2 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 2 / 2
Yayın The sectoral sweeper scheme for wireless sensor networks: Adaptive antenna array based sensor node management and location estimation(Kluwer Academic Publishers-Plenum Publishers, 2006-12) Erdoğan, Ayhan; Coşkun, Vedat; Kavak, AdnanWe introduce a novel sensor node management and location estimation method referred as sectoral sweeper (SS) scheme that uses an adaptive antenna array (AAA) at a central node in wireless sensor networks (WSNs). With the SS scheme, the central node can activate or deactivate the nodes in a desired region which is specified by beam direction and beam width of the transmit beam and also by minimum and maximum thresholds (R (min) and R (max)) for the received signal strength indicator (RSSI) of signals received by the nodes. In order to perform a specified task that is associated with a Task_id, two different beams are transmitted, which are task region beam and routing region beam to switch the nodes into active or routing modes. Since our scheme does not require any additional software or hardware for node management and location estimation in sensor nodes, the deficiencies of tiny sensors are effectively eliminated. The proposed scheme is shown to reduce the number of sensing nodes and the amount of data traffic in the network, thus leading to considerable savings in energy consumption and prolonged sensor lifetime.Yayın Quarantine region scheme to mitigate spam attacks in wireless sensor networks(IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, SerdarThe Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.












