921 research outputs found
A Coverage Monitoring algorithm based on Learning Automata for Wireless Sensor Networks
To cover a set of targets with known locations within an area with limited or
prohibited ground access using a wireless sensor network, one approach is to
deploy the sensors remotely, from an aircraft. In this approach, the lack of
precise sensor placement is compensated by redundant de-ployment of sensor
nodes. This redundancy can also be used for extending the lifetime of the
network, if a proper scheduling mechanism is available for scheduling the
active and sleep times of sensor nodes in such a way that each node is in
active mode only if it is required to. In this pa-per, we propose an efficient
scheduling method based on learning automata and we called it LAML, in which
each node is equipped with a learning automaton, which helps the node to select
its proper state (active or sleep), at any given time. To study the performance
of the proposed method, computer simulations are conducted. Results of these
simulations show that the pro-posed scheduling method can better prolong the
lifetime of the network in comparison to similar existing method
A Review on Sensor Node Placement Techniques in Wireless Sensor Networks
One way to provide Wireless Sensor Network (WSN) with maximum coverage, maximum connectivity, minimum deployment cost and minimum energy consumption is through an effective planning mechanism in arranging an optimum number of sensor nodes. Proper planning will provide a cost-effective deployment by having optimal placements for the sensor nodes. Sensor node placement schemes are needed to accommodate the balance of coverage and energy consumption since closer sensor nodes not only reduces the energy consumption but will result in the network coverage becoming smaller. This paper critically reviews the research and development work done in sensor node placement. Based on the review, the design objectives that need to be considered are identified. Most of the work reviewed focused on two or three design objectives
The design and implementation of fuzzy query processing on sensor networks
Sensor nodes and Wireless Sensor Networks (WSN) enable observation of the physical world in unprecedented levels of granularity. A growing number of environmental monitoring applications are being designed to leverage data collection features of WSN, increasing the need for efficient data management techniques and for comparative analysis of various data management techniques. My research leverages aspects of fuzzy database, specifically fuzzy data representation and fuzzy or flexible queries to improve upon the efficiency of existing data management techniques by exploiting the inherent uncertainty of the data collected by WSN. Herein I present my research contributions. I provide classification of WSN middleware to illustrate varying approaches to data management for WSN and identify a need to better handle the uncertainty inherent in data collected from physical environments and to take advantage of the imprecision of the data to increase the efficiency of WSN by requiring less information be transmitted to adequately answer queries posed by WSN monitoring applications.
In this dissertation, I present a novel approach to querying WSN, in which semantic knowledge about sensor attributes is represented as fuzzy terms. I present an enhanced simulation environment that supports more flexible and realistic analysis by using cellular automata models to separately model the deployed WSN and the underlying physical environment. Simulation experiments are used to evaluate my fuzzy query approach for environmental monitoring applications. My analysis shows that using fuzzy queries improves upon other data management techniques by reducing the amount of data that needs to be collected to accurately satisfy application requests. This reduction in data transmission results in increased battery life within sensors, an important measure of cost and performance for WSN applications
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
Cellular Automata Applications in Shortest Path Problem
Cellular Automata (CAs) are computational models that can capture the
essential features of systems in which global behavior emerges from the
collective effect of simple components, which interact locally. During the last
decades, CAs have been extensively used for mimicking several natural processes
and systems to find fine solutions in many complex hard to solve computer
science and engineering problems. Among them, the shortest path problem is one
of the most pronounced and highly studied problems that scientists have been
trying to tackle by using a plethora of methodologies and even unconventional
approaches. The proposed solutions are mainly justified by their ability to
provide a correct solution in a better time complexity than the renowned
Dijkstra's algorithm. Although there is a wide variety regarding the
algorithmic complexity of the algorithms suggested, spanning from simplistic
graph traversal algorithms to complex nature inspired and bio-mimicking
algorithms, in this chapter we focus on the successful application of CAs to
shortest path problem as found in various diverse disciplines like computer
science, swarm robotics, computer networks, decision science and biomimicking
of biological organisms' behaviour. In particular, an introduction on the first
CA-based algorithm tackling the shortest path problem is provided in detail.
After the short presentation of shortest path algorithms arriving from the
relaxization of the CAs principles, the application of the CA-based shortest
path definition on the coordinated motion of swarm robotics is also introduced.
Moreover, the CA based application of shortest path finding in computer
networks is presented in brief. Finally, a CA that models exactly the behavior
of a biological organism, namely the Physarum's behavior, finding the
minimum-length path between two points in a labyrinth is given.Comment: To appear in the book: Adamatzky, A (Ed.) Shortest path solvers. From
software to wetware. Springer, 201
Propose effective routing method for mobile sink in wireless sensor network
Wireless sensor network is one of the popular technologies used for maximizing the lifetime of network and to enhance the data collection process and energy efficiency by mobility. So, this work was proposed and focused on sink mobility which plays a key role in data collection process. The main challenge task was to discover the route in the active network. We have proposed an opportunistic algorithm in this paper with mobile sink to discover the ideal path starting the source to destination node. The proposed system has focused on a sensor field to sense and to report on building during fires where the sensors could be destroyed. The proposed system was evaluated through simulation and compared with existing algorithms (Genetic algorithm, multi-layer perceptron neural network). The performance which showed data delivery can be increased by up to 95%
A Deterministic Algorithm for the Deployment of Wireless Sensor Networks
Wireless sensor networks are made up by communicating sensor nodes that gather and elaborate information from real world in a distributed and coordinated way in order to deliver an intelligent support to human activities. They are used in many fields such as national security, surveillance, health care, biological detection, and environmental monitoring. However, sensor nodes are characterized by limited wireless communication and computing capabilities as well as reduced on-board battery power. Therefore, they have to be carefully deployed in order to cover the areas to be monitored without impairing network lifetime. This paper presents a new deterministic algorithm to solve the coverage problem of well-known areas by means of wireless sensor networks. The proposed algorithm depends on a small set of parameters and can control sensor deployment within areas even in the presence of obstacles. Moreover, the algorithm makes it possible to control the redundancy degree that can be obtained in covering a region of interest so as to achieve a network deployment characterized by a minimum number of wireless sensor nodes
Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour
An optimum sensor node placement mechanism for Wireless Sensor Network (WSN) is desirable in ensuring the location of sensor nodes offers maximum coverage and connectivity with minimum energy consumption. This paper proposes a sensor node placement algorithm that utilizes a new biologically inspired optimization algorithm that imitates the behaviour of a territorial predator in marking their territories with their odours known as Territorial Predator Scent Marking Algorithm (TPSMA). The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm. The proposed single objective approaches of TPSMA studied in this paper are TPSMA with minimum energy and TPSMA with maximum coverage. Simulation results show that the WSN deployed using the proposed TPSMA sensor node placement algorithm is able to arrange the sensor nodes according to the objective required; TPSMA with maximum coverage offers the highest coverage ratio with fewer sensor nodes up to 100% coverage while TPSMA with minimum energy consumption utilized the lowest energy as low as around 4.85 Joules. Full connectivity is provisioned for all TPSMA approaches since the constraint of the optimization problem is to ensure the connectivity from all sensor nodes to the sink node
A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in a variety of different network types and protocols. To shed light on these issues, this paper is concerned with advancements in intrusion detection practices in IoT. It provides a comprehensive review of current Intrusion Detection Systems (IDS) for IoT technologies, focusing on architecture types. A proposal for future directions in IoT based IDS are then presented and evaluated. We show how traditional practices are unsuitable due to their inherent features providing poor coverage of the IoT domain. In order to develop a secure, robust and optimised solution for these networks, the current research for intrusion detection in IoT will need to move in a different direction. An example of which is proposed in order to illustrate how malicious nodes might be passively detected
- …