Search Word(s) in Title, Keywords, Authors, and Abstract:
Wireless Sensor Networks (WSN)
A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks
Mehdi Imani, Majid Joudaki, Hamid R. Arabnia and Niloofar Mazhari
Page: 1436~1458, Vol. 13, No.6, 2017
10.3745/JIPS.03.0082
Keywords: Ad Hoc Networks, Asynchronous Sleep Scheduling Protocols, Power Saving Protocols, Quorum Based Systems
Show / Hide Abstract
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.177
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract
Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks
ZHAO Zhi-bin and GAO Fuxiang
Page: 135~144, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3.135
Keywords: Real-time Schedule, Wireless Sensor Networks, Two-level Priority, TinyOS, Dynamic Schedule
Show / Hide Abstract
Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006
None
Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract
A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks
Mehdi Imani, Majid Joudaki, Hamid R. Arabnia and Niloofar Mazhari
Page: 1436~1458, Vol. 13, No.6, 2017

Keywords: Ad Hoc Networks, Asynchronous Sleep Scheduling Protocols, Power Saving Protocols, Quorum Based Systems
Show / Hide Abstract
Quorum-based algorithms are widely used for solving several problems in mobile ad hoc networks (MANET) and wireless sensor networks (WSN). Several quorum-based protocols are proposed for multi-hop ad hoc networks that each one has its pros and cons. Quorum-based protocol (QEC or QPS) is the first study in the asynchronous sleep scheduling protocols. At the time, most of the proposed protocols were non-adaptive ones. But nowadays, adaptive quorum-based protocols have gained increasing attention, because we need protocols which can change their quorum size adaptively with network conditions. In this paper, we first introduce the most popular quorum systems and explain quorum system properties and its performance criteria. Then, we present a comparative and comprehensive survey of the non-adaptive and adaptive quorum-based protocols which are subsequently discussed in depth. We also present the comparison of different quorum systems in terms of the expected quorum overlap size (EQOS) and active ratio. Finally, we summarize the pros and cons of current adaptive and non-adaptive quorum-based protocols.
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010

Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs.
In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.
Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks
ZHAO Zhi-bin and GAO Fuxiang
Page: 135~144, Vol. 5, No.3, 2009

Keywords: Real-time Schedule, Wireless Sensor Networks, Two-level Priority, TinyOS, Dynamic Schedule
Show / Hide Abstract
Most of the tasks in wireless sensor networks (WSN) are requested to run in a real-timeway. Neither EDF nor FIFO can ensure real-time scheduling in WSN. A real-time scheduling strategy(RTS) is proposed in this paper. All tasks are divided into two layers and endued diverse priorities.RTS utilizes a preemptive way to ensure hard real-time scheduling. The experimental results indicatethat RTS has a good performance both in communication throughput and over-load.
Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006

Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract
To achieve security in wireless sensor networks (WSN), it is important to be able to encrypt messages sent among sensor nodes. We propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on the probabilistic key. The protocol can increase the efficiency to manage keys since, before distributing the keys by bootstrap, the use of public keys shared among nodes can eliminate the processes to send or to receive keys among the sensors. Also, to find any compromised nodes safely on the network, it solves safety problems by applying the functions of a lightweight attack-detection mechanism.