631 research outputs found

    EASND: Energy Adaptive Secure Neighbour Discovery Scheme for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is defined as a distributed system of networking, which is enabled with set of resource constrained sensors, thus attempt to providing a large set of capabilities and connectivity interferences. After deployment nodes in the network must automatically affected heterogeneity of framework and design framework steps, including obtaining knowledge of neighbor nodes for relaying information. The primary goal of the neighbor discovery process is reducing power consumption and enhancing the lifespan of sensor devices. The sensor devices incorporate with advanced multi-purpose protocols, and specifically communication models with the pre-eminent objective of WSN applications. This paper introduces the power and security aware neighbor discovery for WSNs in symmetric and asymmetric scenarios. We have used different of neighbor discovery protocols and security models to make the network as a realistic application dependent model. Finally, we conduct simulation to analyze the performance of the proposed EASND in terms of energy efficiency, collisions, and security. The node channel utilization is exceptionally elevated, and the energy consumption to the discovery of neighbor nodes will also be significantly minimized. Experimental results show that the proposed model has valid accomplishment

    Evaluating passive neighborhood discovery for Low Power Listening MAC protocols

    Get PDF
    Low Power Listening (LPL) MAC protocols are widely used in today's sensors networks for duty cycling. Their simplicity and power efficiency ensures a long network life when nodes are battery driven and their easy deployment and lower cost of maintenance makes them suitable to be used in hard-to-access places and harsh conditions. We argue that to fully utilize energy efficiency provided by LPL, other protocols in the protocol stack should be aware of mechanisms. In this paper, we focus on neighborhood discovery protocols and discuss their energy efficient integration with LPL. Then, we study the possibility of using a completely passive approach for neighborhood discovery in such networks and provide an analytical model for its performance characteristics. We verify our performance model both by simulation and implementation in TinyOS. Our evaluation results confirm the efficiency of our proposed method in duty-cycled sensor networks

    Combinatorics-based energy conservation methods in wireless sensor networks

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Optimal power control in green wireless sensor networks with wireless energy harvesting, wake-up radio and transmission control

    Get PDF
    Wireless sensor networks (WSNs) are autonomous networks of spatially distributed sensor nodes which are capable of wirelessly communicating with each other in a multi-hop fashion. Among different metrics, network lifetime and utility and energy consumption in terms of carbon footprint are key parameters that determine the performance of such a network and entail a sophisticated design at different abstraction levels. In this paper, wireless energy harvesting (WEH), wake-up radio (WUR) scheme and error control coding (ECC) are investigated as enabling solutions to enhance the performance of WSNs while reducing its carbon footprint. Specifically, a utility-lifetime maximization problem incorporating WEH, WUR and ECC, is formulated and solved using distributed dual subgradient algorithm based on Lagrange multiplier method. It is discussed and verified through simulation results to show how the proposed solutions improve network utility, prolong the lifetime and pave the way for a greener WSN by reducing its carbon footprint

    Polling-Based Downlink Communication Protocol for LoRaWAN using Traffic Indication

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ๊น€์ข…๊ถŒ.LPWAN (Low Power Wide Area Network) technologies such as LoRa and SigFox are emerging as a technology of choice for the Internet of Things (IoT) applications where tens of thousands of untethered devices are deployed over a wide area. In such operating environments, energy conservation is one of the most crucial concerns and network protocols adopt various power saving schemes to lengthen device lifetimes. For example, to avoid idle listening, LoRaWAN restricts downlink communications. However, the confined design philosophy impedes the deployment of IoT applications that require asynchronous downlink communications. In this thesis, we design and implement an energy efficient downlink communication mechanism, named TRILO, for LoRaWAN. We aim to make TRILO be energy efficient while obeying an unavoidable trade-off that balances between latency and energy consumption. TRILO adopts a beacon mechanism that periodically alerts end-devices which have pending downlink frames. We implement the proposed protocol on top of commercially available LoRaWAN components and confirm that the protocol operates properly in real-world experiments. Experimental results show that TRILO successfully transmits downlink frames without losses while uplink traffic suffers from a slight increase in latency because uplink transmissions should halt during beacons and downlink transmissions. Computer simulation results also show that the proposed scheme is more energy efficient than the legacy LoRaWAN downlink protocol.์ „๋ ฅ ๊ณต๊ธ‰์ด ์ œํ•œ์ ์ธ ์ˆ˜ ๋งŒ๊ฐœ์˜ ๋””๋ฐ”์ด์Šค๋“ค์„ ์ด์šฉํ•˜์—ฌ ๋„“์€ ์ง€์—ญ์„ ๋ฐ”ํƒ•์œผ๋กœ ์šด์˜๋˜๋Š” ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท ์‹œ์Šคํ…œ์„ ๊ตฌ์ถ•ํ•˜๋Š” ๋ฐ์— ์žˆ์–ด์„œ LoRa, SigFox์™€ ๊ฐ™์€ ์ €์ „๋ ฅ ๊ด‘์—ญ ๋„คํŠธ์›Œํฌ ๊ธฐ์ˆ (LPWA)์ด ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ ํ™˜๊ฒฝ์—์„œ ์—๋„ˆ์ง€ ์ ˆ์•ฝ์€ ์ค‘์š”ํ•œ ๊ด€์‹ฌ์‚ฌ ์ค‘ ํ•˜๋‚˜์ด๋ฉฐ ๋„คํŠธ์›Œํฌ ํ”„๋กœํ† ์ฝœ๋“ค์€ ๋‹ค์–‘ํ•œ ์ ˆ์ „ ๋ฐฉ์‹์„ ์ฑ„ํƒํ•˜์—ฌ ๋””๋ฐ”์ด์Šค์˜ ์ˆ˜๋ช…์„ ๋ณด์žฅํ•˜๋ ค ํ•˜๊ณ  ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๋ถˆํ•„์š”ํ•œ ๋Œ€๊ธฐ ์ฒญ์ทจ๋กœ ์ธํ•œ ์—๋„ˆ์ง€ ์†์‹ค์„ ๋ฐฉ์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ LoRaWAN์€ ๋‹ค์šด๋งํฌ ํ†ต์‹ ์„ ์ œํ•œํ•˜๊ณ  ์žˆ๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ์„ค๊ณ„ ์ฒ ํ•™์€ ๋น„๋™๊ธฐ์ ์ธ ๋‹ค์šด๋งํฌ ํ†ต์‹ ์„ ํ•„์š”๋กœ ํ•˜๋Š” IoT ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์š”๊ตฌ ์‚ฌํ•ญ์„ ์ถฉ์กฑ์‹œํ‚ค์ง€ ๋ชปํ•˜๋Š” ๋ฌธ์ œ์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” LoRaWAN์—์„œ ๋‹ค์šด๋งํฌ๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ์ปจํŠธ๋กคํ•  ์ˆ˜ ์žˆ๋„๋ก TRILO๋ผ๋Š” ์—๋„ˆ์ง€ ํšจ์œจ์ ์ธ ๋‹ค์šด๋งํฌ ํ†ต์‹  ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ์„ค๊ณ„ํ•˜๊ณ  ๊ตฌํ˜„ํ•˜์˜€๋‹ค. TRILO๋Š” ๋‹ค์šด๋งํฌ ํ”„๋ ˆ์ž„์ด ํŒฌ๋”ฉ๋˜์–ด ์žˆ๋Š” ์—”๋“œ ๋””๋ฐ”์ด์Šค๋“ค์˜ ๋ฆฌ์ŠคํŠธ ์ •๋ณด๋ฅผ ์ฃผ๊ธฐ์ ์œผ๋กœ ๋„คํŠธ์›Œํฌ์— ์•Œ๋ฆฌ๋Š” ๋น„์ฝ˜ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ์ฑ„ํƒํ•˜์˜€๊ณ , ์„œ๋ฒ„์™€ ๋””๋ฐ”์ด์Šค๋“ค์ด ๊ฐ๊ฐ ์ •ํ•ด์ง„ ์ˆœ์„œ์— ๋”ฐ๋ผ ๋‹ค์šด๋งํฌ ์ „์†ก ๋ฐ ์ˆ˜์‹ ์„ ์Šค์ผ€์ค„๋งํ•˜๋„๋ก ํ•˜์˜€๋‹ค. ์„ค๊ณ„ํ•œ ํ”„๋กœํ† ์ฝœ์ด ์ œ๋Œ€๋กœ ๋™์ž‘ํ•˜๋Š”์ง€ ๊ฒ€์ฆํ•˜๊ธฐ ์œ„ํ•ด์„œ ๊ธฐ์กด LoRaWAN์˜ ๊ตฌ์„ฑ ์š”์†Œ ์œ„์— ์ œ์•ˆ๋œ ํ”„๋กœํ† ์ฝœ์„ ๊ตฌํ˜„ํ•œ ํ›„ ์‹ค์ œ ํ…Œ์ŠคํŠธ ๋ฒ ๋“œ๋ฅผ ๊ตฌ์ถ•ํ•˜์—ฌ์„œ ์‹คํ—˜์„ ์ง„ํ–‰ํ•˜์˜€๋‹ค. ์‹คํ—˜ ๊ฒฐ๊ณผ์— ๋”ฐ๋ฅด๋ฉด TRILO๋Š” ๊ธฐ์กด ํ”„๋กœํ† ์ฝœ์˜ ์—…๋งํฌ ํ†ต์‹  ์„ฑ๋Šฅ์„ ์ €ํ•ดํ•˜์ง€ ์•Š์œผ๋ฉด์„œ๋„ ์ถ”๊ฐ€์ ์ธ ๋‹ค์šด๋งํฌ ํ”„๋ ˆ์ž„์„ ์†์‹ค ์—†์ด ์„ฑ๊ณต์ ์œผ๋กœ ์ „์†ก ๋ฐ ์ˆ˜์‹ ํ•˜์˜€๊ณ , ์ปดํ“จํ„ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ ๋˜ํ•œ ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์ด ๊ธฐ์กด์˜ LoRaWAN ๋‹ค์šด๋งํฌ ํ”„๋กœํ† ์ฝœ๋ณด๋‹ค ๋” ์—๋„ˆ์ง€ ํšจ์œจ์ ์œผ๋กœ ๋™์ž‘ํ•˜๋Š” ๊ฒƒ์„ ๋ณด์—ฌ์ฃผ์—ˆ๋‹ค.ABSTRACT ........................................................................................................... โ…ฐ CONTENTS ........................................................................................................... โ…ฒ LIST OF FIGURES ............................................................................................ โ…ณ LIST OF TABLES .............................................................................................. โ…ต CHAPTER โ… : Introduction ................................................................................ 1 CHAPTER โ…ก: Related Work ............................................................................. 8 CHAPTER โ…ข: A Primer on LoRa and LoRaWAN .................................. 11 CHAPTER โ…ฃ: Downlink Communications Scheme .................................. 17 4.1 Comparison of Two Polling Schemes ..................................... 19 4.2 Proposed Downlink Communications Scheme ....................... 26 CHAPTER โ…ค: Implementation ........................................................................ 28 CHAPTER โ…ฅ: Evaluation ................................................................................. 31 6.1 Experimental Results .................................................................... 32 6.2 Simulation Results ......................................................................... 37 CHAPTER โ…ฆ: Discussion ................................................................................. 42 CHAPTER โ…ง: Conclusion ................................................................................. 45 BIBLIOGRAPHY ................................................................................................... 47 ์ดˆ๋ก ........................................................................................................................... 51Maste

    Cluster based jamming and countermeasures for wireless sensor network MAC protocols

    Get PDF
    A wireless sensor network (WSN) is a collection of wireless nodes, usually with limited computing resources and available energy. The medium access control layer (MAC layer) directly guides the radio hardware and manages access to the radio spectrum in controlled way. A top priority for a WSN MAC protocol is to conserve energy, however tailoring the algorithm for this purpose can create or expose a number of security vulnerabilities. In particular, a regular duty cycle makes a node vulnerable to periodic jamming attacks. This vulnerability limits the use of use of a WSN in applications requiring high levels of security. We present a new WSN MAC protocol, RSMAC (Random Sleep MAC) that is designed to provide resistance to periodic jamming attacks while maintaining elements that are essential to WSN functionality. CPU, memory and especially radio usage are kept to a minimum to conserve energy while maintaining an acceptable level of network performance so that applications can be run transparently on top of the secure MAC layer. We use a coordinated yet pseudo-random duty cycle that is loosely synchronized across the entire network via a distributed algorithm. This thwarts an attacker\u27s ability to predict when nodes will be awake and likewise thwarts energy efficient intelligent jamming attacks by reducing their effectiveness and energy-efficiency to that of non-intelligent attacks. Implementing the random duty cycle requires additional energy usage, but also offers an opportunity to reduce asymmetric energy use and eliminate energy use lost to explicit neighbor discovery. We perform testing of RSMAC against non-secure protocols in a novel simulator that we designed to make prototyping new WSN algorithms efficient, informative and consistent. First we perform tests of the existing SMAC protocol to demonstrate the relevance of the novel simulation for estimating energy usage, data transmission rates, MAC timing and other relevant macro characteristics of wireless sensor networks. Second, we use the simulation to perform detailed testing of RSMAC that demonstrates its performance characteristics with different configurations and its effectiveness in confounding intelligent jammers

    Design Experiences on Single and Multi Radio Systems in Wireless Embedded Platforms

    Get PDF
    The progress of radio technology has made several flavors of radio available on the market.Wireless sensor network platform designers have used these radios to build a variety of platforms. Withnew applications and different types of radios on wireless sensing nodes, it is often hard to interconnectdifferent types of networks. Hence, often additional radios have to be integrated onto existingplatforms or new platforms have to be built. Additionally, the energy consumption of these nodes have to be optimized to meetlifetime requirements of years without recharging.In this thesis, we address two issues of single and multi radio platform designfor wireless sensor network applications - engineering issues and energy optimization.We present a set of guiding principles from our design experiences while building 3 real life applications,namely asset tracking, burglar tracking and finally in-situ psychophysiological stress monitoring of human subjects in behavioral studies.In the asset tracking application, we present our design of a tag node that can be hidden inside valuable personal assets such asprinters or sofas in a home. If these items are stolen, a city wide anchor node infrastructure networkwould track them throughout the city. We also present our design for the anchor node.In the burglar tracking application, we present the design of tag nodes and the issueswe faced while integrating it with a GSM radio. Finally, we discuss our experiencesin designing a bridge node, that connects body worn physiological sensorsto a Bluetooth enabled mobile smartphone. We present the software framework that acts as middleware toconnect to the bridge, parse the sensor data, and send it to higher layers of the softwareframework.We describe 2 energy optimization schemes that are used in the Asset Tracking and the Burglar Tracking applications, that enhance the lifetime of the individual applications manifold.In the asset tracking application,we design a grouping scheme that helps increase reliability of detection of the tag nodes at theanchor nodes while reducing the energy consumption of the group of tag nodes travelling together.We achieve an increase of 5 times improvement in lifetime of the entire group. In the Burglar Tracking application, weuse sensing to determine when to turn the GSM radio on and transmit data by differentiatingturns and lane changes. This helps us reduce the number of times the GSM radio is woken up, thereby increasing thelifetime of the tag node while it is being tracked. This adds 8 minutes of trackablelifetime to the burglar tracking tag node. We conclude this thesis by observing the futuretrends of platform design and radio evolution

    Low power body sensor network design based on relaying of creeping waves in the unlicensed 2.4GHz band

    Get PDF
    Body Sensor Networks are an important enabling technology for future applications in remote medical diagnostics. Practical deployments of these systems have only recently edged closer to viability, due in part to advances in low power electronics and System-On-Chip devices. Wireless communication between these sensors remains a daunting challenge, and designers typically leverage existing industrial standards designed for applications with significantly different communications requirements. This Thesis proposes a wireless communications platform designed specifically for body mounted sensors, exploiting a phenomenon in electromagnetic wave propagation known as a creeping wave. Relaying of these waves leads to a highly reliable body sensor network with very low power consumption in the unlicensed 2.4 GHz band. A link budget is derived based on the creeping wave component of the transmitted signal, which is then used to design a spread spectrum wireless transceiver. Significant attention is given to interference mitigation, allowing the system to co-exist with other wireless devices on the internationally unlicensed band. Fading statistics from both anechoic and high multipath scenarios are used to define a channel model for the system. The link budget and channel model lead to the proposed use of relaying as a power savings technique, and this concept is a core feature of the design. This technique is shown to provide reliable total body coverage with very low transmission power, a result that has eluded body sensor networks to date. Various relaying topologies are discussed, and robust operation for highly mobile users is achieved via sensor handoffs, a concept that resembles a similar solution in cellular networks. The design extends to define a polling protocol and packet structures. Objective performance metrics are defined, and the proposed system is evaluated in line with these metrics. The power reduction of the suggested approach is analyzed by comparing the network lifetime and energy-per-bit to those of a reference system offering the same quality of service without relaying. The analysis results in generic closed form expressions of significant gains. The improvement in network lifetime increases with the number of sensors and settles at approximately 8x104, 7x106, 7x107 and 3x108 for 2,4,6 and 8 relaying nodes respectively. The energy-per-bit is shown to decrease by 2, 116, 828 and 2567 for 2, 4, 6 and 8 relay nodes respectively

    Energy Efficient Protocols for Delay Tolerant Networks

    Get PDF
    The delay tolerant networks (DTNs) is characterized by frequent disconnections and long delays of links among devices due to mobility, sparse deployment of devices, attacks, and noise, etc. Considerable research efforts have been devoted recently to DTNs enabling communications between network entities with intermittent connectivity. Unfortunately, mobile devices have limited energy capacity, and the fundamental problem is that traditional power-saving mechanisms are designed assuming well connected networks. Due to much larger inter-contact durations than contact durations, devices spend most of their life time in the neighbor discovery, and centralized power-saving strategies are difficult. Consequently, mobile devices consume a significant amount of energy in the neighbor discovery, rather than in infrequent data transfers. Therefore, distributed energy efficient neighbor discovery protocols for DTNs are essential to minimize the degradation of network connectivity and maximize the benefits from mobility. In this thesis, we develop sleep scheduling protocols in the medium access control (MAC) layer that are adaptive and distributed under different clock synchronization conditions: synchronous, asynchronous, and semi-asynchronous. In addition, we propose a distributed clock synchronization protocol to mitigate the clock synchronization problem in DTNs. Our research accomplishments are briefly outlined as follows: Firstly, we design an adaptive exponential beacon (AEB) protocol. By exploiting the trend of contact availability, beacon periods are independently adjusted by each device and optimized using the distribution of contact durations. The AEB protocol significantly reduces energy consumption while maintaining comparable packet delivery delay and delivery ratio. Secondly, we design two asynchronous clock based sleep scheduling (ACDS) protocols. Based on the fact that global clock synchronization is difficult to achieve in general, predetermined patterns of sleep schedules are constructed using hierarchical arrangements of cyclic difference sets such that devices independently selecting different duty cycle lengths are still guaranteed to have overlapping awake intervals with other devices within the communication range. Thirdly, we design a distributed semi-asynchronous sleep scheduling (DSA) protocol. Although the synchronization error is unavoidable, some level of clock accuracy may be possible for many practical scenarios. The sleep schedules are constructed to guarantee contacts among devices having loosely synchronized clocks, and parameters are optimized using the distribution of synchronization error. We also define conditions for which the proposed semi-asynchronous protocol outperforms existing asynchronous sleep scheduling protocols. Lastly, we design a distributed clock synchronization (DCS) protocol. The proposed protocol considers asynchronous and long delayed connections when exchanging relative clock information among nodes. As a result, smaller synchronization error achieved by the proposed protocol allows more accurate timing information and renders neighbor discovery more energy efficient. The designed protocols improve the lifetime of mobile devices in DTNs by means of energy efficient neighbor discoveries that reduce the energy waste caused by idle listening problems
    • โ€ฆ
    corecore