1,182 research outputs found

    A cluster-based mobile data-gathering scheme for underwater sensor networks

    Get PDF

    Survey: energy efficient protocols using radio scheduling in wireless sensor network

    Get PDF
    An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey

    Semantically Intelligent Distributed Leader Election (SIDLE) Algorithm for WSAN Part of IoT Systems

    Full text link
    This paper introduces the deployment of a group of Wireless Sensor and Actuator Network (WSAN) part of Internet of Thing (IoT) systems in rural regions deployed by a drone dropping sensors and actuators at a certain position as a mesh of a hexagonal form. Nodes are heterogeneous in hardware and functionality thus not all nodes are able to transfer data directly to the base station. Primitive ones are only capable of collecting local data. However, ones that are more sophisticated are equipped with long-range radio telemetry and more computational power. Power optimization is one of the crucial factors in designing WSANs. Total power consumption must be minimized, as sensors are self-managed. It is not feasible to collect sensors on time bases and recharge the batteries. Therefore, energy consumption optimization and harvesting green energy are other factors that are considered. In this regard, protocols are designed in a way to support such requirements. The preprocessed data are first collected and combined by the leaders at each hexagonal cell. Then, the information packets are sent to the head clusters. Consequently, head clusters reprocess the received information and depict a better global view of the zone, using a variety of the received information. Finally, the processed information is sent to the nearest base station or a mobile drone.Comment: The First International Conference of Smart City, 2019, Apadana University, Shiraz, Iran https://www.civilica.com/Paper-SMARTCITYC01-SMARTCITYC01_100.htm

    WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively

    An energy aware scheme for layered chain in underwater wireless sensor networks using genetic algorithm

    Get PDF
    Extending the network lifetime is a very challenging problem that needs to be taken into account during routing data in wireless sensor networks in general and particularly in underwater wireless sensor networks (UWSN). For this purpose, the present paper proposes a multilayer chain based on genetic algorithm routing (MCGA) for routing data from nodes to the sink. This algorithm consists to create a limited number of local chains constructed by using genetic algorithm in order to obtain the shortest path between nodes; furthermore, a leader node (LN) is elected in each chain followed by constructing a global chain containing LNs. The selection of the LN in the closest chain to the sink is as follows: Initially, the closest node to sink is elected LN in this latter because all nodes have initially the same energy value; then the future selection of the LN is based on the residual energy of the nodes. LNs in the other chains are selected based on the proximity to the previous LNs. Data transmission is performed in two steps: intra-chain transmission and inter-chain transmission. Furthermore, MCGA is simulated for different scenarios of mobility and density of nodes in the networks. The performance evaluation of the proposed technique shows a considerable reduction in terms of energy consumption and network lifespan

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record*

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area

    A Modified Energy-Efficient Clustering with Splitting and Merging for Wireless Sensor Networks using Cluster-Head Handover Mechanism

    Get PDF
    Energy efficiency is one of the most important challenges for Wireless Sensor Networks (WSNs). This is due to the fact that sensor nodes have limited energy capacity. Therefore, the energy of sensor nodes has to be efficiently managed to provide longer lifetime for the network. To reduce energy consumption in WSNs, a modified Energy Efficient Clustering with Splitting and Merging (EECSM) for WSNs using Cluster-Head Handover Mechanism was implemented in this research. The modified model used information of the residual energy of sensor nodes to select backup Cluster Heads (CHs) while maintaining a suitable CH handover threshold to minimize energy consumption in the network. The backup CHs take over the responsibilities of the CHs once the handover threshold is reached. The modified model was validated in terms of network lifetime and residual energy ratio with EECSM using MATLAB R2013a. Average improvements of 7.5% and 50.7% were achieved for the network lifetime and residual energy ratio respectively which indicates a significant reduction in energy consumption of the network nodes. Keywords— Clustering, Energy-Efficiency, Handover, Lifetime, Wireless Sensor Networ

    Acoustic power distribution techniques for wireless sensor networks

    Get PDF
    Recent advancements in wireless power transfer technologies can solve several residual problems concerning the maintenance of wireless sensor networks. Among these, air-based acoustic systems are still less exploited, with considerable potential for powering sensor nodes. This thesis aims to understand the significant parameters for acoustic power transfer in air, comprehend the losses, and quantify the limitations in terms of distance, alignment, frequency, and power transfer efficiency. This research outlines the basic concepts and equations overlooking sound wave propagation, system losses, and safety regulations to understand the prospects and limitations of acoustic power transfer. First, a theoretical model was established to define the diffraction and attenuation losses in the system. Different off-the-shelf transducers were experimentally investigated, showing that the FUS-40E transducer is most appropriate for this work. Subsequently, different load-matching techniques are analysed to identify the optimum method to deliver power. The analytical results were experimentally validated, and complex impedance matching increased the bandwidth from 1.5 to 4 and the power transfer efficiency from 0.02% to 0.43%. Subsequently, a detailed 3D profiling of the acoustic system in the far-field region was provided, analysing the receiver sensitivity to disturbances in separation distance, receiver orientation and alignment. The measured effects of misalignment between the transducers are provided as a design graph, correlating the output power as a function of separation distance, offset, loading methods and operating frequency. Finally, a two-stage wireless power network is designed, where energy packets are inductively delivered to a cluster of nodes by a recharge vehicle and later acoustically distributed to devices within the cluster. A novel dynamic recharge scheduling algorithm that combines weighted genetic clustering with nearest neighbour search is developed to jointly minimise vehicle travel distance and power transfer losses. The efficacy and performance of the algorithm are evaluated in simulation using experimentally derived traces that presented 90% throughput for large, dense networks.Open Acces
    • …
    corecore