Current Issue : January-March Volume : 2025 Issue Number : 1 Articles : 5 Articles
This study introduces a novel method that addresses the challenge of visualizing and quantifying detection coverage areas in wireless sensor networks. The method involves projecting a network of range-free sensors and pre-existing transmitters, located within a predefined area of interest, onto a global coordinate system. Detection areas are defined as those covered by the sensing range of at least three sensors. Pre-existing transmitters located within the detection range of the sensors are assumed to degrade the networks’ performance by causing coverage gaps. Interactive satellite maps facilitate the dynamic exploration of coverage via the calculation and visualization of the resulting detection areas. The algorithmic structure of the proposed tool is explained in detail, and four example scenarios demonstrate the tool’s capabilities, as well as its flexibility, adaptability, and effectiveness in identifying the triangulated detection areas. Designed primarily as a geometry calculation and visualization tool that allows for the adjustment of sensor parameters such as locations, ranges, and angular ranges of detection, the proposed tool has the potential to enhance decision-making in sensor network configuration, prior to final sensor placement, across a wide range of applications....
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology to guarantee the reliability of data from sensor nodes. A sensor PUF array is constructed by preparing gas sensors to enhance the data security of the physical layer and reduce hardware resource consumption. The authentication part of the protocol mainly uses lightweight encryption methods, consisting of PUF data, one-way cryptographic hash functions, and iso-or functions, to reduce the computational overhead of the authentication process. The protocol security is enhanced by encrypting the GS-PUF response as an irreversible hash value and verifying the hash value by the user, server, and sensor node to complete bidirectional authentication. The test results demonstrate that the protocol, verified through the ProVerif formal tool, can resist impersonation, replay, node tampering, and cloning attacks. Among the compared schemes, this protocol offers the highest security and the least resource overhead, making it effectively applicable in the Internet of Things and other fields....
Currently, underwater sensor networks are extensively applied for environmental monitoring, disaster prediction, etc. Nevertheless, owing to the complicacy of the underwater environment, the limited energy of underwater sensor nodes, and the high latency of hydroacoustic channels, the energy-efficient operation of underwater sensor networks has become an important challenge. In this paper, a high-efficiency clustering routing protocol in AUV-assisted underwater sensor networks (HECRA) is proposed to address the energy limitations and low data transmission reliability in underwater sensor networks. The protocol optimizes the cluster head selection strategy of the traditional low-energy adaptive clustering hierarchy (LEACH) protocol by introducing the residual energy and node degree in the cluster head selection phase and performs some optimizations in the cluster formation and data transmission phases, including selecting clusters for joining by ordinary nodes based on the residual energy of the cluster head nodes and weight computation based on the depth and residual energy of the cluster head nodes to select the optimal message forwarding nodes. In addition, this paper introduces an autonomous underwater vehicle (AUV) as a dynamic relay node to improve network transmission efficiency. According to the simulation results, compared with the existing LEACH, the energy efficient routing protocol based on layers and unequal clusters in underwater wireless sensor networks (EERBLC) and energy-efficient clustering multi-hop routing protocol in a UWSN (EECMR), the HECRA significantly improves network lifetime, the residual node energy, and the number of successfully transmitted packets, which can effectively prolong network lifetime and ensure efficient data transmission....
The convergence of heterogeneous wireless sensor networks provides many benefits, including increased coverage, flexible load balancing capabilities, more efficient use of network resources, and the provision of additional data by different types of sensors, thus leading to improved customer service based on more complete information. However, despite these advances, the challenge of ensuring reliability and survivability remains due to low-cost sensor requirements and the inherent unreliability of the wireless environment. Integrating different sensor networks and unifying protocols naturally leads to the creation of a network with multiple sinks, necessitating the exploration of new approaches to rational reliability assurance. The failure of some sensors does not necessarily lead to a shutdown of the network, since other sensors can duplicate information and deliver data to sinks via an increased number of alternative routes. In this paper, the reliability indicator is defined as the probability that sinks can collect data from a given number of sensors. In this context, a dedicated reliability metric is introduced and examined for its effectiveness. This metric is computed using an algorithm rooted in the modified factoring method. Furthermore, we introduce a heuristic algorithm designed for optimal sink placement in wireless sensor networks to achieve the highest level of network reliability....
As electronic sensors and sensor networks advance, perception data are increasingly characterized by mixed attributes. Traditional anomaly detection methods predominantly focus on numerical attributes. In this paper, we introduce a weighted neighborhood information network (WNIN)-enabled anomaly detection method tailored for mixed-attribute data from electronic sensors and sensor networks. Firstly, we employ the analytic hierarchy process (AHP) to analyze the security of sensor networks, leveraging a hierarchical electronic sensor network model to construct a hierarchical perception security architecture for anomaly detection. Subsequently, a neighborhood information system is established to ascertain the relationships between data objects with mixed attributes. We then develop the WNIN to encapsulate the relationships, and a state-transferring probability matrix based on data object similarity is derived. Ultimately, a random wandering process within the WNIN is executed, and the importance of data objects is evaluated using the steady-state distribution vector, thereby determining the anomaly data. Simulation outcomes reveal that our proposed method attains superior anomaly detection rates compared with existing methods....
Loading....