7,266 research outputs found
Adaptive Distributed Resource Allocation in Wireless Sensor Networks
Wireless sensor networks have emerged as a promising technology for a wide range of important applications. A major research challenge in this field is the distributed resource allocation problem, which concerns how the limited resources in a wireless sensor network should be allocated or scheduled to minimize costs and maximize the network capability.
In this paper, we propose the Adaptive Distributed Resource Allocation (ADRA) scheme, an adaptive approach for distributed resource allocation in wireless sensor networks. Our scheme specifies relatively simple local actions to be performed by individual sensor nodes in a wireless sensor network for mode management. Each node adapts its operation over time in response to the status and feedback of its neighboring nodes. Desirable global behavior results from the local interactions between nodes.
We study the effectiveness of the ADRA scheme for a realistic application scenario; namely, the sensor mode management in an acoustic sensor network to track vehicle movement. We evaluated the scheme via simulations, and also prototyped it using the Crossbow MICA2 motes. Our simulation and hardware implementation results indicate that the ADRA scheme provides a good tradeoff between performance objectives such as coverage area, power consumption, and network lifetime.Singapore-MIT Alliance (SMA
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
Deterministic Bayesian Information Fusion and the Analysis of its Performance
This paper develops a mathematical and computational framework for analyzing
the expected performance of Bayesian data fusion, or joint statistical
inference, within a sensor network. We use variational techniques to obtain the
posterior expectation as the optimal fusion rule under a deterministic
constraint and a quadratic cost, and study the smoothness and other properties
of its classification performance. For a certain class of fusion problems, we
prove that this fusion rule is also optimal in a much wider sense and satisfies
strong asymptotic convergence results. We show how these results apply to a
variety of examples with Gaussian, exponential and other statistics, and
discuss computational methods for determining the fusion system's performance
in more general, large-scale problems. These results are motivated by studying
the performance of fusing multi-modal radar and acoustic sensors for detecting
explosive substances, but have broad applicability to other Bayesian decision
problems
Distributed detection, localization, and estimation in time-critical wireless sensor networks
In this thesis the problem of distributed detection, localization, and estimation
(DDLE) of a stationary target in a fusion center (FC) based wireless sensor network
(WSN) is considered. The communication process is subject to time-critical
operation, restricted power and bandwidth (BW) resources operating over a shared
communication channel Buffering from Rayleigh fading and phase noise. A novel algorithm
is proposed to solve the DDLE problem consisting of two dependent stages:
distributed detection and distributed estimation. The WSN performs distributed
detection first and based on the global detection decision the distributed estimation
stage is performed. The communication between the SNs and the FC occurs over a
shared channel via a slotted Aloha MAC protocol to conserve BW.
In distributed detection, hard decision fusion is adopted, using the counting
rule (CR), and sensor censoring in order to save power and BW. The effect of
Rayleigh fading on distributed detection is also considered and accounted for by
using distributed diversity combining techniques where the diversity combining is
among the sensor nodes (SNs) in lieu of having the processing done at the FC.
Two distributed techniques are proposed: the distributed maximum ratio combining
(dMRC) and the distributed Equal Gain Combining (dEGC). Both techniques show
superior detection performance when compared to conventional diversity combining
procedures that take place at the FC.
In distributed estimation, the segmented distributed localization and estimation
(SDLE) framework is proposed. The SDLE enables efficient power and BW
processing. The SOLE hinges on the idea of introducing intermediate parameters
that are estimated locally by the SNs and transmitted to the FC instead of the
actual measurements. This concept decouples the main problem into a simpler set
of local estimation problems solved at the SNs and a global estimation problem
solved at the FC. Two algorithms are proposed for solving the local problem: a
nonlinear least squares (NLS) algorithm using the variable projection (VP) method
and a simpler gird search (GS) method. Also, Four algorithms are proposed to solve
the global problem: NLS, GS, hyperspherical intersection method (HSI), and robust
hyperspherical intersection (RHSI) method. Thus, the SDLE can be solved through
local and global algorithm combinations. Five combinations are tied: NLS2 (NLS-NLS),
NLS-HSI, NLS-RHSI, GS2, and GS-N LS. It turns out that the last algorithm
combination delivers the best localization and estimation performance. In fact , the
target can be localized with less than one meter error.
The SNs send their local estimates to the FC over a shared channel using the
slotted-Aloha MAC protocol, which suits WSNs since it requires only one channel.
However, Aloha is known for its relatively high medium access or contention delay
given the medium access probability is poorly chosen. This fact significantly
hinders the time-critical operation of the system. Hence, multi-packet reception
(MPR) is used with slotted Aloha protocol, in which several channels are used for
contention. The contention delay is analyzed for slotted Aloha with and without
MPR. More specifically, the mean and variance have been analytically computed
and the contention delay distribution is approximated. Having theoretical expressions
for the contention delay statistics enables optimizing both the medium access
probability and the number of MPR channels in order to strike a trade-off between
delay performance and complexity
USING PROBABILISTIC GRAPHICAL MODELS TO DRAW INFERENCES IN SENSOR NETWORKS WITH TRACKING APPLICATIONS
Sensor networks have been an active research area in the past decade due to the variety of their applications. Many research studies have been conducted to solve the problems underlying the middleware services of sensor networks, such as self-deployment, self-localization, and synchronization. With the provided middleware services, sensor networks have grown into a mature technology to be used as a detection and surveillance paradigm for many real-world applications.
The individual sensors are small in size. Thus, they can be deployed in areas with limited space to make unobstructed measurements in locations where the traditional centralized systems would have trouble to reach. However, there are a few physical limitations to sensor networks, which can prevent sensors from performing at their maximum potential. Individual sensors have limited power supply, the wireless band can get very cluttered when multiple sensors try to transmit at the same time. Furthermore, the individual sensors have limited communication range, so the network may not have a 1-hop communication topology and routing can be a problem in many cases.
Carefully designed algorithms can alleviate the physical limitations of sensor networks, and allow them to be utilized to their full potential. Graphical models are an intuitive choice for designing sensor network algorithms. This thesis focuses on a classic application in sensor networks, detecting and tracking of targets. It develops feasible inference techniques for sensor networks using statistical graphical model inference, binary sensor detection, events isolation and dynamic clustering. The main strategy is to use only binary data for rough global inferences, and then dynamically form small scale clusters around the target for detailed computations. This framework is then extended to network topology manipulation, so that the framework developed can be applied to tracking in different network topology settings.
Finally the system was tested in both simulation and real-world environments. The simulations were performed on various network topologies, from regularly distributed networks to randomly distributed networks. The results show that the algorithm performs well in randomly distributed networks, and hence requires minimum deployment effort. The experiments were carried out in both corridor and open space settings. A in-home falling detection system was simulated with real-world settings, it was setup with 30 bumblebee radars and 30 ultrasonic sensors driven by TI EZ430-RF2500 boards scanning a typical 800 sqft apartment. Bumblebee radars are calibrated to detect the falling of human body, and the two-tier tracking algorithm is used on the ultrasonic sensors to track the location of the elderly people
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
- …