Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework

Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network’s data output to stay at a high or medium level.

[1]  Zbigniew Kotulski,et al.  Adaptable security mechanism for dynamic environments , 2007, Comput. Secur..

[2]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[3]  Athanasios V. Vasilakos,et al.  Secure Smart Homes , 2017, ACM Comput. Surv..

[4]  Ms.C Ir. Supeno Djanali ANALISA KINERJA RESOURCE-AWARE FRAMEWORK PADA ALGORITMA LIGHT-WEIGHT FREQUENT ITEM (LWF) , 2010 .

[5]  Mohamed Medhat Gaber,et al.  Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks , 2008, ADC.

[6]  Mike Cook,et al.  Raspberry Pi For Dummies , 2013 .

[7]  Xiao Qin,et al.  SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).

[8]  Yacine Challal,et al.  Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.

[9]  Kun Liu,et al.  VEDAS: A Mobile and Distributed Data Stream Mining System for Real-Time Vehicle Monitoring , 2004, SDM.

[10]  Charless C. Fowlkes,et al.  Diamond Eye: a distributed architecture for image data mining , 1999, Defense, Security, and Sensing.

[11]  Jörgen Hansson,et al.  An adaptable security manager for real-time transactions , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.

[12]  Zbigniew Kotulski,et al.  Adaptive Approach to Network Security , 2009, CN.

[13]  Mohamed Medhat Gaber,et al.  Adaptive mining techniques for data streams using algorithm output granularity , 2003 .

[14]  David E. Culler,et al.  System architecture for wireless sensor networks , 2003 .

[15]  Ruoming Jin,et al.  Frequent Pattern Mining in Data Streams , 2007, Frequent Pattern Mining.

[16]  Ishikawa,et al.  A Model of Security Adaptation for Limited Resources in Wireless Sensor Network , 2017 .

[17]  Alessio Merlo,et al.  The energy impact of security mechanisms in modern mobile devices , 2012, Netw. Secur..

[18]  Kahina Chelli,et al.  Security Issues in Wireless Sensor Networks : Attacks and Countermeasures , 2015 .

[19]  Mohamed Medhat Gaber,et al.  Resource-aware Online Data Mining in Wireless Sensor Networks , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.

[20]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[21]  Mohammad Alshayeb,et al.  EVE: On-Board Process Planning and Execution , 2002 .

[22]  Mohamed Medhat Gaber,et al.  A Survey of Classification Methods in Data Streams , 2007, Data Streams - Models and Algorithms.

[23]  George Mastorakis,et al.  On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.

[24]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[25]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[26]  Muhammad Ilyas Syarif,et al.  Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks , 2011, Proceeding of the International Conference on e-Education, Entertainment and e-Management.

[27]  Charu C. Aggarwal,et al.  Data Streams - Models and Algorithms , 2014, Advances in Database Systems.

[28]  Philip S. Yu,et al.  On Clustering Massive Data Streams: A Summarization Paradigm , 2007, Data Streams - Models and Algorithms.

[29]  Archana Bharathidasan,et al.  Sensor Networks : An Overview , 2002 .

[30]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[31]  A. Tomlinson POWER , 1998, The Palgrave Encyclopedia of Imperialism and Anti-Imperialism.

[32]  Philip S. Yu,et al.  A framework for resource-aware knowledge discovery in data streams: a holistic approach with its application to clustering , 2006, SAC '06.

[33]  Alessio Merlo,et al.  What is Green Security? , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[34]  Habib F. Rashvand,et al.  Wireless sensor systems for extreme environments : space, underwater, underground and industrial , 2017 .

[35]  Ke Shi,et al.  Data Mining Techniques for Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[36]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[37]  Mikael Gidlund,et al.  Wireless Coexistence between IEEE 802.11- and IEEE 802.15.4-Based Networks: A Survey , 2011, Int. J. Distributed Sens. Networks.