Rule-Driven Forwarding for Resilient WSN Infrastructures †
<p>TARP rules.</p> "> Figure 2
<p>Data for the <span class="html-italic">SPD</span> rule.</p> "> Figure 3
<p>Fuzzy paths provided by the <span class="html-italic">SPD</span> rule.</p> "> Figure 4
<p>Multiple shortest paths.</p> "> Figure 5
<p>Base packet format in unsecured TARP.</p> "> Figure 6
<p>Packet format for secure TARP.</p> "> Figure 7
<p>Two paths across the network. (<b>a</b>) Path 1; (<b>b</b>) path 2.</p> "> Figure 8
<p>Forwarding around holes (moderate attack). (<b>a</b>) One hole; (<b>b</b>) six holes.</p> "> Figure 9
<p>Forwarding around holes (massive attack). (<b>a</b>) Successful path; (<b>b</b>) failed path.</p> "> Figure 10
<p>Two consecutive paths around nine holes following a fresh beacon. (<b>a</b>) Path one; (<b>b</b>) path two.</p> "> Figure 11
<p>Paths obtained with <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and fuzzy ACKs turned on (<math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>a</mi> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>). (<b>a</b>) Under old beacon; (<b>b</b>) following a new beacon.</p> "> Figure 12
<p>Paths for <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> (both within the same beacon interval). (<b>a</b>) Healthy network; (<b>b</b>) nine holes.</p> "> Figure 13
<p>An RPC scenario with local and global relaxation options, <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>. (<b>a</b>) Local variant, no jamming; (<b>b</b>) local variant, jamming; (<b>c</b>) global variant, no jamming; (<b>d</b>) global variant, jamming.</p> ">
Abstract
:1. Introduction
2. Constraints and Tradeoffs
3. Resilience Issues in WSN
4. TARP
4.1. The Forwarding Paradigm
- Wireless communication, especially in WSNs deployed in the field and/or admitting node mobility or node failures, is inherently flaky. The reliability of a multi-hop transmission over a non-trivial number of links is the product of the reliability of all the individual hops, so it scales poorly [44].
- In the massive collaborative system of a WSN, a node should be able to contribute to the joint effort of the whole network in proportion to its opportunities and abilities. Within the “path-routing” paradigm, a node can either contribute to a path fully or not at all.
- The network is low-bandwidth and deals with short data packets. Complicated schemes intended to isolate data-link transfers and prevent collisions among simultaneous transmissions in the neighborhood are not effective in this type of surrounding.
- The fact that a packet is “accidentally” overheard by a neighbor of the transmitting node, for which it is not “officially” intended, is not a flaw but a feature that should be embraced by the forwarding scheme.
- Redundancy in forwarding a packet, understood as involving more nodes in this task than absolutely necessary, is in fact absolutely needed to make sense of multi-hop communication in a WSN (see Section 5.4).
4.2. The Rule Chain
- The implicit forwarding paths implemented by the rules are fuzzy and intentionally redundant. Their reliability does not depend on any of their individual components. In fact, TARP employs no traditional path concept.
- The contribution of any single node to the joint effort of maintaining connectivity in the network is gradually proportional to its opportunities and resources available.
- The rules focus on forwarding useful data with no administrative burden. Any administrative duties are carried out implicitly by the data packets as they are being received (or perceived) by the nodes.
- Any node overhearing a packet can use the overheard information to its advantage improving its opportunities for contributing to the global goal of maintaining network connectivity.
- The amount of redundancy in the rules is controllable in a mostly automatic way. Additional redundancy kicks in automatically as it turns out to be useful.
4.3. The Cleaning Rules
RuleLHC | (limit hop count): |
if (packet. MAX_HOPS) { | |
packet. ++; | |
receive (packet); | |
return FAIL; | |
} else { | |
return SUCCEED; | |
} |
RuleRCV | (pass the packet to the application): |
if (packet.D == my_address packet.D == 0) { | |
receive (packet); | |
} | |
return packet.D == my_address ? SUCCEED: FAIL; |
RuleDD | (duplicate discard): |
signature = concat (packet.S, packet.Q); | |
if (DD_cache.present (signature) { | |
return SUCCEED; | |
} else { | |
DD_cache.add (signature); | |
return FAIL; | |
} |
4.4. The SPD Rule
RuleSPD | (suboptimal path discard): |
SPD_cache.add (packet.S, packet.); | |
ce = SPD_cache.get (packet.D); | |
if (ce != NULL) { | |
R = (C == 0) ? 0: ce.SCount / C; | |
if (packet. packet.) { | |
ce.SCount++; | |
return SUCCEED; | |
} | |
} | |
return FAIL; |
4.5. Enhancements
- There is no isolation of the next-hop recipient, and every transmitted packet is essentially broadcast to all neighbors. This precludes collision avoidance schemes based on handshakes and may lead to broadcast storms [49], especially when the nodes are uninformed.
- It is not clear how much the flooding can be contained via heuristic rules that never attempt to construct precise, hop-by-hop routes. Is it possible at all to keep the redundancy at a level comparable to single-path forwarding?
- As a consequence of point 1, it seems that the only way to increase the reliability of forwarding is to involve more nodes (and network resources) into the process. With explicit forwarding to a specific next-hop-neighbor, the two nodes can resort to acknowledgments to improve the reliability of communication. This approach seems to be out of reach of the present scheme.
RuleSPP | (suppress parallel paths): |
if (packet.O) { | |
pkt = find_in_xmit_queue (packet.S, packet.Q); | |
if (pkt != NULL) { | |
discard (pkt); | |
return SUCCEED; | |
} | |
} | |
return FAIL; |
RuleSPD | (global relaxation option): |
SPD_cache.add (packet.S, packet.); | |
ce = SPD_cache.get (packet.D); | |
if (ce != NULL) { | |
packet. += (C == 0) ? 0: ce.SCount / C; | |
if (packet. packet.) { | |
ce.SCount++; | |
return SUCCEED; | |
} | |
} | |
return FAIL; |
5. Security and Resilience
5.1. Message Format and Types
- Master beacon. This type of message is issued periodically by the current master node to announce its identity and distribute network-wide parameters. The payload can vary from empty to potentially the maximum, with the expected length close to zero. It is one of the very few network-wide broadcast messages.
- Report. The message originates at any node and is addressed to the master. It can be acknowledgeable or not. In the former case, the issuing node expects an acknowledgment from the master.
- RPC. This is a request from one node to another node (a Remote Procedure Call, with the recipient possibly located several hops away from the sender. An RPC can be acknowledgeable or not.
- Ping. This message is addressed to the neighborhood and is not intended to be forwarded (as such) to any particular destination. A ping can be acknowledgeable or not.
5.2. Confidentiality and Authentication
5.3. Replay Protection
- All packets passed by TARP include a Q field acting as a small-range, wrap-around counter for packets sent by a given source.
- The concept of periodic master beacons is an integral feature of all TARP networks where centralized data collection is of merit.
- A reception error, i.e., some bits in the packet have been corrupted.
- The packet belongs to a different network operating in the same neighborhood on the same channel (the MAC doubles as the NID from the unsecured variant of TARP).
- An intrusion attempt.
5.4. DoS Attacks
6. Experiments
6.1. Healthy Conditions
6.2. Network under Attack
7. Conclusions and Final Remarks
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Raghavendra, C.S.; Sivalingam, K.M.; Znati, T. Wireless Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
- Gburzyński, P.; Kopciuszewska, E. On rapid development of reactive wireless sensor systems. Syst. Saf. Hum. Tech. Facil. Environ. 2019, 1, 574–582. [Google Scholar] [CrossRef] [Green Version]
- Åkerberg, J.; Gidlund, M.; Björkman, M. Future research challenges in wireless sensor and actuator networks targeting industrial automation. In Proceedings of the 2011 9th IEEE International Conference on Industrial Informatics, Lisbon, Portugal, 26–29 July 2011; pp. 410–415. [Google Scholar]
- Cheng, X.; Huang, X.; Du, D.Z. Ad Hoc Wireless Networking; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013; Volume 14. [Google Scholar]
- Gburzynski, P.; Olesinski, W.; Van Vooren, J. A WSN-based, RSS-driven, Real-time Location Tracking System for Independent Living Facilities. In Proceedings of the DCNET, Lisbon, Portugal, 26–28 July 2016; pp. 64–71. [Google Scholar]
- Jordan, R.; Abdallah, C.T. Wireless communications and networking: An overview. IEEE Antennas Propag. Mag. 2002, 44, 185–193. [Google Scholar] [CrossRef]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
- Gburzyński, P.; Olesiński, W. On a practical approach to low-cost ad hoc wireless networking. J. Telecommun. Inf. Technol. 2008, 2008, 29–42. [Google Scholar]
- Chen, C.P.; Chuang, C.L.; Jiang, J.A. Ecological Monitoring Using Wireless Sensor Networks: Overview, Challenges, and Opportunities. In Advancement in Sensing Technology; Springer: Berlin/Heidelberg, Germany, 2013; pp. 1–21. [Google Scholar]
- Lloret, J.; Garcia, M.; Bri, D.; Sendra, S. A wireless sensor network deployment for rural and forest fire detection and verification. Sensors 2009, 9, 8722–8747. [Google Scholar] [CrossRef]
- Chowdary, V.; Gupta, M.K. Automatic Forest Fire Detection and Monitoring Techniques: A Survey. In Intelligent Communication, Control and Devices; Springer: Berlin/Heidelberg, Germany, 2018; pp. 1111–1117. [Google Scholar]
- Anastasi, G.; Conti, M.; Di Francesco, M.; Passarella, A. Energy conservation in wireless sensor networks: A survey. Ad Hoc Netw. 2009, 7, 537–568. [Google Scholar] [CrossRef]
- Seba, A.; Nouali-Taboudjemat, N.; Badache, N.; Seba, H. A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J. Netw. Comput. Appl. 2019, 126, 150–161. [Google Scholar] [CrossRef]
- Gburzyński, P.; Kaminska, B.; Olesiński, W. A Tiny and Efficient Wireless Ad-hoc Protocol for Low-cost Sensor Networks. In Proceedings of the DATE’07, Nice, France, 16–20 April 2007; pp. 1562–1567. [Google Scholar]
- Raymond, D.R.; Midkiff, S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput. 2008, 74–81. [Google Scholar] [CrossRef]
- Jeong, S.; Jo, H.; Kang, S. Fully distributed monitoring architecture supporting multiple trackees and trackers in indoor mobile asset management application. Sensors 2014, 14, 5702–5724. [Google Scholar] [CrossRef] [Green Version]
- Ma, S.; Yang, Y.; Qian, Y.; Sharif, H.; Alahmad, M. Energy harvesting for wireless sensor networks: Applications and challenges in smart grid. Int. J. Sens. Netw. 2016, 21, 226–241. [Google Scholar] [CrossRef]
- Texas Instruments. CC1350 SimpleLink Ultra-Low-Power Dual-Band Wireless MCU; Technical Document SWRS183B; Texas Instruments: Dallas, TX, USA, 2019. [Google Scholar]
- Raghunathan, V.; Ganeriwal, S.; Srivastava, M. Emerging techniques for long lived wireless sensor networks. IEEE Commun. Mag. 2006, 44, 108–114. [Google Scholar] [CrossRef]
- Hefeeda, M.; Bagheri, M. Forest fire modeling and early detection using wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 2009, 7, 169–224. [Google Scholar]
- Gu, C.; Tan, R.; Lou, X. One-Hop Out-of-Band Control Planes for Multi-Hop Wireless Sensor Networks. ACM Trans. Sens. Netw. 2019, 15, 40. [Google Scholar] [CrossRef] [Green Version]
- Aslan, Y.E.; Korpeoglu, I.; Ulusoy, Ö. A framework for use of wireless sensor networks in forest fire detection and monitoring. Comput. Environ. Urban Syst. 2012, 36, 614–625. [Google Scholar] [CrossRef]
- Xue, Y.; Ramamurthy, B.; Burbach, M. A two-tier wireless sensor network infrastructure for large-scale real-time groundwater monitoring. In Proceedings of the IEEE Local Computer Network Conference, Denver, CO, USA, 10–14 October 2010; pp. 874–881. [Google Scholar]
- Castillo-Effer, M.; Quintela, D.H.; Moreno, W.; Jordan, R.; Westhoff, W. Wireless sensor networks for flash-flood alerting. In Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, Punta Cana, Dominican Republic, 3–5 November 2004; Volume 1, pp. 142–146. [Google Scholar]
- Priyadarshinee, I.; Sahoo, K.; Mallick, C. Flood prediction and prevention through wireless sensor networking (WSN): A survey. Int. J. Comput. Appl. 2015, 113, 30–36. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Meddeb, A. Internet of things standards: Who stands out from the crowd? IEEE Commun. Mag. 2016, 54, 40–47. [Google Scholar] [CrossRef]
- Intanagonwiwat, C.; Govindan, R.; Estrin, D. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000; pp. 56–67. [Google Scholar]
- Boers, N.M.; Gburzyński, P.; Nikolaidis, I.; Olesiński, W. Developing wireless sensor network applications in a virtual environment. Telecommun. Syst. 2010, 45, 165–176. [Google Scholar] [CrossRef] [Green Version]
- Gay, D.; Levis, P.; Von Behren, R.; Welsh, M.; Brewer, E.; Culler, D. The nesC language: A holistic approach to networked embedded systems. ACM Sigplan Not. 2014, 49, 41–51. [Google Scholar] [CrossRef]
- Noor, M.b.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
- Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, India, 3–4 November 2004; pp. 162–175. [Google Scholar]
- Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef]
- Ghildiyal, S.; Mishra, A.K.; Gupta, A.; Garg, N. Analysis of denial of service (DoS) attacks in wireless sensor networks. IJRET Int. J. Res. Eng. Technol. 2014, 3, 140–143. [Google Scholar]
- Tellez, M.; El-Tawab, S.; Heydari, H.M. Improving the security of wireless sensor networks in an IoT environmental monitoring system. In Proceedings of the 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, 29 April 2016; pp. 72–77. [Google Scholar]
- Misra, S.; Woungang, I.; Misra, S.C. Guide to Wireless Ad Hoc Networks; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
- Sankar, A.; Liu, Z. Maximum lifetime routing in wireless ad-hoc networks. In Proceedings of the IEEE INFOCOM 2004, Hong Kong, China, 7–11 March 2004; Volume 2, pp. 1089–1097. [Google Scholar]
- Sarkar, A.; Murugan, T.S. Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel. Netw. 2019, 25, 303–320. [Google Scholar] [CrossRef]
- Robinson, Y.H.; Julie, E.G.; Saravanan, K.; Kumar, R.; Son, L.H. FD-AOMDV: Fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 4455–4472. [Google Scholar] [CrossRef]
- Rezazadeh, J. Mobile wireles sensor networks overview. Int. J. Comput. Commun. Netw. 2012, 2, 17–22. [Google Scholar]
- Yang, X.; Deng, D.; Liu, M. An overview of routing protocols for Wireless Sensor Networks. In Proceedings of the 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), Harbin, China, 19–20 December 2015; Volume 1, pp. 1000–1003. [Google Scholar]
- Liu, A.; Zheng, Z.; Zhang, C.; Chen, Z.; Shen, X. Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Trans. Veh. Technol. 2012, 61, 3255–3265. [Google Scholar] [CrossRef] [Green Version]
- De Couto, D.S.; Aguayo, D.; Chambers, B.A.; Morris, R. Performance of multihop wireless networks: Shortest path is not enough. ACM SIGCOMM Comput. Commun. Rev. 2003, 33, 83–88. [Google Scholar] [CrossRef]
- Shimony, B.; Nikolaidis, I.; Gburzynski, P.; Stroulia, E. PicOS tuples: Easing event based programming in tiny pervasive systems. In Proceedings of the 7th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, Antwerp, Belgium, 20–24 September 2010; pp. 53–60. [Google Scholar]
- Perkins, C.; Royer, E. Ad-hoc On-demand Distance Vector Routing (AODV). In Proceedings of the IEEE workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
- Tong, F.; Ni, M.; Shu, L.; Pan, J. A pipelined-forwarding, routing-integrated and effectively-identifying MAC for large-scale WSN. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 225–230. [Google Scholar]
- Singh, R.; Sikdar, B. A Low Delay Routing-Integrated MAC Protocol for Wireless Sensor Networks. IEEE Internet Things J. 2022, 9, 20561–20576. [Google Scholar] [CrossRef]
- Tonguz, O.K.; Wisitpongphan, N.; Parikh, J.S.; Bai, F.; Mudalige, P.; Sadekar, V.K. On the broadcast storm problem in ad hoc wireless networks. In Proceedings of the 2006 3rd International Conference on Broadband Communications, Networks and Systems, San José, CA, USA, 1–5 October 2006; pp. 1–11. [Google Scholar]
- Feng, Y.; Zhang, B.; Chai, S.; Cui, L.; Li, Q. An optimized AODV protocol based on clustering for WSNs. In Proceedings of the 2017 6th International Conference on Computer Science and Network Technology (ICCSNT), Dalian, China, 21–22 October 2017; pp. 410–414. [Google Scholar]
- Ray, S.; Carruthers, J.B.; Starobinski, D. RTS/CTS-induced congestion in ad hoc wireless LANs. In Proceedings of the 2003 IEEE Wireless Communications and Networking, WCNC 2003, New Orleans, LA, USA, 16–20 March 2003; Volume 3, pp. 1516–1521. [Google Scholar]
- Chatzimisios, P.; Boucouvalas, A.; Vitsas, V. Effectiveness of RTS/CTS handshake in IEEE 802.11 a wireless LAN. Electron. Lett. 2004, 40, 915–916. [Google Scholar] [CrossRef]
- Rahman, A.; Gburzyński, P. Hidden problems with the hidden node problem. In Proceedings of the 23rd Biennial Symposium on Communications, Kingston, ON, Canada, 29 May–1 June 2006; pp. 270–273. [Google Scholar]
- Wang, L.; Wu, K.; Hamdi, M. Combating hidden and exposed terminal problems in wireless networks. IEEE Trans. Wirel. Commun. 2012, 11, 4204–4213. [Google Scholar] [CrossRef]
- Boers, N.M.; Nikolaidis, I.; Gburzynski, P. Impulsive interference avoidance in dense wireless sensor networks. In Proceedings of the International Conference on Ad-Hoc Networks and Wireless, Belgrade, Serbia, 9–11 July 2012; pp. 167–180. [Google Scholar]
- Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS: Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
- Mbarek, B.; Meddeb, A. Energy efficient security protocols for wireless sensor networks: SPINS vs. TinySec. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Hammamet, Tunisia, 11–13 May 2016; pp. 1–4. [Google Scholar]
- Texas Instruments. CC1100 Single Chip Low Cost Low Power RF Transceiver; Technical Document SWRS038D; Texas Instruments: Dallas, TX, USA, 2014. [Google Scholar]
- Bellare, M.; Kilian, J.; Rogaway, P. The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 2000, 61, 362–399. [Google Scholar] [CrossRef] [Green Version]
- Perrig, A.; Stankovic, J.; Wagner, D. Security in wireless sensor networks. Commun. ACM 2004, 47, 53–57. [Google Scholar] [CrossRef] [Green Version]
- Glass, S.; Portmann, M.; Muthukkumarasamy, V. Securing route and path integrity in multihop wireless networks. In Security of Self-Organizing Networks. MANET, WSN, WMN, VANET; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
- Daemen, J.; Rijmen, V. The Design of Rijndael: AES-the Advanced Encryption Standard; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Osvik, D.A.; Bos, J.W.; Stefan, D.; Canright, D. Fast software AES encryption. In Proceedings of the International Workshop on Fast Software Encryption, Seoul, Korea, 7–10 February 2010; pp. 75–93. [Google Scholar]
- Rogaway, P. Evaluation of some blockcipher modes of operation. In Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan; 2011. Available online: https://www.cryptrec.go.jp/exreport/cryptrec-ex-2012-2010r1.pdf (accessed on 30 September 2022).
- Rogaway, P.; Wooding, M.; Zhang, H. The security of ciphertext stealing. In Proceedings of the International Workshop on Fast Software Encryption, Washington, DC, USA, 19–21 March 2012; pp. 180–195. [Google Scholar]
- Aura, T. Strategies against replay attacks. In Proceedings of the 10th Computer Security Foundations Workshop, Rockport, MA, USA, 10–12 June 1997; pp. 59–68. [Google Scholar]
- Ramesh, M.V.; Raj, A.B.; Hemalatha, T. Wireless sensor network security: Real-time detection and prevention of attacks. In Proceedings of the 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Rockport, MA, USA, 10–12 June 2012; pp. 783–787. [Google Scholar]
- Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, 25–27 May 2005; pp. 46–57. [Google Scholar]
- Iliev, G.; Mihovska, A.; Mihaylova, D.; Valkova-Jarvis, Z. Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks. Int. J. Interdiscip. Telecommun. Netw. 2019, 12, 46–58. [Google Scholar]
- Spenza, D.; Magno, M.; Basagni, S.; Benini, L.; Paoli, M.; Petrioli, C. Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 522–530. [Google Scholar]
- Mansouri, D.; Mokdad, L.; Ben-Othman, J.; Ioualalen, M. Detecting DoS attacks in WSN based on clustering technique. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; pp. 2214–2219. [Google Scholar]
- Meenalochani, M.; Sudha, S. Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques. Wirel. Pers. Commun. 2019, 104, 663–675. [Google Scholar] [CrossRef]
- Olsonet Communications. The Netting Demo; Technical Document; Olsonet Communications Corporation: Nepean, ON, Canada, 2020. [Google Scholar]
- Gburzyński, P.; Nikolaidis, I. Wireless Network Simulation Extensions in SMURPH/SIDE. In Proceedings of the 2006 Winter Simulation Conference (WSC’06), Monterey, CA, USA, 3–6 December 2006. [Google Scholar]
- Gburzyński, P. Modeling Communication Networks and Protocols; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
Mode | I |
---|---|
Shutdown: device will wake up and reset on the nearest signal change on one of the preconfigured pins | 185 nA |
Standby: low-power idle state, basic clocks running, interrupts enabled, CPU halted waiting for an interrupt | 1 A |
Idle: transient idle state with maximum-speed transition to Active | 570 A |
Active: CPU running | 2 mA |
Radio RX: waiting for reception or receiving a packet | 6 mA |
Radio TX: transmitting a packet | 23 mA |
Distance (m) | PDF (%) |
---|---|
40.0 | 99.8 |
56.4 | 99.3 |
80.0 | 98.4 |
89.4 | 89.3 |
112.8 | 83.2 |
120.0 | 77.1 |
126.5 | 65.1 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gburzynski, P.; Nikolaidis, I. Rule-Driven Forwarding for Resilient WSN Infrastructures. Sensors 2022, 22, 8708. https://doi.org/10.3390/s22228708
Gburzynski P, Nikolaidis I. Rule-Driven Forwarding for Resilient WSN Infrastructures. Sensors. 2022; 22(22):8708. https://doi.org/10.3390/s22228708
Chicago/Turabian StyleGburzynski, Pawel, and Ioanis Nikolaidis. 2022. "Rule-Driven Forwarding for Resilient WSN Infrastructures" Sensors 22, no. 22: 8708. https://doi.org/10.3390/s22228708
APA StyleGburzynski, P., & Nikolaidis, I. (2022). Rule-Driven Forwarding for Resilient WSN Infrastructures. Sensors, 22(22), 8708. https://doi.org/10.3390/s22228708