60 research outputs found

    DISTRIBUTED MULTI-HOP ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKS

    Get PDF
    In a Wireless Sensor Network (WSN), routing is the process of finding a cost-effective route in terms of power consumption. As an evaluation criterion for the WSN performance, network lifetime is directly affected by the routing method. In a wide variety of WSNs, different techniques are used as routing methods, such as shortest distance path. In this paper, we propose a novel algorithm, optimizing power consumption in WSN nodes, based on the shortest path algorithm. In this approach, the energy level of nodes and their geographical distance from each other contribute to the weight of the connecting path. The proposed algorithm is used as a data dissemination method in WSNs with randomly scattered nodes. We also apply Dijkstra’s shortest path algorithm to the same networks. The results showed that the proposed algorithm increases the network lifetime up to 30 % by preventing nodes with low charge levels from early disconnection

    EAGP: An energy-aware gossip protocol for wireless sensor networks

    Get PDF
    In Wireless Sensor Networks (WSN), typically composed of nodes with resource constraints, leveraging efficient processes is crucial to enhance the network lifetime and, consequently, the sustainability in ultra-dense and heterogeneous environments, such as smart cities. Particularly, balancing the energy required to transport data efficiently across such dynamic environments poses significant challenges to routing protocol design and operation, being the trade-off of reducing data redundancy while achieving an acceptable delivery rate a fundamental research topic. In this way, this work proposes a new energy-aware epidemic protocol that uses the current state of the network energy to create a dynamic distribution topology by self-adjusting each node forwarding behavior as eager or lazy according to the local residual battery. Simulated evaluations demonstrate its efficiency in energy consumption, delivery rate, and reduced computational burden when compared with classical gossip protocols as well as with a directional protocol.FCT -Fundação para a Ciência e a Tecnologia(UIDB/50014/2020

    Performance Evaluation of Gradient Routing Strategies for Wireless Sensor Networks

    Get PDF
    International audienceWe consider Wireless Sensor Networks (WSN) applications in which sensors have to send data to a unique sink in a multi-hop fashion. Gradient routing protocol is a scalable way to route data in these applications. Many gradient routing protocols exist, they mainly differ in their performances (delay, delivery ratio, etc.). In this paper, we propose an extensive performance evaluation study of some gradient routing protocols in order to give guidelines for WSN developers

    Effect of steel fibre volume fraction on thermal performance of lightweight foamed mortar (LFM) at ambient temperature

    Get PDF
    Lightweight foamed mortar (LFM) has grow into utmost commercial building material in the construction industry for non-structural and semi-structural applications owing to its reduced self-weight, flowability, stability and excellent thermal insulation properties. Hence, this study was conducted with the aims to develop an alternative for conventional concrete bricks and blocks for non-structural and semi-structural applications of masonry. Lightweight foamed mortar (LFM) is either a cement paste or mortar, relegated as lightweight concrete, in which suitable foaming agent entraps the air-voids in mortar. It therefore has a wide range of applications such as material for wall blocks or panels, floor & roof screeds, trench reinstatement, road foundations and voids filling. This research focuses on experimental investigation of thermal properties of LFM with inclusion of relatively low volume fraction (0.2% and 0.4%) of steel fibre at ambient temperature. There are three parameters will be scrutinized such as thermal conductivity, thermal diffusivity as well as the specific heat capacity. There are two densities of 600kg/m3 and 1200kg/m3 had been cast and tested. The mix design proportion of LFM used for cement, aggregate and water ratio was 1: 1.5:0.45. The experimental results had indicated that the thermal conductivity, thermal diffusivity and specific heat value slightly higher than control mix due to the addition of steel fibres. For instance, thermal conductivity, diffusivity and specific heat of 600 kg/m3 density control mix were 0.212W/mK, 0.477mm2/s and 545 J/kg◦C respectively. When 0.2% volume fraction of steel fiber was added in the mix of 600 kg/m3 density, the value of thermal conductivity, diffusivity and specific heat were increased to 0.235W/mK, 0.583mm2/s and 578 J/kg◦C correspondingly. This is due to the characteristic of the steel fibre application in which steel fibre is good as heat conductor and excellent in absorbing heat. Therefore there is a potential of utilizing steel fiber in cement based material like LFM for components that needs excellent heat absorption capacity

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Energy efficient routing towards a mobile sink using virtual coordinates in a wireless sensor network

    Get PDF
    The existence of a coordinate system can often improve the routing in a wireless sensor network. While most coordinate systems correspond to the geometrical or geographical coordinates, in recent years researchers had proposed the use of virtual coordinates. Virtual coordinates depend only on the topology of the network as defined by the connectivity of the nodes, without requiring geographical information. The work in this thesis extends the use of virtual coordinates to scenarios where the wireless sensor network has a mobile sink. One reason to use a mobile sink is to distribute the energy consumption more evenly among the sensor nodes and thus extend the life-time of the network. We developed two algorithms, MS-DVCR and CU-DVCR which perform routing towards a mobile sink using virtual coordinates. In contrast to the baseline virtual coordinate routing MS-DVCR limits routing updates triggered by the sink movement to a local area around the sink. In contrast, CU-DVCR limits the route updates to a circular area on the boundary of the local area. We describe the design justification and the implementation of these algorithms. Using a set of experimental studies, we show that MS-DVCR and CU-DVCR achieve a lower energy consumption compared to the baseline virtual coordinate routing without any noticeable impact on routing performance. In addition, CU-DVCR provides a lower energy consumption than MS-DVCR for the case of a fast moving sink

    Attacks on Geographic Routing Protocols for Wireless Sensor Network

    Get PDF
    With the increase in the military and several other applications of Wireless Sensor Network, provisions must be made for secure transmission of sensitive information throughout the network. Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing Protocols for wireless sensor networks are classified into three types depending on their network structure as Flat routing protocols, Hierarchical routing protocol and Geographic routing protocols. Large number of nodes in a wireless sensor network , limited battery power and their data centric nature make routing in wireless sensor network a challenging problem. We mainly concentrate on location-based or geographic routing protocol like Greedy Perimeter Stateless Routing Protocol. Sybil attack and Selective forwarding attack are the two attacks feasible in GPSR. These attacks are implemented in GPSR and their losses caused to the network are analysed
    corecore