CINXE.COM

{"title":"Position Awareness Mechanisms for Wireless Sensor Networks","authors":"Seyed Mostafa Torabi","volume":43,"journal":"International Journal of Electronics and Communication Engineering","pagesStart":1081,"pagesEnd":1086,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/6954","abstract":"<p>A Wireless sensor network (WSN) consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. Each node in WSN should be capable to act for long periods of time with scrimpy or no external management. One requirement for this independent is: in the presence of adverse positions, the sensor nodes must be capable to configure themselves. Hence, the nodes for determine the existence of unusual events in their surroundings should make use of position awareness mechanisms. This work approaches the problem by considering the possible unusual events as diseases, thus making it possible to diagnose them through their symptoms, namely, their side effects. Considering these awareness mechanisms as a foundation for highlevel monitoring services, this paper also shows how these mechanisms are included in the primal plan of an intrusion detection system.<\/p>\r\n","references":"[1] C. Hsin and M. Liu, \"A Distributed Monitoring Mechanism for Wireless Sensor Networks,\" Proc. 3rd ACM Wksp. Wireless Sec., Atlanta, GA, Sept. 2002.\r\n[2] S. Rost and H. Balakrishnan, \"Memento: A Health Monitoring System for Wireless Sensor Networks,\" Proc. 3rd IEEE Conf Sensor, Mesh, and Ad Hoc Commun. and Networks, Reston, VA, Sept. 2006.\r\n[3] I. Onat and A. Miri, \"An Intrusion Detection System for Wireless Sensor Networks,\" Proc. IEEE Ina Conf. Wireless and Mobile Computing, Networking and Commun., Montreal, Canada, Aug. 2005.\r\n[4] P. Inverardi, L. Mostarda, and A. Navarra, \"Distributed IDS for Enhancing Security in Mobile Wireless Sensor Networks,\" Proc. 20th Conf. Adv. Info. Networking and Apps., Vienna, Austrai, Apr. 2006.\r\n[5] C. C. Su et al., \"The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks,\" Proc. IEEE WCNC '05, New Orleans, LA, Mar. 2005.\r\n[6] R. Roman, J. Zhou, and J. Lopez, \"Applying Intrusion Detection Systems to Wireless Sensor Networks,\" Proc. 3rd IEEE Consumer Commun. and Networking Conf, Las Vegas, NV, Jan. 2006.\r\n[7] C. Basile et al., \"An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks,\" Proc. 2006 Intl Conf. Dependable Sys. and Networks, Philadelphia, PA, June 2006.\r\n[8] J. P. Walters et al., \"Wireless Sensor Network Security: A Survey,\" Security in Distributed, Grid, and Pervasive Computing, Ed., Y. Xiao, CRC Press, 2006.\r\n[9] J. N. Al-Karaki and A. E. Kamal, \"Routing Techniques in Wireless Sensor Networks: A Survey,\" IEEE Wireless Commun., vol. 11, no. 6, Dec. 2004, pp. 6-28.\r\n[10] A. Becher, Z. Benenson, and M. Dornseif, \"Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks,\" Proc. 3rd Conf. Sec. in Pervasive Comp., York, U.K., Apr. 2006.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 43, 2010"}