2,461 research outputs found

    A Localized Coverage Preserving Protocol for Wireless Sensor Networks

    Get PDF
    In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC) for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N2log(N)), lower than the eligibility rule in the Coverage Control Protocol (CCP), O(N3), where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP) to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree

    Efficiency Impairment of Wireless Sensor Networks Protocols under Realistic Physical Layer Conditions

    Get PDF
    International audienceMost of existing works about sensor networks focus on energy management. Already proposed solutions often consist in balancing energy consumption by taking advantage of the redundancy induced by the random deployment of nodes; some nodes are active while others are in sleep mode, thus consuming less energy. Such a dynamical topology should not impact the monitoring activity. Area coverage protocols aim at turning off redundant sensor nodes in order to constitute a set of active nodes that covers as large an area as the whole set of nodes. In this paper, we focus on localized algorithms that require 1-hop knowledge only to allow nodes to choose their activity status. The unit disk model is the most commonly used assumption; if a node emits a message, any node within its communication range receives it while any node outside the disk does not. In this article, the impact of a realistic radio channel on area coverage protocols for wireless sensor networks is studied. It is shown that a non-binary reception probability can lead to very different results for protocols that could though provide great performances with the unit disk model. An optimization of a protocol to keep increasing the network lifetime once a realistic energy consumption model is considered is also provided

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    An Adaptive Localized Algorithm for Multiple Sensor Area Coverage

    Get PDF
    International audienceWireless sensor networks are made up of hundreds of devices deployed over a distant or sensitive field to be monitored. Energy consumption is balanced by taking advantage of the redundancy induced by the random deployment of nodes. Some nodes are active while others are in sleep mode, thus using less energy. Such a dynamic topology should not impact the monitoring activity. Area coverage protocols aim at turning off redundant sensor nodes while ensuring full coverage of the area by the remaining active nodes. Providing k-area coverage therefore means that every physical point of the monitored field is sensed by at least k sensor devices. Connectivity of the active nodes subset must also be provided so that monitoring reports can reach the sink stations. Existing solutions hardly address these two issues as a unified one. In this paper, we propose a localized algorithm for multiple sensor area coverage able to build connected active nodes sets. We also show that a simple feature of the protocol, called the coverage evaluation scheme, can be enhanced to handle various k-area coverage problem definitions. Experimental results show that our coverage scheme is resistant to collisions of messages as k-area-coverage of the deployment area and connectivity of the active nodes set can still be ensured
    • …
    corecore