3 research outputs found

    Sink-oriented Dynamic Location Service Protocol for Mobile Sinks with an Energy Efficient Grid-Based Approach

    Get PDF
    Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs). They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS) approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA) system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR) that efficiently forwards (or relays) data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources

    Analysis of the energy latency trade-off in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) haben im letzten Jahrzehnt eine erhebliche Aufmerksamkeit erlangt. Diese Netzwerke zeichnen sich durch begrenzte Energieressourcen der Sensorknoten aus. Daher ist Energieeffizienz ein wichtiges Thema in Systemdesign und -betrieb von WSNs. Diese Arbeit konzentriert sich auf großflächige Anwendungen von WSNs wie Umwelt- oder Lebensraumüberwachung, die in der Regel den Ad-hoc-Einsatz von Knoten in großen Anzahl erfordern. Ad-hoc-Einsatz und Budgetbeschränkungen hindern Entwickler an der Programmierung der Knoten mit zusätzlichen Informationen wie beispielsweise Routingtabellen, Positionskoordinaten, oder Netzwerkgrenzen. Um diese Informationen zu beschaffen, ist es üblich verschiedene Initialisierungsschemen mit erheblichen Auswirkungen auf den Energieverbrauch und den Programmieraufwand zu implementieren. In Anbetracht dieser Beschränkungen ist ein neues Paradigma für die Initialisierung und den Betrieb von WSNs notwendig, das sich durch einfachen Einsatz und minimalen Energieaufwand auszeichnet. In dieser Arbeit nutzen wir Sink-Mobilität, um den Initialisierungsoverhead und den operativen Overhead zu reduzieren. Unser erster großer Beitrag ist ein Boundary Identification Schema für WSNs mit dem Namen "Mobile Sink based Boundary Detection" (MoSBoD). Es nutzt die Sink-Mobilität um den Kommunikationsoverhead der Sensorknoten zu reduzieren, was zu einer Erhöhung der Laufzeit des WSN führt. Außerdem entstehen durch das Schema keine Einschränkungen in Bezug auf Nodeplacement, Kommunikationsmodell, oder Ortsinformationen der Knoten. Der zweite große Beitrag ist das Congestion avoidance low Latency and Energy efficient (CaLEe) Routingprotokoll für WSNs. CaLEe basiert auf der virtuellen Partitionierung eines Sensorsbereich in Sektoren und der diskreten Mobilität der Sink im WSN. Unsere Simulationsergebnisse zeigen, dass CaLEe, im Vergleich zum derzeitigen State-of-the-art, nicht nur eine erhebliche Reduzierung der durchschnittlichen Energy Dissipation per Node erzielt, sondern auch eine geringere durchschnittliche End-to-End Data Latency in realistischen Szenarien erreicht. Darüber hinaus haben wir festgestellt, dass kein einziges Protokoll in der Lage ist, eine Best-Case-Lösung (minimale Data Latency und minimale Energy Dissipation) für variierende Netzwerkkonfigurationen, die beispielsweise mithilfe der Parameter Kommunikationsbereich der Nodes, Nodedichte, Durchsatz des Sensorfelds definiert werden können, bieten. Daher ist der dritte Hauptbeitrag dieser Arbeit die Identifikation von (auf unterschiedlichen Netzwerkkonfigurationen basierenden) „Operational Regions“, in denen einzelne Protokolle besser arbeiten als andere. Zusammenfassend kann man sagen, dass diese Dissertation das klassische Energieeffizienzproblem der WSNs (Ressource-begrenzte Knoten) aufgreift und gleichzeitig die End-to-End Data Latency auf einen annehmbaren Rahmen eingrenzt.Wireless Sensor Networks (WSN) have gained a considerable attention over the last decade. These networks are characterized by limited amount of energy supply at sensor node. Hence, energy efficiency is an important issue in system design and operation of WSN. This thesis focuses on large-scale applications of WSN, such as environment or habitat monitoring that usually requires ad-hoc deployment of the nodes in large numbers. Ad-hoc deployment and budget constraints restrict developers from programming the nodes with information like routing tables, position coordinates of the node, boundary of the network. In order to acquire this information, state-of-the-art is to program nodes with various initialization schemes that are heavy both from WSN’s (energy consumption) and programmer’s perspectives (programming effort). In view of these particular constraints, we require a new paradigm for WSN initialization and operation, which should be easy to deploy and have minimal energy demands. In this thesis, we exploit sink mobility to reduce the WSN initialization and operational overhead. Our first major contribution is a boundary identification scheme for WSN, named “Mobile Sink based Boundary detection” (MoSBoD). It exploits the sink mobility to remove the communication overhead from the sensor nodes, which leads to an increase in the lifetime of the WSN. Furthermore, it does not impose any restrictions on node placement, communication model, or location information of the nodes. The second major contribution is Congestion avoidance low Latency and Energy efficient (CaLEe) routing protocol for WSN. CaLEe is based on virtual partitioning of a sensor field into sectors and discrete mobility of the sink in the WSN. Our simulation results showed that CaLEe not only achieve considerable reduction in average energy dissipation per node compared to current state-of-the-art routing protocols but also accomplish lesser average end-to-end data latency under realistic scenarios. Furthermore, we observe that no single protocol is capable of providing best-case solution (minium data latency and minimum energy dissipation) under varying network configurations, which can be defined using communication range of the nodes, node density, throughput of the sensor field etc. Therefore, the third major contribution of this thesis is the identification of operational regions (based on varying network configurations) where one protocol performs better than the other. In summary, this thesis revisits the classic energy efficiency problem of a WSN (that have resource-limited nodes) while keeping end-to-end data latency under acceptable bounds

    An architecture framework for enhanced wireless sensor network security

    Get PDF
    This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish secure WSNs, in a distributed and self-healing manner. Wireless Sensors are used to monitor and control environmental properties such as sound, acceleration, vibration, air pollutants, and temperature. Due to their limited resources in computation capability, memory and energy, their security schemes are susceptible to many kinds of security vulnerabilities. This thesis investigated all possible network attacks on WSNs and at the time of writing, 19 different types of attacks were identified, all of which are discussed including exposures to the attacks, and the impact of those attacks. The author then utilises this work to examine the ZigBee series, which are the new generation of wireless sensor network products with built-in layered security achieved by secure messaging using symmetric cryptography. However, the author was able to uniquely identify several security weaknesses in ZigBee by examining its protocol and launching the possible attacks. It was found that ZigBee is vulnerable to the following attacks, namely: eavesdropping, replay attack, physical tampering and Denial of Services (DoS). The author then provides solutions to improve the ZigBee security through its security schema, including an end-to-end WSN security framework, architecture design and sensor configuration, that can withstand all types of attacks on the WSN and mitigate ZigBee’s WSN security vulnerabilities
    corecore