226 research outputs found

    A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Full text link
    Motivated by the benefits of small world networks, we propose a self-organization framework for wireless ad hoc networks. We investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, we identify crucial design issues for algorithm design. Our results show that, while significant path length reduction is achievable, this is accompanied by the problem of asymmetric paths between nodes. Subsequently, we propose a distributed algorithm for small world creation that achieves path length reduction while maintaining connectivity. We define a new centrality measure that estimates the structural importance of nodes based on traffic flow in the network, which is used to identify the optimum nodes for beamforming. We show, using simulations, that this leads to significant reduction in path length while maintaining connectivity.Comment: Submitted to IEEE Transactions on Vehicular Technolog

    In-Network Outlier Detection in Wireless Sensor Networks

    Full text link
    To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy usage,(3) only uses single hop communication thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance using simulation with real sensor data streams. Our results demonstrate that our approach is accurate and imposes a reasonable communication load and level of power consumption.Comment: Extended version of a paper appearing in the Int'l Conference on Distributed Computing Systems 200

    Interference mitigation in wireless mesh networks through radio co-location aware conflict graphs

    Get PDF
    Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest. But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference. Conflict Graphs are indispensable tools used to theoretically represent and estimate the interference in wireless networks. We propose a generic algorithm to generate conflict graphs which is independent of the underlying interference model. Further, we propose the notion of radio co-location interference, which is caused and experienced by spatially co-located radios in multi-radio multi-channel WMNs. We experimentally validate the concept, and propose a new all-encompassing algorithm to create a radio co-location aware conflict graph. Our novel conflict graph generation algorithm is demonstrated to be significantly superior and more efficient than the conventional approach, through theoretical interference estimates and comprehensive experiments. The results of an extensive set of ns-3 simulations run on the IEEE 802.11g platform strongly indicate that the radio co-location aware conflict graphs are a marked improvement over their conventional counterparts. We also question the use of total interference degree as a reliable metric to predict the performance of a Channel Assignment scheme in a given WMN deployment

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    Get PDF

    Energy-Efficient Self-Organization Protocols for Sensor Networks

    Get PDF
    A Wireless Sensor Network (WSN, for short) consists of a large number of very small sensor devices deployed in an area of interest for gathering and delivery information. The fundamental goal of a WSN is to produce, over an extended period of time, global information from local data obtained by individual sensors. The WSN technology will have a significant impact on a wide array of applications on the efficiency of many civilian and military applications including combat field surveillance, intrusion detection, disaster management among many others. The basic management problem in the WSN is to balance the utility of the activity in the network against the cost incurred by the network resources to perform this activity. Since the sensors are battery powered and it is impossible to change or recharge batteries after the sensors are deployed, promoting system longevity becomes one of the most important design goals instead of QoS provisioning and bandwidth efficiency. On the other hand the self-organization ability is essential for the WSN due to the fact that the sensors are randomly deployed and they work unattended. We developed a self-organization protocol, which creates a multi-hop communication infrastructure capable of utilizing the limited resources of sensors in an adaptive and efficient way. The resulting general-purpose infrastructure is robust, easy to maintain and adapts well to various application needs. Important by-products of our infrastructure include: (1) Energy efficiency: in order to save energy and to extend the longevity of the WSN sensors, which are in sleep mode most of the time. (2) Adaptivity: the infrastructure is adaptive to network size, network topology, network density and application requirement. (3) Robustness: the degree to which the infrastructure is robust and resilient. Analytical results and simulation confirmed that our self-organization protocol has a number of desirable properties and compared favorably with the leading protocols in the literature

    A trust framework for peer-to-peer interaction in ad hoc networks

    Get PDF
    PhDAs a wider public is increasingly adopting mobile devices with diverse applications, the idea of who to trust while on the move becomes a crucial one. The need to find dependable partners to interact is further exacerbated in situations where one finds oneself out of the range of backbone structures such as wireless base stations or cellular networks. One solution is to generate self-started networks, a variant of which is the ad hoc network that promotes peer-to-peer networking. The work in this thesis is aimed at defining a framework for such an ad hoc network that provides ways for participants to distinguish and collaborate with their most trustworthy neighbours. In this framework, entities create the ability to generate trust information by directly observing the behaviour of their peers. Such trust information is also shared in order to assist those entities in situations where prior interactions with their target peers may not have existed. The key novelty points of the framework focus on aggregating the trust evaluation process around the most trustworthy nodes thereby creating a hierarchy of nodes that are distinguished by the class, defined by cluster heads, to which they belong. Furthermore, the impact of such a framework in generating additional overheads for the network is minimised through the use of clusters. By design, the framework also houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation. Key performance indicators are also defined within this work that allow a framework to be quickly analysed through snapshot data, a concept analogous to those used within financial circles when assessing companies. This is also a novel point that may provide the basis for directly comparing models with different underlying technologies. The end result is a trust framework that fully meets the basic requirements for a sustainable model of trust that can be developed onto an ad hoc network and that provides enhancements in efficiency (using clustering) and trust performance
    corecore