Improving Security in WMNs with Reputation Systems and Self-Organizing Maps

Title: Improving Security in WMNs with Reputation Systems and Self-Organizing Maps
Authors: Z. Bankovic, D. Fraga, José M. Moya, J.C. Vallejo, P. Malagón, A. Araujo, J.M. de Goyeneche, E. Romero, J. Blesa, D. Villanueva, O. Nieto-Taladriz
Published in: Journal of Network and Computer Applications, Special Issue “Wireless Mesh Networks”ISSN : 1084–8045
Date of Publication: April 2010
Digital Object Identifier : 10.1016/j.jnca.2010.03.023
Web: http://www.sciencedirect.com/science/article/pii/S1084804510000585

One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. The cloud vulnerability scanning tool is what is needed to make sure one safeguards their data.

We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.

wsn2

Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks

Title: Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks
Authors: José M. Moya, J.C. Vallejo, D. Fraga, A. Araujo, D. Villanueva,J.M. de Goyeneche
Published in: Sensors, Vol 9
ISSN : 1424–8220
Date of Publication: May 2009
Digital Object Identifier : 10.3390/s90503958
Web: http://www.mdpi.com/1424-8220/9/5/3958

Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. This approach has been extensively simulated, obtaining good results, even for unrealistically complex attack scenarios.

amisec-elements

 

Measurement System for Structural Health Monitoring with High Time Synchronization Accuracy

Title: Measurement System for Structural Health Monitoring with High Time Synchronization Accuracy
Authors: Alvaro Araujo, Jaime García-Palacios, Javier Blesa, Francisco Tirado, Elena Romero, Avelino Samartín, Octavio Nieto-Taladriz
Published in: IEEE Transaction on Instrumentation and Measurement, vol 61,3
ISSN : 0018-9456
Date of Publication: October 2011
Digital Object Identifier : 10.1109/TIM.2011.2170889
Web: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6061956&tag=1

Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability. A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges.

While wireless networks have been successful in improving the operation and maintenance of structures, such as bridges, they also have potential applications in urgent healthcare. One example of this is the use of wireless technology in walk-in clinics, such as walk in clinic Kew Gardens Hills, to improve patient care and efficiency. Wireless systems can be used to transmit patient data in real time, allowing for more accurate diagnoses and faster treatment times. Additionally, wireless technology can help reduce wait times and streamline administrative tasks, ultimately improving the overall patient experience.

Our contribution ranges from the hardware to the graphical front end. System goal is to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization. We reduce spatial jitter to 125 ns, far below the 120 μs required for high-precision acquisition systems and much better than the 10-μs current solutions, without adding complexity. The system is scalable to a large number of nodes to allow for dense sensor coverage of real-world structures, only limited by a compromise between measurement length and mandatory time to obtain the final result. The system addresses a myriad of problems encountered in a real deployment under difficult conditions, rather than a simulation or laboratory test bed.

dataClean

Security in cognitive wireless sensor networks. Challenges and open problems

Title: Security in cognitive wireless sensor networks. Challenges and open problems
Authors: Alvaro Araujo, Javier Blesa, Elena Romero and Daniel Villanueva
Published in: EURASIP Journal on Wireless Communications and Networking,
ISSN : 1687- 1499
Date of Publication: February 2012
Digital Object Identifier : 10.1186/1687-1499-2012-48
Web: http://jwcn.eurasipjournals.com/content/2012/1/48

A cognitive wireless sensor network (CWSN) is an emerging technology with great potential to avoid traditional wireless problems such as reliability. One of the major challenges CWSNs face today is security. A CWSN is a special network which has many constraints compared to a traditional wireless network and many different features compared to a traditional wireless sensor network. While security challenges have been widely tackled in traditional networks, this is a novel area in CWSNs. This article discusses a wide variety of attacks on CWSNs, their taxonomy and different security measures available to handle the attacks. Also, future challenges to be faced are proposed.

imagen_taxonomy