Design Challenges and Practical Solutions for Securing Wireless Body Area Networks

Size: px
Start display at page:

Download "Design Challenges and Practical Solutions for Securing Wireless Body Area Networks"

Transcription

1 Design Challenges and Practical olutions for ecuring Wireless Body Area Networks Dr. Ming Li 10/16/2013 Assistant Professor, Dept. of Computer cience, Utah tate University

2 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 2

3 Background Wireless Body Area Network (BAN) 3 [ource:

4 ecurity Issues in BAN Medical devices can also have actuators 4 Who has to die before ecurity is Increased in Wireless Enabled Medical Devices?

5 ecurity Issues in BAN (cont d) ystem and device-level security (authentication & integrity) Data must come from legitimate devices, and should not be modified. Affect safety! Invasion of privacy (data confidentiality) Why should we care? Availability (robustness) Against inadvertent or malicious Denial-of-ervice 5 Wearable ECG monitors Pulse Oximeter Glucose Monitors Cardiac Defibrillators

6 ecure Trust Initialization Bootstrap secure communication within a BAN Establish authenticated secret keys to protect BAN from attacks ecuring both one-to-one and group communication Attack model Can eavesdrop, modify, insert, delete information from the wireless channel May compromise devices afterwards General assumption 6 Devices share no secret information a priori

7 BAN ecurity Challenges Resource-constraint Battery power; Hardware (memory, speed, interfaces) etc. - lightweight ecurity & safety dilemma trict security is needed in normal cases But how about in an emergency? - fail safe Usability requirement Your grandma should be able to use it! - intuitive 7

8 Key pre-distribution Existing Approaches Requires physical contact or extra hardware Not easy to update keys E.g.: Resurrecting duckling [Andersen, 1999]; (wire, UB) Message-in-a-bottle, [enys 07], KALwEN (faraday cage). Biometrical measurements Extract keys from shared biometric signs; plug-and-play Require specialized sensing hardware E.g.: [Poon et al., IEEE Communication Magazine 2006; Venkatasubramanian et al., IEEE Transaction 2010; Venkatasubramanian et al., TON 2010; Xu et al., INFOCOM 2011] 8

9 Physical-layer ecurity Approaches Basic idea Non-cryptographic, use the characteristics of wireless channel Advantage: against key compromise, etc. Related work ecret key extraction from wireless channel [Mathur et. al. Mobicom 2008; Jana et. al. Mobicom 2009; Lai et. al. Allerton 2011] Vulnerable to Man-in-the-Middle (MitM) attack! Physical-layer authentication/proximity-based access control [Cai et al., ND 2011; Mathur et al., Mobiys 2011; Patwari et al., MobiCom 2007; Rasmussen et al., CC 2009; Zeng et al., Wireless Commun. 2010] Need advanced hardware: not compatible 9

10 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 10

11 Problem tatement Can we achieve BAN device authentication without out-of-band channels and human interaction? (merely using wireless) Lu hi*, Ming Li #, hucheng Yu *, Jiawei Yuan, * ACM Wiec, Tucson, AZ,

12 Goal: Models and Assumptions CU differentiates on-body sensors from off-body sensors On-body sensors authenticate CU. Assumption Honest sensor nodes are on-body CU is on-body or near-body, relatively static to the body whether static or in motion during authentication. 12

13 Models and Assumptions (cont d) ystem Model Multiple COT sensors and one CU. CU is not compromised. No additional hardware or out-of-band channel. Attack Model One or more attackers, physically away from body. Eavesdropping, message injection, changing transmission power. Jamming or Do attacks are not considered. 13

14 Exploit Unique Channel Characteristics Observation 1: RI variations for on-body channels are greatly different from RI variations between off-body channels, under artificially introduced motions or channel disturbance. RI variations can be used as an indicator of channel stability. 14

15 15 Experiment Evidence

16 Theoretical Explanation On-body Channel: effect of human body is negligible for onbody devices which are very close and relative static to each other; direct path effect is the dominant factor. Off-body Channel: motions introduce Doppler shift; multipath effect is the dominant factor. 16

17 BANA Protocol The metric to differentiate between on-body sensors and off-body sensors? Average RI variations (ARV) ARV i = um i /NT, while um i = Σ RI k -RI K-1 How to deal with ARVs for final decision? Classification: [ accept ], [ reject ] 17

18 18 BANA Protocol

19 ensor deployment: Experiment etup 7 on-body; chest, arm, waist, thigh. 6 off-body. Experiment locations: (WxLxH, m) mall room: 2.8x3.3x2.7 Medium room: 4.5x5.5x2.7 Corridor: 4.5x40x2.7 19

20 Experiment Testing Plans Involve 2 males and 1 female as patients. Patient movements: walking, sitting & rotating, sitting & rolling. Attacker Placement: inside, next door, far away. Attacker movements: static, following. Each experiment duration: 2 min. 20

21 ARV measurements in 5 Test Plans ARVs of 34/35 on-body sensors are less than 4dB. ARVs of on-body sensors are relatively small. Utilize K-means clustering to partition ARVs into two groups. 21

22 Effectiveness False positive rates and false negative rates are calculated based on 15 sets of data under different settings. 22

23 ecurity Against trategic Attackers Attacker strategy 1: deploy a large number of attacker nodes to deviate classification result. expensive & easily detected. 23

24 ecurity Against trategic Attackers Attacker strategy 2: statistically predict the communication channel between on-body sensors and CU. Predict the channel and change transmission power or refer to historical measurements Channel is dynamic with short coherence time Both CU and on-body sensors are more than half wavelength away from off-body attackers. Beam-Forming Attacks Raise suspicion due to large size. Difficult to perform in NLO scenarios. 24

25 Efficiency Authentication time is up to 12 second. Computation and communication cost is negligible for sensor nodes. 25

26 ummary Discovered a new type of channel characteristics in BAN environment. Proposed BANA: lightweight, commercial off-the-shelf, non-cryptographic without prior-trust, fail-safe. Experiments show effectiveness and efficiency of BANA. 26

27 Outline Background on Body Area Networks (BAN) Main Design Challenges BANA: Body Area Network Authentication Exploiting Channel Characteristics AK-BAN: Authenticated ecret Key Extraction for BANs Conclusion and Future Work 27

28 Problem tatement Can we achieve authenticated secret key extraction in BAN using merely wireless communication? Lu hi*, Jiawei Yuan *, hucheng Yu *, Ming Li #, ACM Wiec, Budapest, Hungary, April

29 The Challenge: A Dilemma Rate is the critical issue for key generation Higher key generation rate requires dynamic channel. Device authentication via BANA requires the opposite Utilizes stability of on-body channel How to solve this tension? 30

30 Unique Channel Characteristics Observation II: On-Body channels exhibit obviously different RI variations Channels between Line-of-sight on-body devices tend to be much more stable than devices in Non-line-of-sight locations (e.g. front-to-back). Can deploy auxiliary sensor to create both channels 31 Wiec 2013

31 R (dbm) R (dbm) Experimental Evidence Channels between CU and 1 to 5 Front View Back View CU amples (per 200 ms) 0 1 Channels between 5 4 and 1, 2, 3, On-body ensors (a) (b) amples (per 200 ms)

32 Theoretical Explanation Line-of-sight channels: the direct path effect is the dominant factor between closely placed devices. table fading if relatively static. Non-line-of-sight channels: affected by the device placement, body movements, human tissue and body surface. Unpredictable fading. 33 Wiec 2013

33 Basic Idea Use stable channels for authentication How to authenticate on-body devices with unstable NLO channels? Exploit multi-hop authentication and transitive trust! Use dynamic channels for key generation How to achieve high key generation rate for LO devices? Exploit node cooperation (multi-hop relay) modeled as a max-flow problem! Needs to achieve key authenticity and secrecy simultaneously 34

34 1. Pairwise Key Generation AK-BAN Protocol k k 1CU k 2CU k 15 k 14 C U k 13 k 25 k 24 k 3CU k 4CU k 5CU 5 k 35 k 45 4 For each node i and CU: Adopt Adaptive ecret Bit Generation (ABG) to build initial shared secret key from R measurements. Generate (n + 1) 2 pairwise keys among n + 1 nodes including CU. 35 k 23 k 34 3

35 2. Initial Authentication AK-BAN Protocol After 1 mm 27 x After + t r1 t /1000 ms sec After 2 x After + t r2 2t /1000 sec ms 36 M m 16 mm 38 C U 3 CU All the broadcasts nodes, including a hello CU, M m 510 message: measure channels. M = (x, t 0, t) tr: a random number M 5 x: a t r1 random < t r2 < number < t m r5 49 After After 5t t 0 : total response time x ms + t t: time interval of each r5 /1000 response Response sec message broadcasting message repeats every t ms, After 4 lasts for t x + t r4 /1000 sec 0 sec. After 4t ms After 3t x ms + t r3 /1000 sec

36 AK-BAN Protocol 2. Initial Authentication 1 ARV cu, ARV 2, ARV 3, ARV 4, ARV 5 C U ARV 1, ARV 2, ARV 3, ARV 4, ARV 5 5 ARV cu, ARV 1, ARV 2, ARV 3, ARV 4 For each node i and CU: Calculates ARV by ARV = um of [R k - R k+1 ] Classifies ARV values into two groups ARV cu, ARV 1, ARV 3, ARV 4, ARV 5 3 ARV cu, ARV 1, ARV 2, ARV 4, ARV 5 4 Accepts nodes whose ARV belongs to the small value group, records as ( j, T). Otherwise, rejects and records as ( j, F). Constructs a trust table.

37 AK-BAN Protocol 3. Authenticated ecret Capacity Broadcast tores M 31 Measures TG={ 2, R CU} 1 tores M 32 Measures R 2 TG={ 1, CU} M 31 M 32 C tores TG={ For each node i and CU: 1 M, 3CU 2, U Measures 3 } R TG={ Broadcasts a secret 4 } capacity message: M 5 ij = (ID i, ID j, T/F, C ij ) M 3CU tores M 35 Computes ARVs and performs Measures R classification on ARVs. Adds M 35 valid j and trusted neighbors of j into Trust Group. 4 Constructs a security M 34 TG={ tores 3, M 34 capacity topology Measures 5 } R 3 TG={CU, 4 } 38

38 4. Deciding Maximum Entropy AK-BAN Protocol C U For i : Based on the capacity topology, runs the max-flow algorithm to find the path(s) to CU that can transmit maximized entropy of key information. 39 3

39 AK-BAN Protocol 5. Key Aggregation Broadcast Between i and CU: K 23 k Broadcasts k 23 k 25 C U 3 max-flow paths between 3 and CU: CU, 3 5 CU. k 23 k 5CU k 5cu k 23 Broadcas ts k 5CU k K 5C U k 25 Each j on the max-flow path broadcasts the XORed value of keys between it and its two neighbors respectively. i and CU obtain each other s pairwise key shared with neighbor along the max-flow path, pick one as the final key between i and CU. Multiple max-flow paths: Concatenation of the keys from individual max-flow paths.

40 5. Key Aggregation Broadcast AK-BAN Protocol Max-flow multi-path merging/splitting: No overlapped bits are used in the XORed value sent from the same node. The broadcast message includes the bit segment starting position of each key used by the XOR operation. 1 CU 5 K25' K35' 5 K5cu' 2 4 K5cu 3 K25' K35' 41 (a) (b)

41 Node Authentication ecurity Analysis Legitimate nodes: successful authentication probability increases Attacker: does not get more chances to be authenticated Man-In-The-Middle attacks are prevented ecrecy of the Extracted Key Attacker channels are uncorrelated to on-body channels. Attackers cannot derive secret key bits generated by on-body nodes. 42

42 ensor deployment Experiment etup 8 on-body: chest, arm, waist, thigh, back. 1 CU. 1 off-body. Room locations unchanged ubjects: 2 males, 1 female. Body movements: itting-and-rotating itting-and-rolling Walking Test plans: Different combinations of sensor deployment, location, subject, and body movement. 43

43 Effectiveness: Authentication False negative rate under different on-body to off-body node ratios remains 0. False positive rate comparison AK-BAN BANA mall 2.38% 38.10% Medium 2.70% 37.84% Corridor 0.00% 37.14% itting-and-rotating 0.00% 34.29% itting-and-rolling 0.00% 37.14% Walking 4.55% 40.91% ubject % 31.25% ubject % 40.91% ubject % 39.47% Overall 1.75% 37.72% 44

44 Key Genration Rate (bps) Efficiency: Key Generation Rate 10 t = 6 ms, mall Room Direct Generation One hop Relay AK BAN t = 6 ms, Corridor t = 5 ms, mall Room ensors

45 Conclusions and Future Work Body area network introduce big challenges in security & privacy research We proposed two trust initialization schemes exploiting channel characteristics that are low-cost, usable, and fail-safe Ongoing and future work Authenticated key extraction. Against other attacks. Robustness against interference and jamming. More 46

46 47 Related Publications Ming Li, Wenjing Lou, Kui Ren, Data ecurity and Privacy for Wireless Body Area Networks, IEEE Wireless Communications Magazine, Feb (citation: ~100) Ming Li, hucheng Yu, Joshua. D. Guttman, Kui Ren, Wenjing Lou, ACM Transactions on ensor Networks (TON), May Lu hi, Ming Li, hucheng Yu and Jiawei Yuan, "BANA: Body Area Network Authentication Exploiting Channel Characteristics'', IEEE Journal of elected Areas on Communications (JAC), ept Ming Li, hucheng Yu, Kui Ren, Wenjing Lou, "Group Device Pairing based ecure ensor Association and Key Management for Body Area Networks, IEEE INFOCOM, an Diego, CA, Mar Lu hi*, Ming Li #, hucheng Yu *, Jiawei Yuan, * "BANA: Body Area Network Authentication Exploiting Channel Characteristics'', ACM Wiec, Tucson, AZ, Apr Yantian Hou, Ming Li, and Joshua. D. Guttman, "Chorus: calable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel'', ACM Wiec, Budapest, Hungary, April 17-19, Lu hi, Jiawei Yuan, hucheng Yu, and Ming Li, "AK-BAN: Authenticated ecret Key Extraction Utilizing Channel Characteristics for Body Area Networks", ACM Wiec, Budapest, Hungary, April 17-19, 2013.

47 Thanks for your attention! Q & A [ 48

ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks

ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks Lu Shi, Jiawei Yuan, Shucheng Yu Department of Computer Science University of Arkansas at Little Rock

More information

A Novel Collaborative Secret Key Generation and Device Authentication Scheme for Securing Intra Wireless Body Area Network

A Novel Collaborative Secret Key Generation and Device Authentication Scheme for Securing Intra Wireless Body Area Network IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X A Novel Collaborative Secret Key Generation and Device Authentication Scheme for Securing

More information

Lightweight Detection of On-body Sensor Impersonator in Body Area Networks

Lightweight Detection of On-body Sensor Impersonator in Body Area Networks Lightweight Detection of On-body Sensor Impersonator in Body Area Networks Liping Xie School of Computer Electronic, and Information, Guangxi University, Nanning, Guangxi, China Email: xie5012@mail.gxu.cn

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Body Sensor Network Security

Body Sensor Network Security 1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Octav Chipara University of Iowa https://cs.uiowa.edu/~ochipara 1 Detecting clinical deterioration at low cost Clinical

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks

00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks 00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks MING LI, Utah State University SHUCHENG YU, University of Arkansas at Little Rock JOSHUA. D. GUTTMAN, Worcester Polytechnic

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Efficient Secret Key Delivery Using Heartbeats

Efficient Secret Key Delivery Using Heartbeats Efficient Secret Key Delivery Using Heartbeats Kwantae Cho 1,*, and Byungho Chung 2 1, 2 Information Security Research Division, Electronics and Telecommunications Research Institute, Republic of Korea

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Cost Based Efficient Routing for Wireless Body Area Networks

Cost Based Efficient Routing for Wireless Body Area Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Sensor Based Time Series Classification of Body Movement

Sensor Based Time Series Classification of Body Movement Sensor Based Time Series Classification of Body Movement Swapna Philip, Yu Cao*, and Ming Li Department of Computer Science California State University, Fresno Fresno, CA, U.S.A swapna.philip@gmail.com,

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

Wireless Sensor Networks: Security Issues, Challenges and Solutions

Wireless Sensor Networks: Security Issues, Challenges and Solutions International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 859-868 International Research Publications House http://www. irphouse.com Wireless Sensor Networks:

More information

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 , pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security

More information

Cooperative Communications and Wireless Body Area Networks. Xigang Huang

Cooperative Communications and Wireless Body Area Networks. Xigang Huang Cooperative Communications and Wireless Body Area Networks Xigang Huang Contents Wireless Body Area Networks Applications Network architecture of WBANs MAC and Route Protocols Interworking Cooperative

More information

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks K.Sivakumar 1, P.Murugapriya 2 II-M.TECH, Department of IT, Sasurie College of Engineering, Vijayamangalam, Tirupur,

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK www.arpapress.com/volumes/vol9issue2/ijrras_9_2_09.pdf AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK Ashish Bagwari 1, Danish Quamar 2, Noor Mohd 3 &

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Blue Point Engineering

Blue Point Engineering ensor Adapter Board Pointing the Way to olutions! Description: This board was designed to allow the control of a solid state relay with a sensor. When the is activated, the onboard micro relay will come

More information

Topology and Power Control

Topology and Power Control Topology and Power Control Octav Chipara Motivation Energy and capacity are limited resources in wireless sensor networks Answer: Topology and Power Control maintain a topology with certain properties

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Spoofing Attacks in wireless Sensor Networks

Spoofing Attacks in wireless Sensor Networks Spoofing Attacks in wireless Sensor Networks V Bharath Srinivas, Dr Syed Umar Department of ECM, KL University, A.P., INDIA. Abstract Wireless networks are vulnerable to spoofing attacks, which allows

More information

AN ad-hoc network is a group of nodes without requiring

AN ad-hoc network is a group of nodes without requiring 240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007 Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis Wei

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting Never Stand Still Faculty of Engineering Computer Science and Engineering Weitao Xu 2,3, Guohao Lan 1,3, Qi

More information

An overview of Trust, Naming and Addressing and Establishment of security associations

An overview of Trust, Naming and Addressing and Establishment of security associations Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -

More information

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,

More information

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1. Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN U.Kavitha 1 1 PG Student, Department of ECE, CK College of Engineering & Technology, Cuddalore, Tamil Nadu, India Abstract Wireless

More information

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

Real-Time and Low-Power Wireless Communication with Sensors and Actuators THE KNOWLEDGE FOUNDATION S SENSORS GLOBAL SUMMIT 2015 November 10-11, 2015 San Diego Marriott La Jolla La Jolla, CA Real-Time and Low-Power Wireless Communication with Sensors and Actuators Behnam Dezfouli

More information

Research Directions in Low-Power Wireless Networks

Research Directions in Low-Power Wireless Networks Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

WARD: A Wearable Action Recognition Database

WARD: A Wearable Action Recognition Database WARD: A Wearable Action Recognition Database Allen Y. Yang Department of EECS University of California Berkeley, CA 94720 USA yang@eecs.berkeley.edu Philip Kuryloski Department of ECE Cornell University

More information

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Proficient ID Allocation for MANETs

Proficient ID Allocation for MANETs Proficient ID Allocation for MANETs S. Rajeswari Associate Professor, ECE, Saranathan College of Engineering, Trichy, India. rajeswaris-ece@saranathan.ac.in Abstract A Mobile Adhoc Network (MANETs) is

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating

More information

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan

More information

Event-based sampling for wireless network control systems with QoS

Event-based sampling for wireless network control systems with QoS 21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin

More information

A Scalable Secured Approach in Wireless Sensor Networks

A Scalable Secured Approach in Wireless Sensor Networks A Scalable Secured Approach in Wireless Sensor Networks Devika Bandyopadhya, Sangita Nath, D. Sheela, and Dr. G. Mahadevan Abstract Security is crucial for wireless sensor networks deployed in hostile

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma Temporal Key Integrity Protocol: TKIP Tim Fielder University of Tulsa Tulsa, Oklahoma History IEEE released the first 802.11 specification back in 1997 The Wired Equivalent Privacy (WEP) authentication/encryption

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

Security Analysis of Emerging Remote Obstetrics Monitoring Systems

Security Analysis of Emerging Remote Obstetrics Monitoring Systems Security Analysis of Emerging Remote Obstetrics Monitoring Systems C. C. Tan*, L. Bai^, D. S. Mastrogiannis, J. Wu* *Dept. of Computer and Information Sciences, Temple University ^ Dept. of Electrical

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

Voiceprint-based Access Control for Wireless Insulin Pump Systems

Voiceprint-based Access Control for Wireless Insulin Pump Systems Voiceprint-based Access Control for Wireless Insulin Pump Systems Presenter: Xiaojiang Du Bin Hao, Xiali Hei, Yazhou Tu, Xiaojiang Du, and Jie Wu School of Computing and Informatics, University of Louisiana

More information