9,817 research outputs found
RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor Networks
Protocols developed during the last years for Wireless Sensor Networks (WSNs)
are mainly focused on energy efficiency and autonomous mechanisms (e.g.
self-organization, self-configuration, etc). Nevertheless, with new WSN
applications, appear new QoS requirements such as time constraints. Real-time
applications require the packets to be delivered before a known time bound
which depends on the application requirements. We particularly focus on
applications which consist in alarms sent to the sink node. We propose
Real-Time X-layer Protocol (RTXP), a real-time communication protocol. To the
best of our knowledge, RTXP is the first MAC and routing real-time
communication protocol that is not centralized, but instead relies only on
local information. The solution is cross-layer (X-layer) because it allows to
control the delays due to MAC and Routing layers interactions. RTXP uses a
suited hop-count-based Virtual Coordinate System which allows deterministic
medium access and forwarder selection. In this paper we describe the protocol
mechanisms. We give theoretical bound on the end-to-end delay and the capacity
of the protocol. Intensive simulation results confirm the theoretical
predictions and allow to compare with a real-time centralized solution. RTXP is
also simulated under harsh radio channel, in this case the radio link
introduces probabilistic behavior. Nevertheless, we show that RTXP it performs
better than a non-deterministic solution. It thus advocates for the usefulness
of designing real-time (deterministic) protocols even for highly unreliable
networks such as WSNs
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
D-SLATS: Distributed Simultaneous Localization and Time Synchronization
Through the last decade, we have witnessed a surge of Internet of Things
(IoT) devices, and with that a greater need to choreograph their actions across
both time and space. Although these two problems, namely time synchronization
and localization, share many aspects in common, they are traditionally treated
separately or combined on centralized approaches that results in an ineffcient
use of resources, or in solutions that are not scalable in terms of the number
of IoT devices. Therefore, we propose D-SLATS, a framework comprised of three
different and independent algorithms to jointly solve time synchronization and
localization problems in a distributed fashion. The First two algorithms are
based mainly on the distributed Extended Kalman Filter (EKF) whereas the third
one uses optimization techniques. No fusion center is required, and the devices
only communicate with their neighbors. The proposed methods are evaluated on
custom Ultra-Wideband communication Testbed and a quadrotor, representing a
network of both static and mobile nodes. Our algorithms achieve up to three
microseconds time synchronization accuracy and 30 cm localization error
- …