{"title":"A pragmatic testing approach for wireless sensor networks","authors":"C. Ramassamy, H. Fouchal, P. Hunel, Nicolas Vidot","doi":"10.1145/1868630.1868641","DOIUrl":"https://doi.org/10.1145/1868630.1868641","url":null,"abstract":"Applications over wireless sensor networks are growing quickly. Traditional software development tools are not well adapted to this technology. In particular, adequate testing methodologies are required. Many issues have not been formally addressed as energy-conservation, congestion control, reliability data dissemination, security. In this paper, we present a pragmatic approach to detect some kind of anomalies based on defined scenarios on wireless sensor networks. A scenario is considered as a set of events which should happen on the network in an ordered way. We discuss a formal architecture able to perform these scenarios over the wireless sensor networks and to raise alarms if necessary. This methodology has been implemented on a prototype and has been experimented with various examples. This contribution is a first attempt for a formal testing methodology for wireless sensor networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security features of a generic sensor data acquisition system","authors":"Christian Probst, A. Veichtlbauer","doi":"10.1145/1868630.1868644","DOIUrl":"https://doi.org/10.1145/1868630.1868644","url":null,"abstract":"In building automation IP based network infrastructures aim to reduce facility management costs remarkably by allowing multiple applications to use the one communication network at the same time. This open approach requires a secure and confidential interaction between sensors and users. Data encryption is a suitable solution to ensure this secure transmission inside IP computer networks. The evaluation of different cryptographic methods has shown that RSA and AES fulfill the requirements for a secure communication. This paper presents the concepts for the registration process, the communication between users and sensors and the update process of new sensors and outlines the tests in order to validate the functionality of the concept.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks","authors":"M. Yigitel, Özlem Durmaz Incel, Cem Ersoy","doi":"10.1145/1868630.1868642","DOIUrl":"https://doi.org/10.1145/1868630.1868642","url":null,"abstract":"Popularity of Wireless Sensor Networks (WSNs) combined with the multimedia requirements of new applications have enabled Wireless Multimedia Sensor Networks (WMSNs) which commonly carry heterogeneous traffic. In order to deliver multiple types of traffic with different requirements in highly resource constrained sensor networks, Quality of Service (QoS) provisioning becomes unavoidable. In this work, we propose Diff-MAC; a QoS-aware and priority-based MAC protocol for WMSNs. Diff-MAC aims to increase the utilization of the channel with effective service differentiation mechanisms while providing fair and fast delivery of the QoS-constrained data. Performance evaluation results of Diff-MAC, obtained through extensive simulations, show significant improvements, in terms of latency, data delivery and energy efficiency, compared to two other existing protocols.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohsen Karimzadeh Kiskani, B. Khalaj, Shahin Vakilinia
{"title":"Delay QoS provisioning in cognitive radio systems using adaptive modulation","authors":"Mohsen Karimzadeh Kiskani, B. Khalaj, Shahin Vakilinia","doi":"10.1145/1868630.1868639","DOIUrl":"https://doi.org/10.1145/1868630.1868639","url":null,"abstract":"The spectrum of licensees can be shared by some secondary users in cognitive radio systems. However, the secondary transmitters are limited by an interference threshold constraint which is imposed by the primary receivers in order to ensure primary users' reliable communication. In this paper, we assume that a number of secondary transmitters are trying to transmit their data to some secondary receivers in the presence of primary transmitters and receivers and, therefore, their inflicted interference at the primary receivers should be less than a specific threshold. We consider the delay quality of service and use the idea of effective capacity to guarantee a desired delay quality of service for every secondary link. By maximizing the sum of effective capacities of the secondary links we propose adaptive modulation schemes to support the desired quality of service. Two different optimal (continuous) and suboptimal (discrete) schemes are proposed and the rate and power allocation is obtained for each scheme. The performance of these two schemes is also compared.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private logical neighborhoods for wireless ad hoc networks","authors":"K. Sivakumar, M. Ramkumar","doi":"10.1145/1641944.1641959","DOIUrl":"https://doi.org/10.1145/1641944.1641959","url":null,"abstract":"In wired networks routers are aware of all other routers to which they are directly connected. In contrast, in mobile ad hoc networks (MANETs) a mobile router (node) will not be aware of all nodes within its transmission range. While many MANET routing protocols have been proposed in the literature, only few of them mandate proactive neighborhood discovery protocols like the Internet message encapsulation protocol (IMEP), for identifying all neighbors within a reliable delivery neighborhood (RDN). We argue why it is especially important for secure routing protocols, which have the additional constraint of the need to \"live with\" non cooperative nodes, to go beyond simply mandating an RDN, by mandating a private logical neighborhood (PLN).","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125860130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REALISM: rendering anonymity and lightweight security with mobility in wireless ad hoc and mesh networks","authors":"Sadeq Ali Makram, Fahad Samad","doi":"10.1145/1641944.1641964","DOIUrl":"https://doi.org/10.1145/1641944.1641964","url":null,"abstract":"The threat of possible malicious activities that can be executed by adversaries impedes the rapid deployment of wireless networks. Researchers and scientists have rendered various mechanisms in order to preclude or at least mitigate such activities. Many of these strategies necessitate or presume the presence of a trusted authority to actualize their implementation. This, of course, in the wireless networks is quite unmanageable and requires extra messages and management overhead. In this paper, we present a secure and anonymity-friendly mechanism for wireless ad hoc and mesh networks. This approach provides a secure connection establishment based on neighborhood trust. Moreover, it preserves anonymity of any two communication parties using exceedingly lightweight security scheme. In addition, it also offers seamless secure connectivity to mobile nodes. Our proposed solution applies to both mesh and ad hoc networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster-based scheduling for object detection in wireless multimedia sensor networks","authors":"Mohammad Alaei, J. Barceló-Ordinas","doi":"10.1145/1641944.1641955","DOIUrl":"https://doi.org/10.1145/1641944.1641955","url":null,"abstract":"Network lifetime is always an important topic in wireless sensor networks. The case of Wireless Multimedia Sensor Networks present additional features such as the fact of transmitting multimedia rich data or the fact of having directional sensing areas. This paper presents a scheduling scheme for clustered nodes according to overlapped Field of View (FoV) regions. This approach schedules nodes applying coordination and collaborations among members of clusters to sense the environment while each cluster covers a specific region defined by the degree of overlapping FoV. The objective of this mechanism is to increase power conservation by avoiding similar sensing and redundant processing. Evaluation shows that the proposed scheduling reduces the average energy consumption and thus improves network lifetime.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed key management for wireless sensor networks","authors":"Kuldeep, G. R. Murthy","doi":"10.1145/1641944.1641950","DOIUrl":"https://doi.org/10.1145/1641944.1641950","url":null,"abstract":"The recent research in sensor networks has led to a number of security schemes. The main requirement of wireless sensor networks is not only security but energy efficient security due to resource constrained nature of sensor nodes. We have developed an energy and storage efficient key distribution scheme using leveling and sectoring. In this scheme, node communicates with their neighbors to setup pair wise keys without any central authority. Proposed protocol is fully distributed and uses negligible communication for key setups between different nodes. Distributed nature of this protocol makes it more faults tolerant. Pair wise keys are different for each pair of nodes, so a small part of network is affected due to node compromise attacks. It is fully developed in TinyOS-2.x and tested in avrora emulator. We are also planning to add code of this key management protocol in TinyOS-2.x contributory section. Use of level and sector also solves problem of localization.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bastani, S. Yousefi, M. Mazoochi, A. Ghiamatyoun
{"title":"On the QoS tree construction in WiMAX mesh networks based on genetic algorithm approach","authors":"S. Bastani, S. Yousefi, M. Mazoochi, A. Ghiamatyoun","doi":"10.1145/1641944.1641946","DOIUrl":"https://doi.org/10.1145/1641944.1641946","url":null,"abstract":"We study the influence of tree's depth and nodes' fan-out on the performance of WiMax mesh networks. For a given tree topology, we first analytically obtain per-node delay and per-node throughput. Then among plenty of tree topologies, extractable from a given network's graph, we search feasible trees which fulfil some per-node and network QoS requirements. Since the searching space is potentially very huge, we use a genetic algorithm in order to explore enough good delay and throughput trade-off. We use the Pruefer code tree representation followed by novel genetic operators. Moreover, by using proper fitness functions, we are able to investigate any desired delay and throughput trade-off in a unified framework. Employing genetic algorithm approach leads to the exploration of extremely wide search space in a reasonably short time, which results in overall scalability and accuracy of the proposed tree exploration algorithm. Due to fast convergence, the proposed genetic algorithm is a good candidate to be implemented in a real-life Base Station (BS) in order to construct adaptive tree topologies based on nodes' traffic demand.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust dynamic user authentication scheme for wireless sensor networks","authors":"B. Vaidya, J. Silva, J. Rodrigues","doi":"10.1145/1641944.1641962","DOIUrl":"https://doi.org/10.1145/1641944.1641962","url":null,"abstract":"In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For instance, WSNs can be deployed in insecure and unattended environments. In this regard, user authentication is a critical issue for WSNs. In this paper, we propose a user authentication protocol in WSNs, which is variation of strong-password based solution proposed by Wong et al. The proposed protocol is evaluated and compared with the previous schemes.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}