• Corpus ID: 6239227

FleGSens - secure area monitoring using wireless sensor networks

@inproceedings{Rothenpieler2009FleGSensS,
  title={FleGSens - secure area monitoring using wireless sensor networks},
  author={Peter Rothenpieler and Daniel Kruger and Dennis Pfisterer and Stefan Fischer and Denise Dudek and Christian Haas and Martina Zitterbart},
  year={2009}
}
In the project FleGSens, a wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information security. The intended prototype consists of 200 sensor nodes for monitoring a 500m long land strip. The system is focused on ensuring integrity and authenticity of generated alarms and availability in the presence of an attacker who may even compromise a limited number of sensor nodes. In this paper, two of the… 

Critical Infrastructure Surveillance Using SecureWireless Sensor Networks

TLDR
The key focus of this paper lies on the security and safety features of the WSN, but the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described.

MOVEDETECT - Secure Detection, Localization and Classification in Wireless Sensor Networks

TLDR
A real-world WSN was developed, which addresses practical issues like water proofing, energy consumption, sensor deployment and visualization of the WSN state, but also provides a unique security concept, a interesting combination of sensors and sophisticated sensor data processing and analysis.

A wireless sensor network for border surveillance

TLDR
The demonstration features secure protocols for the detection of trespassers, node failure and network partitioning, along with a duty cycle protocol to ensure network longevity.

Utilization Of A Large-Scale Wireless Sensor Network For Intrusion Detection And Border Surveillance

TLDR
Probabilistic models have been presented to investigate senor development schemes while considering the environmental factors that affect the sensor performance and to find an optimal node deployment scheme that is robust and efficient by incorporating geographical coordination in the design.

A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols

TLDR
An appropriate metric to measure the quality of WSN border crossing detection is identified and a method to calculate the required number of sensor nodes to deploy in order to achieve a specified level of coverage according to the chosen metric in a given belt region is proposed.

Boundary node failure detection in wireless sensor networks

TLDR
A fully distributed approach for an efficient boundary control based on the determination of the WSN boundary using an algorithm which has the property to determine in each iteration the one-hop neighbor of the current boundary sensor.

Detection of Failed Boundary Nodes in Wireless Sensor Networks

TLDR
A fully distributed approach, called Boundary Node Failure Detection (BNFD), for an efficient boundary control based on the determination of the WSN boundary using an algorithm which has the property to determine in each iteration the one-hop neighbor of the current boundary sensor.

Dependability Assessment of Wireless Sensor Networks with Formal Methods

TLDR
A framework to investigate the correctness of the design of a WSN from the point of view of its dependability, i.e., resilience to undesired events is proposed, based on the Event Calculus formalism and it is backed-up by a support tool aimed to simplify its adoption by system designers.

Energy harvesting based protection of border surveillance systems

TLDR
A solution to secure border surveillance WSNs application is proposed by extending the sensor nodes architecture by introducing a Radio Frequency IDentification (RFID) system, and designing powerless protocols and techniques for mutual authentication and proximity verification between sensor nodes.

References

SHOWING 1-10 OF 16 REFERENCES

A protocol for tracking mobile targets using sensor networks

  • H. YangB. Sikdar
  • Computer Science
    Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 2003
TLDR
The proposed protocol, Distributed Predictive Tracking, is robust against node or prediction failures which may result in temporary loss of the target and recovers from such scenarios quickly and with very little additional energy use.

The hitchhiker's guide to successful wireless sensor network deployments

TLDR
The successful deployment of a wireless sensor network is a difficult task, littered with traps and pitfalls, and the importance of a close interaction with the end-user community in planning and running the network, and finally exploiting the data is indicated.

Efficient in-network moving object tracking in wireless sensor networks

TLDR
This paper develops several tree structures for in-network object tracking which take the physical topology of the sensor network into consideration and shows a significant improvement over existing solutions.

Dual prediction-based reporting for object tracking sensor networks

  • Yingqi XuJ. WinterWang-Chien Lee
  • Computer Science
    The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
  • 2004
TLDR
This work proposes a dual prediction-based reporting mechanism (called DPR), in which both sensor nodes and the base station predict the future movements of the mobile objects, and shows that DPR is able to achieve considerable energy savings under various conditions and outperforms existing reporting mechanisms.

On the security of public key protocols

  • D. DolevA. Yao
  • Computer Science
    22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
  • 1981
TLDR
Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.

Shawn: A new approach to simulating wireless sensor networks

TLDR
Shawn is presented, an open-source discrete-event simulator that has considerable differences to all other existing simulators and is, to the best of the knowledge, the first simulator to support generic high-level algorithms as well as distributed protocols on exactly the same underlying networks.

The TESLA Broadcast Authentication Protocol

TLDR
The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss.

Secure Hop-Count Based Localization in Wireless Sensor Networks

TLDR
This papervelops a Secure HOp-Count based LOCalization scheme, called SHOLOC, to make localization attack-resistant, and proposes a proto- col to authenticate beacon information and protect hop- count from being arbitrary changed.

World Academy of Science, Engineering and Technology 38 2010 A Numerical Study on Thermal Dissociation of

    A line in the sand: a wireless sensor network for target detection, classification, and tracking