Do you want to publish a course? Click here

Review of the causes of energy waste in WSN and classification of some attacks that target source of energy based on B-MAC protocol

استعراض مسببات هدر الطاقة في شبكات الحساسات اللاسلكية و تصنيف بعض الهجمات التي تستهدف منابع الطاقة المعتمدة على البروتوكول B-MAC

1225   0   38   0 ( 0 )
 Publication date 2013
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

Wireless sensor network have become widely used in many civil and military issues. Like all other network, it is exposed to attacks but its simplicity structured (CPU & memory) prevent the traditional defense technic to be applied, so they need a special for defense. Most security researches focus on data righteousness and privacy, in this research we focus on attacks that aimed to the power resources which are referred as Denial Of Sleep attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the power source to be drained very quickly so that it is a very dangerous attack. In this research we reviewed the sources of energy Loss in wireless sensor network and classified the attacks that target the power resource, we built a simulation module to analysis the B-MAC protocol response to denial of sleep attacks.


Artificial intelligence review:
Research summary
تتناول هذه الدراسة موضوع شبكات الحساسات اللاسلكية (WSN) التي أصبحت واسعة الانتشار في العديد من المجالات المدنية والعسكرية والبحثية. نظرًا لبساطة تركيبتها، فإنها تحتاج إلى تقنيات خاصة للحماية من الهجمات التي تستهدف موارد الطاقة، والتي تُعرف بهجمات رفض الدخول في وضع الإثبات (DoS). يركز البحث على تحليل البروتوكول B-MAC، وهو أحد البروتوكولات الشائعة في شبكات الحساسات اللاسلكية، وكيفية استجابته لهجمات رفض الدخول في وضع الإثبات. تم بناء نموذج محاكاة باستخدام بيئة OMNet++ والبنية MiXiM لتحليل تأثير هذه الهجمات على استهلاك الطاقة في الشبكة. أظهرت النتائج أن الهجمات من النوع الثالث (معلومات كاملة عن البروتوكول والشبكة مخترقة) هي الأكثر تأثيرًا على استهلاك الطاقة وتؤدي إلى تعطل الشبكة بشكل أسرع مقارنة بالأنواع الأخرى من الهجمات. يوصي البحث بضرورة تطوير آليات للكشف عن هذه الهجمات وصدها لضمان استمرارية عمل الشبكة.
Critical review
دراسة نقدية: على الرغم من أن البحث يقدم تحليلًا شاملاً لهجمات رفض الدخول في وضع الإثبات وتأثيرها على شبكات الحساسات اللاسلكية، إلا أنه كان من الممكن توسيع نطاق الدراسة لتشمل بروتوكولات أخرى غير B-MAC لتحليل مدى تأثير الهجمات على بروتوكولات متنوعة. كما أن البحث اعتمد بشكل كبير على المحاكاة، وكان من الممكن تعزيز النتائج بإجراء تجارب ميدانية للحصول على بيانات أكثر واقعية. بالإضافة إلى ذلك، كان من الممكن تقديم توصيات أكثر تحديدًا حول كيفية تحسين بروتوكول B-MAC لمواجهة هذه الهجمات بشكل أكثر فعالية.
Questions related to the research
  1. ما هي الهجمات التي يركز عليها البحث في شبكات الحساسات اللاسلكية؟

    يركز البحث على الهجمات التي تستهدف موارد الطاقة في شبكات الحساسات اللاسلكية، والتي تُعرف بهجمات رفض الدخول في وضع الإثبات (DoS).

  2. ما هو البروتوكول الذي تم تحليله في البحث؟

    تم تحليل بروتوكول B-MAC في البحث، وهو أحد البروتوكولات الشائعة في شبكات الحساسات اللاسلكية.

  3. ما هي بيئة المحاكاة المستخدمة في البحث؟

    استخدمت بيئة المحاكاة OMNet++ والبنية MiXiM لتحليل تأثير الهجمات على استهلاك الطاقة في الشبكة.

  4. ما هي التوصيات التي قدمها البحث؟

    يوصي البحث بضرورة تطوير آليات للكشف عن هجمات رفض الدخول في وضع الإثبات وصدها لضمان استمرارية عمل الشبكة.


References used
FORSTER, A. ,Implementation of the B-MAC Protocol for WSN in MiXiM. Networking Laboratory, University of Applied Sciences of Southern SwitzerlandK 2009, 2pages
STANKOVIC, J. A. Wireless Sensor Networks. University of Virginia, Charlottesville Virginia , 2006, 20 pages
YADAV, R. et al. A survey of MAC protocols for wireless sensor networks. UbiCC journal, 2009, 7Pages
rate research

Read More

The reducing of energy consumption for various nodes in wireless sensor networks plays an important and essential role in the prolonging of the life of these networks. In order not to be the energy consumption in some node is very high and in other s is less or very low, the choice of distribution algorithms of the nodes role, as a router node or terminal nodes, and switching between them, plays an important role in prolonging the lifetime of wireless sensor networks. This paper presents an algorithm for the distribution of WSN nodes roles, including allowing the applying of many tree patterns to a single network. This offers the potential to alter the network nodes roles centrally by coordinator and switching between these tree patterns whenever the need arises according to the indicators of energy consumption in the nodes. The results show that the use of the algorithm leads to a significant improvement in the network life ranges between 2 and 4 times, according to the allowing the nodes to sleep and wakeup, or not, for different transmission rates where the scenarios have been tested for ZigBee based wireless sensors networks using NS-2 simulator.
Wireless Sensor Networks (WSN) have applications in many different areas of life, such as health care, environmental monitoring, and military and economic areas and in industrial automation and many other applications. The development of these net works and the improvement of their performance occupy an important place of interest in research centers and specialized scientific institutes. The interest in these structures as a way to improve the performance of these networks leads to good results in this area. The cluster structure is one of the most important structures that have received increasing attention over recent years. This research suggested a modification of the structure of the cluster tree WSN dividing clusters into sub-groups, and each group of these sub-groups operates like a tree from a small amount of nodes. The results that have been obtained by means of simulation indicate a significant improvement in terms of reducing energy consumption and thus an increase in the lifetime of the network, as compared to traditional cluster tree WSN. But that was at the expense of slightly lower rates of transmission and delivery ratio in the nodes of these networks. This leads us to recommend using this method to build the networks used to monitor protected agriculture and other networks with low transmission rates.
The dynamic clustering-based hierarchical routing protocols are one of the methods used to save energy and increase the lifetime of wireless sensor networks, however, that most of the researches are neglecting the energy expended in election of the heads and formation of clusters in the network. In this paper, we examine the overhead energy caused by hierarchical routing protocols based on dynamic clustering and study its impact on the stability period of the wireless sensor networks. Also, we proposed a solution to limit this energy by reducing the consumed energy in election of heads and clusters formation operations. It is shown through the simulation results that the energy consumed in LEACH setup phase decreases the stability period of these networks and increases the number of dead nodes. And the use of the proposed solution reduced the energy consumption during the election of the heads and the formation of clusters clearly compared to the normal way followed in LEACH, which has increased stability period and the number of live nodes in the network.
Routing protocols play an essential role in meeting the quality of service requirements in the network, but achieving these requirements may require frequent send and receive operations to build and maintain routing tables, which consume sensors r esource If we take into consideration the limitations of wireless sensor networks in terms of the amount of available energy and storage capacity. In this research a performance comparison of the on-demand Distance Vector Routing protocol AODV and Hierarchical Routing protocolHR was carried out in terms of the packet delivery and loose rate, delay and jitter, and the amount of expended energy in the Wireless sensor network operates according to IEEE802.15.4 standard in cases where some of sensors get out of work for limited periods of time. The results showed that the hierarchical routing protocols perform better in terms of delay time and transfer rate and the amount of consumed energy than on-demand Distance Vector Routing protocol routing protocol, but suffer larger packet loss due to routing path corruption as a result of sensors crashes.
In this PAPER, we perform a study and extensive comparative between the well-known link quality estimators and CTP, a tree-based routing protocol provided by TinyOS for different network topology and simulate it using TOSSIM simulator to evaluate the performance of these estimators.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا