4,638 research outputs found

    An objective based classification of aggregation techniques for wireless sensor networks

    No full text
    Wireless Sensor Networks have gained immense popularity in recent years due to their ever increasing capabilities and wide range of critical applications. A huge body of research efforts has been dedicated to find ways to utilize limited resources of these sensor nodes in an efficient manner. One of the common ways to minimize energy consumption has been aggregation of input data. We note that every aggregation technique has an improvement objective to achieve with respect to the output it produces. Each technique is designed to achieve some target e.g. reduce data size, minimize transmission energy, enhance accuracy etc. This paper presents a comprehensive survey of aggregation techniques that can be used in distributed manner to improve lifetime and energy conservation of wireless sensor networks. Main contribution of this work is proposal of a novel classification of such techniques based on the type of improvement they offer when applied to WSNs. Due to the existence of a myriad of definitions of aggregation, we first review the meaning of term aggregation that can be applied to WSN. The concept is then associated with the proposed classes. Each class of techniques is divided into a number of subclasses and a brief literature review of related work in WSN for each of these is also presented

    An Energy Efficient, Load Balancing, and Reliable Routing Protocol for Wireless Sensor Networks

    Get PDF
    AN ENERGY EFFICIENT, LOAD BALANCING, AND RELIABLE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS by Kamil Samara The University of Wisconsin-Milwaukee, 2016 Under the Supervision of Professor Hossein Hosseini The Internet of Things (IoT) is shaping the future of Computer Networks and Computing in general, and it is gaining ground very rapidly. The whole idea has originated from the pervasive presence of a variety of things or objects equipped with the internet connectivity. These devices are becoming cheap and ubiquitous, at the same time more powerful and smaller with a variety of onboard sensors. All these factors with the availability of unique addressing, provided by the IPv6, has made these devices capable of collaborating with each other to accomplish common tasks. Mobile AdHoc Networks (MANETS) and Wireless Sensor Networks (WSN) in particular play a major role in the backbone of IoT. Routing in Wireless Sensor Networks (WSN) has been a challenging task for researchers in the last several years because the conventional routing algorithms, such as the ones used in IP-based networks, are not well suited for WSNs because these conventional routing algorithms heavily rely on large routing tables that need to be updated periodically. The size of a WSN could range from hundreds to tens of thousands of nodes, which will make routing tables’ size very large. Managing large routing tables is not feasible in WSNs due to the limitations of resources. The directed diffusion algorithm is a well-known routing algorithm for Wireless Sensor Networks (WSNs). The directed diffusion algorithm saves energy by sending data packets hop by hop and by enforcing paths to avoid flooding. The directed diffusion algorithm does not attempt to find the best or healthier paths (healthier paths are paths that use less total energy than others and avoid critical nodes). Hence the directed diffusion algorithm could be improved by enforcing the use of healthier paths, which will result in less power consumption. We propose an efficient routing protocol for WSNs that gives preference to the healthier paths based on the criteria of the total energy available on the path, the path length, and the avoidance of critical nodes. This preference is achieved by collecting information about the available paths and then using non-incremental machine learning to enforce path(s) that meet our criteria. In addition to preferring healthier paths, our protocol provides Quality of Service (QoS) features through the implementation of differentiated services, where packets are classified as critical, urgent, and normal, as defined later in this work. Based on this classification, different packets are assigned different priority and resources. This process results in higher reliability for the delivery of data, and shorter delivery delay for the urgent and critical packets. This research includes the implementation of our protocol using a Castalia Simulator. Our simulation compares the performance of our protocol with that of the directed diffusion algorithm. The comparison was made on the following aspects: • Energy consumption • Reliable delivery • Load balancing • Network lifetime • Quality of service Simulation results did not point out a significant difference in performance between the proposed protocol and the directed diffusion algorithm in smaller networks. However, when the network’s size started to increase the results showed better performance by the proposed protocol

    An energy efficient routing scheme by using GPS information for wireless sensor networks

    Get PDF
    In the process of transmission in wireless sensor networks (WSN), a vital problem is that a centre region close to the sink will form in which sensors have to cost vast amount of energy. To communicate in an energy-efficient manner, compressed sensing (CS) has been employed gradually. However, the performance of plain CS is significantly dependant on the specific data gathering strategy in practice. In this paper, we propose an energy-efficient data gathering scheme based on regionalisation CS. Subsequently, advanced methods for practical applications are considered. Experiments reveal that our scheme outperforms distributed CS, the straight forward and the mixed schemes by comparing different parameters of the data package, and the considered methods also guarantee its feasibility.N/

    An Energy Driven Architecture for Wireless Sensor Networks

    Full text link
    Most wireless sensor networks operate with very limited energy sources-their batteries, and hence their usefulness in real life applications is severely constrained. The challenging issues are how to optimize the use of their energy or to harvest their own energy in order to lengthen their lives for wider classes of application. Tackling these important issues requires a robust architecture that takes into account the energy consumption level of functional constituents and their interdependency. Without such architecture, it would be difficult to formulate and optimize the overall energy consumption of a wireless sensor network. Unlike most current researches that focus on a single energy constituent of WSNs independent from and regardless of other constituents, this paper presents an Energy Driven Architecture (EDA) as a new architecture and indicates a novel approach for minimising the total energy consumption of a WS

    A Novel Multiplex Network-based Sensor Information Fusion Model and Its Application to Industrial Multiphase Flow System

    Get PDF
    This work was supported by National Natural Science Foundation of China under Grant No. 61473203, and the Natural Science Foundation of Tianjin, China under Grant No. 16JCYBJC18200.Peer reviewedPostprin

    Effect of steel fibre volume fraction on thermal performance of lightweight foamed mortar (LFM) at ambient temperature

    Get PDF
    Lightweight foamed mortar (LFM) has grow into utmost commercial building material in the construction industry for non-structural and semi-structural applications owing to its reduced self-weight, flowability, stability and excellent thermal insulation properties. Hence, this study was conducted with the aims to develop an alternative for conventional concrete bricks and blocks for non-structural and semi-structural applications of masonry. Lightweight foamed mortar (LFM) is either a cement paste or mortar, relegated as lightweight concrete, in which suitable foaming agent entraps the air-voids in mortar. It therefore has a wide range of applications such as material for wall blocks or panels, floor & roof screeds, trench reinstatement, road foundations and voids filling. This research focuses on experimental investigation of thermal properties of LFM with inclusion of relatively low volume fraction (0.2% and 0.4%) of steel fibre at ambient temperature. There are three parameters will be scrutinized such as thermal conductivity, thermal diffusivity as well as the specific heat capacity. There are two densities of 600kg/m3 and 1200kg/m3 had been cast and tested. The mix design proportion of LFM used for cement, aggregate and water ratio was 1: 1.5:0.45. The experimental results had indicated that the thermal conductivity, thermal diffusivity and specific heat value slightly higher than control mix due to the addition of steel fibres. For instance, thermal conductivity, diffusivity and specific heat of 600 kg/m3 density control mix were 0.212W/mK, 0.477mm2/s and 545 J/kgâ—¦C respectively. When 0.2% volume fraction of steel fiber was added in the mix of 600 kg/m3 density, the value of thermal conductivity, diffusivity and specific heat were increased to 0.235W/mK, 0.583mm2/s and 578 J/kgâ—¦C correspondingly. This is due to the characteristic of the steel fibre application in which steel fibre is good as heat conductor and excellent in absorbing heat. Therefore there is a potential of utilizing steel fiber in cement based material like LFM for components that needs excellent heat absorption capacity

    A network access control framework for 6LoWPAN networks

    Get PDF
    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes
    • …
    corecore