Skip to main content

Implementing Recovery in Low-Resource Stationary Wireless Sensor Networks

  • Conference paper
Advances in Wireless, Mobile Networks and Applications (ICCSEA 2011, WiMoA 2011)

Abstract

Implementation of certain types of protocols on wireless sensor networks (WSNs) can be difficult due to the architecture of the motes. Identification of these issues and recommendations for workarounds can be very useful for the WSN research community testing hardware.

In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering WSNs with low resources. In attempting to integrate these protocols, several issues arose in the implementation phase connected to pre-set configurations of the motes used.

In this paper, we describe the issues arising in integrating our protocols using Zigbee with IEEE 802.15.4 and the reprogramming module Deluge, and compare our challenges and solutions with those faced by other researchers in this area. Finally, we provide recommendations for consideration by researchers who may in future consider integrating several protocols on these platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jeong, J., Culler, D.: Incremental network programming for wireless sensors. In: Proceedings of the First IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks IEEE SECON, pp. 25–33 (2004)

    Google Scholar 

  2. Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: SenSys 2004, pp. 162–175. ACM, New York (2004)

    Google Scholar 

  3. Koubaa, A., Cunha, A., Alves, M.: A time division beacon scheduling mechanism for IEEE 802.15.4/Zigbee cluster-tree wireless sensor networks. In: ECRTS 2007 (2007)

    Google Scholar 

  4. Krishnan, R., Starobinski, D.: Efficient Clustering Algorithms for Self-Organizing Wireless Sensor Networks. Journal of AD-Hoc Networks, 36–59 (2006)

    Google Scholar 

  5. Li, B., Doss, R., Batten, L., Schott, W.: Fast Recovery from Node Compromise in Wireless Sensor Networks. In: NTMS 2009, pp. 186–191 (2009)

    Google Scholar 

  6. Li, B., Batten, L., Doss, R.: Lightweight Authentication for Recovery in Wireless Sensor Networks. In: MSN 2009, pp. 465–471 (2009)

    Google Scholar 

  7. Li, B., Batten, L., Doss, R.: Network resilience in low-resource mobile WSNs. In: Proceedings of MobiSec 2010, paper 9047. ICST online publishing (2010)

    Google Scholar 

  8. Li, M., Liu, Y.: Underground structure monitoring with wireless sensor networks. In: IPSN 2007, Cambridge, Mass, pp. 69–78 (2007)

    Google Scholar 

  9. Maia, G., Guidoni, D.L., Aquino, A.L.L., Loureiro, A.A.F.: Improving an Over-the-Air Programming Protocol for Wireless Sensor Networks Based on Small World Concepts. In: Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 261–267. ACM Press, New York (2009)

    Google Scholar 

  10. Rabin, M.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization. MIT Laboratory for Computer Science, 16 pages (January 1979)

    Google Scholar 

  11. Shamir, A.: SQUASH – A new MAC with provable security properties for highly constrained devices such as RFID tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144–157. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Stathopoulos, T., Heidemann, J., Estrin, D.: A remote code update mechanism for wireless sensor networks, Technical report, UCLA (2003)

    Google Scholar 

  13. Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network Magazine 20(3), 48–55 (2006)

    Article  Google Scholar 

  14. Wasilewski, K., Branch, J., Lisee, M., Szymanski, B.: Self-healing routing: A study in efficiency and resiliency of data delivery in wireless sensor networks. In: Proceedings of Conference on unattended Ground, Sea, and Air Sensor Technologies and Applications, Symposium on Defence & Security, Orlando Florida (2007)

    Google Scholar 

  15. Wu, J.: An enhanced approach to determine a small forward node set based on multipoint relay. In: Proc. IEEE Semi-Annual Vehicular Technology Conference, pp. 2774–2777 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, B., Batten, L.M., Doss, R. (2011). Implementing Recovery in Low-Resource Stationary Wireless Sensor Networks. In: Al-Majeed, S.S., Hu, CL., Nagamalai, D. (eds) Advances in Wireless, Mobile Networks and Applications. ICCSEA WiMoA 2011 2011. Communications in Computer and Information Science, vol 154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21153-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21153-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21152-2

  • Online ISBN: 978-3-642-21153-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics