Dissertations / Theses on the topic 'Resource-constrained wireless sensor'

To see the other types of publications on this topic, follow the link: Resource-constrained wireless sensor.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 dissertations / theses for your research on the topic 'Resource-constrained wireless sensor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Junlin. "Distributed estimation in resource-constrained wireless sensor networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26633.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Ghassan AlRegib; Committee Member: Elliot Moore; Committee Member: Monson H. Hayes; Committee Member: Paul A. Work; Committee Member: Ying Zhang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
2

Daabaj, Khaled. "Reliable load-balancing routing for resource-constrained wireless sensor networks." Thesis, Daabaj, Khaled (2012) Reliable load-balancing routing for resource-constrained wireless sensor networks. PhD thesis, Murdoch University, 2012. https://researchrepository.murdoch.edu.au/id/eprint/6906/.

Full text
Abstract:
Wireless sensor networks (WSNs) are energy and resource constrained. Energy limitations make it advantageous to balance radio transmissions across multiple sensor nodes. Thus, load balanced routing is highly desirable and has motivated a significant volume of research. Multihop sensor network architecture can also provide greater coverage, but requires a highly reliable and adaptive routing scheme to accommodate frequent topology changes. Current reliability-oriented protocols degrade energy efficiency and increase network latency. This thesis develops and evaluates a novel solution to provide energy-efficient routing while enhancing packet delivery reliability. This solution, a reliable load-balancing routing (RLBR), makes four contributions in the area of reliability, resiliency and load balancing in support of the primary objective of network lifetime maximisation. The results are captured using real world testbeds as well as simulations. The first contribution uses sensor node emulation, at the instruction cycle level, to characterise the additional processing and computation overhead required by the routing scheme. The second contribution is based on real world testbeds which comprises two different TinyOS-enabled senor platforms under different scenarios. The third contribution extends and evaluates RLBR using large-scale simulations. It is shown that RLBR consumes less energy while reducing topology repair latency and supports various aggregation weights by redistributing packet relaying loads. It also shows a balanced energy usage and a significant lifetime gain. Finally, the forth contribution is a novel variable transmission power control scheme which is created based on the experience gained from prior practical and simulated studies. This power control scheme operates at the data link layer to dynamically reduce unnecessarily high transmission power while maintaining acceptable link reliability.
APA, Harvard, Vancouver, ISO, and other styles
3

Wacker, Arno Rüdiger. "Key distribution schemes for resource constrained devices in wireless sensor networks." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-34332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Ying. "Optimal decision rules for decentralized detection in resource-constrained wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1375537831&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bolisetti, Siva Karteek. "Target detection architecture for resource constrained wireless sensor networks within Internet of Things." Thesis, Staffordshire University, 2017. http://eprints.staffs.ac.uk/3886/.

Full text
Abstract:
Wireless sensor networks (WSN) within Internet of Things (IoT) have the potential to address the growing detection and classification requirements among many surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional passive means of sensing such as acoustic and seismic which are used for surveillance and target detection applications of WSN. RF sensing based WSN within IoT detect the presence of designated targets by transmitting RF signals into the sensing environment and observing the reflected echoes. In this thesis, an RF sensing based target detection architecture for surveillance applications of WSN has been proposed to detect the presence of stationary targets within the sensing environment. With multiple sensing nodes operating simultaneously within the sensing region, diversity among the sensing nodes in the choice of transmit waveforms is required. Existing multiple access techniques to accommodate multiple sensing nodes within the sensing environment are not suitable for RF sensing based WSN. In this thesis, a diversity in the choice of the transmit waveforms has been proposed and transmit waveforms which are suitable for RF sensing based WSN have been discussed. A criterion have been defined to quantify the ease of detecting the signal and energy efficiency of the signal based on which ease of detection index and energy efficiency index respectively have been generated. The waveform selection criterion proposed in this thesis takes the WSN sensing conditions into account and identifies the optimum transmit waveform within the available choices of transmit waveforms based on their respective ease of detection and energy efficiency indexes. A target detector analyses the received RF signals to make a decision regarding the existence or absence of targets within the sensing region. Existing target detectors which are discussed in the context of WSN do not take the factors such as interference and nature of the sensing environment into account. Depending on the nature of the sensing environment, in this thesis the sensing environments are classified as homogeneous and heterogeneous sensing environments. Within homogeneous sensing environments the presence of interference from the neighbouring sensing nodes is assumed. A target detector has been proposed for WSN within homogeneous sensing environments which can reliably detect the presence of targets. Within heterogeneous sensing environments the presence of clutter and interfering waveforms is assumed. A target detector has been proposed for WSN within heterogeneous sensing environments to detect targets in the presence of clutter and interfering waveforms. A clutter estimation technique has been proposed to assist the proposed target detector to achieve increased target detection reliability in the presence of clutter. A combination of compressive and two-step target detection architectures has been proposed to reduce the transmission costs. Finally, a 2-stage target detection architecture has been proposed to reduce the computational complexity of the proposed target detection architecture.
APA, Harvard, Vancouver, ISO, and other styles
6

Roseveare, Nicholas. "Optimization and resource management in wireless sensor networks." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15730.

Full text
Abstract:
Doctor of Philosophy
Department of Electrical and Computer Engineering
Balasubramaniam Natarajan
In recent years, there has been a rapid expansion in the development and use of low-power, low-cost wireless modules with sensing, computing, and communication functionality. A wireless sensor network (WSN) is a group of these devices networked together wirelessly. Wireless sensor networks have found widespread application in infrastructure, environmental, and human health monitoring, surveillance, and disaster management. While there are many interesting problems within the WSN framework, we address the challenge of energy availability in a WSN tasked with a cooperative objective. We develop approximation algorithms and execute an analysis of concave utility maximization in resource constrained systems. Our analysis motivates a unique algorithm which we apply to resource management in WSNs. We also investigate energy harvesting as a way of improving system lifetime. We then analyze the effect of using these limited and stochastically available communication resources on the convergence of decentralized optimization techniques. The main contributions of this research are: (1) new optimization formulations which explicitly consider the energy states of a WSN executing a cooperative task; (2) several analytical insights regarding the distributed optimization of resource constrained systems; (3) a varied set of algorithmic solutions, some novel to this work and others based on extensions of existing techniques; and (4) an analysis of the effect of using stochastic resources (e.g., energy harvesting) on the performance of decentralized optimization methods. Throughout this work, we apply our developments to distribution estimation and rate maximization. The simulation results obtained help to provide verification of algorithm performance. This research provides valuable intuition concerning the trade-offs between energy-conservation and system performance in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Xing. "Hybrid real-time operating system integrated with middleware for resource-constrained wireless sensor nodes." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22472/document.

Full text
Abstract:
Avec les avancées récentes en microélectronique, en traitement numérique et en technologie de communication, les noeuds de réseau de capteurs sans fil (noeud RCSF) deviennent de moins en moins encombrants et coûteux. De ce fait la technologie de RCSF est utilisée dans de larges domaines d’application. Comme les noeuds RCSF sont limités en taille et en coût, ils sont en général équipés d’un petit microcontrôleur de faible puissance de calcul et de mémoire etc. De plus ils sont alimentés par une batterie donc son énergie disponible est limitée. A cause de ces contraintes, la plateforme logicielle d’un RCSF doit consommer peu de mémoire, d’énergie, et doit être efficace en calcul. Toutes ces contraintes rendent les développements de logiciels dédiés au RCSF très compliqués. Aujourd’hui le développement d’un système d’exploitation dédié à la technologie RCSF est un sujet important. En effet avec un système d’exploitation efficient, les ressources matérielles d’une plateforme RCSF peuvent être utilisées efficacement. De plus, un ensemble de services système disponibles permet de simplifier le développement d’une application. Actuellement beaucoup de travaux de recherche ont été menés pour développer des systèmes d’exploitation pour le RCSF tels que TinyOS, Contiki, SOS, openWSN, mantisOS et simpleRTJ. Cependant plusieurs défis restent à relever dans le domaine de système d’exploitation pour le RCSF. Le premier des défis est le développement d’un système d’exploitation temps réel à faible empreinte mémoire dédié au RCSF. Le second défi est de développer un mécanisme permettant d’utiliser efficacement la mémoire et l’énergie disponible d’un RCSF. De plus, comment fournir un développement d’application pour le RCSF reste une question ouverte. Dans cette thèse, un nouveau système d’exploitation hybride, temps réel à énergie efficiente et à faible empreinte mémoire nommé MIROS dédié au RCSF a été développé. Dans MIROS, un ordonnanceur hybride a été adopté ; les deux ordonnanceurs évènementiel et multithread ont été implémentés. Avec cet ordonnanceur hybride, le nombre de threads de MIROS peut être diminué d’une façon importante. En conséquence, les avantages d’un système d’exploitation évènementiel qui consomme peu de ressource mémoire et la performance temps réel d’un système d’exploitation multithread ont été obtenues. De plus, l’allocation dynamique de la mémoire a été aussi réalisée dans MIROS. La technique d’allocation mémoire de MIROS permet l’augmentation de la zone mémoire allouée et le réassemblage des fragments de mémoire. De ce fait, l’allocation de mémoire de MIROS devient plus flexible et la ressource mémoire d’un noeud RCSF peut être utilisée efficacement. Comme l’énergie d’un noeud RCSF est une ressource à forte contrainte, le mécanisme de conservation d’énergie a été implanté dans MIROS. Contrairement aux autres systèmes d’exploitation pour RCSF où la conservation d’énergie a été prise en compte seulement en logiciel, dans MIROS la conservation d’énergie a été prise en compte à la fois en logiciel et en matériel. Enfin, pour fournir un environnement de développement convivial aux utilisateurs, un nouveau intergiciel nommé EMIDE a été développé et intégré dans MIROS. EMIDE permet le découplage d’une application de système. Donc le programme d’application est plus simple et la reprogrammation à distance est plus performante, car seulement les codes de l’application seront reprogrammés. Les évaluations de performance de MIROS montrent que MIROS est un système temps réel à faible empreinte mémoire et efficace pour son exécution. De ce fait, MIROS peut être utilisé dans plusieurs plateformes telles que BTnode, IMote, SenseNode, TelosB et T-Mote Sky. Enfin, MIROS peut être utilisé pour les plateformes RCSF à fortes contraintes de ressources
With the recent advances in microelectronic, computing and communication technologies, wireless sensor network (WSN) nodes have become physically smaller and more inexpensive. As a result, WSN technology has become increasingly popular in widespread application domains. Since WSN nodes are minimized in physical size and cost, they are mostly restricted to platform resources such as processor computation ability, memory resources and energy supply. The constrained platform resources and diverse application requirements make software development on the WSN platform complicated. On the one hand, the software running on the WSN platform should be small in the memory footprint, low in energy consumption and high in execution efficiency. On the other hand, the diverse application development requirements, such as the real-time guarantee and the high reprogramming performance, should be met by the WSN software. The operating system (OS) technology is significant for the WSN proliferation. An outstanding WSN OS can not only utilize the constrained WSN platform resources efficiently, but also serve the WSN applications soundly. Currently, a set of WSN OSes have been developed, such as the TinyOS, the Contiki, the SOS, the openWSN and the mantisOS. However, many OS development challenges still exist, such as the development of a WSN OS which is high in real-time performance yet low in memory footprint; the improvement of the utilization efficiency to the memory and energy resources on the WSN platforms, and the providing of a user-friendly application development environment to the WSN users. In this thesis, a new hybrid, real-time, energy-efficient, memory-efficient, fault-tolerant and user-friendly WSN OS MIROS is developed. MIROS uses the hybrid scheduling to combine the advantages of the event-driven system's low memory consumption and the multithreaded system's high real-time performance. By so doing, the real-time scheduling can be achieved on the severely resource-constrained WSN platforms. In addition to the hybrid scheduling, the dynamic memory allocators are also realized in MIROS. Differing from the other dynamic allocation approaches, the memory heap in MIROS can be extended and the memory fragments in the MIROS can be defragmented. As a result, MIROS allocators become flexible and the memory resources can be utilized more efficiently. Besides the above mechanisms, the energy conservation mechanism is also implemented in MIROS. Different from most other WSN OSes in which the energy resource is conserved only from the software aspect, the energy conservation in MIROS is achieved from both the software aspect and the multi-core hardware aspect. With this conservation mechanism, the energy cost reduced significantly, and the lifetime of the WSN nodes prolonged. Furthermore, MIROS implements the new middleware software EMIDE in order to provide a user-friendly application development environment to the WSN users. With EMIDE, the WSN application space can be decoupled from the low-level system space. Consequently, the application programming can be simplified as the users only need to focus on the application space. Moreover, the application reprogramming performance can be improved as only the application image other than the monolithic image needs to be updated during the reprogramming process. The performance evaluation works to the MIROS prove that MIROS is a real-time OS which has small memory footprint, low energy cost and high execution efficiency. Thus, it is suitable to be used on many WSN platforms including the BTnode, IMote, SenseNode, TelosB, T-Mote Sky, etc. The performance evaluation to EMIDE proves that EMIDE has less memory cost and low energy consumption. Moreover, it supports small-size application code. Therefore, it can be used on the high resource-constrained WSN platforms to provide a user-friendly development environment to the WSN users
APA, Harvard, Vancouver, ISO, and other styles
8

Tsiftes, Nicolas. "Storage-Centric System Architectures for Networked, Resource-Constrained Devices." Doctoral thesis, Uppsala universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267628.

Full text
Abstract:
The emergence of the Internet of Things (IoT) has increased the demand for networked, resource-constrained devices tremendously. Many of the devices used for IoT applications are designed to be resource-constrained, as they typically must be small, inexpensive, and powered by batteries. In this dissertation, we consider a number of challenges pertaining to these constraints: system support for energy efficiency; flash-based storage systems; programming, testing, and debugging; and safe and secure application execution. The contributions of this dissertation are made through five research papers addressing these challenges. Firstly, to enhance the system support for energy-efficient storage in resource-constrained devices, we present the design, implementation, and evaluation of the Coffee file system and the Antelope DBMS. Coffee provides a sequential write throughput that is over 92% of the attainable flash driver throughput, and has a constant memory footprint for open files. Antelope is the first full-fledged relational DBMS for sensor networks, and it provides two novel indexing algorithms to enable fast and energy-efficient database queries. Secondly, we contribute a framework that extends the functionality and increases the performance of sensornet checkpointing, a debugging and testing technique. Furthermore, we evaluate how different data compression algorithms can be used to decrease the energy consumption and data dissemination time when reprogramming sensor networks. Lastly, we present Velox, a virtual machine for IoT applications. Velox can enforce application-specific resource policies. Through its policy framework and its support for high-level programming languages, Velox helps to secure IoT applications. Our experiments show that Velox monitors applications' resource usage and enforces policies with an energy overhead below 3%. The experimental systems research conducted in this dissertation has had a substantial impact both in the academic community and the open-source software community. Several of the produced software systems and components are included in Contiki, one of the premier open-source operating systems for the IoT and sensor networks, and they are being used both in research projects and commercial products.
APA, Harvard, Vancouver, ISO, and other styles
9

Porambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.

Full text
Abstract:
Abstract The concept of the Internet of Things (IoT) is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. Among many underlying networking technologies for the IoT, Wireless Sensor Network (WSN) technology has become an integral building block. IoT enabled sensor networks provide a wide range of application areas such as smart homes, connected healthcare, smart cities and various solutions for the manufacturing industry. The integration of WSNs in IoT will also create new security challenges for establishing secure channels between low power sensor nodes and Internet hosts. This will lead to many challenges in designing new key establishment and authentication protocols and redefining the existing ones. This dissertation addresses how to integrate lightweight key management and authentication solutions in the resource constrained sensor networks deployed in IoT domains. Firstly, this thesis elaborates how to exploit the implicit certificates to initiate secure End-to-End (E2E) communication channels between the resource constrained sensor nodes in IoT networks. Implicit certificates are used for authentication and key establishment purposes. The compliance of the security schemes is proven through performance evaluations and by discussing the security properties. Secondly, this dissertation presents the design of two lightweight group key establishment protocols for securing group communications between resource-constrained IoT devices. Finally, the thesis explores promising approaches on how to tailor the existing security protocols in accordance with IoT device and network characteristics. In particular, variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections between the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. A solutions called Collaborative HIP (CHIP) is proposed with an efficient key establishment component for the high resource-constrained devices on the IoT. The applicability of the keying mechanism is demonstrated with the implementation and the performance measurements results
Tiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
APA, Harvard, Vancouver, ISO, and other styles
10

Houssain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.

Full text
Abstract:
Les systèmes de cryptographie à base de courbe elliptique (ECC) ont été adoptés comme des systèmes standardisés de cryptographie à clé publique (PKC) par l'IEEE, ANSI, NIST, SEC et WTLS. En comparaison avec la PKC traditionnelle, comme RSA et ElGamal, l'ECC offre le même niveau de sécurité avec des clés de plus petites tailles. Cela signifie des calculs plus rapides et une consommation d'énergie plus faible ainsi que des économies de mémoire et de bande passante. Par conséquent, ECC est devenue une technologie indispensable, plus populaire et considérée comme particulièrement adaptée à l’implémentation sur les dispositifs à ressources restreintes tels que les réseaux de capteurs sans fil (WSN). Le problème majeur avec les noeuds de capteurs chez les WSN, dès qu'il s'agit d’opérations cryptographiques, est les limitations de leurs ressources en termes de puissance, d'espace et de temps de réponse, ce qui limite la capacité du capteur à gérer les calculs supplémentaires nécessaires aux opérations cryptographiques. En outre, les mises en oeuvre actuelles de l’ECC sur WSN sont particulièrement vulnérables aux attaques par canaux auxiliaires (SCA), en particulier aux attaques par analyse de consommation (PAA), en raison de l'absence de la sécurité physique par blindage, leur déploiement dans les régions éloignées et le fait qu’elles soient laissées sans surveillance. Ainsi, les concepteurs de crypto-processeurs ECC sur WSN s'efforcent d'introduire des algorithmes et des architectures qui ne sont pas seulement résistants PAA, mais également efficaces sans aucun supplément en termes de temps, puissance et espace. Cette thèse présente plusieurs contributions dans le domaine des cryptoprocesseurs ECC conscientisés aux PAA, pour les dispositifs à ressources limitées comme le WSN. Premièrement, nous proposons deux architectures robustes et efficaces pour les ECC conscientisées au PAA. Ces architectures sont basées sur des algorithmes innovants qui assurent le fonctionnement de base des ECC et qui prévoient une sécurisation de l’ECC contre les PAA simples (SPA) sur les dispositifs à ressources limitées tels que les WSN. Deuxièmement, nous proposons deux architectures additionnelles qui prévoient une sécurisation des ECC contre les PAA différentiels (DPA). Troisièmement, un total de huit architectures qui incluent, en plus des quatre architectures citées ci-dessus pour SPA et DPA, deux autres architectures dérivées de l’architecture DPA conscientisée, ainsi que deux architectures PAA conscientisées. Les huit architectures proposées sont synthétisées en utilisant la technologie des réseaux de portes programmables in situ (FPGA). Quatrièmement, les huit architectures sont analysées et évaluées, et leurs performances comparées. En plus, une comparaison plus avancée effectuée sur le niveau de la complexité du coût (temps, puissance, et espace), fournit un cadre pour les concepteurs d'architecture pour sélectionner la conception la plus appropriée. Nos résultats montrent un avantage significatif de nos architectures proposées par rapport à la complexité du coût, en comparaison à d'autres solutions proposées récemment dans le domaine de la recherche
Elliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
APA, Harvard, Vancouver, ISO, and other styles
11

Oudishu, Ramcin, and Pethrus Gärdborn. "A CoAP Publish-Subscribe Broker for More Resource-Efficient Wireless Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232076.

Full text
Abstract:
With the rapid development of the Internet of Things, Wireless Sensor Networks (WSNs) are deployed increasingly all over the world, providing data that can help increase sustainable development. Currently in Uppsala, Sweden, the GreenIoT project monitors air pollution by using WSNs. The resource constrained nature of WSNs demand that special care is taken in the design of communication models and communication protocols. The publish-subscribe (pub/sub) model suits WSNs very well since it puts an intermediary the broker server between sensor nodes and clients, thus alleviating the workload of the sensor nodes. The IETF (Internet Engineering Task Force) is currently in the process of standardizing a pub/sub extension to the Constrained Application Protocol (CoAP). Since the extension is such a recent addition to CoAP and not yet standardized, there are very few actual implementations of it and little is known of how it would work in practice. The GreenIoT project is considering replacement of their current pub/sub broker with the CoAP pub/sub broker since its underlying implementation is likely to be more energy efficient and the standardizing organization behind CoAP is the well-esteemed IETF. On a general level, this report offers an investigation of the problems and challenges faced when implementing the CoAP pub/sub extension with respect to design choices, implementation and protocol ambiguities. More specifically, a CoAP pub/sub broker is implemented for the GreenIoT project. By means of carefully analyzing the CoAP protocol and CoAP pub/sub draft as well as other necessary protocols, then proceeding to make decisions of what programming language to use as well as what existing CoAP library to use, a broker server was implemented and tested iteratively as the work proceeded. The implementation gave rise to several questions regarding the pub/sub draft which are also discussed in the report.
Den hastiga utvecklingen av Sakernas Internet över hela världen har medfört ett ökat användande av trådlösa sensornätverk vars datainsamling kan bidra till en mer hållbar utveckling. För närvarande använder sig GreenIoT-projektet i Uppsala av trådlösa sensornätverk för att övervaka halterna av luftföroreningar. Resursbegränsningarna för dylika nätverk medför att särskild hänsyn måste tas vid design av såväl kommunikationsmodeller som kommunikationsprotokoll. Modellen Publicera-Prenumerera (pub/pre) passar ypperligt för trådlösa sensornätverk då en mellanhand placeras mellan klient och server en s.k. broker vilket får den positiva effekten att att sensornoderna avlastas. För närvarande är IETF (Internet Engineering Task Force) i färd med att standardisera en pub/pre-utvidgning av det redan standardiserade CoAP (Constrained Application Protocol). Eftersom att utvidgningen är så pass ny finns ytterst få implementationer av den och man vet därmed väldigt lite om hur den faktiskt fungerar i praktiken. GreenIoT-projektet överväger att ersätta sin nuvarande pub/pre-broker med en CoAP pub/pre-broker eftersom att energianvändningen kan antas bli lägre samt att standardiseringsorganisationen bakom CoAP är det välrenommerade IETF. Sett ur ett större perspektiv erbjuder denna rapport en undersökning av de problem och utmaningar man ställs inför vid implementation av CoAP pub/pre-utvidgningen med avseende på designval, implementationsval, och protokolltvetydigheter. Mer konkret implementeras en CoAP pub/pre-broker åt GreenIoT-projektet. Genom att först noggrant analysera CoAP-protokollet, CoAP pub/pre-utkastet, liksom andra nödvändiga protokoll, för att därefter bestämma vilket programmeringsspråk och vilket existerande CoAP-bibliotek som skulle användas, implementerades en broker server som testades iterativt under processens gång. Ett flertal frågor som uppstod rörande pub/pre-utkastet presenteras och diskuteras i rapporten.
APA, Harvard, Vancouver, ISO, and other styles
12

Iqbal, Muhammad Aamir. "Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10254391.

Full text
Abstract:

This dissertation addresses new challenges in the Internet of Things (IoT) related to security and privacy. The current transition from legacy internet to Internet of Things leads to multiple changes in its communication paradigms. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy, and autonomy to once uniform and deterministic systems and the issue of scalability within a WSN. Unlike internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources and thus, are unable to support complex security schemes. A direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical unless both endpoints are able to run the required (expensive) cryptographic primitives, thus leaving aside a whole class of resource constrained devices. In this dissertation, we propose novel security solution approaches for key establishments designed to reduce the requirements of existing security protocols in order to be supported by resource-constrained devices and for the scalability of sensors with a WSN in contest of IoT. We have investigated the feasibility of substituting the key management scheme of ZigBee stack by implementing LEAP+ to enhance its security and scalability capabilities in a WSN. LEAP+ is surprisingly well-suited to different types of network topologies, device types, and addressing modes offered by ZigBee stack, resolving the issue of scalability due to ZigBee’s key management centralized approach, and our experimental results and performance evaluation parameters illustrated these facts. We designed new key establishment protocols for the constrained wireless sensors to delegate their heavy cryptographic load to less constrained nodes in their neighborhood, exploiting the spatial heterogeneity of IoT nodes. Allowing cooperation between sensor nodes may open the way to a new class of threats, known as internal attacks, that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a cooperative group. Proposed protocols aim to track nodes behaviors and past performances to detect their trustworthiness and select reliable ones for cooperative assistance. Sensor nodes’ trustworthiness is verified by accompanying them with an accelerometer to detect whether these cooperative sensors are installed on the same body. Based on an extensive analysis and their accelerometers’ data correlations with the base station (mobile phone in this case) accelerometer data, we identify a set of neighboring devices able to provide assistance in performing heavy asymmetric computations effectively without compromising the security of the whole system. Formal security and privacy verifications and performance analyses with respect to the resource-constrained sensor’s energy are also conducted to ensure the security effectiveness and energy efficiency of our proposed protocols.

APA, Harvard, Vancouver, ISO, and other styles
13

Soroush, Emad. "Fast data streaming in resource constrained wireless sensor networks." Thesis, 2008. http://hdl.handle.net/1828/1078.

Full text
Abstract:
In many emerging applications, data streams are monitored in a network environment. Due to limited communication bandwidth and other resource constraints, a critical and practical demand is to online compress data streams continuously with quality guarantee. Although many data compression and digital signal processing methods have been developed to reduce data volume, their super-linear time and more-than-constant space complexity prevents them from being applied directly on data streams, particularly over resource-constrained sensor networks. In this thesis, we tackle the problem of online quality guaranteed compression of data streams using fast linear approximation (i.e., using line segments to approximate a time series). Technically, we address two versions of the problem which explore quality guarantees in different forms. We develop online algorithms with linear time complexity and constant cost in space. Our algorithms are optimal in the sense that they generate the minimum number of segments that approximate a time series with the required quality guarantee. To meet the resource constraints in sensor networks, we also develop a fast algorithm which creates connecting segments with very simple computation. The low cost nature of our methods leads to a unique edge on the applications of massive and high speed streaming environment, low bandwidth networks, and heavily constrained nodes in computational power (e.g., tiny sensor nodes). We implement and evaluate our methods in the application of an acoustic wireless sensor network.
APA, Harvard, Vancouver, ISO, and other styles
14

Garimella, Bhavani Jayaweera Sudharman K. "Distributed detection and data fusion in resource constrained wireless sensor networks." Diss., 2005. http://il.proquest.com/products_umi/dissertations.

Full text
Abstract:
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering.
"December 2005." Title from PDF title page (viewed on April 19, 2007). Thesis adviser: Sudharman K. Jayaweera. UMI Number: AAT 1436557 Includes bibliographic references (leaves 39-45).
APA, Harvard, Vancouver, ISO, and other styles
15

Garimella, Bhavani. "Distributed detection and data fusion in resource constrained wireless sensor networks." Thesis, 2005. http://hdl.handle.net/10057/740.

Full text
Abstract:
Wireless sensor networks have received immense attention in recent years due to their possible applications in various fields like battery-field surveillance, disaster recovery etc. Since these networks are mostly resource-constrained there is a need for efficient algorithms in maximizing the network resources. In this thesis, energy and bandwidth-efficient detection and fusion algorithms for such resource constrained wireless sensor systems are developed. A Sequential Probability Ratio Test (SPRT) based detection algorithms for an energy-constrained sensor network is proposed. Performance is evaluated in terms of number of nodes required to achieve a given probability of detection. Simulation results show that a network implementing the SPRT based model outperforms a network having a parallel fusion detector. To implement distributed detection and fusion in energy and bandwidth constrained networks, non-orthogonal communication is considered to be one of the possible solutions. An optimal Bayesian data fusion receiver for a DS-CDMA based distributed wireless sensor network having a parallel architecture is proposed. It is shown that the optimal Bayesian receiver outperforms the partitioned receivers in terms of probability of error. But the complexity of this optimal receiver is exponential in the number of nodes. In order to reduce the complexity, partitioned receivers that perform detection and fusion in two stages are proposed. Several well-known multi-user detectors namely, JML, matched filter, Decorrelator and linear MMSE detectors are considered for the first stage detection and performance is evaluated in terms of probability of error at the fusion center. Conventional detector based fusion receiver has a performance close to that of optimal fusion receiver with quite less complexity under specific channel conditions. Performance and complexity trade-offs should be considered while designing the network.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering.
"December 2005."
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Kuan-Hsun, and 王冠勛. "EcoDB: A Lightweight Debugging Tool for Resource Constrained Wireless Sensor Platforms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67934251719118796087.

Full text
Abstract:
碩士
國立清華大學
資訊工程學系
99
In this thesis, we propose a lightweight debugging tool named EcoDB for resource-constrained wireless sensor platforms. EcoDB runs a simulator and a source-level debugger simultaneously. We use both the simulator and the source-level debugger to provide the information that the developer of the system needs to diagnose the problem, and we provide the option to save the traced output to a Micro-SD card to eliminate the overhead of data communication. EcoDB minimize its side effects on the program being debugged. As a result, EcoDB requires 689 bytes of data memory and 135 bytes of program memory and does not alter functional behavior or energy usage of the original WSN application program.
APA, Harvard, Vancouver, ISO, and other styles
17

Pereira, Felisberto Sequeira. "Solutions for resource constrained IoT devices." Doctoral thesis, 2021. http://hdl.handle.net/10773/31504.

Full text
Abstract:
Internet of Things (IoT) has been developing to become a free exchange of useful information between multiple devices. Already spread all over the world in the most varied forms and applications, IoT devices need to overcome a series of challenges to respond to the new requirements and demands. This thesis will focus on developing passive, semi-passive, and active solutions to overcome the energy and communication challenges faced by IoT devices. In that sense, several topics like backscatter communication, Wireless Power Transfer (WPT), Energy Harvesting (EH), chipless sensors, Simultaneous Wireless Information and Power Transfer (SWIPT), and Low-Power Wide- Area Network (LPWAN) will be explored and a set of contributions will be put forward. Moreover, whenever possible, the proposed solutions are implemented and tested in real application scenarios contributing to a better understanding of its viability.
A internet das coisas, conhecida pela sigla inglesa IoT (Internet of Things), tem se desenvolvido no sentido de se tornar numa rede de informação com participação e interação de vários dispositivos. Já espalhados por todo o mundo, nas mais diversas formas e aplicações, os dispositivos IoT precisam de se reinventar para responder aos novos desafios e requisitos. Esta tese concentra-se no desenvolvimento de soluções passivas, semi-passivas e ativas para responder aos desafios relacionados com eficiência energética e comunicação. Nesse sentido, vários tópicos como comunicação backscatter, transmissão de energia sem fios, colheita de energia, sensores sem chip, transmissão de energia e informação em simultâneo e comunicação de baixo consumo e longo alcance serão explorados desenvolvendo um conjunto de contribuições. Alem disso, sempre que possível, as soluções desenvolvidas são implementadas e testadas em cenários de aplicações reais contribuindo para um melhor entendimento da sua viabilidade.
Programa Doutoral em Engenharia Eletrotécnica
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Wei. "Quality-driven cross layer design for multimedia security over resource constrained wireless sensor networks." 2009. http://proquest.umi.com/pqdweb?did=1933031681&sid=9&Fmt=2&clientId=14215&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph.D.)--University of Nebraska-Lincoln, 2009.
Title from title screen (site viewed March 2, 2010). PDF text: ix, 110 p. : ill. (chiefly col.) ; 3 Mb. UMI publication number: AAT 3386564. Includes bibliographical references. Also available in microfilm and microfiche formats.
APA, Harvard, Vancouver, ISO, and other styles
19

Arazi, Ortal. "Self-Certified Public Key Cryptographic Methodologies for Resource-Constrained Wireless Sensor Networks." 2007. http://trace.tennessee.edu/utk_graddiss/117.

Full text
Abstract:
As sensor networks become one of the key technologies to realize ubiquitous computing, security remains a growing concern. Although a wealth of key-generation methods have been developed during the past few decades, they cannot be directly applied to sensor network environments. The resource-constrained characteristics of sensor nodes, the ad-hoc nature of their deployment, and the vulnerability of wireless media pose a need for unique solutions. A fundamental requisite for achieving security is the ability to provide for data con…dential- ity and node authentication. However, the scarce resources of sensor networks have rendered the direct applicability of existing public key cryptography (PKC) methodologies impractical. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foun- dation for constrained environments, providing strong security for relatively small key sizes. This work focuses on the clear need for resilient security solutions in wireless sensor networks (WSNs) by introducing e¢ cient PKC methodologies, explicitly designed to accommodate the distinctive attributes of resource-constrained sensor networks. Primary contributions pertain to the introduction of light-weight cryptographic arithmetic operations, and the revision of self- certi…cation (consolidated authentication and key-generation). Moreover, a low-delay group key generation methodology is devised and a denial of service mitigation scheme is introduced. The light-weight cryptographic methods developed pertain to a system-level e¢ cient utilization of the Montgomery procedure and e¢ cient calculations of modular multiplicative inverses. With respect to the latter, computational complexity has been reduced from O(m) to O(logm), with little additional memory cost. Complementing the theoretical contributions, practical computation o¤-loading protocols have been developed along with a group key establishment scheme. Implementation on state-of- the-art sensor node platforms has yielded a comprehensive key establishment process obtained in approximately 50 ns, while consuming less than 25 mJ. These exciting results help demonstrate the technology developed and ensure its impact on next-generation sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Arazi, Ortal. "Self-certifed public key cryptographic methodologies for resource-constrained wireless sensor networks." 2007. http://etd.utk.edu/2007/AraziOrtal.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Wacker, Arno [Verfasser]. "Key distribution schemes for resource constrained devices in wireless sensor networks / vorgelegt von Arno Rüdiger Wacker." 2008. http://d-nb.info/989092143/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography