20,084 research outputs found
UAV-enabled wireless-powered Iot wireless sensor networks
Future massive internet of thing (IoT) networks will enable the vision of smart cities, where it is anticipated that a massive number of sensor devices, in the order of tens of millions devices, ubiquitously deployed to monitor the environment. Main challenges in such a network are how to improve the network lifetime and design an e cient data aggregation process. To improve the lifetime, using low-power passive sensor devices have recently shown great potential. Ambient backscattering is a novel technology which provides low-power long-range wireless communication expanding the network lifetime signi cantly. On the other hand, in order to collect the sensed data from sensor devices deployed over a wide area, unmanned aerial vehicles (UAVs) has been considered as a promising technology, by leveraging the UAV's high mobility and line-of-sight (LOS) dominated air-ground channels. The UAV can act as data aggregator collecting sensed data from all sensors. In this thesis, we consider medium-access control (MAC) policies for two sensor data collection scenarios. First, the objective is to collect individual sensor data from the eld. The challenge in this case is to determine how a large number of sensors should access the medium so that data aggregation process performed in a fast and reliable fashion. Utilizing conventional orthogonal medium access schemes (e.g., time-division vi multiple access (TDMA) and frequency-division multiple access (FDMA)), is highly energy consuming and spectrally ine cient. Hence, we employ non-orthogonal multiple access (NOMA) which is envisaged as an essential enabling technology for 5G wireless networks especially for uncoordinated transmissions. In Chapter 2, we develop a framework where the UAV is used as a replacement to conventional terrestrial data collectors in order to increase the e ciency of collecting data from a eld of passive backscatter sensors, and simultaneously it acts as a mobile RF carrier emitter to activate backscatter sensors. In the MAC layer, we employ uplink power-domain NOMA scheme to e ectively serve a large number of passive backscatter sensors. Our objective is to optimize the path, altitude, and beamwidth of the UAV such that the network throughput is maximized. In Chapter 3, we consider the scenario where there are a separate data collector and RF carrier emitter such that the former is a gateway on the ground and the latter is a single UAV hovering over the eld of backscatter sensors. Secondly, we consider a case where only a function of sensed data is of interest rather than individual sensor values. A new challenge arises where the problem is to design a communication policy to improve the accuracy of the estimated function. Recently, over-the-air computation (AirComp) has emerged to be a promising solution to enable merging computation and communication by utilizing the superposition property of wireless channels, when a function of measurements are desired rather than individual in massive IoT sensor networks. One of the key challenges in AirComp is to compensate the e ects of channel. Motivated by this, in Chapter 4, we propose a UAV assisted communication framework to tackle this problem by a simple to implement sampling-then-mapping mechanism
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
This chapter discusses the need of security and privacy protection mechanisms
in aggregation protocols used in wireless sensor networks (WSN). It presents a
comprehensive state of the art discussion on the various privacy protection
mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed
by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA
protocol and proposes a mechanism to plug that vulnerability. To demonstrate
the need of security in aggregation process, the chapter further presents
various threats in WSN aggregation mechanisms. A large number of existing
protocols for secure aggregation in WSN are discussed briefly and a protocol is
proposed for secure aggregation which can detect false data injected by
malicious nodes in a WSN. The performance of the protocol is also presented.
The chapter concludes while highlighting some future directions of research in
secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited
devices. The devices cooperate to monitor one or more physical phenomena within
an area of interest. WSNs operate as stochastic systems because of randomness
in the monitored environments. For long service time and low maintenance cost,
WSNs require adaptive and robust methods to address data exchange, topology
formulation, resource and power optimization, sensing coverage and object
detection, and security challenges. In these problems, sensor nodes are to make
optimized decisions from a set of accessible strategies to achieve design
goals. This survey reviews numerous applications of the Markov decision process
(MDP) framework, a powerful decision-making tool to develop adaptive algorithms
and protocols for WSNs. Furthermore, various solution methods are discussed and
compared to serve as a guide for using MDPs in WSNs
A File System Abstraction for Sense and Respond Systems
The heterogeneity and resource constraints of sense-and-respond systems pose
significant challenges to system and application development. In this paper, we
present a flexible, intuitive file system abstraction for organizing and
managing sense-and-respond systems based on the Plan 9 design principles. A key
feature of this abstraction is the ability to support multiple views of the
system via filesystem namespaces. Constructed logical views present an
application-specific representation of the network, thus enabling high-level
programming of the network. Concurrently, structural views of the network
enable resource-efficient planning and execution of tasks. We present and
motivate the design using several examples, outline research challenges and our
research plan to address them, and describe the current state of
implementation.Comment: 6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems,
Applications, and Services In conjunction with MobiSys '0
- …