28 research outputs found
On-demand fuzzy clustering and ant-colony optimisation based mobile data collection in wireless sensor network
In a wireless sensor network (WSN), sensor nodes collect data from the environment and transfer this data to an end user through multi-hop communication. This results in high energy dissipation of the devices. Thus, balancing of energy consumption is a major concern in such kind of network. Appropriate cluster head (CH) selection may provide to be an efficient way to reduce the energy dissipation and prolonging the network lifetime in WSN. This paper has adopted the concept of fuzzy if-then rules to choose the cluster head based on certain fuzzy descriptors. To optimise the fuzzy membership functions, Particle Swarm Optimisation (PSO) has been used to improve their ranges. Moreover, recent study has confirmed that the introduction of a mobile collector in a network which collects data through short-range communications also aids in high energy conservation. In this work, the network is divided into clusters and a mobile collector starts from the static sink or base station and moves through each of these clusters and collect data from the chosen cluster heads in a single-hop fashion. Mobility based on Ant-Colony Optimisation (ACO) has already proven to be an efficient method which is utilised in this work. Additionally, instead of performing clustering in every round, CH is selected on demand. The performance of the proposed algorithm has been compared with some existing clustering algorithms. Simulation results show that the proposed protocol is more energy-efficient and provides better packet delivery ratio as compared to the existing protocols for data collection obtained through Matlab Simulations
An improved modified LEACH-C algorithm for energy efficient routing in Wireless Sensor Networks
Wireless Sensor Networks (WSN) is mainly characterized by its limited power supply. Hence the need for Energy efficient infrastructure is becoming increasingly more important since it impact in network lifetime. Here the focus of this paper on Hierarchy clustering because multi-hope short range communication between wireless sensor nodes is energy efficient compared to Single-hope long range communication. In Hierarchy clustering, there are many Protocols but this paper talk about the well-known Low-Energy Adaptive Clustering Hierarchy (LEACH)[1].Centralized Low-Energy Adaptive Clustering Hierarchy (LEACH-C) and Advanced Low-Energy Adaptive Clustering Hierarchy(ALEACH) are energy efficient clustering routing protocol and they are belonging to hierarchy routing. In this paper we proposed Modified LEACH-C to upgrade the execution of existing Leach-C in such sort of Topology where Leach-C not performs so well. By Applying Method of Distance calculation between CH (cluster-head) to Member node and BS (base-station) to Member node. Making non-overlapping cluster using assigning proper ID while creating clusters. This makes the routing protocol more energy effective and delays life-time of a wireless sensor network. Simulation results demonstrate that Modified LEACH-C enhances network life-time contrasted with LEACH-C algorithm
Recommended from our members
Routing and Medium Access Control (MAC) in wireless sensor network for monitoring emergency applications
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonIn recent years, Wireless Sensor Networks (WSNs) have been implemented in many applications including emergency applications. Emergency applications require different characteristics than others, such as robust communication, low energy consumption and minimum end-to-end delay. Routing and Medium Access Control (MAC) are two protocols that have been used by many researchers to achieve those requirements. This thesis mainly focuses on studying distributive clustering routing and MAC protocol for emergency applications. To design robust communication in emergency applications, this thesis has proposed a modified LEACH protocol considering the health status of sensor nodes. LEACH is a benchmark protocol employing distributive clustering-based routing with low energy consumption, however this protocol is not suitable for emergency applications. The health status refers to the condition of nodes, safe or in danger, with the danger status shows the high probability to be destroyed sooner because of external factors such as fire. The proposed approach avoids selecting the nodes in danger as cluster heads. Furthermore, efficient multi-hop communication is employed to minimise energy consumption. The simulation result shows that total data received, energy consumption , packet delivery ratio, and energy efficiency of the proposed approach are stable with an increasing number of destroyed nodes. Furthermore, a grid-based clustering approach with health status is proposed to further enhance energy constraint and robust communication. The proposed approach includes distributive clustering and incorporate constant number of CHs in every round. The remaining energy, the health status of node, and the distance to the centre of the grid are consided when choosing the cluster head. Simulation results have revealed that the proposed protocol has a significant effect on the time for first node to destroy due to energy consumption, an increase of 45% compared to LEACH. Furthermore, packet delivery ratio of the proposed approach is enhanced by 16% compared to LEACH. In order to reduce end to end delay, a priority-based grid Time Division Multiple Access (TDMA) has been proposed. In this approach, traffic is classified into two categories: emergency traffic from danger nodes, and monitoring traffic from safe nodes. This scheme was implemented using three steps: formation of a new TDMA frame, the arrangement of slots and priority allocation. Simulations results showed an improvement of around 65% and 70% in end to end delay compared to Grid and LEACH approaches.Directorate General of Resources for Science, Technology, and Higher Education of Indonesia; the University of Ria
Solutions for large scale, efficient, and secure Internet of Things
The design of a general architecture for the Internet of Things (IoT) is a complex task, due to the heterogeneity of devices, communication technologies, and applications that are part of such systems. Therefore, there are significant opportunities to improve the state of the art, whether to better the performance of the system, or to solve actual issues in current systems. This thesis focuses, in particular, on three aspects of the IoT. First, issues of cyber-physical systems are analysed. In these systems, IoT technologies are widely used to monitor, control, and act on physical entities. One of the most important issue in these scenarios are related to the communication layer, which must be characterized by high reliability, low latency, and high energy efficiency. Some solutions for the channel access scheme of such systems are proposed, each tailored to different specific scenarios. These solutions, which exploit the capabilities of state of the art radio transceivers, prove effective in improving the performance of the considered systems. Positioning services for cyber-physical systems are also investigated, in order to improve the accuracy of such services. Next, the focus moves to network and service optimization for traffic intensive applications, such as video streaming. This type of traffic is common amongst non-constrained devices, like smartphones and augmented/virtual reality headsets, which form an integral part of the IoT ecosystem. The proposed solutions are able to increase the video Quality of Experience while wasting less bandwidth than state of the art strategies. Finally, the security of IoT systems is investigated. While often overlooked, this aspect is fundamental to enable the ubiquitous deployment of IoT. Therefore, security issues of commonly used IoT protocols are presented, together with a proposal for an authentication mechanism based on physical channel features. This authentication strategy proved to be effective as a standalone mechanism or as an additional security layer to improve the security level of legacy systems
Channel Access in Wireless Networks: Protocol Design of Energy-Aware Schemes for the IoT and Analysis of Existing Technologies
The design of channel access policies has been an object of study since the deployment of the first wireless networks, as the Medium Access Control (MAC) layer is responsible for coordinating transmissions to a shared channel and plays a key role in the network performance. While the original target was the system throughput, over the years the focus switched to communication latency, Quality of Service (QoS) guarantees, energy consumption, spectrum efficiency, and any combination of such goals.
The basic mechanisms to use a shared channel, such as ALOHA, TDMA- and FDMA-based policies, have been introduced decades ago. Nonetheless, the continuous evolution of wireless networks and the emergence of new communication paradigms demand the development of new strategies to adapt and optimize the standard approaches so as to satisfy the requirements of applications and devices.
This thesis proposes several channel access schemes for novel wireless technologies, in particular Internet of Things (IoT) networks, the Long-Term Evolution (LTE) cellular standard, and mmWave communication with the IEEE802.11ad standard.
The first part of the thesis concerns energy-aware channel access policies for IoT networks, which typically include several battery-powered sensors.
In scenarios with energy restrictions, traditional protocols that do not consider the energy consumption may lead to the premature death of the network and unreliable performance expectations. The proposed schemes show the importance of accurately characterizing all the sources of energy consumption (and inflow, in the case of energy harvesting), which need to be included in the protocol design. In particular, the schemes presented in this thesis exploit data processing and compression techniques to trade off QoS for lifetime. We investigate contention-free and contention-based chanel access policies for different scenarios and application requirements.
While the energy-aware schemes proposed for IoT networks are based on a clean-slate approach that is agnostic of the communication technology used, the second part of the thesis is focused on the LTE and IEEE802.11ad standards.
As regards LTE, the study proposed in this thesis shows how to use machine-learning techniques to infer the collision multiplicity in the channel access phase, information that can be used to understand when the network is congested and improve the contention resolution mechanism. This is especially useful for massive access scenarios; in the last years, in fact, the research community has been investigating on the use of LTE for Machine-Type Communication (MTC).
As regards the standard IEEE802.11ad, instead, it provides a hybrid MAC layer with contention-based and contention-free scheduled allocations, and a dynamic channel time allocation mechanism built on top of such schedule. Although this hybrid scheme is expected to meet heterogeneous requirements, it is still not clear how to develop a schedule based on the various traffic flows and their demands. A mathematical model is necessary to understand the performance and limits of the possible types of allocations and guide the scheduling process. In this thesis, we propose a model for the contention-based access periods which is aware of the interleaving of the available channel time with contention-free allocations
Security Risk Management for the Internet of Things
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT systems. Risk assessments for modern IoT systems must be frequent, dynamic and driven by knowledge about both cyber and physical assets. Furthermore, they should be more proactive, more automated, and able to leverage information shared across IoT value chains. This book introduces a set of novel risk assessment techniques and their role in the IoT Security risk management process. Specifically, it presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm. It also highlights machine learning techniques that boost the automation and proactiveness of IoT security risk assessments. Furthermore, blockchain solutions for open and transparent sharing of IoT security information across the supply chain are introduced. Frameworks for privacy awareness, along with technical measures that enable privacy risk assessment and boost GDPR compliance are also presented. Likewise, the book illustrates novel solutions for security certification of IoT systems, along with techniques for IoT security interoperability. In the coming years, IoT security will be a challenging, yet very exciting journey for IoT stakeholders, including security experts, consultants, security research organizations and IoT solution providers. The book provides knowledge and insights about where we stand on this journey. It also attempts to develop a vision for the future and to help readers start their IoT Security efforts on the right foot
UAV-Enabled Surface and Subsurface Characterization for Post-Earthquake Geotechnical Reconnaissance
Major earthquakes continue to cause significant damage to infrastructure systems and the loss of life (e.g. 2016 Kaikoura, New Zealand; 2016 Muisne, Ecuador; 2015 Gorkha, Nepal). Following an earthquake, costly human-led reconnaissance studies are conducted to document structural or geotechnical damage and to collect perishable field data. Such efforts are faced with many daunting challenges including safety, resource limitations, and inaccessibility of sites. Unmanned Aerial Vehicles (UAV) represent a transformative tool for mitigating the effects of these challenges and generating spatially distributed and overall higher quality data compared to current manual approaches. UAVs enable multi-sensor data collection and offer a computational decision-making platform that could significantly influence post-earthquake reconnaissance approaches. As demonstrated in this research, UAVs can be used to document earthquake-affected geosystems by creating 3D geometric models of target sites, generate 2D and 3D imagery outputs to perform geomechanical assessments of exposed rock masses, and characterize subsurface field conditions using techniques such as in situ seismic surface wave testing. UAV-camera systems were used to collect images of geotechnical sites to model their 3D geometry using Structure-from-Motion (SfM). Key examples of lessons learned from applying UAV-based SfM to reconnaissance of earthquake-affected sites are presented. The results of 3D modeling and the input imagery were used to assess the mechanical properties of landslides and rock masses. An automatic and semi-automatic 2D fracture detection method was developed and integrated with a 3D, SfM, imaging framework. A UAV was then integrated with seismic surface wave testing to estimate the shear wave velocity of the subsurface materials, which is a critical input parameter in seismic response of geosystems. The UAV was outfitted with a payload release system to autonomously deliver an impulsive seismic source to the ground surface for multichannel analysis of surface waves (MASW) tests. The UAV was found to offer a mobile but higher-energy source than conventional seismic surface wave techniques and is the foundational component for developing the framework for fully-autonomous in situ shear wave velocity profiling.PHDCivil EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/145793/1/wwgreen_1.pd
Intelligent Machining Systems
Machining is one of the most widespread manufacturing processes and plays a critical role
in industries. As a matter of fact, machine tools are often called mother machines as they
are used to produce other machines and production plants. The continuous development
of innovative materials and the increasing competitiveness are two of the challenges that
nowadays manufacturing industries have to cope with. The increasing attention to environmental
issues and the rising costs of raw materials drive the development of machining
systems able to continuously monitor the ongoing process, identify eventual arising problems
and adopt appropriate countermeasures to resolve or prevent these issues, leading
to an overall optimization of the process. This work presents the development of intelligent
machining systems based on in-process monitoring which can be implemented on
production machines in order to enhance their performances. Therefore, some cases of
monitoring systems developed in different fields, and for different applications, are presented
in order to demonstrate the functions which can be enabled by the adoption of
these systems. Design and realization of an advanced experimental machining testbed is
presented in order to give an example of a machine tool retrofit aimed to enable advanced
monitoring and control solutions. Finally, the implementation of a data-driven simulation
of the machining process is presented. The modelling and simulation phases are presented
and discussed. So, the model is applied to data collected during an experimental campaign
in order to tune it. The opportunities enabled by integrating monitoring systems
with simulation are presented with preliminary studies on the development of two virtual
sensors for the material conformance and cutting parameter estimation during machining
processes