Resilient Data Aggregation in Wireless Sensor Networks

Resilient Data Aggregation in Wireless Sensor Networks PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Sensor nodes are low-cost and low-power devices that are prone to node compromises, communication failures and malfunctioning of sensing hardware. As a result, some nodes may report outlying data values, introducing significant deviations in the aggregated sensor readings. This thesis presents a practical resilient outlier detection technique to filter out the influence of the outlying data reported by faulty or compromised nodes. The proposed outlier detection algorithm is based on event localization using minimum mean squared error (MMSE) estimation combined with threshold-based consistency checking to detect outliers. Data aggregation is one of the key techniques commonly used to develop lightweight communication protocols applicable to wireless sensor networks. The proposed approach handles localization of multiple events by grouping the sensor readings into spatially correlated clusters and performing an event-centric detection of outliers. In the entire process of data aggregation, the outlier detection technique fits as a preprocessing stage for reducing the effect of outliers on the aggregated result. Suitable extensions to the basic outlier detection algorithm are proposed to effectively apply the algorithm to both centralized and decentralized sensor network architectures. This thesis further includes studies that test the effectiveness of the proposed approach, including the detection rate, the false positive rate, degree of damage and the resilience to malicious readings introduced by the attackers. The experimental results show that on average the proposed approach detects as high as 80-90% of the outliers while resulting in 5-15% false positive rate when the network consists of 40-45% outliers. The experiments also show that the extent of damage on the aggregated result is below 50% due to the elimination of outliers before aggregation. Finally, the resilient data aggregation process requires modest computational and memory requirements with zero commu.

Resilient Data Aggregation in Wireless Sensor Networks

Resilient Data Aggregation in Wireless Sensor Networks PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Sensor nodes are low-cost and low-power devices that are prone to node compromises, communication failures and malfunctioning of sensing hardware. As a result, some nodes may report outlying data values, introducing significant deviations in the aggregated sensor readings. This thesis presents a practical resilient outlier detection technique to filter out the influence of the outlying data reported by faulty or compromised nodes. The proposed outlier detection algorithm is based on event localization using minimum mean squared error (MMSE) estimation combined with threshold-based consistency checking to detect outliers. Data aggregation is one of the key techniques commonly used to develop lightweight communication protocols applicable to wireless sensor networks. The proposed approach handles localization of multiple events by grouping the sensor readings into spatially correlated clusters and performing an event-centric detection of outliers. In the entire process of data aggregation, the outlier detection technique fits as a preprocessing stage for reducing the effect of outliers on the aggregated result. Suitable extensions to the basic outlier detection algorithm are proposed to effectively apply the algorithm to both centralized and decentralized sensor network architectures. This thesis further includes studies that test the effectiveness of the proposed approach, including the detection rate, the false positive rate, degree of damage and the resilience to malicious readings introduced by the attackers. The experimental results show that on average the proposed approach detects as high as 80-90% of the outliers while resulting in 5-15% false positive rate when the network consists of 40-45% outliers. The experiments also show that the extent of damage on the aggregated result is below 50% due to the elimination of outliers before aggregation. Finally, the resilient data aggregation process requires modest computational and memory requirements with zero commu.

Secure Data Aggregation in Wireless Sensor Networks

Secure Data Aggregation in Wireless Sensor Networks PDF Author: Sankardas Roy
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 0

Get Book Here

Book Description
Wireless sensor networks have proved to be useful in several applications, such as environment monitoring and perimeter surveillance. In a large sensor network, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multi-path routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false sub-aggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this dissertation, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub-aggregate values. In particular, we present two classes of algorithms to securely compute Count or Sum. First, we propose a lightweight verification algorithm which enables the base station to determine if the computed aggregate includes any false contribution. Second, we present attack-resilient computation algorithms which can be used to compute the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Thorough theoretical analysis and extensive simulation study show that our algorithms outperform other existing approaches. This dissertation also addresses the security issues of in-network computation of Median and presents verification algorithms and attack-resilient computation algorithms to securely compute an approximate estimate of this aggregate. To the best of our knowledge, prior to this dissertation there was no other work related to the security of in-network computation of Median. We evaluate the performance and cost of our algorithms via both analysis and simulation. The results show that our approach is scalable and efficient.

Loss-resilient Proactive Data Transmission in Wireless Sensor Networks

Loss-resilient Proactive Data Transmission in Wireless Sensor Networks PDF Author: Yingqi Xu
Publisher:
ISBN:
Category : Sensor networks
Languages : en
Pages : 26

Get Book Here

Book Description
Abstract: "Among a wide range of sensor network applications, many of them require reliable data communication such that data packets can be delivered to the destination without loss. However, existing reliable transmission techniques either are too costly for resource-constrained sensor networks or have limited capabilities for achieving reliable data communication. In this paper, an effective coding scheme that exploits the tradeoff between redundant data transmission and encoding/decoding complexity is proposed. Two key design parameters of the proposed scheme, the degree of repair packets and the number of repair packets, are derived to achieve a high data recovery probability with minimum coding redundancy and computation overhead. Furthermore, the proposed scheme is leveraged under recoverable and permanent failure models for proactive transmission. Accordingly, the expected probability of a destination obtaining all data packets is analyzed. Simulations have been conducted to verify our theoretical results. The simulation results reveal profound insights in support of the proactive transmission paradigm to achieve high communication reliability in wireless sensor networks."

Guide to Wireless Sensor Networks

Guide to Wireless Sensor Networks PDF Author: Sudip Misra
Publisher: Springer Science & Business Media
ISBN: 1848822189
Category : Computers
Languages : en
Pages : 725

Get Book Here

Book Description
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.

Sensor Networks and Configuration

Sensor Networks and Configuration PDF Author: Nitaigour P. Mahalik
Publisher: Springer Science & Business Media
ISBN: 3540373667
Category : Technology & Engineering
Languages : en
Pages : 520

Get Book Here

Book Description
This book incorporates a selection of research and development papers. Its scope is on history and background, underlying design methodology, application domains and recent developments. The readers will be able to understand the underlying technology, philosophy, concepts, ideas, and principles, with regard to broader areas of sensor network. Aspects of sensor network and experimental results have been presented in proper order.

Secure Distributed Data Aggregation

Secure Distributed Data Aggregation PDF Author: Haowen Chan
Publisher: Now Publishers Inc
ISBN: 1601984502
Category : Computers
Languages : en
Pages : 63

Get Book Here

Book Description
Secure Distributed Data Aggregation surveys the various families of approaches to secure aggregation in distributed networks such as sensor networks. It adopts a tutorial approach and sets out to provide the reader with a general intuitive understanding of the field.

RDCS

RDCS PDF Author: Abhishek Ghose
Publisher:
ISBN:
Category :
Languages : en
Pages : 96

Get Book Here

Book Description


Cybernetics and Automation Control Theory Methods in Intelligent Algorithms

Cybernetics and Automation Control Theory Methods in Intelligent Algorithms PDF Author: Radek Silhavy
Publisher: Springer
ISBN: 3030198138
Category : Technology & Engineering
Languages : en
Pages : 382

Get Book Here

Book Description
This book discusses novel intelligent-system algorithms and methods in cybernetics, presenting new approaches in the field of cybernetics and automation control theory. It constitutes the proceedings of the Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.

Sensor Networks

Sensor Networks PDF Author: Gianluigi Ferrari
Publisher: Springer Science & Business Media
ISBN: 3642013414
Category : Technology & Engineering
Languages : en
Pages : 396

Get Book Here

Book Description
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts:PartIisdenotedas“Theory,”sincethetopicsofits vechaptersareapparently “detached” from real scenarios; Part II is denoted as “Theory and Practice,” since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as “Practice,” since the topics of its ve chapters are clearly related to practical applications.

Smart Wireless Sensor Networks

Smart Wireless Sensor Networks PDF Author: Yen Kheng Tan
Publisher: IntechOpen
ISBN: 9789533072616
Category : Technology & Engineering
Languages : en
Pages : 432

Get Book Here

Book Description
The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks.