IET Wireless Sensor Systems
Volume 8, Issue 2, April 2018
Volumes & issues:
Volume 8, Issue 2
April 2018
-
- Author(s): Sergi Consul-Pacareu and Bashir I. Morshed
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 45 –51
- DOI: 10.1049/iet-wss.2017.0064
- Type: Article
- + Show details - Hide details
-
p.
45
–51
(7)
Unobtrusive monitoring of physiological signals in natural settings is important for precision diagnostics. Fully-passive wireless body-worn sensors are viable and promising for unobtrusive monitoring. In this study, the authors present a new class of fully-passive sensor, namely wireless resistive analog passive (WRAP) sensor. It uses resistive transducers at the sensors for converting physical stimulus to load modulation of carrier wireless signal at 13.56 MHz at low power (–20 to 0 dBm). The sensor is simply composed of a loop antenna, a tuning capacitor, and a resistive transducer suitable for the type of physiological signals to be measured. The authors report the characterisation of WRAP sensors for various resistive loads of 1.2 ω to 82 kω at various co-axial distances (5–40 mm) between the TX and RX antennas. They have prototyped and characterised multiple WRAP sensors with several practical measurements of physiological signals such as heart rate, temperature, and pulse oximetry. They also demonstrate bio-potential measurement (down to 400 μV pp ) using metal–oxide–semiconductor field-effect transistor as the transducer. These results show the feasibility of developing a new type of body-worn fully-passive WRAP sensors for unobtrusive physiological signal monitoring at real-life settings for precision diagnostics of many disorders and tracking person-centric therapy efficacy.
- Author(s): Ademola P. Abidoye and Ibidun C. Obagbuwa
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 52 –59
- DOI: 10.1049/iet-wss.2017.0029
- Type: Article
- + Show details - Hide details
-
p.
52
–59
(8)
Wireless sensor networks (WSNs) have been widely applied in many areas for real-time event detection. They are designed using both mobile and static sensor nodes (SNs) for different applications such as smart parking, environmental monitoring, health care systems, automotive industries, sports, open space surveillance, and so on. WSNs communicate through wireless mediums and are accessible to anyone, which make SNs susceptible to different types of attacks. Distributed denial of service (DDoS) is one such attack. It wastes the limited energy of SNs and causes loss of data packets within a network. A DDoS attack launches a coordinated attack by flooding the target nodes with bogus requests, thus exhausting their resources, and forcing them to deny service to legitimate member nodes. In this study, the authors propose a message analyser scheme for WSNs. The method is capable of detecting compromised SNs vulnerable to a DDoS attack. In addition, it is able to detect all compromised messages transmitted by the attackers to the base station through the sender nodes. The proposed method is compared with other related protocols. The results show that their method can effectively detect and defend against DDoS attacks in WSNs.
- Author(s): Ashanie Guanathillake ; Andrey V. Savkin ; Anura P. Jayasumana
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 60 –67
- DOI: 10.1049/iet-wss.2017.0039
- Type: Article
- + Show details - Hide details
-
p.
60
–67
(8)
A novel distributed approach for searching and tracking of targets is presented for sensor network environments in which physical distance measurement using techniques such as signal strength is not feasible. The solution consists of a robust Kalman filter combined with a non-linear least-square method, and maximum likelihood topology maps. The primary input for estimating target location and direction of motion is provided by time stamps recorded by the sensor nodes when the target is detected within their sensing range. An autonomous robot following the target collects this information from sensors in its neighbourhood to determine its own path in search of the target. While the maximum likelihood topology coordinate space is a robust alternative to physical coordinates, it contains significant non-linear distortions when compared with physical distances between nodes. The authors overcome this using time stamps corresponding to target detection by nodes instead of relying on distances. The performance of the proposed algorithm is compared with recently proposed pseudo gradient algorithm based on hop count and received signal strength. Even though the proposed algorithm does not depend on distance measurements, the results show that it is able to track the target effectively even when the target changes its moving pattern frequently.
- Author(s): Jianpo Li ; Dong Wang ; Yanjiao Wang
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 68 –75
- DOI: 10.1049/iet-wss.2017.0075
- Type: Article
- + Show details - Hide details
-
p.
68
–75
(8)
Distance vector-hop (DV-hop) is a localisation algorithm based on distance vector routing, which often suffers the wormhole attack. To solve this problem, a security DV-hop localisation algorithm against wormhole attack (AWDV-hop) is proposed. First, the algorithm establishes the neighbour node relationship list (NNRL) by broadcast flooding. All the nodes get the ID numbers of their neighbour nodes through NNRL. The suspect beacon nodes can be found by comparing the theoretical and actual number of neighbour nodes. Then, the suspect beacon nodes calculate the distances to other beacon nodes in their NNRL to find the actual attacked beacon nodes. The attacked beacon nodes in the different areas of wormhole attack are marked with 1 or 2. Finally, the unknown nodes mark themselves with 1 or 2 according to the beacon nodes marked before. In the next round of localisation, the nodes marked with 1 and the nodes marked with 2 disconnected from each other. The simulation results show that the localisation error of the proposed AWDV-hop algorithm is reduced by about 80% than that of DV-hop algorithm suffering from the wormhole attack. Compared to label-based DV-HOP (LBDV-hop) and secure neighbour discovery based DV-HOP (NDDV-hop) algorithm, the localisation error is reduced by about 7 and 34%, respectively.
- Author(s): Husam I. Sweidan and Timothy C. Havens
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 76 –86
- DOI: 10.1049/iet-wss.2017.0037
- Type: Article
- + Show details - Hide details
-
p.
76
–86
(11)
In many practical scenarios, targets tend to have certain mobility trends such as following a traverseable terrain, having a common starting/destination locations, or moving in a region with abundant resources. This work is interested in exploring the possible gain from sensor relocation in improving the localisation accuracy of targets that follow mobility trends similar to those previously observed. This objective is tackled using a three-phase approach. In the first phase, the wireless sensor network tracks the targets based on the initial deployment. The second phase uses the location estimates from phase 1 to form a region of interest (ROI). The last phase carries out the sensor relocation to the ROI. Two fitness functions are explored for optimising sensors’ locations in the ROI, namely geometric dilution of precision and K-coverage. K-coverage offered the best performance especially for sensors with a short-to-medium detection range. The uniform random relocation offered a comparable performance with a relatively low computational complexity. Results also revealed the degradation in coverage rate due to relocating sensors to the ROI, and how optimising sensor locations outside the ROI can help in mending coverage holes.
- Author(s): Sofiane Aissani ; Mawloud Omar ; Abdelkamel Tari ; Feriel Bouakkaz
- Source: IET Wireless Sensor Systems, Volume 8, Issue 2, p. 87 –97
- DOI: 10.1049/iet-wss.2017.0048
- Type: Article
- + Show details - Hide details
-
p.
87
–97
(11)
Key management is the basic building block of all the security protocols and is one of the most challenging issues in wireless sensor networks (WSNs). Centralising a trusted key management server is not an appropriate solution in such fully distributed networks. On the other hand, designing a distributed key management system is a challenging task, due to the constrained characteristics of sensor nodes, which are limited in storage, computation, communication, and energy. In the literature, there is a hot research effort on key management purpose for WSNs. The greatest part of the existing solutions focuses mainly on the optimisation of the key number, rekeying frequency and process or the encryption system of the distributed keys. Unfortunately, these systems are implemented as an additional and independent service, involving a considerable overhead. In this study, the authors propose µKMS (micro key management system) for WSNs. µKMS implements a dissimulation scheme, embedding the rekeying process messages on the unexploited coding space of the exchanged ZigBee packets. They have developed simulations, where the obtained results show the relevance of µKMS in terms of communication overhead, storage overhead, and energy consumption.
Design and analysis of a novel wireless resistive analog passive sensor technique
DDoS attacks in WSNs: detection and countermeasures
Robust Kalman filter-based decentralised target search and prediction with topology maps
Security DV-hop localisation algorithm against wormhole attack in wireless sensor network
Sensor relocation for improved target tracking
µKMS: micro key management system for WSNs
Most viewed content
Most cited content for this Journal
-
Energy efficient clustering protocol based on K-means (EECPK-means)-midpoint algorithm for enhanced network lifetime in wireless sensor network
- Author(s): Anindita Ray and Debashis De
- Type: Article
-
Hybrid wireless sensor networks: a reliability, cost and energy-aware approach
- Author(s): Amir Ehsani Zonouz ; Liudong Xing ; Vinod M. Vokkarane ; Yan (Lindsay) Sun
- Type: Article
-
Indoor ranging and localisation algorithm based on received signal strength indicator using statistic parameters for wireless sensor networks
- Author(s): Saverio Pagano ; Simone Peirani ; Maurizio Valle
- Type: Article
-
Load-balanced energy efficient clustering protocol for wireless sensor networks
- Author(s): Saman Siavoshi ; Yousef S. Kavian ; Hamid Sharif
- Type: Article
-
Efficient scalable sensor node placement algorithm for fixed target coverage applications of wireless sensor networks
- Author(s): Arouna Ndam Njoya ; Christopher Thron ; Jordan Barry ; Wahabou Abdou ; Emmanuel Tonye ; Nukenine Siri Lawrencia Konje ; Albert Dipanda
- Type: Article