2,575 research outputs found

    End to End Delay and Energy Consumption in a Two Tier Cluster Hierarchical Wireless Sensor Networks

    Full text link
    [EN] In this work it is considered a circular Wireless Sensor Networks (WSN) in a planar structure with uniform distribution of the sensors and with a two-level hierarchical topology. At the lower level, a cluster configuration is adopted in which the sensed information is transferred from sensor nodes to a cluster head (CH) using a random access protocol (RAP). At CH level, CHs transfer information, hop-by-hop, ring-by-ring, towards to the sink located at the center of the sensed area using TDMA as MAC protocol. A Markovian model to evaluate the end-to-end (E2E) transfer delay is formulated. In addition to other results such as the well know energy hole problem, the model reveals that for a given radial distance between the CH and the sink, the transfer delay depends on the angular orientation between them. For instance, when two rings of CHs are deployed in the WSN area, the E2E delay of data packets generated at ring 2 and at the ¿west¿ side of the sink, is 20% higher than the corresponding E2E delay of data packets generated at ring 2 and at the ¿east¿ side of the sink. This asymmetry can be alleviated by rotating from time to time the allocation of temporary slots to CHs in the TDMA communication. Also, the energy consumption is evaluated and the numerical results show that for a WSN with a small coverage area, say a radio of 100 m, the energy saving is more significant when a small number of rings are deployed, perhaps none (a single cluster in which the sink acts as a CH). Conversely, topologies with a large number of rings, say 4 or 5, offer a better energy performance when the service WSN covers a large area, say radial distances greater than 400 m.The work of V. Casares-Giner (ITACA research institute) is partly supported by the Spanish national projects TIN2013-47272-C2-1-R and TEC2015-71932-REDT. The work of Tatiana Navas, Dolly Florez, and Tito R. Vargas H., and the collaboration between the two institutions, is supported by the Universidad Santo Tomas under Master Degree's research and academic projects.Casares-Giner, V.; Navas, TI.; Smith Flórez, D.; Vargas Hernández, TR. (2019). End to End Delay and Energy Consumption in a Two Tier Cluster Hierarchical Wireless Sensor Networks. Information. 10(4):1-29. https://doi.org/10.3390/info10040135S129104Sari, A. (2015). Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 08(03), 29-42. doi:10.4236/ijcns.2015.83004Haibo Zhang, & Hong Shen. (2009). Balancing Energy Consumption to Maximize Network Lifetime in Data-Gathering Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 20(10), 1526-1539. doi:10.1109/tpds.2008.252Wieselthier, J. E., Ephremides, A., & Michaels, L. A. (1989). An exact analysis and performance evaluation of framed ALOHA with capture. IEEE Transactions on Communications, 37(2), 125-137. doi:10.1109/26.20080Liu, W., Zhao, D., & Zhu, G. (2012). End-to-end delay and packet drop rate performance for a wireless sensor network with a cluster-tree topology. Wireless Communications and Mobile Computing, 14(7), 729-744. doi:10.1002/wcm.2230Alabdulmohsin, I., Hyadi, A., Afify, L., & Shihada, B. (2014). End-to-end delay analysis in wireless sensor networks with service vacation. 2014 IEEE Wireless Communications and Networking Conference (WCNC). doi:10.1109/wcnc.2014.6952872Park, J., Lee, S., & Yoo, S. (2015). Time slot assignment for convergecast in wireless sensor networks. Journal of Parallel and Distributed Computing, 83, 70-82. doi:10.1016/j.jpdc.2015.05.004Yang, X., Wang, L., Xie, J., & Zhang, Z. (2018). Energy Efficiency TDMA/CSMA Hybrid Protocol with Power Control for WSN. Wireless Communications and Mobile Computing, 2018, 1-7. doi:10.1155/2018/4168354Sgora, A., Vergados, D. J., & Vergados, D. D. (2015). A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks. ACM Computing Surveys, 47(3), 1-39. doi:10.1145/2677955Martin, E., Liu, L., Covington, M., Pesti, P., & Weber, M. (2010). Positioning Technologies in Location-Based Services. Location-Based Services Handbook, 1-45. doi:10.1201/9781420071986-c1PAL, A. (2010). Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges. Network Protocols and Algorithms, 2(1). doi:10.5296/npa.v2i1.279Kusdaryono, A., & Lee, K.-O. (2011). A Clustering Protocol with Mode Selection for Wireless Sensor Network. Journal of Information Processing Systems, 7(1), 29-42. doi:10.3745/jips.2011.7.1.029Donald, V. H. M. (1979). Advanced Mobile Phone Service: The Cellular Concept. Bell System Technical Journal, 58(1), 15-41. doi:10.1002/j.1538-7305.1979.tb02209.xCasares-Giner, V., Wuchner, P., Pacheco-Paramo, D., & de Meer, H. (2012). Combined contention and TDMA-based communication in wireless sensor networks. Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012. doi:10.1109/ngi.2012.6252158Ranganathan, P., & Nygard, K. (2010). Time Synchronization in Wireless Sensor Networks: A Survey. International Journal of UbiComp, 1(2), 92-102. doi:10.5121/iju.2010.1206Sahoo, A., & Chilukuri, S. (2010). DGRAM: A Delay Guaranteed Routing and MAC Protocol for Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 9(10), 1407-1423. doi:10.1109/tmc.2010.107Wu, Y.-C., Chaudhari, Q., & Serpedin, E. (2011). Clock Synchronization of Wireless Sensor Networks. IEEE Signal Processing Magazine, 28(1), 124-138. doi:10.1109/msp.2010.938757Casares-Giner, V., Sempere-Payá, V., & Todolí-Ferrandis, D. (2014). Framed ALOHA Protocol with FIFO-Blocking and LIFO-Push out Discipline. Network Protocols and Algorithms, 6(3), 82. doi:10.5296/npa.v6i3.5557Tello-Oquendo, L., Pla, V., Leyva-Mayorga, I., Martinez-Bauset, J., Casares-Giner, V., & Guijarro, L. (2019). Efficient Random Access Channel Evaluation and Load Estimation in LTE-A With Massive MTC. IEEE Transactions on Vehicular Technology, 68(2), 1998-2002. doi:10.1109/tvt.2018.2885333Adan, I. J. B. F., van Leeuwaarden, J. S. H., & Winands, E. M. M. (2006). On the application of Rouché’s theorem in queueing theory. Operations Research Letters, 34(3), 355-360. doi:10.1016/j.orl.2005.05.012Casares-Giner, V., Martinez-Bauset, J., & Portillo, C. (2019). Performance evaluation of framed slotted ALOHA with reservation packets and succesive interference cancelation for M2M networks. Computer Networks, 155, 15-30. doi:10.1016/j.comnet.2019.02.02

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments

    Get PDF
    Healthcare Monitoring Systems (HMSs) are promising to monitor patients in hospitals and elderly people living in Ambient Assisted Living environments using Wireless Sensor Networks. HMSs assist in monitoring chronic diseases such as Heart Attacks, High Blood Pressure and other cardiovascular diseases. Wearable and implanted devices are types of Body sensors that collect human health related data. Collected data is sent over Personal Area Networks (PANs). However, PANs are facing the challenge of increasing network traffic due to the increased number of IP-enabled devices connected in Healthcare Monitoring Systems to assist patients. ZigBee technology is an IEEE 802.15.4 standard designed to address network traffic issues in PANs. To route traffic, ZigBee network use ZigBee Tree Routing (ZTR) protocol. ZTR however suffers a challenge of network latency caused by end to end delay during packet forwarding. This paper is proposing a New Tree Routing Protocol (NTRP) for Healthcare Monitoring Systems to collect Heart Rate signals. NTRP uses Kruskal’s minimum spanning tree to find shortest routes on a ZigBee network which improves ZTR. Neighbor tables are implemented in NTRP instead of parent–child mechanism implemented in ZTR. To reduce end to end delay, NTRP groups’ nodes into clusters and the cluster heads use neighbor tables to forward heart rate data to the destination node. NS-2 simulation tool is used to evaluate NTRP performance

    DESIGN OF MOBILE DATA COLLECTOR BASED CLUSTERING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless Sensor Networks (WSNs) consisting of hundreds or even thousands of nodes, canbe used for a multitude of applications such as warfare intelligence or to monitor the environment. A typical WSN node has a limited and usually an irreplaceable power source and the efficient use of the available power is of utmost importance to ensure maximum lifetime of eachWSNapplication. Each of the nodes needs to transmit and communicate sensed data to an aggregation point for use by higher layer systems. Data and message transmission among nodes collectively consume the largest amount of energy available in WSNs. The network routing protocols ensure that every message reaches thedestination and has a direct impact on the amount of transmissions to deliver messages successfully. To this end, the transmission protocol within the WSNs should be scalable, adaptable and optimized to consume the least possible amount of energy to suite different network architectures and application domains. The inclusion of mobile nodes in the WSNs deployment proves to be detrimental to protocol performance in terms of nodes energy efficiency and reliable message delivery. This thesis which proposes a novel Mobile Data Collector based clustering routing protocol for WSNs is designed that combines cluster based hierarchical architecture and utilizes three-tier multi-hop routing strategy between cluster heads to base station by the help of Mobile Data Collector (MDC) for inter-cluster communication. In addition, a Mobile Data Collector based routing protocol is compared with Low Energy Adaptive Clustering Hierarchy and A Novel Application Specific Network Protocol for Wireless Sensor Networks routing protocol. The protocol is designed with the following in mind: minimize the energy consumption of sensor nodes, resolve communication holes issues, maintain data reliability, finally reach tradeoff between energy efficiency and latency in terms of End-to-End, and channel access delays. Simulation results have shown that the Mobile Data Collector based clustering routing protocol for WSNs could be easily implemented in environmental applications where energy efficiency of sensor nodes, network lifetime and data reliability are major concerns

    Energy-efficient routing protocols in heterogeneous wireless sensor networks

    Get PDF
    Sensor networks feature low-cost sensor devices with wireless network capability, limited transmit power, resource constraints and limited battery energy. The usage of cheap and tiny wireless sensors will allow very large networks to be deployed at a feasible cost to provide a bridge between information systems and the physical world. Such large-scale deployments will require routing protocols that scale to large network sizes in an energy-efficient way. This thesis addresses the design of such network routing methods. A classification of existing routing protocols and the key factors in their design (i.e., hardware, topology, applications) provides the motivation for the new three-tier architecture for heterogeneous networks built upon a generic software framework (GSF). A range of new routing algorithms have hence been developed with the design goals of scalability and energy-efficient performance of network protocols. They are respectively TinyReg - a routing algorithm based on regular-graph theory, TSEP - topological stable election protocol, and GAAC - an evolutionary algorithm based on genetic algorithms and ant colony algorithms. The design principle of our routing algorithms is that shortening the distance between the cluster-heads and the sink in the network, will minimise energy consumption in order to extend the network lifetime, will achieve energy efficiency. Their performance has been evaluated by simulation in an extensive range of scenarios, and compared to existing algorithms. It is shown that the newly proposed algorithms allow long-term continuous data collection in large networks, offering greater network longevity than existing solutions. These results confirm the validity of the GSF as an architectural approach to the deployment of large wireless sensor networks

    A Sybil attack detection scheme for a forest wildfire monitoring application

    Full text link
    © 2016 Elsevier B.V. Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in human-inaccessible terrains to monitor and collect time-critical and delay-sensitive events. There have been several studies on the use of WSN in different applications. All such studies have mainly focused on Quality of Service (QoS) parameters such as delay, loss, jitter, etc. of the sensed data. Security provisioning is also an important and challenging task lacking in all previous studies. In this paper, we propose a Sybil attack detection scheme for a cluster-based hierarchical network mainly deployed to monitor forest wildfire. We propose a two-tier detection scheme. Initially, Sybil nodes and their forged identities are detected by high-energy nodes. However, if one or more identities of a Sybil node sneak through the detection process, they are ultimately detected by the two base stations. After Sybil attack detection, an optimal percentage of cluster heads are elected and each one is informed using nomination packets. Each nomination packet contains the identity of an elected cluster head and an end user's specific query for data collection within a cluster. These queries are user-centric, on-demand and adaptive to an end user requirement. The undetected identities of Sybil nodes reside in one or more clusters. Their goal is to transmit high false-negative alerts to an end user for diverting attention to those geographical regions which are less vulnerable to a wildfire. Our proposed approach has better network lifetime due to efficient sleep–awake scheduling, higher detection rate and low false-negative rate

    Data Aggregation and its Impact on Overall QoS of Lossy Wireless Sensor Network: A Survey

    Get PDF
    In Wireless sensor network, packet loss due to buffer overflow of sensor nodes and the delay caused due to retransmission of that lost packet is a major problem. So a big challenge is to improve the delay performance along with reliability of WSN. The goal of the proposed system is to broadcast sensed data to focus on delay performance. Also congestion at collector node due to duplicate sensed data in network is reduced by data aggregation, for this we compute a function at the collector node from the information gathered by spatially distributed sensor nodes. Because wireless sensor network applications require various levels of communication reliability (CR), the data transmission should satisfy the desired CR of the applications. Here, we propose a flexible loss recovery mechanism (called Active Caching) for sensor network applications with various CRs. The proposed scheme caches data packets at intermediate nodes over routing paths computed by CR to retransmit lost packets during multi-hop transmissions. DOI: 10.17762/ijritcc2321-8169.150516

    Routing protocols for self-organizing hierarchical ad-hoc wireless networks

    Get PDF
    —A novel self-organizing hierarchical architecture is proposed for improving the scalability properties of adhoc wireless networks. This paper focuses on the design and evaluation of routing protocols applicable to this class of hierarchical ad-hoc networks. The performance of a hierarchical network with the popular dynamic source routing (DSR) protocol is evaluated and compared with that of a conventional “flat” ad-hoc networks using an ns-2 simulation model. The results for an example sensor network scenario show significant capacity increases with the hierarchical architecture (∼4:1). Alternative routing metrics that account for energy efficiency are also considered briefly, and the effect on user performance and system capacity are given for a specific example

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper
    corecore