Thursday 13 November 2008

Intrusion Detection forWireless Sensor Networks

A WSN consists of a large set of tiny sensor nodes. Sensor nodes can perform
sensing, data processing, and communicating but with limited power,
computational capacities, small memory size, and low bandwidth. Unlike
MANETs, the senor nodes in WSNs are usually static after deployment, and
communicate mainly through broadcast instead of point-to-point communication.
Sensor networks have been used in a variety of domains, such as
military sensing in a battlefield, perimeter defense in critical area such as
airport, intrusion detection for traditional communication network, disasters
monitoring, and home healthcare. Obviously, some applications are
security-critical, which attract many researchers’ attention to secure a sensor
network. Some security protocols or mechanisms have been designed
for sensor network. For example, SPINS, a set of protocols, provides secure
data confidentiality, two-party data authentication, and data freshness and
authenticated broadcast for sensor network.15 LEAP, a localized encryption
and authentication protocol, is designed to support in-network processing
based on the different security requirements for different types of message
exchange. INSENS is an intrusion-tolerant routing protocol for WSNs.17
A lightweight security protocol relying solely on broadcasts of end-to-end
encrypted packets. However, in a sensor network,
as a complicated system, there are always some vulnerabilities to be
attacked.

Reference:Wireless Ad hoc Networking by Shih-Lin Wu & Yu-Chee Tseng

Wireless Ad Hoc Networking
Author:Chang Guang University, Tao-Yuan, Taiwan National Chiao-Tung University, Hsin-Chu, Taiwan
Reader Reviews

What a Techie needs to Understand wireless5
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks by Shih-Lin Wu and Yu-Chee Tseng (Wireless Networks and Mobile Communications: Auerbach) The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and its key technologies and applications over the platforms of personal-area, sensory-area, and local-area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Features:
* Covers key technologies in wireless and ad hoc networks for personal-area, local-area, and sensory-area networks
* Presents state-of-the-art research and developments by an international team of experts
* Explores topics from networking architectures and protocols to implementation experience and measurements

Wednesday 12 November 2008

Multihop Routing Security

Multihop routing security in the integrated networks is another critical issue.
If the multihop routing is corrupted by a malicious intermediary node, the
MS cannot get a correct Internet connection with services. There are three
types of routes in the integrated networks:24 the route from a BS to an MS,
the route from an MS to a BS, and the route between two MSs without
BS. Corresponding to the three types of routes, multihop routing security
should provide security to all the above types of routes. In the process
of route discovery, it is necessary to execute the required principles to
enforce registered MSs to participate in honest route discovery and maintenance
and to exclude the malicious nodes from the routing paths. Owing
to infrastructure-supported multihop routing security, the home network
has the capability to manipulate MS’s billing and credential when an MS
has any malicious action in the process of route discovery. Thus, it is possible
to have a scheme that the Internet maintain a set of metrics to record
the past misbehavers of an MS and a multihop selects well-behaved MSs as
the intermediary MS for packet forwarding. Also, the infrastructure-based
scheme for detecting various misbehaviors is an important issue in the integrated
networks but has been neglected in current security designs. A lot
of issues about securing multihop routing and packet forwarding remain
unexplored:
- How to enforce service availability and cooperation in the integrated
network with a secure mechanism to stimulate MS to participate
in packet forwarding, to refrain from overloading the network, to
thwart the “selfish” MS, and to deter malicious behaviors.
- How to implement fair charging and rewarding for the cooperation
between MSs in packet-forwarding protocol and a reasonable fine
for misbehavers
Reference:Wireless Ad hoc Networking by Shih-Lin Wu & Yu-Chee Tseng

Wireless Ad Hoc Networking
Author:Chang Guang University, Tao-Yuan, Taiwan National Chiao-Tung University, Hsin-Chu, Taiwan
Reader Reviews

What a Techie needs to Understand wireless5
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks by Shih-Lin Wu and Yu-Chee Tseng (Wireless Networks and Mobile Communications: Auerbach) The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and its key technologies and applications over the platforms of personal-area, sensory-area, and local-area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Features:
* Covers key technologies in wireless and ad hoc networks for personal-area, local-area, and sensory-area networks
* Presents state-of-the-art research and developments by an international team of experts
* Explores topics from networking architectures and protocols to implementation experience and measurements

Tuesday 11 November 2008

Design Integration with Ad Hoc Networks

The main disadvantage of WCDMA networks is perhaps on the limited bandwidth available to the users. The emerging multimedia applications (e.g., streaming for high-quality HDTV video) demands high throughput. Therefore, further integration with WLAN and ad hoc networks provides the unique opportunity to connect every user/device with high bandwidth. The primary advantage is the 11-/45-Mbps bandwidth offered by 802.11b/a/g WLAN (infrastructure mode) and perhaps even higher bandwidth for the ad hoc and personal area networks (PAN) networks.
How to integrate these three networks together into a highly efficient and seamless network requires systematic investigation in the future. One typical approach is to have a hierarchical design with the combined WCDMA/WLAN/ad hoc serves as the top–down structure. The integration of WCDMA/WLAN requires the intelligent selection of gateway points in either the WLAN portion or the 3G network to connect the users to the WCDMA core network anywhere.
There are a few schemes83–86 proposed in recent years for such an effort. However, the majority of these schemes assumed that the bandwidth for the 3G core networks will be increased significantly in the near future.
We believe it will take a longer time for WAN/MAN such as WCDMA to deliver high-bandwidth throughput. On the other hand, WLAN and ad hoc networks will have much faster development on delivering high-throughput
products. Thus, our approach87 uses WLAN to cluster mobile users and reduce the 3G radio activity. The philosophy is that when the 3G radio link is less crowded, it most likely provides higher efficiency for the users. Based on the relative BS/AP positions of the WCDMA and WLAN networks, we analyzed six cases of configurations. These six cases cover the majority of scenarios when WCDMA’s BS interacts with WLAN’s APs. We have formulated the problem, and produced the suboptimal solutions to reduce the overall interference between these devices.
When many users connect to a single AP of WLAN, the load imbalance becomes apparent. Ad hoc networks can be jointly integrated between WLAN/ad hoc as the relay points to achieve better load balance. Since ad hoc networks mostly work within a limited distance (e.g., within tens of meters), it is natural to have PANs connected with the combined WCDMA/WLAN networks to extend the global connectivity. One approach to integrate ad hoc networks into the combined WCDMA/WLAN networks is to follow the top–down structure, which only allows the ad hoc networks connect to WLAN only (instead of providing connectivity to the WCDMA core networks, though it is possible). However,
even with this simplified structure division, the overall design task still remains to be a challenge. The key factor is, with the ad hoc networks, relay can be mobile. Though the AP’s location is fixed, it is open to decide which mobile station should serve as the relay point to connect to the AP on behalf of other mobile stations of the same ad hoc networks. Therefore, a higher complexity of overall system design should be addressed. These issues include what
media access methods should the system provide to support different traffic types and what relay structure should be determined with the goal to maximize the overall throughput.

Reference:Wireless Ad hoc Networking by Shih-Lin Wu & Yu-Chee Tseng


Wireless Ad Hoc Networking
Author:Chang Guang University, Tao-Yuan, Taiwan National Chiao-Tung University, Hsin-Chu, Taiwan
Reader Reviews

What a Techie needs to Understand wireless5
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks by Shih-Lin Wu and Yu-Chee Tseng (Wireless Networks and Mobile Communications: Auerbach) The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and its key technologies and applications over the platforms of personal-area, sensory-area, and local-area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Features:
* Covers key technologies in wireless and ad hoc networks for personal-area, local-area, and sensory-area networks
* Presents state-of-the-art research and developments by an international team of experts
* Explores topics from networking architectures and protocols to implementation experience and measurements

Monday 10 November 2008

HART

Highway addressable remote transducer (HART) is a wireless standard
aimed at providing wireless capabilities. The wireless HART working group,
an activity of the HART Communication Foundation (HCF) had set the goal
of producing draft specifications for a wireless standard in early 2006.25
The HCF is an independent, nonprofit organization providing worldwide
support for applications of the HART protocol. The working group plans to
coordinate activities with wireless organizations, in the industry such as the
ISA SP100 Wireless Committee, to ensure continuity and uniformity with
standardization efforts. HCF member companies include major automation
suppliers and leaders: ABB, Adaptive Instruments, Elpro Technologies,
Emerson, Endress+Hauser, Honeywell, Omnex Controls, Phoenix Contact,
Siemens, Smar, and Yokogawa.

Reference : Wireless Ad Hoc Networking by Shih-Lin Wu & Yu-Chee Tseng

Sunday 9 November 2008

Coveraging of aWireless Sensor Network

Coverage is an essential problem in wireless sensor networks. It is important
to ensure that sensors provide sufficient coverage of the sensing field.
However, one should use as few sensors as possible to cover the sensing
field to reduce the hardware cost. Assuming that sensors are randomly
deployed, this section discusses three general models to define the coverage
problem and reviews some solutions to the coverage problem. The
first one is the binary model, where each sensor’s coverage area is modeled
by a disk. Any location within the disk is well monitored by the
sensor located at the center of the disk; otherwise, it is not monitored
by the sensor. The second one is the probabilistic model. An event happening
in the coverage of a sensor is either detected or not detected by the
sensor depending on a probability distribution. Hence, even if an event
is very close to a sensor, it may still be missed by the sensor. The last
model considers the coverage problem by including the issue of how targets
travel along the sensing field. The worst and best traveling paths of
this model can be used to evaluate the sensing capability of the sensor
network.

Reference:Wireless Ad Hoc Networking by Shih-Lin Wu & Yu-Chee Tseng