2,961 research outputs found
Selecting source image sensor nodes based on 2-hop information to improve image transmissions to mobile robot sinks in search \& rescue operations
We consider Robot-assisted Search Rescue operations enhanced with some
fixed image sensor nodes capable of capturing and sending visual information to
a robot sink. In order to increase the performance of image transfer from image
sensor nodes to the robot sinks we propose a 2-hop neighborhood
information-based cover set selection to determine the most relevant image
sensor nodes to activate. Then, in order to be consistent with our proposed
approach, a multi-path extension of Greedy Perimeter Stateless Routing (called
T-GPSR) wherein routing decisions are also based on 2-hop neighborhood
information is proposed. Simulation results show that our proposal reduces
packet losses, enabling fast packet delivery and higher visual quality of
received images at the robot sink
Distance Aware Relaying Energy-efficient: DARE to Monitor Patients in Multi-hop Body Area Sensor Networks
In recent years, interests in the applications of Wireless Body Area Sensor
Network (WBASN) is noticeably developed. WBASN is playing a significant role to
get the real time and precise data with reduced level of energy consumption. It
comprises of tiny, lightweight and energy restricted sensors, placed in/on the
human body, to monitor any ambiguity in body organs and measure various
biomedical parameters. In this study, a protocol named Distance Aware Relaying
Energy-efficient (DARE) to monitor patients in multi-hop Body Area Sensor
Networks (BASNs) is proposed. The protocol operates by investigating the ward
of a hospital comprising of eight patients, under different topologies by
positioning the sink at different locations or making it static or mobile.
Seven sensors are attached to each patient, measuring different parameters of
Electrocardiogram (ECG), pulse rate, heart rate, temperature level, glucose
level, toxins level and motion. To reduce the energy consumption, these sensors
communicate with the sink via an on-body relay, affixed on the chest of each
patient. The body relay possesses higher energy resources as compared to the
body sensors as, they perform aggregation and relaying of data to the sink
node. A comparison is also conducted conducted with another protocol of BAN
named, Mobility-supporting Adaptive Threshold-based Thermal-aware
Energy-efficient Multi-hop ProTocol (M-ATTEMPT). The simulation results show
that, the proposed protocol achieves increased network lifetime and efficiently
reduces the energy consumption, in relative to M-ATTEMPT protocol.Comment: IEEE 8th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited
devices. The devices cooperate to monitor one or more physical phenomena within
an area of interest. WSNs operate as stochastic systems because of randomness
in the monitored environments. For long service time and low maintenance cost,
WSNs require adaptive and robust methods to address data exchange, topology
formulation, resource and power optimization, sensing coverage and object
detection, and security challenges. In these problems, sensor nodes are to make
optimized decisions from a set of accessible strategies to achieve design
goals. This survey reviews numerous applications of the Markov decision process
(MDP) framework, a powerful decision-making tool to develop adaptive algorithms
and protocols for WSNs. Furthermore, various solution methods are discussed and
compared to serve as a guide for using MDPs in WSNs
Wireless Power Transfer and Data Collection in Wireless Sensor Networks
In a rechargeable wireless sensor network, the data packets are generated by
sensor nodes at a specific data rate, and transmitted to a base station.
Moreover, the base station transfers power to the nodes by using Wireless Power
Transfer (WPT) to extend their battery life. However, inadequately scheduling
WPT and data collection causes some of the nodes to drain their battery and
have their data buffer overflow, while the other nodes waste their harvested
energy, which is more than they need to transmit their packets. In this paper,
we investigate a novel optimal scheduling strategy, called EHMDP, aiming to
minimize data packet loss from a network of sensor nodes in terms of the nodes'
energy consumption and data queue state information. The scheduling problem is
first formulated by a centralized MDP model, assuming that the complete states
of each node are well known by the base station. This presents the upper bound
of the data that can be collected in a rechargeable wireless sensor network.
Next, we relax the assumption of the availability of full state information so
that the data transmission and WPT can be semi-decentralized. The simulation
results show that, in terms of network throughput and packet loss rate, the
proposed algorithm significantly improves the network performance.Comment: 30 pages, 8 figures, accepted to IEEE Transactions on Vehicular
Technolog
Snapshots of the EYES project
The EYES project (IST-2001-34734) is a three years European research project on self-organizing and collaborative energy-efficient sensor networks. It addresses the convergence of distributed information processing, wireless communications, and mobile computing. The goal of the project is to develop the architecture and the technology which enables the creation of a new generation of sensors that can effectively network together so as to provide a flexible platform for the support of a large variety of mobile sensor network applications. This paper provides a broad overview of the EYES project and highlights some approaches and results of the architecture
Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence
Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks
- …