341 research outputs found

    Energy efficient organization and modeling of wireless sensor networks

    Get PDF
    With their focus on applications requiring tight coupling with the physical world, as opposed to the personal communication focus of conventional wireless networks, wireless sensor networks pose significantly different design, implementation and deployment challenges. Wireless sensor networks can be used for environmental parameter monitoring, boundary surveillance, target detection and classification, and the facilitation of the decision making process. Multiple sensors provide better monitoring capabilities about parameters that present both spatial and temporal variances, and can deliver valuable inferences about the physical world to the end user. In this dissertation, the problem of the energy efficient organization and modeling of dynamic wireless sensor networks is investigated and analyzed. First, a connectivity distribution model that characterizes the corresponding sensor connectivity distribution for a multi-hop sensor networking system is introduced. Based on this model, the impact of node connectivity on system reliability is analyzed, and several tradeoffs among various sleeping strategies, node connectivity and power consumption, are evaluated. Motivated by the commonality encountered in the mobile sensor wireless networks, their self-organizing and random nature, and some concepts developed by the continuum theory, a model is introduced that gives a more realistic description of the various processes and their effects on a large-scale topology as the mobile wireless sensor network evolves. Furthermore, the issue of developing an energy-efficient organization and operation of a randomly deployed multi-hop sensor network, by extending the lifetime of the communication critical nodes and as a result the overall network\u27s operation, is considered and studied. Based on the data-centric characteristic of wireless sensor networks, an efficient Quality of Service (QoS)-constrained data aggregation and processing approach for distributed wireless sensor networks is investigated and analyzed. One of the key features of the proposed approach is that the task QoS requirements are taken into account to determine when and where to perform the aggregation in a distributed fashion, based on the availability of local only information. Data aggregation is performed on the fly at intermediate sensor nodes, while at the same time the end-to-end latency constraints are satisfied. An analytical model to represent the data aggregation and report delivery process in sensor networks, with specific delivery quality requirements in terms of the achievable end-to-end delay and the successful report delivery probability, is also presented. Based on this model, some insights about the impact on the achievable system performance, of the various designs parameters and the tradeoffs involved in the process of data aggregation and the proposed strategy, are gained. Furthermore, a localized adaptive data collection algorithm performed at the source nodes is developed that balances the design tradeoffs of delay, measurement accuracy and buffer overflow, for given QoS requirements. The performance of the proposed approach is analyzed and evaluated, through modeling and simulation, under different data aggregation scenarios and traffic loads. The impact of several design parameters and tradeoffs on various critical network and application related performance metrics, such as energy efficiency, network lifetime, end-to-end latency, and data loss are also evaluated and discussed

    Aggregation Pattern Transitions by Slightly Varying the Attractive/Repulsive Function

    Get PDF
    Among collective behaviors of biological swarms and flocks, the attractive/repulsive (A/R) functional links between particles play an important role. By slightly changing the cutoff distance of the A/R function, a drastic transition between two distinct aggregation patterns is observed. More precisely, a large cutoff distance yields a liquid-like aggregation pattern where the particle density decreases monotonously from the inside to the outwards within each aggregated cluster. Conversely, a small cutoff distance produces a crystal-like aggregation pattern where the distance between each pair of neighboring particles remains constant. Significantly, there is an obvious spinodal in the variance curve of the inter-particle distances along the increasing cutoff distances, implying a legible transition pattern between the liquid-like and crystal-like aggregations. This work bridges the aggregation phenomena of physical particles and swarming of organisms in nature upon revealing some common mechanism behind them by slightly varying their inter-individual attractive/repulsive functions, and may find its potential engineering applications, for example, in the formation design of multi-robot systems and unmanned aerial vehicles (UAVs)

    Quadri-dimensional approach for data analytics in mobile networks

    Get PDF
    The telecommunication market is growing at a very fast pace with the evolution of new technologies to support high speed throughput and the availability of a wide range of services and applications in the mobile networks. This has led to a need for communication service providers (CSPs) to shift their focus from network elements monitoring towards services monitoring and subscribers’ satisfaction by introducing the service quality management (SQM) and the customer experience management (CEM) that require fast responses to reduce the time to find and solve network problems, to ensure efficiency and proactive maintenance, to improve the quality of service (QoS) and the quality of experience (QoE) of the subscribers. While both the SQM and the CEM demand multiple information from different interfaces, managing multiple data sources adds an extra layer of complexity with the collection of data. While several studies and researches have been conducted for data analytics in mobile networks, most of them did not consider analytics based on the four dimensions involved in the mobile networks environment which are the subscriber, the handset, the service and the network element with multiple interface correlation. The main objective of this research was to develop mobile network analytics models applied to the 3G packet-switched domain by analysing data from the radio network with the Iub interface and the core network with the Gn interface to provide a fast root cause analysis (RCA) approach considering the four dimensions involved in the mobile networks. This was achieved by using the latest computer engineering advancements which are Big Data platforms and data mining techniques through machine learning algorithms.Electrical and Mining EngineeringM. Tech. (Electrical Engineering

    Identifying and Mitigating Security Risks in Multi-Level Systems-of-Systems Environments

    Get PDF
    In recent years, organisations, governments, and cities have taken advantage of the many benefits and automated processes Information and Communication Technology (ICT) offers, evolving their existing systems and infrastructures into highly connected and complex Systems-of-Systems (SoS). These infrastructures endeavour to increase robustness and offer some resilience against single points of failure. The Internet, Wireless Sensor Networks, the Internet of Things, critical infrastructures, the human body, etc., can all be broadly categorised as SoS, as they encompass a wide range of differing systems that collaborate to fulfil objectives that the distinct systems could not fulfil on their own. ICT constructed SoS face the same dangers, limitations, and challenges as those of traditional cyber based networks, and while monitoring the security of small networks can be difficult, the dynamic nature, size, and complexity of SoS makes securing these infrastructures more taxing. Solutions that attempt to identify risks, vulnerabilities, and model the topologies of SoS have failed to evolve at the same pace as SoS adoption. This has resulted in attacks against these infrastructures gaining prevalence, as unidentified vulnerabilities and exploits provide unguarded opportunities for attackers to exploit. In addition, the new collaborative relations introduce new cyber interdependencies, unforeseen cascading failures, and increase complexity. This thesis presents an innovative approach to identifying, mitigating risks, and securing SoS environments. Our security framework incorporates a number of novel techniques, which allows us to calculate the security level of the entire SoS infrastructure using vulnerability analysis, node property aspects, topology data, and other factors, and to improve and mitigate risks without adding additional resources into the SoS infrastructure. Other risk factors we examine include risks associated with different properties, and the likelihood of violating access control requirements. Extending the principals of the framework, we also apply the approach to multi-level SoS, in order to improve both SoS security and the overall robustness of the network. In addition, the identified risks, vulnerabilities, and interdependent links are modelled by extending network modelling and attack graph generation methods. The proposed SeCurity Risk Analysis and Mitigation Framework and principal techniques have been researched, developed, implemented, and then evaluated via numerous experiments and case studies. The subsequent results accomplished ascertain that the framework can successfully observe SoS and produce an accurate security level for the entire SoS in all instances, visualising identified vulnerabilities, interdependencies, high risk nodes, data access violations, and security grades in a series of reports and undirected graphs. The framework’s evolutionary approach to mitigating risks and the robustness function which can determine the appropriateness of the SoS, revealed promising results, with the framework and principal techniques identifying SoS topologies, and quantifying their associated security levels. Distinguishing SoS that are either optimally structured (in terms of communication security), or cannot be evolved as the applied processes would negatively impede the security and robustness of the SoS. Likewise, the framework is capable via evolvement methods of identifying SoS communication configurations that improve communication security and assure data as it traverses across an unsecure and unencrypted SoS. Reporting enhanced SoS configurations that mitigate risks in a series of undirected graphs and reports that visualise and detail the SoS topology and its vulnerabilities. These reported candidates and optimal solutions improve the security and SoS robustness, and will support the maintenance of acceptable and tolerable low centrality factors, should these recommended configurations be applied to the evaluated SoS infrastructure

    From Pillars to AI Technology-Based Forest Fire Protection Systems

    Get PDF
    The importance of forest environment in the perspective of the biodiversity as well as from the economic resources which forests enclose, is more than evident. Any threat posed to this critical component of the environment should be identified and attacked through the use of the most efficient available technological means. Early warning and immediate response to a fire event are critical in avoiding great environmental damages. Fire risk assessment, reliable detection and localization of fire as well as motion planning, constitute the most vital ingredients of a fire protection system. In this chapter, we review the evolution of the forest fire protection systems and emphasize on open issues and the improvements that can be achieved using artificial intelligence technology. We start our tour from the pillars which were for a long time period, the only possible method to oversee the forest fires. Then, we will proceed to the exploration of early AI systems and will end-up with nowadays systems that might receive multimodal data from satellites, optical and thermal sensors, smart phones and UAVs and use techniques that cover the spectrum from early signal processing algorithms to latest deep learning-based ones to achieving the ultimate goal

    Multi-faceted analytics of social events: Identification, representation and monitoring

    Get PDF
    corecore