17,426 research outputs found

    Evaluation of routing protocol with multi-mobile sinks in WSNs using QoS and energy consumption parameters

    Get PDF
    An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols in two phases: The first phase is used to evaluate the route quality and networks’ energy consumption on small WSN with one mobile Sink Node (SN) and GMSs. The second phase, is used to evaluate the route quality and networks’ energy consumption on large network (four WSNs) with GMSs. The two phases are implementated by creating five sceneries via using NS2.3 simulator software. The implementation results of the proposed performance evaluation technique have demonstrated that SMSNDRP gives better networks’ energy consumption on small single network in comparison with KM-DGP. Also, it gives high quality route in large network that used four mobile SN, in contrast to KM-DGP that used sixteen mobile SNs. While in large network, it found that KM-DGP with sixteen mobile SNs gives better networks’ energy consumption in comparison with SMSNDRP with four mobile SNs

    Efficiency of integration between sensor networks and clouds

    Get PDF
    Numerous wireless sensor networks (WSN) applications include monitoring and controlling various conditions in the environment, industry, healthcare, medicine, military affairs, agriculture, etc. The life of sensor nodes largely depends on the power supply type, communication ability, energy storage capacity and energy management mechanisms. The collection and transmission of sensor data streams from sensor nodes lead to the depletion of their energy. At the same time, the storage and processing of this data require significant hardware resources. Integration between clouds and sensor networks is an ideal solution to the limited computing power of sensor networks, data storage and processing. One of the main challenges facing systems engineers is to choose the appropriate protocol for integrating sensor data into the cloud structure, taking into account specific system requirements. This paper presents an experimental study on the effectiveness of integration between sensor networks and the cloud, implemented through three protocols HTTP, MQTT and MQTT-SN. A model for studying the integration of sensor network - Cloud with the communication models for integration - request-response and publish- subscribe, implemented with HTTP, MQTT and MQTT-SN. The influence of the number of transmitted data packets from physical sensors to the cloud on the transmitted data delay to the cloud, the CPU and memory load was studied. After evaluating the results of sensor network and cloud integration experiments, the MQTT protocol is the most efficient in terms of data rate and power consumption

    Cooperative medium access control based on spectrum leasing

    No full text
    Based on cooperative spectrum leasing, a distributed “win–win” (WW) cooperative framework is designed to encourage the licensed source node (SN) to lease some part of its spectral resources to the unlicensed relay node (RN) for the sake of simultaneously improving the SN’s achievable rate and for reducing the energy consumption (EC). The potential candidate RNs carry out autonomous decisions concerning whether to contend for a cooperative transmission opportunity, which could dissipate some of their battery power, while conveying their traffic in light of their individual service requirements. Furthermore, a WW cooperative medium-access-control (MAC) protocol is designed to implement the proposed distributed WW cooperative framework. Simulation results demonstrate that our WW cooperative MAC protocol is capable of providing both substantial rate improvements and considerable energy savings for the cooperative spectrum leasing system

    Semi-persistent RRC protocol for machine-type communication devices in LTE networks

    Get PDF
    In this paper, we investigate the design of a radio resource control (RRC) protocol in the framework of long-term evolution (LTE) of the 3rd Generation Partnership Project regarding provision of low cost/complexity and low energy consumption machine-type communication (MTC), which is an enabling technology for the emerging paradigm of the Internet of Things. Due to the nature and envisaged battery-operated long-life operation of MTC devices without human intervention, energy efficiency becomes extremely important. This paper elaborates the state-of-the-art approaches toward addressing the challenge in relation to the low energy consumption operation of MTC devices, and proposes a novel RRC protocol design, namely, semi-persistent RRC state transition (SPRST), where the RRC state transition is no longer triggered by incoming traffic but depends on pre-determined parameters based on the traffic pattern obtained by exploiting the network memory. The proposed RRC protocol can easily co-exist with the legacy RRC protocol in the LTE. The design criterion of SPRST is derived and the signalling procedure is investigated accordingly. Based upon the simulation results, it is shown that the SPRST significantly reduces both the energy consumption and the signalling overhead while at the same time guarantees the quality of service requirements

    Relay selection methods for maximizing the lifetime of wireless sensor networks

    No full text
    Combined analytical and fuzzy techniques are proposed for improving the battery lifetime, performance, as well as energy efficiency of wireless sensor networks (WSNs) with the aid of efficient relay selection methods. We determine the best relay selection method by striking an appealing performance versus network lifetime trade-off. Furthermore, the beneficial regions of cooperation are determined considering asymmetric traffic scenarios, where relaying provides energy saving

    e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

    Full text link
    To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs. Although schemes are proposed to secure the IMD access, some issues are still open. First, pre-sharing a long-term key between a patient's IMD and a doctor's programmer is vulnerable since once the doctor's programmer is compromised, all of her patients suffer; establishing a temporary key by leveraging proximity gets rid of pre-shared keys, but as the approach lacks real authentication, it can be exploited by nearby adversaries or through man-in-the-middle attacks. Second, while prolonging the lifetime of IMDs is one of the most important design goals, few schemes explore to lower the communication and computation overhead all at once. Finally, how to safely record the commands issued by doctors for the purpose of forensics, which can be the last measure to protect the patients' rights, is commonly omitted in the existing literature. Motivated by these important yet open problems, we propose an innovative scheme e-SAFE, which significantly improves security and safety, reduces the communication overhead and enables IMD-access forensics. We present a novel lightweight compressive sensing based encryption algorithm to encrypt and compress the IMD data simultaneously, reducing the data transmission overhead by over 50% while ensuring high data confidentiality and usability. Furthermore, we provide a suite of protocols regarding device pairing, dual-factor authentication, and accountability-enabled access. The security analysis and performance evaluation show the validity and efficiency of the proposed scheme
    • 

    corecore