4,226 research outputs found
Garnet: a middleware architecture for distributing data streams originating in wireless sensor networks
We present an architectural framework, Garnet, which provides a data stream centric abstraction to encourage the manipulation and exploitation of data generated in sensor networks. By providing middleware services to allow mutually-unaware applications to manipulate sensor behaviour, a scalable, extensible platform is provided. We focus on sensor networks with transmit and receive capabilities as this combination poses greater challenges for managing and distributing sensed data. Our approach allows simple and sophisticated sensors to coexist, and allows data consumers to be mutually unaware of each other This also promotes the use of middleware services to mediate among consumers with potentially conflicting demands for shared data. Garnet has been implemented in Java, and we report on our progress to date and outline some likely scenarios where the use of our distributed architecture and accompanying middleware support enhances the task of sharing data in sensor network environments
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
Connectivity-guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks
Mobile sensors can relocate and self-deploy into a network. While focusing on the problems of coverage, existing deployment schemes largely over-simplify the conditions for network connectivity: they either assume that the communication range is large enough for sensors in geometric neighborhoods to obtain location information through local communication, or they assume a dense network that remains connected. In addition, an obstacle-free field or full knowledge of the field layout is often assumed. We present new schemes that are not governed by these assumptions, and thus adapt to a wider range of application scenarios. The schemes are designed to maximize sensing coverage and also guarantee connectivity for a network with arbitrary sensor communication/sensing ranges or node densities, at the cost of a small moving distance. The schemes do not need any knowledge of the field layout, which can be irregular and have obstacles/holes of arbitrary shape. Our first scheme is an enhanced form of the traditional virtual-force-based method, which we term the Connectivity-Preserved Virtual Force (CPVF) scheme. We show that the localized communication, which is the very reason for its simplicity, results in poor coverage in certain cases. We then describe a Floor-based scheme which overcomes the difficulties of CPVF and, as a result, significantly outperforms it and other state-of-the-art approaches. Throughout the paper our conclusions are corroborated by the results from extensive simulations
Dead Reckoning Localization Technique for Mobile Wireless Sensor Networks
Localization in wireless sensor networks not only provides a node with its
geographical location but also a basic requirement for other applications such
as geographical routing. Although a rich literature is available for
localization in static WSN, not enough work is done for mobile WSNs, owing to
the complexity due to node mobility. Most of the existing techniques for
localization in mobile WSNs uses Monte-Carlo localization, which is not only
time-consuming but also memory intensive. They, consider either the unknown
nodes or anchor nodes to be static. In this paper, we propose a technique
called Dead Reckoning Localization for mobile WSNs. In the proposed technique
all nodes (unknown nodes as well as anchor nodes) are mobile. Localization in
DRLMSN is done at discrete time intervals called checkpoints. Unknown nodes are
localized for the first time using three anchor nodes. For their subsequent
localizations, only two anchor nodes are used. The proposed technique estimates
two possible locations of a node Using Bezouts theorem. A dead reckoning
approach is used to select one of the two estimated locations. We have
evaluated DRLMSN through simulation using Castalia simulator, and is compared
with a similar technique called RSS-MCL proposed by Wang and Zhu .Comment: Journal Paper, IET Wireless Sensor Systems, 201
Opportunistic Localization Scheme Based on Linear Matrix Inequality
Enabling self-localization of mobile nodes is an important problem that has been widely studied in the literature.
The general conclusions is that an accurate localization
requires either sophisticated hardware (GPS, UWB, ultrasounds transceiver) or a dedicated infrastructure (GSM, WLAN). In this paper we tackle the problem from a different and rather new perspective: we investigate how localization performance can be improved by means of a cooperative and opportunistic data exchange among the nodes. We consider a target node, completely unaware of its own position, and a number of mobile nodes with some self-localization capabilities. When the opportunity occurs, the target node can exchange data with in-range mobile nodes. This opportunistic data exchange is then used by the target node to refine its position estimate by using a technique based on Linear Matrix Inequalities and barycentric algorithm. To investigate the performance of such an opportunistic localization algorithm, we define a simple mathematical model that describes the opportunistic interactions and, then, we run several computer simulations for analyzing the effect of the nodes duty-cycle and of the native self-localization error modeling considered. The results show that the opportunistic interactions can actually improve the self-localization accuracy of a strayed node in many different scenarios
Discharge Curve Backoff Sleep Protocol for Energy Efficient Coverage in Wireless Sensor Networks
AbstractIn energy constrained wireless sensor networks, maximizing network coverage lifetime while ensuring optimized coverage is important. The challenge is to determine an appropriate duty cycle for the nodes while maintaining sufficient count of active nodes for optimal network coverage. Most of the existing work, for coverage optimization based on duty cycle, does not consider the residual energy of the active nodes. This can result in suboptimal wake-up of sleeping nodes. RBSP considers the residual energy but ignores the active nodesâ battery discharge rate. In this paper, we propose DCBSP (Discharge Curve Backoff Sleep Protocol), which considers the battery discharge curve of the active nodes to determine the duty cycle of the inactive nodes. Thus in DCBSP, inactive nodes wake-up close to death of the active nodes which leads to lesser energy consumption and increased network lifetime. NS-2 simulations show the energy consumption of DCBSP is lesser than that of PEAS by 39% and lesser by 25% and 15% as compared to RBSP and PECAS respectively. Further, the coverage ratio of DCBSP is higher than PEAS by 32% and higher by 17% and 6% as compared to RBSP, PECAS respectively. Hence, DCBSP is effective in ensuring higher coverage while extending the network lifetime
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
Most of geographic routing approaches in wireless ad hoc and sensor networks
do not take into consideration the medium access control (MAC) and physical
layers when designing a routing protocol. In this paper, we focus on a
cross-layer framework design that exploits the synergies between network, MAC,
and physical layers. In the proposed CoopGeo, we use a beaconless forwarding
scheme where the next hop is selected through a contention process based on the
geographic position of nodes. We optimize this Network-MAC layer interaction
using a cooperative relaying technique with a relay selection scheme also based
on geographic information in order to improve the system performance in terms
of reliability.Comment: in 2010 IEEE 71st Vehicular Technology Conference, 201
Improved Fair-Zone technique using Mobility Prediction in WSN
The self-organizational ability of ad-hoc Wireless Sensor Networks (WSNs) has
led them to be the most popular choice in ubiquitous computing. Clustering
sensor nodes organizing them hierarchically have proven to be an effective
method to provide better data aggregation and scalability for the sensor
network while conserving limited energy. It has some limitation in energy and
mobility of nodes. In this paper we propose a mobility prediction technique
which tries overcoming above mentioned problems and improves the life time of
the network. The technique used here is Exponential Moving Average for online
updates of nodal contact probability in cluster based network.Comment: 10 pages, 7 figures, Published in International Journal Of Advanced
Smart Sensor Network Systems (IJASSN
- âŠ