11,564 research outputs found

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Collision Free Navigation of a Multi-Robot Team for Intruder Interception

    Full text link
    In this report, we propose a decentralised motion control algorithm for the mobile robots to intercept an intruder entering (k-intercepting) or escaping (e-intercepting) a protected region. In continuation, we propose a decentralized navigation strategy (dynamic-intercepting) for a multi-robot team known as predators to intercept the intruders or in the other words, preys, from escaping a siege ring which is created by the predators. A necessary and sufficient condition for the existence of a solution of this problem is obtained. Furthermore, we propose an intelligent game-based decision-making algorithm (IGD) for a fleet of mobile robots to maximize the probability of detection in a bounded region. We prove that the proposed decentralised cooperative and non-cooperative game-based decision-making algorithm enables each robot to make the best decision to choose the shortest path with minimum local information. Then we propose a leader-follower based collision-free navigation control method for a fleet of mobile robots to traverse an unknown cluttered environment where is occupied by multiple obstacles to trap a target. We prove that each individual team member is able to traverse safely in the region, which is cluttered by many obstacles with any shapes to trap the target while using the sensors in some indefinite switching points and not continuously, which leads to saving energy consumption and increasing the battery life of the robots consequently. And finally, we propose a novel navigation strategy for a unicycle mobile robot in a cluttered area with moving obstacles based on virtual field force algorithm. The mathematical proof of the navigation laws and the computer simulations are provided to confirm the validity, robustness, and reliability of the proposed methods

    In-Network Outlier Detection in Wireless Sensor Networks

    Full text link
    To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy usage,(3) only uses single hop communication thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance using simulation with real sensor data streams. Our results demonstrate that our approach is accurate and imposes a reasonable communication load and level of power consumption.Comment: Extended version of a paper appearing in the Int'l Conference on Distributed Computing Systems 200

    A survey on gas leakage source detection and boundary tracking with wireless sensor networks

    Get PDF
    Gas leakage source detection and boundary tracking of continuous objects have received a significant research attention in the academic as well as the industries due to the loss and damage caused by toxic gas leakage in large-scale petrochemical plants. With the advance and rapid adoption of wireless sensor networks (WSNs) in the last decades, source localization and boundary estimation have became the priority of research works. In addition, an accurate boundary estimation is a critical issue due to the fast movement, changing shape, and invisibility of the gas leakage compared with the other single object detections. We present various gas diffusion models used in the literature that offer the effective computational approaches to measure the gas concentrations in the large area. In this paper, we compare the continuous object localization and boundary detection schemes with respect to complexity, energy consumption, and estimation accuracy. Moreover, this paper presents the research directions for existing and future gas leakage source localization and boundary estimation schemes with WSNs

    Self-healing in unattended wireless sensor networks

    Get PDF
    Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats. In particular, lack of pervasive tamper-resistant hardware results in sensors being easy targets for compromise. Having compromised a sensor, the adversary learns all the sensor secrets, allowing it to later encrypt/decrypt or authenticate messages on behalf of that sensor. This threat is particularly relevant in the novel unattended wireless sensor networks (UWSNs) scenario. UWSNs operate without constant supervision by a trusted sink. UWSN?s unattended nature and increased exposure to attacks prompts the need for special techniques geared towards regaining security after being compromised. In this article, we investigate cooperative self-healing in UWSNs and propose various techniques to allow unattended sensors to recover security after compromise. Our techniques provide seamless healing rates even against a very agile and powerful adversary. The effectiveness and viability of our proposed techniques are assessed by thorough analysis and supported by simulation results. Finally, we introduce some real-world issues affecting UWSN deployment and provide some solutions for them as well as a few open problems calling for further investigation

    Cognitive Radio Connectivity for Railway Transportation Networks

    Get PDF
    Reliable wireless networks for high speed trains require a significant amount of data communications for enabling safety features such as train collision avoidance and railway management. Cognitive radio integrates heterogeneous wireless networks that will be deployed in order to achieve intelligent communications in future railway systems. One of the primary technical challenges in achieving reliable communications for railways is the handling of high mobility environments involving trains, which includes significant Doppler shifts in the transmission as well as severe fading scenarios that makes it difficult to estimate wireless spectrum utilization. This thesis has two primary contributions: (1) The creation of a Heterogeneous Cooperative Spectrum Sensing (CSS) prototype system, and (2) the derivation of a Long Term Evolution for Railways (LTE-R) system performance analysis. The Heterogeneous CSS prototype system was implemented using Software-Defined Radios (SDRs) possessing different radio configurations. Both soft and hard-data fusion schemes were used in order to compare the signal source detection performance in real-time fading scenarios. For future smart railways, one proposed solution for enabling greater connectivity is to access underutilized spectrum as a secondary user via the dynamic spectrum access (DSA) paradigm. Since it will be challenging to obtain an accurate estimate of incumbent users via a single-sensor system within a real-world fading environment, the proposed cooperative spectrum sensing approach is employed instead since it can mitigate the effects of multipath and shadowing by utilizing the spatial and temporal diversity of a multiple radio network. Regarding the LTE-R contribution of this thesis, the performance analysis of high speed trains (HSTs) in tunnel environments would provide valuable insights with respect to the smart railway systems operating in high mobility scenarios in drastically impaired channels
    corecore