510 research outputs found

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    Topological Design of Multiple Virtual Private Networks UTILIZING SINK-TREE PATHS

    Get PDF
    With the deployment of MultiProtocol Label Switching (MPLS) over a core backbone networks, it is possible for a service provider to built Virtual Private Networks (VPNs) supporting various classes of services with QoS guarantees. Efficiently mapping the logical layout of multiple VPNs over a service provider network is a challenging traffic engineering problem. The use of sink-tree (multipoint-to-point) routing paths in a MPLS network makes the VPN design problem different from traditional design approaches where a full-mesh of point-to-point paths is often the choice. The clear benefits of using sink-tree paths are the reduction in the number of label switch paths and bandwidth savings due to larger granularities of bandwidth aggregation within the network. In this thesis, the design of multiple VPNs over a MPLS-like infrastructure network, using sink-tree routing, is formulated as a mixed integer programming problem to simultaneously find a set of VPN logical topologies and their dimensions to carry multi-service, multi-hour traffic from various customers. Such a problem formulation yields a NP-hard complexity. A heuristic path selection algorithm is proposed here to scale the VPN design problem by choosing a small-but-good candidate set of feasible sink-tree paths over which the optimal routes and capacity assignments are determined. The proposed heuristic has clearly shown to speed up the optimization process and the solution can be obtained within a reasonable time for a realistic-size network. Nevertheless, when a large number of VPNs are being layout simultaneously, a standard optimization approach has a limited scalability. Here, the heuristics termed the Minimum-Capacity Sink-Tree Assignment (MCSTA) algorithm proposed to approximate the optimal bandwidth and sink-tree route assignment for multiple VPNs within a polynomial computational time. Numerical results demonstrate the MCSTA algorithm yields a good solution within a small error and sometimes yields the exact solution. Lastly, the proposed VPN design models and solution algorithms are extended for multipoint traffic demand including multipoint-to-point and broadcasting connections

    Overlay networks for smart grids

    Get PDF

    Enhancing Security and Energy Efficiency in Wireless Sensor Network Routing with IOT Challenges: A Thorough Review

    Get PDF
    Wireless sensor networks (WSNs) have emerged as a crucial component in the field of networking due to their cost-effectiveness, efficiency, and compact size, making them invaluable for various applications. However, as the reliance on WSN-dependent applications continues to grow, these networks grapple with inherent limitations such as memory and computational constraints. Therefore, effective solutions require immediate attention, especially in the age of the Internet of Things (IoT), which largely relies on the effectiveness of WSNs. This study undertakes a comprehensive review of research conducted between 2018 and 2020, categorizing it into six main domains: 1) Providing an overview of WSN applications, management, and security considerations. 2) Focusing on routing and energy-saving techniques. 3) Reviewing the development of methods for information gathering, emphasizing data integrity and privacy. 4) Emphasizing connectivity and positioning techniques. 5) Examining studies that explore the integration of IoT technology into WSNs with an eye on secure data transmission. 6) Highlighting research efforts aimed at energy efficiency. The study addresses the motivation behind employing WSN applications in IoT technologies, as well as the challenges, obstructions, and solutions related to their application and development. It underscores that energy consumption remains a paramount issue in WSNs, with untapped potential for improving energy efficiency while ensuring robust security. Furthermore, it identifies existing approaches' weaknesses, rendering them inadequate for achieving energy-efficient routing in secure WSNs. This review sheds light on the critical challenges and opportunities in the field, contributing to a deeper understanding of WSNs and their role in secure IoT applications
    • …
    corecore