91,498 research outputs found

    Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband

    Full text link
    This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global Mobile Information System Simulator (GloMoSim). The optimal operating parameters are first discussed for IR-UWB in terms of slot size, retransmission delay and the number of retransmission, then a comparison between IR-UWB and other transmission techniques in terms of reliability latency and power efficiency

    Local Multicoloring Algorithms: Computing a Nearly-Optimal TDMA Schedule in Constant Time

    Get PDF
    The described multicoloring problem has direct applications in the context of wireless ad hoc and sensor networks. In order to coordinate the access to the shared wireless medium, the nodes of such a network need to employ some medium access control (MAC) protocol. Typical MAC protocols control the access to the shared channel by time (TDMA), frequency (FDMA), or code division multiple access (CDMA) schemes. Many channel access schemes assign a fixed set of time slots, frequencies, or (orthogonal) codes to the nodes of a network such that nodes that interfere with each other receive disjoint sets of time slots, frequencies, or code sets. Finding a valid assignment of time slots, frequencies, or codes hence directly corresponds to computing a multicoloring of a graph GG. The scarcity of bandwidth, energy, and computing resources in ad hoc and sensor networks, as well as the often highly dynamic nature of these networks require that the multicoloring can be computed based on as little and as local information as possible

    Procedure for Selecting a Transmission Mode Dependent on the State-of-Charge and State-of-Health of a Lithium-ion Battery in Wireless Sensor Networks with Energy Harvesting Devices

    Get PDF
    Diverse methods and considerations have been proposed to manage the available energy in an efficient manner in Wireless Sensor Networks. By incorporating Energy Harvesting Devices in these type of networks it is possible to reduce the dependency of the availability of the Energy Storage Devices, particularly the lithium-ion battery. Recently, the State-of-Charge and State-of-Health of the battery have been considered as inputs for the design of the Medium- Access-Control protocols for Wireless Sensor Networks. In this article, different guidelines are proposed for the design of Medium-Access-Control protocols used in Wireless Sensor Networks with Energy Harvesting Devices considering the State-of-Charge and State-of-Health as indicators for the estimation of the transmission time of the sensor node. The proposed guidelines consider different currents used during the transmission to estimate the State-of-Charge and Stateof- Health of the battery. The incorporation of these indicators aim to improve the decision-making process of the sensor node when transmitting.Diverse methods and considerations have been proposed to manage the available energy in an efficient manner in Wireless Sensor Networks. By incorporating Energy Harvesting Devices in these type of networks it is possible to reduce the dependency of the availability of the Energy Storage Devices, particularly the lithium-ion battery. Recently, the State-of-Charge and State-of-Health of the battery have been considered as inputs for the design of the Medium- Access-Control protocols for Wireless Sensor Networks. In this article, different guidelines are proposed for the design of Medium-Access-Control protocols used in Wireless Sensor Networks with Energy Harvesting Devices considering the State-of-Charge and State-of-Health as indicators for the estimation of the transmission time of the sensor node. The proposed guidelines consider different currents used during the transmission to estimate the State-of-Charge and Stateof- Health of the battery. The incorporation of these indicators aim to improve the decision-making process of the sensor node when transmitting

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks

    Full text link
    In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.Comment: 10 pages, IJCNC Journal 201

    An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Network

    Get PDF
    Wireless sensor networks are networks of tiny sensing devices for communicating in using wireless technology. Wireless sensor networks are deployed in scenarios where any plant information should be available for industrial control applications. Cross-layer interaction is most important factor to gain maximum efficiency and also able to provide difficult interaction among the layers of the protocol stack. Hence to achieve this is challenging issue because latency, energy and reliability are at odds, and also resource constrained does not support complex algorithm. Wireless sensor networks have many protocols. In this paper Breath protocol is proposed for industrial control application .To minimizing energy consumption in network breath is designed for WSNs by which nodes attached to plants must carry information via through multi hop routing to sink. To optimize energy efficiency the protocol is based on randomized routing, medium access control, and duty-cycling. Alternate model of breath protocol ensures a long lifetime of the network by making effective distribution of workload in sensor nodes. Hence it shows as a good terminology for efficient, timely data gathering for industrial control applications. DOI: 10.17762/ijritcc2321-8169.15032

    Access Control in Wireless Sensor Networks

    Full text link
    Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computing devices equipped with different sensors. Sensor networks collect and process environmental data and can be used for habitat monitoring, precision agriculture, wildfire detection, structural health monitoring and many other applications. Securing sensor networks calls for novel solutions, especially because of their unattended deployment and strong resource limitations. Moreover, developing security solutions without knowing precisely against what threats the system should be protected is impossible. Thus, the first task in securing sensor networks is to define a realistic adversary model. We systematically investigate vulnerabilities in sensor networks, specifically focusing on physical attacks on sensor node hardware. These are all attacks that require direct physical access to the sensor nodes. Most severe attacks of this kind are also known as node capture, or node compromise. Based on the vulnerability analysis, we present a novel general adversary model for sensor networks. If the data collected within a sensor network is valuable or should be kept confidential then the data should be protected from unauthorized access. We determine security issues in the context of access control in sensor networks in presence of node capture attacks and develop protocols for broadcast authentication that constitute the core of our solutions for access control. We develop broadcast authentication protocols for the case where the adversary can capture up to some threshold t sensor nodes. The developed protocols offer absolute protection while not more than t nodes are captured, but their security breaks completely otherwise. Moreover, security in this case comes at a high cost, as the resource requirements for the protocols grow rapidly with t. One of the most popular ways to overcome impossibility or inefficiency of solutions in distributed systems is to make the protocol goals probabilistic. We therefore develop efficient probabilistic protocols for broadcast authentication. Security of these protocols degrades gracefully with the increasing number of captured nodes. We conclude that the perfect threshold security is less appropriate for sensor networks than the probabilistic approach. Gracefully degrading security offers better scalability and saves resources, and should be considered as a promising security paradigm for sensor networks
    • …
    corecore