119,203 research outputs found

    Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks and Computation

    Full text link
    Sensor networks potentially feature large numbers of nodes that can sense their environment over time, communicate with each other over a wireless network, and process information. They differ from data networks in that the network as a whole may be designed for a specific application. We study the theoretical foundations of such large scale sensor networks, addressing four fundamental issues- connectivity, capacity, clocks and function computation. To begin with, a sensor network must be connected so that information can indeed be exchanged between nodes. The connectivity graph of an ad-hoc network is modeled as a random graph and the critical range for asymptotic connectivity is determined, as well as the critical number of neighbors that a node needs to connect to. Next, given connectivity, we address the issue of how much data can be transported over the sensor network. We present fundamental bounds on capacity under several models, as well as architectural implications for how wireless communication should be organized. Temporal information is important both for the applications of sensor networks as well as their operation.We present fundamental bounds on the synchronizability of clocks in networks, and also present and analyze algorithms for clock synchronization. Finally we turn to the issue of gathering relevant information, that sensor networks are designed to do. One needs to study optimal strategies for in-network aggregation of data, in order to reliably compute a composite function of sensor measurements, as well as the complexity of doing so. We address the issue of how such computation can be performed efficiently in a sensor network and the algorithms for doing so, for some classes of functions.Comment: 10 pages, 3 figures, Submitted to the Proceedings of the IEE

    Kriptografi Dan Skema Keamanan Untuk Jaringan Sensor Nirkawat

    Full text link
    This paper attempts to explore the security issues in sensor network that include constraints in sensor networks security, the requirements of secure sensor networks, attack classification and its counter measures and security mechanisms at wirelesssensor network (WSN) such as cryptography and key management. Popularity of wireless sensor network is increasing because of its potential to provide low-cost solution for a variety of real-world problem. As a special form of ad-hoc networks, sensor networks has many limitations that lead to vulnerabilities in security issues. Currently, there are many researches in the field of sensor network security. Our analysis shows that symmetric key cryptography systems are more favorable to provide WSN security services because of its computation and energy cost. Moreover, distributed combine with pre-distributed key management is important to overcome security threats and centralize threats detection is more favorable to reduce energy and computation cost of sensor nodes

    Towards a Queueing-Based Framework for In-Network Function Computation

    Full text link
    We seek to develop network algorithms for function computation in sensor networks. Specifically, we want dynamic joint aggregation, routing, and scheduling algorithms that have analytically provable performance benefits due to in-network computation as compared to simple data forwarding. To this end, we define a class of functions, the Fully-Multiplexible functions, which includes several functions such as parity, MAX, and k th -order statistics. For such functions we exactly characterize the maximum achievable refresh rate of the network in terms of an underlying graph primitive, the min-mincut. In acyclic wireline networks, we show that the maximum refresh rate is achievable by a simple algorithm that is dynamic, distributed, and only dependent on local information. In the case of wireless networks, we provide a MaxWeight-like algorithm with dynamic flow splitting, which is shown to be throughput-optimal

    Decentralized event-triggered control over wireless sensor/actuator networks

    Full text link
    In recent years we have witnessed a move of the major industrial automation providers into the wireless domain. While most of these companies already offer wireless products for measurement and monitoring purposes, the ultimate goal is to be able to close feedback loops over wireless networks interconnecting sensors, computation devices, and actuators. In this paper we present a decentralized event-triggered implementation, over sensor/actuator networks, of centralized nonlinear controllers. Event-triggered control has been recently proposed as an alternative to the more traditional periodic execution of control tasks. In a typical event-triggered implementation, the control signals are kept constant until the violation of a condition on the state of the plant triggers the re-computation of the control signals. The possibility of reducing the number of re-computations, and thus of transmissions, while guaranteeing desired levels of performance makes event-triggered control very appealing in the context of sensor/actuator networks. In these systems the communication network is a shared resource and event-triggered implementations of control laws offer a flexible way to reduce network utilization. Moreover reducing the number of times that a feedback control law is executed implies a reduction in transmissions and thus a reduction in energy expenditures of battery powered wireless sensor nodes.Comment: 13 pages, 3 figures, journal submissio

    Dataflow-Oriented Provenance System for Multifusion Wireless Sensor Networks

    Get PDF
    We present a dataflow-oriented provenance system for data fusion sensor networks. This model works best with net- works sensing dynamic objects and although our system is generic, we model it on a proximity binary sensor network. We introduce a network-level fault-tolerance mechanism by using the cognitive strength of provenance models. Our provenance model reduce the limitations of a sensor’s capability and decrease the error-prone nature of wireless sen- sor networks. In addition provenance data is used in order to efficiently build the dynamic data fusion scenario and to adjust the network such as turning of some sensors. In a fault-tolerant, self-adjusting sensor network, sensor data produce more accurate results and with the improvements, tasks such as target localization is more precisely done. One other aspect of our network is that by having computation nodes spread to the network, the computation is done in a distributed manner and as nodes make decisions based on the provenance and fusion data available, the network has a distributed intelligence. Keywords: Multifusion, Wireless Sensor Networks, Open Provenance Mode

    Performance Evaluation of Mannasim Framework for Wireless Sensor Network in Network Simulator 2

    Get PDF
    Optimizing sensor networks involves addressing a wide range of issues steaming from limited energy reserves, computation power, communication capabilities, and self-managing sensor nodes. The high cost and difficulties in deploying wireless sensor networks are the main challenges that motivate investigating the performance of a sensor network in a simulated environment. The Network Simulator 2 (ns-2) is one of the flexible tools available for network engineers to study how various protocols perform under different configurations and topologies. ns-2 lacks of modules for studying the sensor networks. However, many researchers have developed several modules for ns-2, which help exploring wireless sensor network before real deployment. This project concerns the reliability of Mannasim module for studying the performance of wireless sensor networks in ns-2. This project supports the analysis of different sensor network configurations under the demands of specific sensor applications. The project showed that Mannasim module reliable and it is able to meet the requirements of different layers that are involved in sensor networks
    • …
    corecore