426 research outputs found

    A hybrid MAC protocol for emergency response wireless sensor networks

    Get PDF
    We introduce ER-MAC, a novel hybrid MAC protocol for emergency response wireless sensor networks. It tackles the most important emergency response requirements, such as autonomous switching from energy-efficient normal monitoring to emergency monitoring to cope with heavy traffic, robust adaptation to changes in the topology, packet prioritisation and fairness support. ER-MAC is designed as a hybrid of the TDMA and CSMA approaches, giving it the flexibility to adapt to traffic and topology changes. It adopts a TDMA approach to schedule collision-free slots. Nodes wake up for their scheduled slots, but otherwise switch into power-saving sleep mode. When an emergency occurs, nodes that participate in the emergency monitoring change their MAC behaviour by allowing contention in TDMA slots to achieve high delivery ratio and low latency. In its operation, ER-MAC prioritises high priority packets and sacrifices the delivery ratio and latency of the low priority ones. ER-MAC also guarantees fairness over the packets' sources and offers a synchronised and loose slot structure to allow nodes to join or leave the network. Simulations in ns-2 show the superiority of ER-MAC over Z-MAC, a state-of-the art hybrid MAC protocol, with higher delivery ratio, lower latency, and lower energy consumption. When a cluster of nodes in the network detects fire, nodes with ER-MAC deliver twice as many high priority emergency packets and four times faster than Z-MAC. This is achieved by ER-MAC with only one fifth as much energy as Z-MAC

    Fault-tolerant and QoS based Network Layer for Security Management

    Get PDF
    Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Adoption of vehicular ad hoc networking protocols by networked robots

    Get PDF
    This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan

    On Efficiency and Validity of Previous Homeplug MAC Performance Analysis

    Get PDF
    The Medium Access Control protocol of Power Line Communication networks (defined in Homeplug and IEEE 1901 standards) has received relatively modest attention from the research community. As a consequence, there is only one analytic model that complies with the standardised MAC procedures and considers unsaturated conditions. We identify two important limitations of the existing analytic model: high computational expense and predicted results just prior to the predicted saturation point do not correspond to long-term network performance. In this work, we present a simplification of the previously defined analytic model of Homeplug MAC able to substantially reduce its complexity and demonstrate that the previous performance results just before predicted saturation correspond to a transitory phase. We determine that the causes of previous misprediction are common analytical assumptions and the potential occurrence of a transitory phase, that we show to be of extremely long duration under certain circumstances. We also provide techniques, both analytical and experimental, to correctly predict long-term behaviour and analyse the effect of specific Homeplug/IEEE 1901 features on the magnitude of misprediction errors

    Delay models for static and adaptive persistent resource allocations in wireless systems

    Get PDF
    A variety of scheduling strategies can be employed in wireless systems to satisfy different system objectives and to cater for different traffic types. Static persistent resource allocations can be employed to transfer small M2M data packets efficiently compared to dynamic packet-by-packet scheduling, even when the M2M traffic model is non-deterministic. Recently, adaptive persistent allocations have been proposed in which the volume of allocated resources can change in sympathy with the instantaneous queue size at the M2M device and without expensive signaling on control channels. This increases the efficiency of resource usage at the expense of a (typically small) increased packet delay. In this paper, we derive a statistical model for the device queue size and packet delay in static and adaptive persistent allocations which can be used for any arrival process (i.e., Poisson or otherwise). The primary motivation is to assist with dimensioning of persistent allocations given a set of QoS requirements (such as a prescribed delay budget). We validate the statistical model via comparison with queue size and delay statistics obtained from a discrete event simulation of a persistent allocation system. The validation is performed for both exponential and gamma distributed packet inter-arrivals to demonstrate the model generality

    Dense clustered multi-channel wireless sensor cloud

    Get PDF
    Dense Wireless Sensor Network Clouds have an inherent issue of latency and packet drops with regards to data collection. Though there is extensive literature that tries to address these issues through either scheduling, channel contention or a combination of the two, the problem still largely exists. In this paper, a Clustered Multi-Channel Scheduling Protocol (CMSP) is designed that creates a Voronoi partition of a dense network. Each partition is assigned a channel, and a scheduling scheme is adopted to collect data within the Voronoi partitions. This scheme collects data from the partitions concurrently and then passes it to the base station. CMSP is compared using simulation with other multi-channel protocols like Tree-based Multi-Channel, Multi-Channel MAC and Multi-frequency Media Access Control for wireless sensor networks. Results indicate CMSP has higher throughput and data delivery ratio at a lower power consumption due to network partitioning and hierarchical scheduling that minimizes load on the network

    Development of a Quality of Service Framework for Multimedia Streaming Applications

    Get PDF
    By the year 2012, it is expected that the majority of all Internet traffic will be video content. Coupled with this is the increasing availability of Wireless Local Area Networks (WLANs) due to their ease of deployment, flexibility and reducing roll out costs. Unfortunately the contention based access mechanism utilised by IEEE 802.11 WLANs does not suit the non-uniform or bursty bandwidth profile of a video stream which can lead to a reduced quality of service (QoS) being experienced by the end-user. In 2005, the IEEE 802.11e protocol was ratified in an attempt to solve this emerging problem. It provides for an access prioritization mechanism based upon four separate traffic classes or access categories (ACs). Each AC is characterised by a set of access parameters that determine its level of access priority which is turn determines the amount of bandwidth available to it. Computer simulation studies have shown that AC prioritisation can yield significant improvements in the QoS delivered over a WLAN. However, these studies have been based upon the use of static access parameters for the ACs. In practice, this is not a viable solution owing to the dynamic and unpredictable nature of the operating conditions on WLANs. In this thesis, an experimental study of AC prioritisation based upon adaptive tuning of the access parameters is presented. This new approach to bandwidth provisioning for video streaming is shown to yield significant improvements in the QoS under a wide range of different operating conditions. For example, it is shown that by adaptively tuning the access control parameters in response to the network conditions, the number of video frames delivered that satisfy QoS requirements is more than doubled
    corecore