1,090 research outputs found
On Heterogeneous Neighbor Discovery in Wireless Sensor Networks
Neighbor discovery plays a crucial role in the formation of wireless sensor
networks and mobile networks where the power of sensors (or mobile devices) is
constrained. Due to the difficulty of clock synchronization, many asynchronous
protocols based on wake-up scheduling have been developed over the years in
order to enable timely neighbor discovery between neighboring sensors while
saving energy. However, existing protocols are not fine-grained enough to
support all heterogeneous battery duty cycles, which can lead to a more rapid
deterioration of long-term battery health for those without support. Existing
research can be broadly divided into two categories according to their
neighbor-discovery techniques---the quorum based protocols and the co-primality
based protocols.In this paper, we propose two neighbor discovery protocols,
called Hedis and Todis, that optimize the duty cycle granularity of quorum and
co-primality based protocols respectively, by enabling the finest-grained
control of heterogeneous duty cycles. We compare the two optimal protocols via
analytical and simulation results, which show that although the optimal
co-primality based protocol (Todis) is simpler in its design, the optimal
quorum based protocol (Hedis) has a better performance since it has a lower
relative error rate and smaller discovery delay, while still allowing the
sensor nodes to wake up at a more infrequent rate.Comment: Accepted by IEEE INFOCOM 201
Trade-Offs between Energy Saving and Reliability in Low Duty Cycle Wireless Sensor Networks Using a Packet Splitting Forwarding Technique
One of the challenging topics and design constraints in Wireless Sensor Networks (WSNs) is the reduction of energy consumption because, in most application scenarios, replacement of power resources in sensor devices might be unfeasible. In order to minimize the power consumption, some nodes can be put to sleep during idle times and wake up only when needed. Although it seems the best way to limit the consumption of energy, other performance parameters such as network reliability have to be considered. In a recent paper, we introduced a new forwarding algorithm for WSNs based on a simple splitting procedure able to increase the network lifetime. The forwarding technique is based on the Chinese Remainder Theorem and exhibits very good results in terms of energy efficiency and complexity. In this paper, we intend to investigate a trade-off between energy efficiency and reliability of the proposed forwarding scheme when duty-cycling techniques are considered too
Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks
Neighbor discovery is a fundamental service for initialization and managing
network dynamics in wireless sensor networks and mobile sensing applications.
In this paper, we present a novel design principle named Talk More Listen Less
(TMLL) to reduce idle-listening in neighbor discovery protocols by learning the
fact that more beacons lead to fewer wakeups. We propose an extended neighbor
discovery model for analyzing wakeup schedules in which beacons are not
necessarily placed in the wakeup slots. Furthermore, we are the first to
consider channel occupancy rate in discovery protocols by introducing a new
metric to trade off among duty-cycle, latency and channel occupancy rate.
Guided by the TMLL principle, we have designed Nihao, a family of
energy-efficient asynchronous neighbor discovery protocols for symmetric and
asymmetric cases. We compared Nihao with existing state of the art protocols
via analysis and real-world testbed experiments. The result shows that Nihao
significantly outperforms the others both in theory and practice.Comment: 9 pages, 14 figures, published in IEEE INFOCOM 201
Secure key design approaches using entropy harvesting in wireless sensor network: A survey
Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
- …