Volume-2 ~ Issue-4
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Wireless Sensor Network: An Emerging Technology |
| Country | : | Bangladesh |
| Authors | : | Monjur Ahmed |
| : | 10.9790/2834-0240104 ![]() |
|
Abstract: Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of network management. Wireless sensor networks are emerging very rapidly and have already demanded keen interests from researchers. As a relatively new concept in the world of communication, a number of aspects are being explored by the researchers including routing and security features of the wireless sensor networks. Like any wireless network, power consumption has always been a critical issue for wireless sensor networks. This is also due to the environmental constraint in which the wireless sensor networks are normally deployed. This paper provides an overview of this emerging technology by addressing its architecture, deployment and key issues e. g. energy-efficiency, routing, reliability and security
Key words: wireless sensor network, reliability, routing, security, sensor
Key words: wireless sensor network, reliability, routing, security, sensor
[1] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal: "Wireless Sensor Network Survey", Computer Networks, 52, pp. 2292-2330. (2008)
[2] Deepak Ganesan, Alberto Cerpa, Wei Ye, YanYu, Jerry Zhao, and Deborah Estrin: "Networking Issues in Wireless Sensor Networks", Journal of parallel and distributed computing, 64, pp. 799-814. (2004)
[3] Moshaddique Al Ameen, Kyung-sup Kwak: "Social Issues in Wireless Sensor Network with Health Perspective", The International Arab Journal of Information Technology, 8, pp. 52-58. (2011)
[4] Tarique Haider, Mariam Yusuf: "A Fuzzy Approach to Energy Optimized Routing for Wireless Sensor Networks", The International Arab Journal of Information Technology, 6, pp. 179-185. (2009)
[5] Shio Kumar Singh, M P Singh, D K Singh: "Routing Protocols in Wireless Sensor Networks – A Survey", International Journal of Computer Science & Engineering Survey (IJCSES), 1, pp. 63-83. (2010)
[6] Hemanta Kumar Kalita, Avijit Kar: "Wireless Sensor Network Security Analysis", International Journal of Next-Generation Networks (IJNGN), 1, pp. 1-10. (2009)
[7] Kavi K. Khedo, Rajiv Perseedoss, Avinash Mungur: "A Wireless Sensor Network Air Pollution Monitoring System", International Journal of Wireless & Mobile Networks (IJWMN), 2, pp. 31-45. (2010)
[8] Kshitij Shinghal, Dr. Arti Noor, Dr. Neelam Srivastava, Dr. Raghuvir Singh: "Intelligent Humidity Sensor for Wireless Sensor Network Agricultural Application", International Journal of Wireless & Mobile Networks (IJWMN), 3, pp. 118-128. (2011)
[9] Ning Wang, Naiqian Zhang, Maohua Wang: "Wireless Sensors in Agriculture and Food Industry – Recent Development and Future Perspective", Computers and Electronics in Agriculture, 50, pp. 1-14. (2006)
[10] Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab: "Review of Wireless Sensor Networks – Architecture and Applications", International Journal of Computer Science & Management Studies, 11, pp. 34-38. (2011)
[2] Deepak Ganesan, Alberto Cerpa, Wei Ye, YanYu, Jerry Zhao, and Deborah Estrin: "Networking Issues in Wireless Sensor Networks", Journal of parallel and distributed computing, 64, pp. 799-814. (2004)
[3] Moshaddique Al Ameen, Kyung-sup Kwak: "Social Issues in Wireless Sensor Network with Health Perspective", The International Arab Journal of Information Technology, 8, pp. 52-58. (2011)
[4] Tarique Haider, Mariam Yusuf: "A Fuzzy Approach to Energy Optimized Routing for Wireless Sensor Networks", The International Arab Journal of Information Technology, 6, pp. 179-185. (2009)
[5] Shio Kumar Singh, M P Singh, D K Singh: "Routing Protocols in Wireless Sensor Networks – A Survey", International Journal of Computer Science & Engineering Survey (IJCSES), 1, pp. 63-83. (2010)
[6] Hemanta Kumar Kalita, Avijit Kar: "Wireless Sensor Network Security Analysis", International Journal of Next-Generation Networks (IJNGN), 1, pp. 1-10. (2009)
[7] Kavi K. Khedo, Rajiv Perseedoss, Avinash Mungur: "A Wireless Sensor Network Air Pollution Monitoring System", International Journal of Wireless & Mobile Networks (IJWMN), 2, pp. 31-45. (2010)
[8] Kshitij Shinghal, Dr. Arti Noor, Dr. Neelam Srivastava, Dr. Raghuvir Singh: "Intelligent Humidity Sensor for Wireless Sensor Network Agricultural Application", International Journal of Wireless & Mobile Networks (IJWMN), 3, pp. 118-128. (2011)
[9] Ning Wang, Naiqian Zhang, Maohua Wang: "Wireless Sensors in Agriculture and Food Industry – Recent Development and Future Perspective", Computers and Electronics in Agriculture, 50, pp. 1-14. (2006)
[10] Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab: "Review of Wireless Sensor Networks – Architecture and Applications", International Journal of Computer Science & Management Studies, 11, pp. 34-38. (2011)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Security Framework for Wireless Sensor Networks: IBE-Tru |
| Country | : | India |
| Authors | : | Malathi V, Dr. B Sivakumar |
| : | 10.9790/2834-0240509 ![]() |
|
Abstract: The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework incorporates ideas from Trusted Computing Group (TCG) and the Identity based cryptosystem developed by Boneh Franklin in ensuring trusted and secure communications between sender and receiver. The framework and proposed implementation procedures are briefly discussed. The proposed framework which was developed on TinyOS platform was simulated using TOSSIM on Micaz nodes and a study was carried out to compare memory utilizations of the proposed security framework with those obtained in a recent similar work.
[1] N. Gura, A. Patel, A. Wander et al., Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPU: Spingler Berlin, 2004.
[2] D. J. Malan, M. Welsh, and M. D. Smith, "A Public key Infrastructure for key Distribution in Tiny-OS based on Elliptic Curve Cryptography," in First IEEE Conference on Sensor and Ad Hoc Communications and Neworks, California, pp. 71-80,2004
[3] A. S. K. Pathan, and H. Choong Seon, "Feasibility of PKC in resource-constrained wireless sensor networks," in Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on, pp. 13- 20,2008.
[4] A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology- Crypto84, vol. 196, pp. 47, 1984.
[5] D. Boneh, and M. Franklin, "Idenetity-based encryption from weil pairing," Advance in cryptology-crypto, vol. 2139, pp. 29, 2001.
[6] J. Zhang, and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of Network and Computer Applications, vol. In Press, Corrected Proof, 2009.
[7] R. Watro, D. Kong, S.-F. Cuti et al., "TinyPK: Securing Sensor Networks with Public Key Technology," in 2nd Workshop on Security of Ad Hoc and Sensor Networks SASN'04, Washinton DC, USA, pp. 59-64,2004.
[8] L. Martin, G. Appenzeller, and M. Schertler, "RFC5408 - Identity-Based Encryption Architecture and Supporting," Network working Group, 2009.
[9] G. Yang, C.-m. Rong, C. Veigner et al., "Identity-based key agreement and encryption for wireless sensor networks," The Journal of China Universities of Posts and Telecommunications, vol. 13, no. 4, pp. 54-60, 2006.
[10] G. Zhi, S. Huiping, C. Zhong et al., "Efficient Identity-Based Key Issue with TPM," in Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, pp. 2354- 2359,2008.
[2] D. J. Malan, M. Welsh, and M. D. Smith, "A Public key Infrastructure for key Distribution in Tiny-OS based on Elliptic Curve Cryptography," in First IEEE Conference on Sensor and Ad Hoc Communications and Neworks, California, pp. 71-80,2004
[3] A. S. K. Pathan, and H. Choong Seon, "Feasibility of PKC in resource-constrained wireless sensor networks," in Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on, pp. 13- 20,2008.
[4] A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology- Crypto84, vol. 196, pp. 47, 1984.
[5] D. Boneh, and M. Franklin, "Idenetity-based encryption from weil pairing," Advance in cryptology-crypto, vol. 2139, pp. 29, 2001.
[6] J. Zhang, and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of Network and Computer Applications, vol. In Press, Corrected Proof, 2009.
[7] R. Watro, D. Kong, S.-F. Cuti et al., "TinyPK: Securing Sensor Networks with Public Key Technology," in 2nd Workshop on Security of Ad Hoc and Sensor Networks SASN'04, Washinton DC, USA, pp. 59-64,2004.
[8] L. Martin, G. Appenzeller, and M. Schertler, "RFC5408 - Identity-Based Encryption Architecture and Supporting," Network working Group, 2009.
[9] G. Yang, C.-m. Rong, C. Veigner et al., "Identity-based key agreement and encryption for wireless sensor networks," The Journal of China Universities of Posts and Telecommunications, vol. 13, no. 4, pp. 54-60, 2006.
[10] G. Zhi, S. Huiping, C. Zhong et al., "Efficient Identity-Based Key Issue with TPM," in Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, pp. 2354- 2359,2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, we proposed coprocessor can be used for communication operations, such as scrambling, interleaving, convolutional encoding, viterbi decoding, FFT, and several other functions using the proposed design. The coprocessor has been modeled by VHDL. Performance comparisons shows that the number of clock cycles can be reduced about 48% for scrambling and 84% for convolutional encoding compared with existing DSPs. From the results, performance of proposed coprocessor is better than conventional DSP (SC140) in terms of number of clock per cycle and gate counts.
Keywords: scrambling, convolutional encoding, interleaving, modulation, viterbi decoding, FFT.
Keywords: scrambling, convolutional encoding, interleaving, modulation, viterbi decoding, FFT.
[1] Jeong H. Lee, Sug H. Jeong and Myung H. Sunwoo ,"Application-specific DSP architecture for OFDM- Modem-systems," in Proc. IEEE Workshop on Signal Processing Syst. (SIPS'2003), Aug. 2003.
[2] Albonesi, David. "Selective Cache Ways: On-Demand Cache Resource Allocation." Journal of Instructional- Level-Parallelism 2 (2000).
[3] Sung D. Kim, Sug H. Jeong, Myung H. Sunwoo, andKyung H. Kim,"NOVEL BIT MANIPULATION UNIT FOR COMMUNICATION DIGITAL SIGNAL PROCESSORS," in Proc. Int. Symp. On Circuits and Systems, Vancouver, Canada, May 2004.
[4] Motorola Semiconductors Inc., SC140 DSP CoreReference Manual, Denver, Colo, USA, 2001.
[5] IEEE, 802.11a Wireless LAN Medium Access Control and Physical Layer Specifications, September 1999.
[6] G.M. Bhat*, M. Mustafa**, Shabir Ahmad** and Javaid Ahmad**."VHDL modeling and Simulation of data scrambler and descrambler for secure data communication" University of Kashmir, Srinagar, India.
[7] Yunghsiang S. Han "Introduction to Binary Convolutional Codes" Graduate Institute of Communication Engineering,National Taipei University Taiwan.
[8] HelsinkiUniversityofTechnologyS-72.333PostgraduateSeminaronRadio ommunications"Convolutional Coding & Viterbi Algorithm" Communications Laboratory16.11.2004.
[9] Giuseppe Anastasi_ , Eleonora Borgia#,"HI : "An Hybrid Adaptive Interleaved Communication Protocolfor Reliable Data Transfer in WSNs with Mobile Sinks" University of Pisa
[10] Leif Wilhelmsson, Member, IEEE, and Laurence B. Milstein, Fellow, "On the Effect of Imperfect Interleaving for the Gilbert–Elliott Channel" VOL. 47, NO. 5, MAY 1999.
[2] Albonesi, David. "Selective Cache Ways: On-Demand Cache Resource Allocation." Journal of Instructional- Level-Parallelism 2 (2000).
[3] Sung D. Kim, Sug H. Jeong, Myung H. Sunwoo, andKyung H. Kim,"NOVEL BIT MANIPULATION UNIT FOR COMMUNICATION DIGITAL SIGNAL PROCESSORS," in Proc. Int. Symp. On Circuits and Systems, Vancouver, Canada, May 2004.
[4] Motorola Semiconductors Inc., SC140 DSP CoreReference Manual, Denver, Colo, USA, 2001.
[5] IEEE, 802.11a Wireless LAN Medium Access Control and Physical Layer Specifications, September 1999.
[6] G.M. Bhat*, M. Mustafa**, Shabir Ahmad** and Javaid Ahmad**."VHDL modeling and Simulation of data scrambler and descrambler for secure data communication" University of Kashmir, Srinagar, India.
[7] Yunghsiang S. Han "Introduction to Binary Convolutional Codes" Graduate Institute of Communication Engineering,National Taipei University Taiwan.
[8] HelsinkiUniversityofTechnologyS-72.333PostgraduateSeminaronRadio ommunications"Convolutional Coding & Viterbi Algorithm" Communications Laboratory16.11.2004.
[9] Giuseppe Anastasi_ , Eleonora Borgia#,"HI : "An Hybrid Adaptive Interleaved Communication Protocolfor Reliable Data Transfer in WSNs with Mobile Sinks" University of Pisa
[10] Leif Wilhelmsson, Member, IEEE, and Laurence B. Milstein, Fellow, "On the Effect of Imperfect Interleaving for the Gilbert–Elliott Channel" VOL. 47, NO. 5, MAY 1999.
