International audienceUsed in areas such as pollution measurement or data gathering over battlefields, wireless sensor networks have attracted more and more attention over the last years. The deployment of such a network is accompanied by several security issues, including data confidentiality. Robust encryption algorithms addressed to network communication exist, but they do not always match the low resources restrictions — low processor, memory, limited energy — set upon the sensors. To overcome this, other, simpler solutions have been proposed, such as the Securing Data based on Multi-Path routing method, or an application of the Shamir's Secret Sharing Scheme, which both use distinct paths in the network to send pieces of data obtained by splitting the original message. This paper addresses the two methods named above, and proposes a solution based on traffic classification, using alternatively the Securing Data based on Multi-Path routing method, the Shamir's Secret Sharing Scheme, and strong encryption algorithms
International audienceClustering algorithms have been widely used in many domains so as to partition a set of elements into several subsets, each subset (or ”cluster”) grouping elements which share some similarities. These algorithms are particularly useful in wireless sensor networks (WSNs), where they allow data aggregation and energy cuts. By forming clusters and electing cluster heads responsible for forwarding their packets, the small devices that compose WSNs have not to reach directly the base station (BS) of the network. They spare energy and they can lead further in time their measuring task, so as to detect forest fires or water pollution for example. In this paper, we will apply a new and general clustering algorithm, based on classificability and ultrametric properties, to a WSN. Our goal is to get clusters with a low computational complexity, but with an optimal structure regarding energy consumption
International audienceThe use of sensor networks has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect the network against denial of service attacks with the use of traffic monitoring agents on some nodes. But if the control nodes go down or get compromised, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by introducing an energy-aware and secure method to select these monitoring nodes (called cNodes) in a clustered wireless sensor network. Our election process is done in accordance to their remaining reserves: nodes with the higher residual energy are selected. We discuss limitations of this deterministic process concerning security and cluster coverage, and suggest as a workaround to designate new control nodes (called vNodes). Those vNodes are responsible for monitoring the cNodes by periodically enquiring about their remaining energy and ensuring that they do not lie during the election process (in attempt to keep their cNode role). Finally, we present some experimental results obtained with the ns-3 simulator in order to analyze the impact of our proposal on the energy repartition in the network
Abstract-Over the last decade, the level of critical infrastructure technology has been steadily transforming in order to keep pace with the growing demand for the services offered. The implementation of the smart grid, which relies on a complex and intelligent level of interconnectivity, is one example of how vital amenity provision is being refined. However, with this change, the risk of threats from the digital domain must be calculated. Superior interconnectivity between infrastructures means that the future cascading impacts of successful cyberattacks are unknown. One such threat being faced in the digital domain is the Distributed Denial of Service (DDoS) attack. A DDoS has the goal of incapacitating a server, network or service, by barraging a target with external data traffic in the form of communication requests. DDoS have the potential to cause a critical infrastructure outage, and the subsequent impact on a network of such infrastructures is yet unknown. In this paper, an approach for assessing the future impacts of a cyber-attack in a network of critical infrastructures is presented; with a focus on DDoS attacks. A simulation of a critical infrastructure network provides data to represent both normal run-time and an attack scenario. Using this dataset, a technique for assessing the future impact of disruptions on integrated critical infrastructure network, is demonstrated.
In this era of big data, of quantified self and of smart cities, wireless sensor networks are meant to be used every day, for all sort of applications. Made of tiny sensors, they collect data and communicate through wireless technologies. Because they may take part in sensitive or military applications, security is an essential matter in such networks. Confidentiality and authenticity can be ensured by the use of dedicated mechanisms. Focusing on availability, we propose here a new practical approach to protect the network against denial of service attacks thanks to the use of traffic monitoring agents called cNodes. The approach uses a fair election process of cNodes in accordance with classical criteria related to residual energies and the presence of compromised nodes which may have greedy or jamming behaviors. Results obtained from simulations show that this method is effective both in terms of detection and of energy conservation.
Summary The use of wireless sensor networks (WSNs) has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect clustered network against denial of service attacks with the use of traffic monitoring agents on some nodes. Those control nodes have to analyze the traffic inside a cluster and to send warnings to the cluster head whenever an abnormal behavior (e.g., high packets throughput or non‐retransmission of packets) is detected. But if the control nodes (cNodes) die out of exhaustion, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by renewing periodically the election process. Furthermore, we propose three energy‐aware and secure methods to designate the cNodes in a hierarchically clustered WSN. The first one is a simple self‐election process where nodes randomly designate themselves. It leads to a better load balancing than a static method (i.e., with no renewal), but we argue that we can obtain better results by considering the remaining energy of the nodes at cNodes selection time. Hence, the second algorithm is purely based on the residual energy of the sensors. We discuss limitations of this deterministic process concerning security and cluster coverage and suggest workarounds. These improvements lead us to the third mechanism. It is based on residual energy too, but it includes a democratic election process in which nodes in the cluster vote to optimize the cNode role attribution. Results obtained from simulation experiments with the ns‐2 tool are provided to analyze the energy repartition in the network and to compare the three selection algorithms. All experimental outcomes show improvements of the load balancing in the network, while maintaining good detection coverage, in regard to static selection. Furthermore, the analysis of the respective performances of the three mechanisms is used as a basis to establish recommendations regarding the use cases of those methods. Copyright © 2017 John Wiley & Sons, Ltd.
In this era of big data, of quantified self and of smart cities, wireless sensor networks are meant to be used every day, for all sort of applications. Made of tiny sensors, they collect data and communicate through wireless technologies. Because they may take part in sensitive or military applications, security is an essential matter in such networks. Confidentiality and authenticity can be ensured by the use of dedicated mechanisms. Focusing on availability, we propose here a new practical approach to protect the network against denial of service attacks thanks to the use of traffic monitoring agents called cNodes. The approach uses a fair election process of cNodes in accordance with classical criteria related to residual energies and the presence of compromised nodes which may have greedy or jamming behaviors. Results obtained from simulations show that this method is effective both in terms of detection and of energy conservation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.