75 research outputs found
On the Displacement for Covering a dimensional Cube with Randomly Placed Sensors
Consider sensors placed randomly and independently with the uniform
distribution in a dimensional unit cube (). The sensors have
identical sensing range equal to , for some . We are interested in
moving the sensors from their initial positions to new positions so as to
ensure that the dimensional unit cube is completely covered, i.e., every
point in the dimensional cube is within the range of a sensor. If the
-th sensor is displaced a distance , what is a displacement of minimum
cost? As cost measure for the displacement of the team of sensors we consider
the -total movement defined as the sum , for some
constant . We assume that and are chosen so as to allow full
coverage of the dimensional unit cube and .
The main contribution of the paper is to show the existence of a tradeoff
between the dimensional cube, sensing radius and -total movement. The
main results can be summarized as follows for the case of the dimensional
cube.
If the dimensional cube sensing radius is and
, for some , then we present an algorithm that uses
total expected movement (see Algorithm 2 and
Theorem 5).
If the dimensional cube sensing radius is greater than
and is a natural
number then the total expected movement is
(see Algorithm 3 and Theorem 7).
In addition, we simulate Algorithm 2 and discuss the results of our
simulations
Recommended from our members
Reliable on-demand routing protocols for mobile ad-hoc networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University London.Mobile Ad-Hoc Network (MANET) facilitates the creation of dynamic reconfigurable networks, without centralized infrastructure. MANET routing protocols have to face high challenges like link instability, node mobility, frequently changing topologies and energy consumption of node, due to these challenges routing becomes one of the core issues in MANETs. This Thesis mainly focuses on the reactive routing protocol such as Ad-Hoc On-Demand Distance Vector (AODV) routing protocol. Reliable and Efficient Reactive Routing Protocol (RERRP) for MANET has been proposed to reduce the link breakages between the moving nodes. This scheme selects a reliable route using Reliability Factor (RF); the RF considers Route Expiration Time and Hop Count to select a routing path with high reliability and have less number of hops. The simulation result shows that RERRP outperforms AODV and enhance the packet delivery fraction (PDF) by around 6% and reduces the network routing load (NRL) by around 30%. Broadcasting in MANET could cause serious redundancy, contention, and collision of the packets. A scheme, Effective Broadcast Control Routing Protocol (EBCRP) has been proposed for the controlling of broadcast storm problem in a MANET. The EBCRP is mainly selects the reliable node while controlling the redundant re-broadcast of the route request packet. The proposed algorithm EBCRP is an on-demand routing protocol, therefore AODV route discovery mechanism was selected as the base of this scheme. The analysis of the performance of EBCRP has revealed that the EBCRP have controlled the routing overhead significantly, reduces it around 70% and enhance the packet delivery by 13% as compared to AODV. An Energy Sensible and Route Stability Based Routing Protocol (ESRSBR) have also been proposed that mainly focuses on increasing the network lifetime with better packet delivery. The ESRSBR supports those nodes to participate in the data transfer that have more residual energy related to their neighbour nodes. The proposed protocol also keeps track of the stability of the links between the nodes. Finally, the ESRSBR selects those routes which consist of nodes that have more residual energy and have stable links. The comparative analysis of ESRSBR with AODV and recently proposed routing protocol called Link Stability and Energy Aware (LSEA) routing protocol revealed that the proposed protocol ESRSBR has a significantly affect the network lifetime, increases it around 10% and 13% as compared to LSEA and AODV protocols respectively. The ESRSBR also decreases the routing overhead by 22% over LSEA and by 38% over AODV.Higher Education Commission of Pakistan and NED University of Engineering and Technology Karach
Simulating Opportunistic Networks: Survey and Future Directions
(c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works[EN] Simulation is one of the most powerful tools we have for evaluating the performance of opportunistic networks (OppNets). In this paper, we focus on available tools and mod- els, compare their performance and precision and experimentally show the scalability of different simulators. We also perform a gap analysis of state-of-the-art OppNet simulations and sketch out possible further development and lines of research. This paper is targeted at students starting work and research in this area while also serving as a valuable source of information for experienced researchers.This work was supported in part by the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, in part by the Universidad Laica Eloy Alfaro de Manabi, and in part by the Secretaria Nacional de Educacion Superior, Ciencia, Tecnologia e Innovacion, Ecuador. (Corresponding author: Jens Dede.)Dede, J.; Förster, A.; Hernández-Orallo, E.; Herrera-Tapia, J.; Kuladinithi, K.; Kuppusamy, V.; Manzoni, P.... (2018). Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials. 20(2):1547-1573. https://doi.org/10.1109/COMST.2017.2782182S1547157320
Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults
A set of mobile robots is placed at points of an infinite line. The robots
are equipped with GPS devices and they may communicate their positions on the
line to a central authority. The collection contains an unknown subset of
"spies", i.e., byzantine robots, which are indistinguishable from the
non-faulty ones. The set of the non-faulty robots need to rendezvous in the
shortest possible time in order to perform some task, while the byzantine
robots may try to delay their rendezvous for as long as possible. The problem
facing a central authority is to determine trajectories for all robots so as to
minimize the time until the non-faulty robots have rendezvoused. The
trajectories must be determined without knowledge of which robots are faulty.
Our goal is to minimize the competitive ratio between the time required to
achieve the first rendezvous of the non-faulty robots and the time required for
such a rendezvous to occur under the assumption that the faulty robots are
known at the start. We provide a bounded competitive ratio algorithm, where the
central authority is informed only of the set of initial robot positions,
without knowing which ones or how many of them are faulty. When an upper bound
on the number of byzantine robots is known to the central authority, we provide
algorithms with better competitive ratios. In some instances we are able to
show these algorithms are optimal
Asynchronous Gathering of Robots with Finite Memory on a Circle under Limited Visibility
Consider a set of mobile entities, called robots, located and operating
on a continuous circle, i.e., all robots are initially in distinct locations on
a circle. The \textit{gathering} problem asks to design a distributed algorithm
that allows the robots to assemble at a point on the circle. Robots are
anonymous, identical, and homogeneous. Robots operate in a deterministic
Look-Compute-Move cycle within the circular path. Robots agree on the clockwise
direction. The robot's movement is rigid and they have limited visibility
, i.e., each robot can only see the points of the circle which is at an
angular distance strictly less than from the robot.
Di Luna \textit{et al}. [DISC'2020] provided a deterministic gathering
algorithm of oblivious and silent robots on a circle in semi-synchronous
(\textsc{SSync}) scheduler. Buchin \textit{et al}. [IPDPS(W)'2021] showed that,
under full visibility, robot model with \textsc{SSync}
scheduler is incomparable to robot (robots are silent but have
finite persistent memory) model with asynchronous (\textsc{ASync}) scheduler.
Under limited visibility, this comparison is still unanswered. So, this work
extends the work of Di Luna \textit{et al}. [DISC'2020] under \textsc{ASync}
scheduler for robot model
Industrial Wireless Sensor Networks
Wireless sensor networks are penetrating our daily lives, and they are starting to be deployed even in an industrial environment. The research on such industrial wireless sensor networks (IWSNs) considers more stringent requirements of robustness, reliability, and timeliness in each network layer. This Special Issue presents the recent research result on industrial wireless sensor networks. Each paper in this Special Issue has unique contributions in the advancements of industrial wireless sensor network research and we expect each paper to promote the relevant research and the deployment of IWSNs
Cyber Security of Critical Infrastructures
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
Data and the city – accessibility and openness. a cybersalon paper on open data
This paper showcases examples of bottom–up open data and smart city applications and identifies lessons for future such efforts. Examples include Changify, a neighbourhood-based platform for residents, businesses, and companies; Open Sensors, which provides APIs to help businesses, startups, and individuals develop applications for the Internet of Things; and Cybersalon’s Hackney Treasures. a location-based mobile app that uses Wikipedia entries geolocated in Hackney borough to map notable local residents. Other experiments with sensors and open data by Cybersalon members include Ilze Black and Nanda Khaorapapong's The Breather, a "breathing" balloon that uses high-end, sophisticated sensors to make air quality visible; and James Moulding's AirPublic, which measures pollution levels. Based on Cybersalon's experience to date, getting data to the people is difficult, circuitous, and slow, requiring an intricate process of leadership, public relations, and perseverance. Although there are myriad tools and initiatives, there is no one solution for the actual transfer of that data
- …