Skip to main content

Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009)

Abstract

Sensor networks are one of the first examples of pervasive computing, which is characterized by the massive use of increasingly smaller and powerful devices. A cloud of sensors arranged in a given environment is in itself a great source of data; accessing this source in order to extract useful information is not a trivial problem. It requires correct sensor deployment within the environment and a protocol for data exchange. We also have to bear in mind the problem of data and sensors security: sensors are often installed in areas difficult to protect and monitor. In this paper we describe SensorTree, a functioning model and a simulator for a network of wireless sensors installed on the sea surface to measure parameters useful for determining the weather situation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–442 (2002)

    Article  Google Scholar 

  2. Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: ACM MobiCom 1999, Washington, pp. 263–270 (1999)

    Google Scholar 

  3. Perkins, C.: Ad Hoc Networks. Addison-Wesley, Reading (2000)

    Google Scholar 

  4. Skorobogatov, S.: Data Remanence in Flash Memory Devices. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 339–353. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Gutmann, P.: Data Remanence in Semiconductor Devices. In: 10th USENIX Security Symposium Proceedings, Washington (2001)

    Google Scholar 

  6. Tan, H., Jha, S., Hostry, D., Zick, J., Sivaraman, V.: Secure Multi-hop Network Programming With Multiple One-way Key Chains. In: WiSec 2008, Alexandria (2008)

    Google Scholar 

  7. Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2) (2007)

    Google Scholar 

  8. Akyildiz, I.F., Vuran, M.C., Akan, O.B.: A Cross-Layer Protocol for Wireless Sensor Networks. In: Conference on Information Science and Systems (CISS 2006), Princeton (2006)

    Google Scholar 

  9. Gutmann, P.: Secure Deletion of Data from Magnetic and Solid-State Memory. In: 6th USENIX Security Symposium Proceedings, San José (1996)

    Google Scholar 

  10. Giannotti, F., Pedreschi, D.: Mobility, Data Mining and Privacy Geographic Knowledge Discovery. Springer, Heidelberg (2008)

    Book  Google Scholar 

  11. Tracy, L.T., Roy, S.: A reservation MAC protocol for ad-hoc underwater acoustic sensor networks. In: WUWNet 2008, San Francisco (2008)

    Google Scholar 

  12. Badia, L., Mastrogiovanni, M., Petrioli, C., Stefanakos, S., Zorzi, M.: An optimization framework for joint sensor deployment, link scheduling and routing in underwater sensor networks. In: WUWNet 2006, Los Angeles (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fenu, G., Steri, G. (2009). Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04434-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04433-5

  • Online ISBN: 978-3-642-04434-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics