Revisión del estado del arte de redes de sensores inalámbricos

  • Catalina Aranzazu Suescún Universidad Pontificia Bolivariana
  • Gustavo Alberto Moreno López Politécnico Colombiano Jaime Isaza Cadavid
Palabras clave: nodos de sensores, seguridad, aplicaciones, inalámbricos

Resumen

Este artículo presenta un estudio del estado del arte de las redes de sensores inalámbricas, las cuales siguen un desarrollo creciente y presentan una gran variedad de aplicaciones. Estas redes constituyen un campo actual y emergente de estudio donde se combina el desarrollo de computadores, comunicaciones inalámbricas y dispositivos móviles e integración con otras disciplinas como agricultura, biología, medicina, etc. Se presenta el concepto principal, los componentes, topologías, estándares, aplicaciones, problemas y desafíos, luego se profundiza en soluciones de seguridad y se concluye con herramientas básicas de simulación.

Biografía del autor/a

Gustavo Alberto Moreno López, Politécnico Colombiano Jaime Isaza Cadavid
Universidad Pontificia Bolivariana

Citas

Corral I., Ana Belén. Diseño e implementación de un entorno de simulación para redes de sensores inalámbricos [Ingeniería de Telecomunicación]. Universidad Politécnica de Cartagena, 2005.

RAAP. Redes de Sensores Inalámbricos. Disponible en: http://www.dsi.uclm.es/asignaturas/42650/ [consultado el 19 de marzo de 2009].

GOMEZ M., Francisco. Departamento de Arquitectura y Tecnología de Computadores. Redes de Sensores Inalámbricas. Disponible en: http://atc.ugr.es/~aprieto/TIC_socio_sanitario/A11_4_05_Redes_sensores.pdf [consultado el 29 Diciembre 2008].

Schaeffer Elisa. Un Vistazo a los fundamentos de optimización de redes sensoras. Disponible en: http://it.ciidit.uanl.mx/~elisa/presentations/optsensora.pdf[consultado el 2 de enero 2009].

FRANCO B., Carlos. Tendencias: Wireless Sensor Networks. Disponible en: http://www.coit.es/publicaciones/bit/bit165/61-64.pdf [consultado el 27 Diciembre 2008].

TOSSIM. Disponible en: http://www.tinyos.net/ [consultado el 2 de enero 2009].

UNIVERSIDAD DE BERKELEY. Computer Science. Disponible en: http://www.cs.berkeley.edu/ [consultado el 3 enero 2009].

RUIZ M., Pedro. Introducción a las redes de sensores. Disponible en: http://ants.dif.um.es/rm/ [consultado el 29 diciembre 2008].

ZIGBEE ALLIANCE. Disponible en: http://www.zigbee.org/ [consultado el 2 abril de 2009]

VINAGRE D., Juan José. Teoría del encaminamiento en redes Ad hoc inalámbricas. [Tesis Doctoral]. Universidad Carlos III de Madrid, 2007.

Ortuño P., Miguel Angel. Protocolo de encaminamiento en origen con identificadores no únicos para redes Ad-Hoc de dispositivos con recursos limitados. [Tesis Doctoral]. Universidad Rey Juan Carlos, 2006.

CEI. Metodología de despliegue para redes de sensores y estrategias de actuación. Disponible en: http://www.cei.upm.es/Seminario_CEI/2008/Presentaciones/5_Jorge_Portilla_MTP_Seminario_CEI-2.pdf [consultado el 27 de diciembre 2008].

OLIVARES M., Teresa. Universidad de Castilla La Mancha. Redes de sensores inalámbricos. Disponible en: http://www.info-ab.uclm.es [consultado el 3 de enero 2009].

Lédeczi, A., Nádas, A., P.V ̈olgyesi, y otros. System for urban warfare. ACM Transactions on Sensor Networks 1, 2, 153–177, 2005.

Self-healing minefield.Disponible en: http://www.darpa.mil/sto/smallunitops/SHM/proginfo.html [Consultado el 2 de abril de 2009].

ESCOLAR D., Soledad. Estado del arte e investigación. Disponible en: http://rderuben.googlepages.com/wsn.pdf/ [consultado el 2 de enero 2009].

K. Papadopoulos, T. Zahariadis, N. Leligou y S. Voliotis, Sensor Networks Security Issues In Augmented Home Environment. IEEE International Symposium on Consumer Electronics,ISCE 2008. Abril de 2008.

T. Zia y A. Zomaya, Security Issues in Wireless Sensor Networks. International Conference on Systems and Networks Communications,ICSNC. Octubre de 2006.

V. Mhatre, C. P. Rosenberg, y D. Kofman, et al., A Minimum Cost Heterogeneous Sensor Network with a Lifetime Constraint, IEEE Transactions on Mobile Computing. Vol. 4. Enero de 2005,

M. Yarvis, N. Kushalnagar, y H. Singh, et al., Exploiting Heterogeneity in Sensor Networks, Proc. of IEEE INFOCOM 2005.

L. Eschenauer y V. D. Gligor, A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM conference on Computer and communications security, pp. 41-47, Noviembre de 2002.

C. Castelluccia y Angelo Spognardi, RoK: A Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks. Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007.

I. Mironov, Hash functions: Theory, attacks, and applications. Microsoft Research, Silicon Valley Campus. Noviembre de 2005. (En Línea): https://research.microsoft.com/users/mironov/papers/hash_survey.pdf

L. Lamport, Password authentication with insecure communication. Commun. ACM, vol. 24, no. 11, 1981.

S. Emre Taúç, E. Bayramo÷lu y A. Levi, Simple and Flexible Random Key Predistribution Schemes for Wireless Sensor Networks Using Deployment Knowledge.International Conference on Information Security and Assurance. IEEE 2008.

W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, IEEE Infocom, 2004.

Y. Ho Kim, H. Lee y D. Hoon Lee, A secure and efficient key management scheme for wireless sensor networks. Security and Privacy in Communications Networks and the Workshops, SecureComm 2007. Third International Conference, 17-21 Septiembre de 2007.

J. Young Chun, Y. Ho Kim, J. Lim y D. Hoon Lee, Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing. 2007.

M. Meribout y A. Al-Zoubi, A Recurrent Decentralized Key Management Architecture for Wireless Sensor Network. Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing. 2008.

U.S. Department Of Commerce/National Institute Of Standards And Technology, Data Encryption Standard, (Des). Federal Information Processing Standards Publication. Octubre de 1999. (En línea): http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

J. Luo, P. Papadimitratos y J-P. Hubaux, GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, IEEE SECON '08, 2008..

X. Yi, M. Faulkner y E. Okamoto, Securing Wireless Sensor Networks. The Third International Conference on Availability, Reliability and Security. IEEE 2008.

MIT open Course Aware, Chapter 7: Introduction to finite fields. Ingeniería eléctrica y ciencias de la computación. (En línea): http://ocw.mit.edu/NR/rdonlyres/ElectricalEngineering-and-Computer-Science/

A. Shamir, How to share a secret, Communications of the ACM, vol. 22, no. 11, pp. 656-715. Nov 1979.

J. Abraham y K. S. Ramanatha, A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks, International Conference on Multimedia and Ubiquitous Engineering. ACM, 2007.

Ossama Younis and Sonia Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks, IEEE Transactions on Mobile Computing, volume 3. 2004..[37]A. Hamid, M. Mahbub Alam y C. Seon Hong, Developing a Security Protocol based on LCG and Orthogonal Matrices for Wireless Sensor Networks.The 9th International Conference onAdvanced Communication Technology.Febrero de 2007.

D.E. Knuth, Deciphering a Linear Congruential Encryption. IEEE Transactions on Information Theory, Vol. IT-X, no. 1, pp.49-52, Enero de 1985,.

D.E. Knuth, The Art of Computer Programming, Vol 2: Seminumerical Algorithms. Ed. Addison-Wesley, 1969.

I. Ingemarsson, Commutative Group Codes for the Gaussian Channel. IEEE Transactions on Information Theory, vol. IT-19, no. 5, pp. 215-219, Marzo de 1973.

K-W. Fan, S. Liu y P. Sinha, Scalable Data Aggregation for Dynamic Events in Sensor Networks. Conference On Embedded Networked Sensor Systems.Proceedings of the 4th international conference on Embedded networked sensor systems.Noviembre de 2006.

J. Mache, C-Y. Wan y M. Yarvis, Exploiting Heterogeneity for Sensor Network Security. 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. SECON 2008.

X. Du, H-H. Chen, Y. Xiao y M. Guizani, A Pseudo-Random Function based Key Management Scheme for Heterogeneous Sensor Networks. IEEE GLOBECOM 2007 proceedings.

J. Brown, X. Du, y K. Nygard, An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme. IEEE GLOBECOM 2007 proceedings.

F. Aurenhammer y R. Klein, Voronoi Diagrams. (En Línea): http://www.pi6.fernuni-hagen.de/publ/tr198.pdf

Y. Sun, J. Zhang, H. Ji y T. Yang, KMSGC: A Key Management Scheme for Clustered Wireless Sensor Networks Based on Group-oriented Cryptography.IEEE International Conference on Networking, Sensing and Control, ICNSC 2008. Abril de 2008.

W. Du, J. Deng, Y. S. Han, S. Chen, y P. K. Varshney., A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Marzo de 2004.

Kalpana Sharma, Vikash Varun y Rohit Kumar, System on Chip for Sensor Network Security: A Proposed Architecture. 10th International Conference on Advanced Communication Technology, ICACT 2008.

J. Zhang, X. Liu Y H. Xu, An Efficient Scheme for Broadcast Authentication in Wireless Sensor Networks. ASIAN ACM Symposium on Information, Computer and Communications Security.Proceedings of the 2006 ACM Symposium on Information, computer and communications security. 2006.

N. Sultana y E-N. Huh,An Efficient Scheme for Secure Group Communication in Mobile Wireless Sensor Networks. Conference on Ubiquitous Information Management And Communication. Proceedings of the 2nd international conference on Ubiquitous information management and communication. ACM, 2008.

Byung Hee Kim y Tae Ho Cho, Efficient Selection Method of Message Authentication Codes for Filtering Scheme in Sensor networks. Conference on Ubiquitous Information Management And Communication.Proceedings of the 2nd international conference on Ubiquitous information management and communication. ACM, 2008

J. Yin y S. Kumar Madria, Sybil Attack Detection in a Hierarchical Sensor Network. Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007.

K. Chang y K. G. Shin, Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Securecomm and Workshops. IEEE, 2006.[54] P. Ning, A. Liu y W. Du, Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks. ACM Transactions on Sensor Networks, Vol. 4, No. 1, Article 1. Enero de 2008

F. Ye, H. Yang, y Z. Liu. Catching "Moles in Sensor Networks. 27th International Conference on Distributed Computing Systems. 2007.

D. Wang, Q. Zhang y J. Liu, The Self-Protection Problem in Wireless Sensor Networks. ACM Transactions on Sensor Networks, Vol. 3, No. 4, Article 20. Octubre de 2007.

M. Conti, R. Di Pietro, L. V. Mancini y A. Mei, A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. The ACM International Symposium on Mobile Ad Hoc Networking and Computing. 2007.

M. Ketel, Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks. 40th Southeastern Symposium on System Theory. IEEE, Marzo de 2008.

I. Chatzigiannakis y A. Strikos, A Decentralized Intrusion Detection System for Increasing Security of Wireless Sensor Networks, Emerging Technologies and Factory Automation, ETFA 2007.

G. Huo y X. Wang, DIDS: A Dynamic Model of Intrusion Detection System in Wireless Sensor Networks. Proceedings of the 2008 IEEE International Conference on Information and Automation. Zhangjiajie, China. Junio de 2008.

K. Bonne Rasmussen y S. Capkun, Implications of Radio Fingerprinting on the Security of Sensor Networks. Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007.

K. Xing, F. Liu, X. Cheng y D. H.C. Du, Real-time Detection of Clone Attacks in Wireless Sensor Networks.The 28th International Conference on Distributed Computing Systems. IEEE 2008.

D. Seong Kim, C. Su Yang, y J. Sou Park, Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. Second International Conference on Availability, Reliability and Security. ACM. 2007.

NETWORK SIMULATOR. Disponible en: http://www.isi.edu/nsnam/ns/ [consultado el 3 de enero 2009].

OMNET++. Disponible en: http://www.omnetpp.org/index.php [consultado el 3 de enero 2009].

Publicado
2009-06-30
Cómo citar
Suescún, C. A., & Moreno López, G. A. (2009). Revisión del estado del arte de redes de sensores inalámbricos. Revista Politécnica, 5(8), 94 - 111. Recuperado a partir de https://revistas.elpoli.edu.co/index.php/pol/article/view/130
Sección
Artículos

Métricas de Artículo

Resumen : 1319   PDF : 746