3,391 research outputs found

    Autonomous discovery and repair of damage in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks in volatile environments may suffer damage, and connectivity must be restored. The repairing agent must discover surviving nodes and damage to the physical and radio environment as it moves around the sensor field to execute the repair. We compare two approaches, one which re-generates a full plan whenever it discovers new knowledge, and a second which attempts to minimise the required number of new radio nodes. We apply each approach with two different heuristics, one which attempts to minimise the cost of new radio nodes, and one which aims to minimise the travel distance. We conduct extensive simulation-based experiments, varying key parameters, including the level of damage suffered, and comparing directly with the published state-of-the-art. We quantify the relative performance of the different algorithms in achieving their objectives, and also measure the execution times to assess the impact on being able to make autonomous decisions in reasonable time

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Demonstration of robotic repair for wireless networks

    Get PDF
    This paper describes our demonstration of a network repair problem where a robot bridges a gap between two disconnected wireless nodes by searching for a good position and moving there to forward data between the two nodes. It serves to show the potential for our published solutions for automated network repair. A simple Adhoc network consists of two Intel Galileo Gen 2 nodes exchanging messages and an NXT Mindstorm robot with another Galileo on board healing the network connection between the two Galileos in the case the two get disconnected. The demo showcases a solution that employs mobile agents to serve as relays to bridge the connectivity gaps in the wireless network

    Proceedings of Abstracts Engineering and Computer Science Research Conference 2019

    Get PDF
    © 2019 The Author(s). This is an open-access work distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. For further details please see https://creativecommons.org/licenses/by/4.0/. Note: Keynote: Fluorescence visualisation to evaluate effectiveness of personal protective equipment for infection control is © 2019 Crown copyright and so is licensed under the Open Government Licence v3.0. Under this licence users are permitted to copy, publish, distribute and transmit the Information; adapt the Information; exploit the Information commercially and non-commercially for example, by combining it with other Information, or by including it in your own product or application. Where you do any of the above you must acknowledge the source of the Information in your product or application by including or linking to any attribution statement specified by the Information Provider(s) and, where possible, provide a link to this licence: http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/This book is the record of abstracts submitted and accepted for presentation at the Inaugural Engineering and Computer Science Research Conference held 17th April 2019 at the University of Hertfordshire, Hatfield, UK. This conference is a local event aiming at bringing together the research students, staff and eminent external guests to celebrate Engineering and Computer Science Research at the University of Hertfordshire. The ECS Research Conference aims to showcase the broad landscape of research taking place in the School of Engineering and Computer Science. The 2019 conference was articulated around three topical cross-disciplinary themes: Make and Preserve the Future; Connect the People and Cities; and Protect and Care

    Efficient Local Route Repair Mechanism for AODV protocol in MANETS

    Get PDF
    A Mobile Ad-hoc Network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. A mobile ad hoc network is an autonomous system of mobile nodes connected by a wireless link. A MANET does not have any access point or does not depend on any central administrator. In a large scale ad hoc networks, there is a continuous node mobility may cause radio links to be broken frequently. When there is a substantial increase in the degree of mobility of the wireless network more link errors are likely to occur. When this happens, route repair is typically performed to establish a new route. Such route repair mechanisms suffers with the problems like high control overhead and long packet delay making them inefficient due to frequent failures of intermediate connections in an end-to-end communication. When there is a breakage in the intermediate link, it is better to discover a new route locally without resorting to an end-to-end route discovery. Therefore to overcome from these consequence propose a new idea on local route repair (LRR) mechanism that the repair is confined to the surrounding area of the broken link is proposed to reduce the reaction time of recovery and the routing overhead. The route repair idea is implemented by improving repair mechanism in the widely accepted Ad hoc On-demand Distance Vector (AODV) protocol. The proposed version of AODV routing protocol with route repair scheme overcomes the disadvantages of its antecedent. Where as in the proposed version of AODV, nodes in the active path between source and destination act as a virtual source when link breakage occurs and there by the search process is continued till the link is formed to reach the original destination is reached. The improved local route repair mechanism is contributed with the anticipation of link breakage. This mechanism achieves better performance when compared to existing local repair mechanism

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Boundary node selection algorithms in WSNs

    Full text link
    Physical damage and/or node power exhaustion may lead to coverage holes in WSNs. Coverage holes can be directly detected by certain proximate nodes known as boundary nodes (B-nodes). Due to the sensor nodes' redundant deployment and autonomous fault detection, holes are surrounded by a margin of B-nodes (MB-nodes). If all B-nodes in the margin take part in the hole recovery processes, either by increasing their transmission power or by relocating towards region of interest (ROI), the probability of collision, interference, disconnection, and isolation may increase affecting the rest of the network's performance and QoS. Thus, distributed boundary node selection algorithms (BNS-Algorithms) are proposed to address these issues. BNS-algorithms allow B-nodes to self-select based on available 1-hop information extracted from nodes' simple geometrical and statistical features. Our results show that the performance of the proposed distributed BNS-algorithms approaches that of their centralized counterparts. © 2011 IEEE
    • …
    corecore