921 research outputs found

    A Coverage Monitoring algorithm based on Learning Automata for Wireless Sensor Networks

    Full text link
    To cover a set of targets with known locations within an area with limited or prohibited ground access using a wireless sensor network, one approach is to deploy the sensors remotely, from an aircraft. In this approach, the lack of precise sensor placement is compensated by redundant de-ployment of sensor nodes. This redundancy can also be used for extending the lifetime of the network, if a proper scheduling mechanism is available for scheduling the active and sleep times of sensor nodes in such a way that each node is in active mode only if it is required to. In this pa-per, we propose an efficient scheduling method based on learning automata and we called it LAML, in which each node is equipped with a learning automaton, which helps the node to select its proper state (active or sleep), at any given time. To study the performance of the proposed method, computer simulations are conducted. Results of these simulations show that the pro-posed scheduling method can better prolong the lifetime of the network in comparison to similar existing method

    A Review on Sensor Node Placement Techniques in Wireless Sensor Networks

    Get PDF
    One way to provide Wireless Sensor Network (WSN) with maximum coverage, maximum connectivity, minimum deployment cost and minimum energy consumption is through an effective planning mechanism in arranging an optimum number of sensor nodes. Proper planning will provide a cost-effective deployment by having optimal placements for the sensor nodes. Sensor node placement schemes are needed to accommodate the balance of coverage and energy consumption since closer sensor nodes not only reduces the energy consumption but will result in the network coverage becoming smaller. This paper critically reviews the research and development work done in sensor node placement. Based on the review, the design objectives that need to be considered are identified. Most of the work reviewed focused on two or three design objectives

    The design and implementation of fuzzy query processing on sensor networks

    Get PDF
    Sensor nodes and Wireless Sensor Networks (WSN) enable observation of the physical world in unprecedented levels of granularity. A growing number of environmental monitoring applications are being designed to leverage data collection features of WSN, increasing the need for efficient data management techniques and for comparative analysis of various data management techniques. My research leverages aspects of fuzzy database, specifically fuzzy data representation and fuzzy or flexible queries to improve upon the efficiency of existing data management techniques by exploiting the inherent uncertainty of the data collected by WSN. Herein I present my research contributions. I provide classification of WSN middleware to illustrate varying approaches to data management for WSN and identify a need to better handle the uncertainty inherent in data collected from physical environments and to take advantage of the imprecision of the data to increase the efficiency of WSN by requiring less information be transmitted to adequately answer queries posed by WSN monitoring applications. In this dissertation, I present a novel approach to querying WSN, in which semantic knowledge about sensor attributes is represented as fuzzy terms. I present an enhanced simulation environment that supports more flexible and realistic analysis by using cellular automata models to separately model the deployed WSN and the underlying physical environment. Simulation experiments are used to evaluate my fuzzy query approach for environmental monitoring applications. My analysis shows that using fuzzy queries improves upon other data management techniques by reducing the amount of data that needs to be collected to accurately satisfy application requests. This reduction in data transmission results in increased battery life within sensors, an important measure of cost and performance for WSN applications

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    Cellular Automata Applications in Shortest Path Problem

    Full text link
    Cellular Automata (CAs) are computational models that can capture the essential features of systems in which global behavior emerges from the collective effect of simple components, which interact locally. During the last decades, CAs have been extensively used for mimicking several natural processes and systems to find fine solutions in many complex hard to solve computer science and engineering problems. Among them, the shortest path problem is one of the most pronounced and highly studied problems that scientists have been trying to tackle by using a plethora of methodologies and even unconventional approaches. The proposed solutions are mainly justified by their ability to provide a correct solution in a better time complexity than the renowned Dijkstra's algorithm. Although there is a wide variety regarding the algorithmic complexity of the algorithms suggested, spanning from simplistic graph traversal algorithms to complex nature inspired and bio-mimicking algorithms, in this chapter we focus on the successful application of CAs to shortest path problem as found in various diverse disciplines like computer science, swarm robotics, computer networks, decision science and biomimicking of biological organisms' behaviour. In particular, an introduction on the first CA-based algorithm tackling the shortest path problem is provided in detail. After the short presentation of shortest path algorithms arriving from the relaxization of the CAs principles, the application of the CA-based shortest path definition on the coordinated motion of swarm robotics is also introduced. Moreover, the CA based application of shortest path finding in computer networks is presented in brief. Finally, a CA that models exactly the behavior of a biological organism, namely the Physarum's behavior, finding the minimum-length path between two points in a labyrinth is given.Comment: To appear in the book: Adamatzky, A (Ed.) Shortest path solvers. From software to wetware. Springer, 201

    Propose effective routing method for mobile sink in wireless sensor network

    Get PDF
    Wireless sensor network is one of the popular technologies used for maximizing the lifetime of network and to enhance the data collection process and energy efficiency by mobility. So, this work was proposed and focused on sink mobility which plays a key role in data collection process. The main challenge task was to discover the route in the active network. We have proposed an opportunistic algorithm in this paper with mobile sink to discover the ideal path starting the source to destination node. The proposed system has focused on a sensor field to sense and to report on building during fires where the sensors could be destroyed. The proposed system was evaluated through simulation and compared with existing algorithms (Genetic algorithm, multi-layer perceptron neural network). The performance which showed data delivery can be increased by up to 95%

    A Deterministic Algorithm for the Deployment of Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made up by communicating sensor nodes that gather and elaborate information from real world in a distributed and coordinated way in order to deliver an intelligent support to human activities. They are used in many fields such as national security, surveillance, health care, biological detection, and environmental monitoring. However, sensor nodes are characterized by limited wireless communication and computing capabilities as well as reduced on-board battery power. Therefore, they have to be carefully deployed in order to cover the areas to be monitored without impairing network lifetime. This paper presents a new deterministic algorithm to solve the coverage problem of well-known areas by means of wireless sensor networks. The proposed algorithm depends on a small set of parameters and can control sensor deployment within areas even in the presence of obstacles. Moreover, the algorithm makes it possible to control the redundancy degree that can be obtained in covering a region of interest so as to achieve a network deployment characterized by a minimum number of wireless sensor nodes

    Deterministic Static Sensor Node Placement in Wireless Sensor Network based on Territorial Predator Scent Marking Behaviour

    Get PDF
    An optimum sensor node placement mechanism for Wireless Sensor Network (WSN) is desirable in ensuring the location of sensor nodes offers maximum coverage and connectivity with minimum energy consumption. This paper proposes a sensor node placement algorithm that utilizes a new biologically inspired optimization algorithm that imitates the behaviour of a territorial predator in marking their territories with their odours known as Territorial Predator Scent Marking Algorithm (TPSMA). The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm. The proposed single objective approaches of TPSMA studied in this paper are TPSMA with minimum energy and TPSMA with maximum coverage. Simulation results show that the WSN deployed using the proposed TPSMA sensor node placement algorithm is able to arrange the sensor nodes according to the objective required; TPSMA with maximum coverage offers the highest coverage ratio with fewer sensor nodes up to 100% coverage while TPSMA with minimum energy consumption utilized the lowest energy as low as around 4.85 Joules. Full connectivity is provisioned for all TPSMA approaches since the constraint of the optimization problem is to ensure the connectivity from all sensor nodes to the sink node

    A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems

    Get PDF
    The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in a variety of different network types and protocols. To shed light on these issues, this paper is concerned with advancements in intrusion detection practices in IoT. It provides a comprehensive review of current Intrusion Detection Systems (IDS) for IoT technologies, focusing on architecture types. A proposal for future directions in IoT based IDS are then presented and evaluated. We show how traditional practices are unsuitable due to their inherent features providing poor coverage of the IoT domain. In order to develop a secure, robust and optimised solution for these networks, the current research for intrusion detection in IoT will need to move in a different direction. An example of which is proposed in order to illustrate how malicious nodes might be passively detected
    • …
    corecore