In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or...In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.展开更多
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head...An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.展开更多
This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion...This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion.The connectivity criterion is probabilistic and considers inherently distinct groups of parameters:technical parameters that determine the network function at specific levels of the communication stack and physical parameters that describe the environment in the water area.The proposed approach enables researchers to evaluate the network characteristics in terms of energy efficiency and reliability while considering specific network and environmental parameters.Moreover,this approach is a simple and convenient tool for analyzing the effectiveness of protocols in various open systems interconnection model levels.It is possible to assess the potential capabilities of any protocol and include it in the proposed model.This work presents the results of modeling the critical characteristics of heterogeneous three-dimensional UWASNs of different scales consisting of stationary sensors and a wave glider as a mobile gateway,using specific protocols as examples.Several alternative routes for the wave glider are considered to optimize the network’s functional capabilities.Optimal trajectories of the wave glider’s movement have been determined in terms of ensuring the efficiency and reliability of the hybrid UWASN at various scales.In the context of the problem,an evaluation of different reference node placement was to ensure message transmission to a mobile gateway.The best location of reference nodes has been found.展开更多
对于普遍存在的异构传感器网络,目前尚缺乏有力的方法解决其覆盖势力的剖分问题。对此,该文提出一种本地化的覆盖势力剖分算法—CFA(Coverage Force Algorithm)。该算法根据节点感应能力的差异,构建基于感应异构性的"通用Voronoi&q...对于普遍存在的异构传感器网络,目前尚缺乏有力的方法解决其覆盖势力的剖分问题。对此,该文提出一种本地化的覆盖势力剖分算法—CFA(Coverage Force Algorithm)。该算法根据节点感应能力的差异,构建基于感应异构性的"通用Voronoi"图,能有效对网络中异构节点的覆盖势力范围进行剖分。实验证明,CFA算法解决了异构网络覆盖性能分析问题,和传统的Voronoi图方法相比,具有广普性和本地化的特点。展开更多
文摘In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.
文摘An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes.
基金partially funded by the Ministry of Science and Higher Education of the Russian Federation as a part of World-class Research Center Program:Advanced Digital Technologies(contract No.075-15-2022-312 dated 20 April 2022).
文摘This work proposes an innovative approach to evaluate the functional characteristics of a heterogeneous underwater wireless acoustic sensor network(UWASN)using a stochastic model and the network connectivity criterion.The connectivity criterion is probabilistic and considers inherently distinct groups of parameters:technical parameters that determine the network function at specific levels of the communication stack and physical parameters that describe the environment in the water area.The proposed approach enables researchers to evaluate the network characteristics in terms of energy efficiency and reliability while considering specific network and environmental parameters.Moreover,this approach is a simple and convenient tool for analyzing the effectiveness of protocols in various open systems interconnection model levels.It is possible to assess the potential capabilities of any protocol and include it in the proposed model.This work presents the results of modeling the critical characteristics of heterogeneous three-dimensional UWASNs of different scales consisting of stationary sensors and a wave glider as a mobile gateway,using specific protocols as examples.Several alternative routes for the wave glider are considered to optimize the network’s functional capabilities.Optimal trajectories of the wave glider’s movement have been determined in terms of ensuring the efficiency and reliability of the hybrid UWASN at various scales.In the context of the problem,an evaluation of different reference node placement was to ensure message transmission to a mobile gateway.The best location of reference nodes has been found.
文摘对于普遍存在的异构传感器网络,目前尚缺乏有力的方法解决其覆盖势力的剖分问题。对此,该文提出一种本地化的覆盖势力剖分算法—CFA(Coverage Force Algorithm)。该算法根据节点感应能力的差异,构建基于感应异构性的"通用Voronoi"图,能有效对网络中异构节点的覆盖势力范围进行剖分。实验证明,CFA算法解决了异构网络覆盖性能分析问题,和传统的Voronoi图方法相比,具有广普性和本地化的特点。