Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancing Security and Power Management in Wireless Sensor Networks

T. Dhanalakshmi, M. Sasitharagai

Abstract


Heuristic techniques enable to select an information fusion of the selected sensor observation with the prior target location. The main objectives are to share the information about the target accurately, to adjust the power consuming in the sensors while transforming the information and to conserve the system resources by associating data tracks which is simpler in distributed environment of global consistency. Mutual information based sensor selection (MISS) algorithm is adopted to track the accurate information collaboratively. A novel approach to energy savings is devised as information-controlled transmission power (ICTP) where nodes with more information use higher transmission powers than those that are less informative to share their target state information with the neighboring nodes. One of the main challenges in this kind of application is security. Due to their key role in WSNs and also their fragility, localization systems can be the target of an attack that could compromise the entire functioning of a WSN and lead to incorrect military plans and decision making, among other problems. Here, we propose some techniques that can be used to prevent or impede the attacks in WSNs

Keywords


Localization, Collaboration, Power Consumption, Tracking

Full Text:

PDF

References


S. Appadwedula, V.V. Veeravalli, and D.L. Jones, “Robust and Locally-Optimum Decentralized Detection with Censoring Sensors,” Proc. Fifth Int’l Conf. Information Fusion, pp. 56-63, July 2002.

N. Patwari, A.O. Hero, and B.M. Sadler, “Hierarchical Censoring Sensors for Change Detection,” Proc. IEEE Workshop Statistical Signal Processing, pp. 21-24, Sept. 2003.

N.Patwari and A.O. Hero, “Hierarchical Censoring for Distributed Detection in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing, pp. IV 848-IV-851, 2003.

P. Gross, J.T. Mangan, and K.L. Godrich, “Assuring Operational Continuity in C4ISR Facilities,” Proc. Industrial and Commercial Power Systems Technical Conf., pp. 1-8, Apr. 2006.

L. Lazos and R.Poovendran, “Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE JSAC, vol. 24, Feb. 2006, pp. 233– 46.

L. Lazos and R. Poovendran, “Serloc: Secure Range- Independent Localization for Wireless Sensor Networks,” Proc. WiSe ’04, 2004, pp. 21–30.

L. Lazos, R. Poovendran, and S. Capkun, “Rope: Robust Position Estimation in Wireless Sensor Networks,” Proc. IPSN, Apr. 200, pp. 324–31.

S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” INFOCOM ’05, Miami, FL, Mar.2005.

D. Liu, P. Ning, and W. Du, “Detecting Malicious BeaconNodes for Secure Location Discovery in Wireless Sensor Networks” 25th ICDCS, 2005, pp. 609–19.

A. Srinivasan, J. Teitelbaum, and J. Wu, “DRBTS: DistributedReputation-Based Beacon Trust System,”2nd IEEE DASC, 2006, pp. 277–83.

Z. Li et al., “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” IPSN ’05, 2005, p. 12.

D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” IPSN ’05: Proc. 4th Int’l. Symp. Info. Processing in Sensor Networks, 2005, p. 13.

W. Du, L. Fang, and P. Ning, “Lad: Localization Anomaly Detection for Wireless Sensor Networks,” 19th IPDPS, 2005, p. 41.1.

N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” WiSe ’03, N2003, pp. 1–10.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.