Visual Scheme for the Detection of Mobile Attack on WSN Simulator

Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.

[1]  Jens Palsberg,et al.  Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[2]  Boleslaw K. Szymanski,et al.  SENSE: A WIRELESS SENSOR NETWORK SIMULATOR , 2005 .

[3]  John S. Baras,et al.  ATEMU: a fine-grained sensor network simulator , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[4]  Chang-Tien Lu,et al.  Geography Markup Language (GML) , 2008, Encyclopedia of GIS.

[5]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[6]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[7]  Weiwei Sun,et al.  A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[8]  Dharma P. Agrawal,et al.  Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-radio Mesh Network Testbed , 2012, J. Inf. Process. Syst..

[9]  Teruhiko Teraoka,et al.  Organization and exploration of heterogeneous personal data collected in daily life , 2012, Human-centric Computing and Information Sciences.

[10]  Ronald C. Arkin,et al.  Integration of reactive and telerobotic control in multi-agent robotic systems , 1994 .

[11]  Elijah Blessing Rajsingh,et al.  A novel fault tolerant service selection framework for pervasive computing , 2012, Human-centric Computing and Information Sciences.

[12]  Deborah Estrin,et al.  EmStar: A Software Environment for Developing and Deploying Wireless Sensor Networks , 2004, USENIX ATC, General Track.