Skip to main content

2017 | OriginalPaper | Buchkapitel

2. IoT Nodes: System-Level View

verfasst von : Pascal Urard, Mališa Vučinić

Erschienen in: Enabling the Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we detail the key elements of the wireless sensor network nodes architectures. We also review the most important tradeoffs to make in order to maximize the system energy efficiency, keeping the cost of the solution under control. We also review the pairing and registration operations and detail the security requirements as well as the impact of security on the energy efficiency and the cost of the solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat I.M. Atakli, H. Hu, Y. Chen, W.S. Ku, Z. Su, Malicious node detection in wireless sensor networks using weighted trust evaluation, in Proceedings of the 2008 Spring Simulation Multiconference, SpringSim’08 (Society for Computer Simulation International, San Diego, 2008), pp. 836–843 I.M. Atakli, H. Hu, Y. Chen, W.S. Ku, Z. Su, Malicious node detection in wireless sensor networks using weighted trust evaluation, in Proceedings of the 2008 Spring Simulation Multiconference, SpringSim’08 (Society for Computer Simulation International, San Diego, 2008), pp. 836–843
Zurück zum Zitat B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Technical Report, Version, 1 (2004) B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks. Department of Computer Science, Johns Hopkins University, Technical Report, Version, 1 (2004)
Zurück zum Zitat A. Becher, Z. Benenson, M. Dornseif, Tampering with motes: real-world physical attacks on wireless sensor networks, in Proceedings of the Third International Conference on Security in Pervasive Computing, SPC’06 (Springer-Verlag, Berlin, 2006), pp. 104–118 A. Becher, Z. Benenson, M. Dornseif, Tampering with motes: real-world physical attacks on wireless sensor networks, in Proceedings of the Third International Conference on Security in Pervasive Computing, SPC’06 (Springer-Verlag, Berlin, 2006), pp. 104–118
Zurück zum Zitat H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Proceedings of 2003 Symposium on Security and Privacy 2002 (May 2002), pp. 197–213 H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Proceedings of 2003 Symposium on Security and Privacy 2002 (May 2002), pp. 197–213
Zurück zum Zitat C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad hoc Netw. 1(2), 293–315 (2002) C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad hoc Netw. 1(2), 293–315 (2002)
Zurück zum Zitat Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, in Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN’05 (ACM, New York, 2005), pp. 76–88 Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, in Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN’05 (ACM, New York, 2005), pp. 76–88
Zurück zum Zitat M. Li, I. Koutsopoulos, R. Poovendran, Optimal jamming attacks and network defense policies in wireless sensor networks, in 26th IEEE International Conference on Computer Communications, INFOCOM 2007 (IEEE, May 2007), pp. 1307–1315 M. Li, I. Koutsopoulos, R. Poovendran, Optimal jamming attacks and network defense policies in wireless sensor networks, in 26th IEEE International Conference on Computer Communications, INFOCOM 2007 (IEEE, May 2007), pp. 1307–1315
Zurück zum Zitat F. Liu, X. Cheng, D. Chen, Insider attacker detection in wireless sensor networks, in 26th IEEE International Conference on Computer Communications, INFOCOM 2007 (IEEE, May 2007), pp. 1937–1945 F. Liu, X. Cheng, D. Chen, Insider attacker detection in wireless sensor networks, in 26th IEEE International Conference on Computer Communications, INFOCOM 2007 (IEEE, May 2007), pp. 1937–1945
Zurück zum Zitat D.R. Raymond, S.F. Midkiff, Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)CrossRef D.R. Raymond, S.F. Midkiff, Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)CrossRef
Zurück zum Zitat M. Rezvani, A. Ignjatovic, E. Bertino, S. Jha, Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)CrossRef M. Rezvani, A. Ignjatovic, E. Bertino, S. Jha, Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)CrossRef
Zurück zum Zitat G. Romaniello, Energy efficient protocols for harvested wireless sensor networks. PhD thesis, Universite de Grenoble, March 2015 G. Romaniello, Energy efficient protocols for harvested wireless sensor networks. PhD thesis, Universite de Grenoble, March 2015
Zurück zum Zitat H. Tschofenig, T. Fossati, TLS/DTLS Profiles for the Internet of Things. draft-ietf-dice-profile-14. Work in progress, August 2015 H. Tschofenig, T. Fossati, TLS/DTLS Profiles for the Internet of Things. draft-ietf-dice-profile-14. Work in progress, August 2015
Zurück zum Zitat P. Urard, G. Romaniello, A. Banciu, J.C. Grasset, V. Heinrich, M. Boulemnakher, F. Todeschni, L. Damon, R. Guizzetti, L Andre, A. Cathelin, A self-powered IPv6 bidirectional wireless sensor & actuator network for indoor conditions, in 2015 Symposium on VLSI Circuits (VLSI Circuits) (IEEE, June 2015), pp. C100–C101 P. Urard, G. Romaniello, A. Banciu, J.C. Grasset, V. Heinrich, M. Boulemnakher, F. Todeschni, L. Damon, R. Guizzetti, L Andre, A. Cathelin, A self-powered IPv6 bidirectional wireless sensor & actuator network for indoor conditions, in 2015 Symposium on VLSI Circuits (VLSI Circuits) (IEEE, June 2015), pp. C100–C101
Zurück zum Zitat L.-O. Varga, G. Romaniello, M. Vucinic, M. Favre, A. Banciu, R. Guizzetti, C. Planat et al., GreenNet: an energy-harvesting IP-enabled wireless sensor network. IEEE Internet Things J 2(5), 412–426 (2015a) L.-O. Varga, G. Romaniello, M. Vucinic, M. Favre, A. Banciu, R. Guizzetti, C. Planat et al., GreenNet: an energy-harvesting IP-enabled wireless sensor network. IEEE Internet Things J 2(5), 412–426 (2015a)
Zurück zum Zitat L.-O. Varga, Multi-hop energy harvesting wireless sensor networks: routing and low duty-cycle link layer. PhD thesis, Grenoble Alps University, December 2015 L.-O. Varga, Multi-hop energy harvesting wireless sensor networks: routing and low duty-cycle link layer. PhD thesis, Grenoble Alps University, December 2015
Zurück zum Zitat A. Vempaty, O. Ozdemir, K. Agrawal, H. Chen, P.K. Varshney, Localization in wireless sensor networks: byzantines and mitigation techniques. IEEE Trans. Signal Process. 61(6), 1495–1508 (2012)MathSciNetCrossRef A. Vempaty, O. Ozdemir, K. Agrawal, H. Chen, P.K. Varshney, Localization in wireless sensor networks: byzantines and mitigation techniques. IEEE Trans. Signal Process. 61(6), 1495–1508 (2012)MathSciNetCrossRef
Zurück zum Zitat M. Vučinić, Architectures and protocols for secure and energy-efficient integration of wireless sensor networks with the internet of things. PhD thesis, Grenoble Alps University, November 2015 M. Vučinić, Architectures and protocols for secure and energy-efficient integration of wireless sensor networks with the internet of things. PhD thesis, Grenoble Alps University, November 2015
Zurück zum Zitat T. Watteyne, L. Doherty, J. Simon, K. Pister, Technical overview of SmartMesh IP. in Proceedings of IMIS’13 (Washington, DC, 2012) T. Watteyne, L. Doherty, J. Simon, K. Pister, Technical overview of SmartMesh IP. in Proceedings of IMIS’13 (Washington, DC, 2012)
Metadaten
Titel
IoT Nodes: System-Level View
verfasst von
Pascal Urard
Mališa Vučinić
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-51482-6_2

Neuer Inhalt