Position Awareness Mechanisms for Wireless Sensor Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
Position Awareness Mechanisms for Wireless Sensor Networks

Authors: Seyed Mostafa Torabi

Abstract:

A Wireless sensor network (WSN) consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. Each node in WSN should be capable to act for long periods of time with scrimpy or no external management. One requirement for this independent is: in the presence of adverse positions, the sensor nodes must be capable to configure themselves. Hence, the nodes for determine the existence of unusual events in their surroundings should make use of position awareness mechanisms. This work approaches the problem by considering the possible unusual events as diseases, thus making it possible to diagnose them through their symptoms, namely, their side effects. Considering these awareness mechanisms as a foundation for highlevel monitoring services, this paper also shows how these mechanisms are included in the primal plan of an intrusion detection system.

Keywords: Awareness Mechanism, Intrusion Detection, Independent, Wireless Sensor Network

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1332922

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1398

References:


[1] C. Hsin and M. Liu, "A Distributed Monitoring Mechanism for Wireless Sensor Networks," Proc. 3rd ACM Wksp. Wireless Sec., Atlanta, GA, Sept. 2002.
[2] S. Rost and H. Balakrishnan, "Memento: A Health Monitoring System for Wireless Sensor Networks," Proc. 3rd IEEE Conf Sensor, Mesh, and Ad Hoc Commun. and Networks, Reston, VA, Sept. 2006.
[3] I. Onat and A. Miri, "An Intrusion Detection System for Wireless Sensor Networks," Proc. IEEE Ina Conf. Wireless and Mobile Computing, Networking and Commun., Montreal, Canada, Aug. 2005.
[4] P. Inverardi, L. Mostarda, and A. Navarra, "Distributed IDS for Enhancing Security in Mobile Wireless Sensor Networks," Proc. 20th Conf. Adv. Info. Networking and Apps., Vienna, Austrai, Apr. 2006.
[5] C. C. Su et al., "The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks," Proc. IEEE WCNC '05, New Orleans, LA, Mar. 2005.
[6] R. Roman, J. Zhou, and J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks," Proc. 3rd IEEE Consumer Commun. and Networking Conf, Las Vegas, NV, Jan. 2006.
[7] C. Basile et al., "An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks," Proc. 2006 Intl Conf. Dependable Sys. and Networks, Philadelphia, PA, June 2006.
[8] J. P. Walters et al., "Wireless Sensor Network Security: A Survey," Security in Distributed, Grid, and Pervasive Computing, Ed., Y. Xiao, CRC Press, 2006.
[9] J. N. Al-Karaki and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Commun., vol. 11, no. 6, Dec. 2004, pp. 6-28.
[10] A. Becher, Z. Benenson, and M. Dornseif, "Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks," Proc. 3rd Conf. Sec. in Pervasive Comp., York, U.K., Apr. 2006.