37,477 research outputs found

    A Learning-based Approach to Exploiting Sensing Diversity in Performance Critical Sensor Networks

    Get PDF
    Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting and classifying events while maximizing system lifetime. to meet high accuracy requirements and maximize system lifetime, we must address sensing diversity: sensing capability differences among both heterogeneous and homogeneous sensors in a specific deployment. Existing approaches either ignore sensing diversity entirely and assume all sensors have similar capabilities or attempt to overcome sensing diversity through calibration. Instead, we use machine learning to take advantage of sensing differences among heterogeneous sensors to provide high accuracy and energy savings for performance critical applications.;In this dissertation, we provide five major contributions that exploit the nuances of specific sensor deployments to increase application performance. First, we demonstrate that by using machine learning for event detection, we can explore the sensing capability of a specific deployment and use only the most capable sensors to meet user accuracy requirements. Second, we expand our diversity exploiting approach to detect multiple events using a distributed manner. Third, we address sensing diversity in body sensor networks, providing a practical, user friendly solution for activity recognition. Fourth, we further increase accuracy and energy savings in body sensor networks by sharing sensing resources among neighboring body sensor networks. Lastly, we provide a learning-based approach for forwarding event detection decisions to data sinks in an environment with mobile sensor nodes

    Web spider defense technique in wireless sensor networks

    Full text link
    Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all steps performed by the web spider are included in our system and we will detail the algorithm and protocol procedure. A real test bench has been implemented in order to validate our system. It shows the performance for different response times, the CPU and RAM consumption, and the average and maximum values for ping and tracert time responses using constant delay and exponential jitter.This work has been partially supported by the "Ministerio de Ciencia e Innovacion", through the "Plan Nacional de I+D+i 2008-2011" in the "Subprograma de Proyectos de Investigacion Fundamental", Project TEC2011-27516.Cánovas Solbes, A.; Lloret, J.; Macias Lopez, EM.; Suarez Sarmiento, A. (2014). Web spider defense technique in wireless sensor networks. International Journal of Distributed Sensor Networks. 2014:1-7. https://doi.org/10.1155/2014/348606S172014Bri, D., Garcia, M., Lloret, J., & Dini, P. (2009). Real Deployments of Wireless Sensor Networks. 2009 Third International Conference on Sensor Technologies and Applications. doi:10.1109/sensorcomm.2009.69Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302-1325. doi:10.1016/j.jnca.2011.03.004Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867-880. doi:10.1016/j.jnca.2011.03.005Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022-1034. doi:10.1016/j.jnca.2012.01.002Maleh, Y., & Ezzati, A. (2013). A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network. International Journal of Wireless & Mobile Networks, 5(6), 79-90. doi:10.5121/ijwmn.2013.5606Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion Detection Systems in Wireless Sensor Networks: A Review. International Journal of Distributed Sensor Networks, 9(5), 167575. doi:10.1155/2013/167575Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56-63. doi:10.1109/mwc.2007.4396943Fatema, N., & Brad, R. (2013). Attacks and Counterattacks on Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 4(6), 1-15. doi:10.5121/ijasuc.2013.4601Ankala, R. P., Kavitha, D., & Haritha, D. (2011). MOBILE AGENT BASED ROUTING in MANETS –ATTACKS & DEFENCES. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1351Hylsberg Jacobsen, R., Zhang, Q., & Skjødeberg Toftegaard, T. (2011). Bioinspired Principles for Large-Scale Networked Sensor Systems: An Overview. Sensors, 11(4), 4137-4151. doi:10.3390/s110404137Kofahi, N. (2013). An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers. International Journal of Security and Its Applications, 7(5), 1-16. doi:10.14257/ijsia.2013.7.5.01Sisodia, M. S., & Raghuwanshi, V. (2011). Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1342Zhijie, H., & Ruchuang, W. (2012). Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model. Physics Procedia, 25, 2072-2080. doi:10.1016/j.phpro.2012.03.352Al-Gharabally, N., El-Sayed, N., Al-Mulla, S., & Ahmad, I. (2009). Wireless honeypots. Proceedings of the 2009 conference on Information Science, Technology and Applications - ISTA ’09. doi:10.1145/1551950.1551969Gopinath V.Success analysis of deception in wireless sensor networks [M.S. thesis]2010Oklahoma State UniversityZhongshan Zhang, Keping Long, Jianping Wang, & Dressler, F. (2014). On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms, Designing Principles and Optimization Approaches. IEEE Communications Surveys & Tutorials, 16(1), 513-537. doi:10.1109/surv.2013.062613.00014Rathore, H., & Jha, S. (2013). Bio-inspired machine learning based Wireless Sensor Network security. 2013 World Congress on Nature and Biologically Inspired Computing. doi:10.1109/nabic.2013.6617852Alrajeh, N. A., & Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 9(10), 351047. doi:10.1155/2013/351047Amirkolaei M. K.Enhancing bio-inspired intrusion response in Ad-hoc networks [Ph.D. thesis]August 2013Edinburgh, UKEdinburgh Napier Universityhttp://researchrepository.napier.ac.uk/6533/Muraleedharan, R., & Osadciw, L. A. (2009). An intrusion detection framework for Sensor Networks using Honeypot and Swarm Intelligence. Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.4108/icst.mobiquitous2009.7084Hortos, W. S. (2012). Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks. 37th Annual IEEE Conference on Local Computer Networks -- Workshops. doi:10.1109/lcnw.2012.6424040Benahmed, K., Merabti, M., & Haffaf, H. (2012). Inspired Social Spider Behavior for Secure Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications, 4(4), 1-10. doi:10.4018/jmcmc.2012100101Herberstein, M. E. (Ed.). (2009). Spider Behaviour. doi:10.1017/cbo9780511974496Ficco, M. (2010). Achieving Security by Intrusion-Tolerance Based on Event Correlation. Network Protocols and Algorithms, 2(3). doi:10.5296/npa.v2i3.42

    QoS Analysis for a Non-Preemptive Continuous Monitoring and Event Driven WSN Protocol in Mobile Environments

    Full text link
    Evolution in wireless sensor networks (WSNs) has allowed the introduction of new applications with increased complexity regarding communication protocols, which have to ensure that certain QoS parameters are met. Specifically, mobile applications require the system to respond in a certain manner in order to adequately track the target object. Hybrid algorithms that perform Continuous Monitoring (CntM) and Event-Driven (ED) duties have proven their ability to enhance performance in different environments, where emergency alarms are required. In this paper, several types of environments are studied using mathematical models and simulations, for evaluating the performance of WALTER, a priority-based nonpreemptive hybrid WSN protocol that aims to reduce delay and packet loss probability in time-critical packets. First, randomly distributed events are considered. This environment can be used to model a wide variety of physical phenomena, for which report delay and energy consumption are analyzed by means of Markov models. Then, mobile-only environments are studied for object tracking purposes. Here, some of the parameters that determine the performance of the system are identified. Finally, an environment containing mobile objects and randomly distributed events is considered. It is shown that by assigning high priority to time-critical packets, report delay is reduced and network performance is enhanced.This work was partially supported by CONACyT under Project 183370. The research of Vicent Pla has been supported in part by the Ministry of Economy and Competitiveness of Spain under Grant TIN2013-47272-C2-1-R.Leyva Mayorga, I.; Rivero-Angeles, ME.; Carreto-Arellano, C.; Pla, V. (2015). QoS Analysis for a Non-Preemptive Continuous Monitoring and Event Driven WSN Protocol in Mobile Environments. International Journal of Distributed Sensor Networks. 2015:1-16. https://doi.org/10.1155/2015/471307S1162015Arampatzis, T., Lygeros, J., & Manesis, S. (s. f.). A Survey of Applications of Wireless Sensors and Wireless Sensor Networks. Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005. doi:10.1109/.2005.1467103Ramachandran, C., Misra, S., & Obaidat, M. S. (2008). A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks. International Journal of Communication Systems, 21(10), 1047-1073. doi:10.1002/dac.937Misra, S., Singh, S., Khatua, M., & Obaidat, M. S. (2013). Extracting mobility pattern from target trajectory in wireless sensor networks. International Journal of Communication Systems, 28(2), 213-230. doi:10.1002/dac.2649Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660-670. doi:10.1109/twc.2002.804190Younis, O., & Fahmy, S. (s. f.). Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach. IEEE INFOCOM 2004. doi:10.1109/infcom.2004.1354534Manjeshwar, A., & Agrawal, D. P. (s. f.). TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001. doi:10.1109/ipdps.2001.925197Manjeshwar, A., & Agrawal, D. P. (2002). APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless. Proceedings 16th International Parallel and Distributed Processing Symposium. doi:10.1109/ipdps.2002.1016600Sharif, A., Potdar, V., & Rathnayaka, A. J. D. (2010). Prioritizing Information for Achieving QoS Control in WSN. 2010 24th IEEE International Conference on Advanced Information Networking and Applications. doi:10.1109/aina.2010.166Alappat, V. J., Khanna, N., & Krishna, A. K. (2011). Advanced Sensor MAC protocol to support applications having different priority levels in Wireless Sensor Networks. 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM). doi:10.1109/chinacom.2011.6158175Alam, K. M., Kamruzzaman, J., Karmakar, G., & Murshed, M. (2012). Priority Sensitive Event Detection in Hybrid Wireless Sensor Networks. 2012 21st International Conference on Computer Communications and Networks (ICCCN). doi:10.1109/icccn.2012.6289220Raja, A., & Su, X. (2008). A Mobility Adaptive Hybrid Protocol for Wireless Sensor Networks. 2008 5th IEEE Consumer Communications and Networking Conference. doi:10.1109/ccnc08.2007.159Srikanth, B., Harish, M., & Bhattacharjee, R. (2011). An energy efficient hybrid MAC protocol for WSN containing mobile nodes. 2011 8th International Conference on Information, Communications & Signal Processing. doi:10.1109/icics.2011.6173629Lee, Y.-D., Jeong, D.-U., & Lee, H.-J. (2011). Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications. International Journal of Communication Systems, 26(4), 505-514. doi:10.1002/dac.1360Deepak, K. S., & Babu, A. V. (2013). Improving energy efficiency of incremental relay based cooperative communications in wireless body area networks. International Journal of Communication Systems, 28(1), 91-111. doi:10.1002/dac.2641Yuan Li, Wei Ye, & Heidemann, J. (s. f.). Energy and latency control in low duty cycle MAC protocols. IEEE Wireless Communications and Networking Conference, 2005. doi:10.1109/wcnc.2005.1424589Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), 535-547. doi:10.1109/49.840210Wei Ye, Heidemann, J., & Estrin, D. (s. f.). An energy-efficient MAC protocol for wireless sensor networks. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. doi:10.1109/infcom.2002.101940

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    Outlier detection techniques for wireless sensor networks: A survey

    Get PDF
    In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree

    Performance and Detection of M-ary Frequency Shift Keying in Triple Layer Wireless Sensor Network

    Full text link
    This paper proposes an innovative triple layer Wireless Sensor Network (WSN) system, which monitors M-ary events like temperature, pressure, humidity, etc. with the help of geographically distributed sensors. The sensors convey signals to the fusion centre using M-ary Frequency Shift Keying (MFSK)modulation scheme over independent Rayleigh fading channels. At the fusion centre, detection takes place with the help of Selection Combining (SC) diversity scheme, which assures a simple and economical receiver circuitry. With the aid of various simulations, the performance and efficacy of the system has been analyzed by varying modulation levels, number of local sensors and probability of correct detection by the sensors. The study endeavors to prove that triple layer WSN system is an economical and dependable system capable of correct detection of M-ary events by integrating frequency diversity together with antenna diversity.Comment: 13 pages; International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.4, July 201

    Outlier Detection Techniques For Wireless Sensor Networks: A Survey

    Get PDF
    In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the multivariate nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a decision tree to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier degree
    corecore