Abstract and keywords
Abstract (English):
The article encompasses development and assessment issues of the decentralized control protocol in mesh decentralized wireless sensor networks within the industrial Internet of things. The protocol is used to ensure the operation of the network, including functions of gathering, processing and analyzing data received from network nodes to solve the problem of monitoring information security, given the variability of the network composition and its topology, the spatial placement of nodes, as well as the volumes of their resources. In this article, the main attention is paid to the proposed two algorithms for organizing a multilateral session of wireless sensor networks nodes, which form the basis of this protocol, using a role model of nodes. The formed protocol is focused on solving the issues of monitoring the information security of a mesh decentralized wireless sensor network and revealing attacks that exploit, among other things, the properties of wireless sensor networks self-organization and decentralization.

Keywords:
wireless sensor network, decentralized control, protocol
Text
Text (PDF): Read Download
References

1. Kaur S., Sharma S. Role of the Internet of Things in Smart Cities: A Review // 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India. 2023. P. 686–689. DOI:https://doi.org/10.1109/ICACITE57410.2023.10182986.

2. Singh H., Verma D. Approaches for Data Analysis in WSN // 11th International Conference on System Modeling & Advancement in Research Trends (SMART). Moradabad, India. 2022. P. 521–527. DOI:https://doi.org/10.1109/SMART55829.2022.10046819.

3. Eltahlawy A.M., Azer M.A. Using Blockchain Technology for the Internet Of Vehicles // International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC). Cairo, Egypt. 2021. P. 54–61. DOI:https://doi.org/10.1109/MIUCC52538.2021.9447622.

4. Sharma M., Gebali F., Elmiligi H., Rahman M. Network Security Evaluation Scheme for WSN in Cyber-physical Systems // IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). Vancouver, BC, Canada. 2018. P. 1145–1151. DOI:https://doi.org/10.1109/IEMCON.2018.8615051.

5. Ji S., Pei Q., Zeng Y., Yang C., Bu S.-p. An Automated Black-box Testing Approach for WSN Security Protocols // 2011 Seventh International Conference on Computational Intelligence and Security. Sanya, China. 2011. P. 693–697. DOI:https://doi.org/10.1109/CIS.2011.158.

6. Singh T., Vaid R., Sharma A. Security Issues in Blockchain Integrated WSN: Challenges and Concerns // International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). Chennai, India. 2022. P. 1–5. DOI:https://doi.org/10.1109/ICSES55317.2022.9914006.

7. Badri N., Nasraoui L., Saidane L.A. Blockchain for WSN and IoT Applications // IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). Hammamet, Tunisia. 2022. P. 543–548. DOI:https://doi.org/10.1109/SETIT54465.2022.9875746.

8. Aleksieva V., Valchanov H., Haka A., Dinev D. Model of Controlled Environment based on Blockchain and IoT // 4th International Conference on Communications, Information, Electronic and Energy Systems (CIEES). Plovdiv, Bulgaria. 2023. P. 1–4. DOI:https://doi.org/10.1109/CIEES58940.2023.10378795.

9. Desnitsky V., Meleshko A. Modeling and Analysis of Secure Blockchain-driven Self-organized Decentralized Wireless Sensor Networks for Attack Detection // International Russian Automation Conference (RusAutoCon). Sochi, Russian Federation. 2024.

10. Harsha K.M., James D. A Novel Approach to Aggregate and Secure Data in Wireless Sensor Networks // International Conference on Communication and Electronics Systems (ICCES). Coimbatore, India. 2019. P. 1665–1670. DOI:https://doi.org/10.1109/ICCES45898.2019.9002418.

11. Wang W., He G., Wan J. Research on Zigbee wireless communication technology // International Conference on Electrical and Control Engineering. Yichang, China. 2011. P. 1245–1249. DOI:https://doi.org/10.1109/ICECENG.2011.6057961.

12. Wang Z., Wen Q., Sun Y., Zhang H. A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks // IEEE 12th International Conference on Computer and Information Technology. Chengdu, China. 2012. P. 921–925. DOI:https://doi.org/10.1109/CIT.2012.190.

13. Roughgarden T. Communication Complexity (for Algorithm Designers) // Foundations and Trends in Theoretical Computer Science Journal. 2016. Vol. 11. Number 3–4. P. 217–404. DOI:https://doi.org/10.1561/0400000076.

14.  Kushilevitz E. Communication Complexity // Advances in Computers. Elsevier. 1997. Vol. 44. P. 331–360. DOI:https://doi.org/10.1016/S0065-2458(08)60342-3.

15.  Chen W., Xiao W. Model checking and analyzing the security protocol for wireless sensor networks // Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. Harbin, China. 2011. P. 4093–4096. DOI:https://doi.org/10.1109/EMEIT.2011.6023953.

Login or Create
* Forgot password?