20,084 research outputs found

    UAV-enabled wireless-powered Iot wireless sensor networks

    Get PDF
    Future massive internet of thing (IoT) networks will enable the vision of smart cities, where it is anticipated that a massive number of sensor devices, in the order of tens of millions devices, ubiquitously deployed to monitor the environment. Main challenges in such a network are how to improve the network lifetime and design an e cient data aggregation process. To improve the lifetime, using low-power passive sensor devices have recently shown great potential. Ambient backscattering is a novel technology which provides low-power long-range wireless communication expanding the network lifetime signi cantly. On the other hand, in order to collect the sensed data from sensor devices deployed over a wide area, unmanned aerial vehicles (UAVs) has been considered as a promising technology, by leveraging the UAV's high mobility and line-of-sight (LOS) dominated air-ground channels. The UAV can act as data aggregator collecting sensed data from all sensors. In this thesis, we consider medium-access control (MAC) policies for two sensor data collection scenarios. First, the objective is to collect individual sensor data from the eld. The challenge in this case is to determine how a large number of sensors should access the medium so that data aggregation process performed in a fast and reliable fashion. Utilizing conventional orthogonal medium access schemes (e.g., time-division vi multiple access (TDMA) and frequency-division multiple access (FDMA)), is highly energy consuming and spectrally ine cient. Hence, we employ non-orthogonal multiple access (NOMA) which is envisaged as an essential enabling technology for 5G wireless networks especially for uncoordinated transmissions. In Chapter 2, we develop a framework where the UAV is used as a replacement to conventional terrestrial data collectors in order to increase the e ciency of collecting data from a eld of passive backscatter sensors, and simultaneously it acts as a mobile RF carrier emitter to activate backscatter sensors. In the MAC layer, we employ uplink power-domain NOMA scheme to e ectively serve a large number of passive backscatter sensors. Our objective is to optimize the path, altitude, and beamwidth of the UAV such that the network throughput is maximized. In Chapter 3, we consider the scenario where there are a separate data collector and RF carrier emitter such that the former is a gateway on the ground and the latter is a single UAV hovering over the eld of backscatter sensors. Secondly, we consider a case where only a function of sensed data is of interest rather than individual sensor values. A new challenge arises where the problem is to design a communication policy to improve the accuracy of the estimated function. Recently, over-the-air computation (AirComp) has emerged to be a promising solution to enable merging computation and communication by utilizing the superposition property of wireless channels, when a function of measurements are desired rather than individual in massive IoT sensor networks. One of the key challenges in AirComp is to compensate the e ects of channel. Motivated by this, in Chapter 4, we propose a UAV assisted communication framework to tackle this problem by a simple to implement sampling-then-mapping mechanism

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

    Get PDF
    This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks (WSN). It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA protocol and proposes a mechanism to plug that vulnerability. To demonstrate the need of security in aggregation process, the chapter further presents various threats in WSN aggregation mechanisms. A large number of existing protocols for secure aggregation in WSN are discussed briefly and a protocol is proposed for secure aggregation which can detect false data injected by malicious nodes in a WSN. The performance of the protocol is also presented. The chapter concludes while highlighting some future directions of research in secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    A File System Abstraction for Sense and Respond Systems

    Full text link
    The heterogeneity and resource constraints of sense-and-respond systems pose significant challenges to system and application development. In this paper, we present a flexible, intuitive file system abstraction for organizing and managing sense-and-respond systems based on the Plan 9 design principles. A key feature of this abstraction is the ability to support multiple views of the system via filesystem namespaces. Constructed logical views present an application-specific representation of the network, thus enabling high-level programming of the network. Concurrently, structural views of the network enable resource-efficient planning and execution of tasks. We present and motivate the design using several examples, outline research challenges and our research plan to address them, and describe the current state of implementation.Comment: 6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems, Applications, and Services In conjunction with MobiSys '0
    corecore