890 research outputs found

    A Comprehensive Survey of Potential Game Approaches to Wireless Networks

    Get PDF
    Potential games form a class of non-cooperative games where unilateral improvement dynamics are guaranteed to converge in many practical cases. The potential game approach has been applied to a wide range of wireless network problems, particularly to a variety of channel assignment problems. In this paper, the properties of potential games are introduced, and games in wireless networks that have been proven to be potential games are comprehensively discussed.Comment: 44 pages, 6 figures, to appear in IEICE Transactions on Communications, vol. E98-B, no. 9, Sept. 201

    Learning automata-based solution to target coverage problem for directional sensor networks with adjustable sensing ranges

    Get PDF
    The extensive applications of directional sensor networks (DSNs) in a wide range of situations have attracted a great deal of attention. One significant problem linked with DSNs is target coverage, which primarily operate based on simultaneously observing a group of targets occurring in a set area, hence maximizing the network lifetime. As there are limitations to the directional sensors’ sensing angle and energy resource, designing new techniques for effectively managing the energy consumption of the sensors is crucial. In this study, two problems were addressed. First, a new learning automata-based algorithm is proposed to solve the target coverage problem, in cases where sensors have multiple power levels (i.e., sensors have multiple sensing ranges), by selecting a subset of sensor directions that is able to monitor all the targets. In real applications, targets may have different coverage quality requirements, which leads to the second; the priority-based target coverage problem, which has not yet been investigated in the field of study. In this problem, two newly developed algorithms based on learning automata and greedy are proposed to select a subset of sensor directions in a way that different coverage quality requirements of all the targets could be satisfied. All of the proposed algorithms were assessed for their performances via a number of experiments. In addition, the effect of each algorithm on maximizing network lifetime was also investigated via a comparative study. All algorithms are successful in solving the problems; however, the learning automata-based algorithms are proven to be superior by up to 18% comparing with the greedy-based algorithms, when considering extending the network lifetime

    Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour

    Get PDF
    An optimum sensor node placement mechanism for Wireless Sensor Network (WSN) is desirable in ensuring the location of sensor nodes offers maximum coverage and connectivity with minimum energy consumption. This paper proposes a sensor node placement algorithm that utilizes a new biologically inspired optimization algorithm that imitates the behaviour of a territorial predator in marking their territories with their odours known as Territorial Predator Scent Marking Algorithm (TPSMA). The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm. The proposed single objective approaches of TPSMA studied in this paper are TPSMA with minimum energy and TPSMA with maximum coverage. Simulation results show that the WSN deployed using the proposed TPSMA sensor node placement algorithm is able to arrange the sensor nodes according to the objective required; TPSMA with maximum coverage offers the highest coverage ratio with fewer sensor nodes up to 100% coverage while TPSMA with minimum energy consumption utilized the lowest energy as low as around 4.85 Joules. Full connectivity is provisioned for all TPSMA approaches since the constraint of the optimization problem is to ensure the connectivity from all sensor nodes to the sink node

    Unity Attractors Inspired Programmable Cellular Automata and Barnacles Swarm Optimization-Based Energy Efficient Data Communication for Securing IoT

    Get PDF
    Wireless Sensor Networks (WSNs) is the innovative technology that covers wide range of application that possesses high potential merits such as long-term operation, unmonitored network access, data transmission, and low implementation cost. In this context, Internet of Things (IoT) have evolved as an exciting paradigm with the rapid advancement of cellular mobile networks, near field communications and cloud computing. WSNs potentially interacts with the IoT devices based on the sensing features of web devices and communication technologies in sensors. At this juncture, IoT need to facilitate huge amount of data aggregation with security and disseminate it to the reliable path to make it reach the required base station. In this paper, Unity Attractors Inspired Programmable Cellular Automata and Barnacles Swarm Optimization-Based Energy Efficient Data Communication Mechanism (UAIPCA-BSO) is proposed for  Securing data and estimate the optimal path through which it can be forwarded in the IoT environment. In specific, Unity Attractors Inspired Programmable Cellular Automata is adopted for guaranteeing security during the data transmission process. It also aids in determining the optimal path of data transmission based on the merits of Barnacles Swarm Optimization Algorithm (BSOA), such that data is made to reach the base station at the required destination in time. The simulation results of UAIPCA-BSO confirmed minimized end-to-end delay , accuracy and time taken for malicious node detection, compared to the baseline approaches used for comparison

    A Deterministic Algorithm for the Deployment of Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made up by communicating sensor nodes that gather and elaborate information from real world in a distributed and coordinated way in order to deliver an intelligent support to human activities. They are used in many fields such as national security, surveillance, health care, biological detection, and environmental monitoring. However, sensor nodes are characterized by limited wireless communication and computing capabilities as well as reduced on-board battery power. Therefore, they have to be carefully deployed in order to cover the areas to be monitored without impairing network lifetime. This paper presents a new deterministic algorithm to solve the coverage problem of well-known areas by means of wireless sensor networks. The proposed algorithm depends on a small set of parameters and can control sensor deployment within areas even in the presence of obstacles. Moreover, the algorithm makes it possible to control the redundancy degree that can be obtained in covering a region of interest so as to achieve a network deployment characterized by a minimum number of wireless sensor nodes

    Fault Tolerant Coverage and Connectivity in Presence of Channel Randomness

    Get PDF
    Some applications of wireless sensor network require K-coverage and K-connectivity to ensure the system to be fault tolerance and to make it more reliable. Therefore, it makes coverage and connectivity an important issue in wireless sensor networks. In this paper, we proposed K-coverage and K-connectivity models for wireless sensor networks. In both models, nodes are distributed according to Poisson distribution in the sensor field. To make the proposed model more realistic we used log-normal shadowing path loss model to capture the radio irregularities and studied its impact on K-coverage and K-connectivity. The value of K can be different for different types of applications. Further, we also analyzed the problem of node failure for K-coverage model. In the simulation section, results clearly show that coverage and connectivity of wireless sensor network depend on the node density, shadowing parameters like the path loss exponent, and standard deviation
    corecore