Search results for "LESS"
showing 10 items of 2452 documents
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
Joint routing and per-flow fairness in wireless multihop networks
2008
In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…
A New Wireless Device for Real-Time Mechanical Impact Evaluation in a Citrus Packing Line
2020
Abstract. Postharvest handling of fresh fruit is a potential source of bruising and damage, with significant consequences for fruit quality and marketability. In the last 30 years, different types of impact-recording devices (also called electronic fruits or pseudo-fruits) have been developed with the aim of measuring the impacts experienced by fruits during postharvest operations. The aim of this study was to develop and test a novel wireless instrumented sphere to study the critical points in a citrus packing line by measuring the impacts experienced by fruits in real-time. The non-commercial device was based on a MEMS (micro-electro-mechanical system) sensor node with a sensing range fro…
Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks
2021
Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot …
DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks
2016
Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…
A Self-Powered Long-range Wireless IoT Device based on LoRaWAN
2020
In this article, we propose a self-powered long-range wireless Internet-of-Things (IoT) device based on Long Range Wide Area Network (LoRaWAN) with various sensing capabilities. The nodes are designed based on ambient energy harvesting in such a way that these are self-sustainable throughout the components’ lifespan. Also, these nodes can be deployed on a large scale and are maintenance-free. In addition, these nodes can be deployed in remote places where the accessibility is limited, and maintenance is difficult. The wireless sensor nodes can be deployed both in indoor and outdoor environments with sufficient light levels for the solar panel, such as indoor lights in the indoor environment…
Face Processing on Low-Power Devices
2009
The research on embedded vision-based techniques is considered nowadays as one of the most interesting matters of computer vision. In this work we address the scenario in which a real-time face processing system is needed to monitor people walking through some locations. Some face detection (e.g., Viola-Jones face detector) and face recognition (e.g., eigenfaces) approaches have reached a certain level of maturity, so we focused on the development of such techniques on embedded systems taking into account both hardware and software constraints. Our goal is to detect the presence of some known individuals inside some sensitive areas producing a compact description of the observed people. Cap…
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
2012
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs
2011
How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…