QoS as Means of Providing WSN Security

  • George S. Oreku
  • Tamara Pazynyuk
Part of the Risk Engineering book series (RISK)


WSN are being increasingly used in applications where QoS and low cost are the overriding considerations. With increased use, their reliability, availability and serviceability need to be addressed from the outset.


  1. 1.
    Chen, D., Varshney, P.K.: QoS support in wireless sensor networks: A survey. In: Proceedings of International Conference on Wireless Networks, vol. 13244, pp. 227–233 (2004)Google Scholar
  2. 2.
    Perillo, M., Heinzelman, W.: Providing application QoS through intelligent sensor management. In: 1st Sensor Network Protocols and Applications Workshop, pp. 93–101 (2003)Google Scholar
  3. 3.
    Iyer, R., Kleinrock, L.: QoS control for sensor networks. In: IEEE International Conference on Communications, vol. 1, pp. 517–521 (2003)Google Scholar
  4. 4.
    Pottie, G., Kaiser, W.: Wireless integrated network sensors. Commun. ACM 43(5), 51–58 (2000)CrossRefGoogle Scholar
  5. 5.
    Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the world with wireless sensor networks. In: Proceedings of International Conference on Acoustics, Speech and Signal Processing, vol. 4, pp. 2033–2036 (2001)Google Scholar
  6. 6.
    MIT Technology Review: 10 emerging technologies that will change the world. MIT Technology Review, Cambridge (2003)Google Scholar
  7. 7.
    Rey, R.F.: Engineering and Operations in the Bell System. Bell Labs, New Jersy (1977)Google Scholar
  8. 8.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  9. 9.
    Crawley, E., Nair, R., Rajagopalan, B., Sandick, H.: A framework for QoS-based routing in the Internet. Internet informational RFC 2386, 37. (1998)
  10. 10.
    Chen, S.: Routing support for providing guaranteed end-to-end quality-of-service. Ph.D. thesis, UIUC, 207. (1999)
  11. 11.
    Min, R., Bhardwaj, M., Cho, S.H., Shih, E., Sinha, A.: Low power wireless sensor networks. In: Proceedings of International Conference on VLSI Design, pp. 205–210 (2001)Google Scholar
  12. 12.
    Stallings, W.: Network security essentials. Applications and standards. Prentice Hall, Upper Saddle River (2000)Google Scholar
  13. 13.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad hoc Netw. J. Spec. Issue Sens. Netw. Appl. Protoc. 1(2–3), 293–315 (2003)CrossRefGoogle Scholar
  14. 14.
    Kargl, F., Schlott, S., Klenk, A., Geiss, A.: Michael weber. Securing ad hoc routing protocols. In: IEEE EUROMICRO, pp. 514–519 (2004)Google Scholar
  15. 15.
    Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for sensor networks, wireless sensor networks, pp. 253–275 (2004)Google Scholar
  16. 16.
  17. 17.
    Chiang, M.W., Zilic, Z., Radecka, K., Chenard, J.S.: Architectures of increased availability wireless sensor network nodes. In: ITC International Test Conference, vol. 43(2), pp. 1232–124 (2004)Google Scholar
  18. 18.
    Knight, J.C.: An introduction to computing system dependability. In: Proceedings of the 26th International Conference on Software Engineering. IEEE Computer Society, pp. 730–731 (2004)Google Scholar
  19. 19.
    Callaway, E.H.: Wireless sensor networks architectures and protocols. Auerbach Publications, UK (2004)Google Scholar
  20. 20.
    Headquarters, Department of the Army, TM-5-698-1.: Reliability/Availability of Electrical & Mechanical Systems for Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance Facilities (2003)Google Scholar
  21. 21.
    Eddousm, M., Stansfield, R.: Methods of decision making. Unity press, Leicester, pp. 50–52 (1997)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Tanzania Industrial Research Development OrganisationTIRDO/North West UniversityDar Es SalaamTanzania
  2. 2.Far East Energy Management Company (FEEMC)VladivostokRussia

Personalised recommendations