7,077 research outputs found
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited
devices. The devices cooperate to monitor one or more physical phenomena within
an area of interest. WSNs operate as stochastic systems because of randomness
in the monitored environments. For long service time and low maintenance cost,
WSNs require adaptive and robust methods to address data exchange, topology
formulation, resource and power optimization, sensing coverage and object
detection, and security challenges. In these problems, sensor nodes are to make
optimized decisions from a set of accessible strategies to achieve design
goals. This survey reviews numerous applications of the Markov decision process
(MDP) framework, a powerful decision-making tool to develop adaptive algorithms
and protocols for WSNs. Furthermore, various solution methods are discussed and
compared to serve as a guide for using MDPs in WSNs
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks
This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each subset also plays an important role in sensor network performance because when active sensors periodically send data to base stations, contention for channel access must be considered. The number of available channels imposes a limit on the cardinality of each subset. Coverage breach happens when a subset of sensors cannot completely cover all the targets. To make efficient use of both energy and bandwidth with a minimum coverage breach is the goal of sensor network design. This paper presents the minimum breach problem using a mathematical model, studies the computational complexity of the problem, and provides two approximate heuristics. Effects of increasing the number of channels and increasing the number of sensors on sensor network coverage are studied through numerical simulations. Overall, the simulation results reveal that when the number of sensors increases, network lifetimes can be improved without loss of network coverage if there is no bandwidth constraint; with bandwidth constraints, network lifetimes may be improved further at the cost of coverage breach
Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks
International audienceThere is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks of weak computation and battery power. In this paper, our aim is to prolong the whole network lifetime while fulfilling the surveillance application needs. We present a novel scheduling algorithm where only a subset of video nodes contribute significantly to detect intruders and prevent malicious attacker to predict the behavior of the network prior to intrusion. Our approach is chaos-based, where every node based on its last detection, a hash value and some pseudo-random numbers easily computes a decision function to go to sleep or active mode. We validate the efficiency of our approach through theoretical analysis and demonstrate the benefits of our scheduling algorithm by simulations. Results show that in addition of being able to increase the whole network lifetime and to present comparable results against random attacks (low stealth time), our scheme is also able to withstand malicious attacks due to its fully unpredictable behavior
Solving Target Coverage Problem in Wireless Sensor Network Using Genetic Algorithm
The past few years have seen tremendous increase of interest in the field of wireless sensor network. These wireless sensor network comprise numerous small sensor nodes distributed in an area and collect specific data from that area. The nodes comprising a network are mostly battery driven and hence have a limited amount of energy. The target coverage deals with the surveillance of the area under consideration taking into account the energy constraint associated with nodes. In nutshell, the lifetime of the network is to be maximized while ensuring that all the targets are monitored. The approach of segregating the nodes into various covers is used such that each cover can monitor all the targets while other nodes in remaining covers are in sleep state. The covers are scheduled to operate in turn thereby ensuring that the targets are monitored all the time and the lifetime of the network is also maximized. The segregation method is based on Maximum Set Cover (MSC) problem which is transformed into Maximum Disjoint Set Cover problem (MDSC). This problem of finding Maximum Disjoint Set Cover falls under the category of NP-Complete problem. Hence, two heuristics based approach are discussed in this work; first Greedy Heuristic is implemented to be used as baseline. Then a Genetic Algorithm based approach is proposed that can solve this problem by evolutionary global search technique. The existing and proposed algorithms are coded and functionality verified using MATLAB R2010b and performance evaluation and comparisons are made in terms of number of sensors and sensing range
Biologically inspired, self organizing communication networks.
PhDThe problem of energy-efficient, reliable, accurate and self-organized target tracking in
Wireless Sensor Networks (WSNs) is considered for sensor nodes with limited physical
resources and abrupt manoeuvring mobile targets. A biologically inspired, adaptive
multi-sensor scheme is proposed for collaborative Single Target Tracking (STT) and
Multi-Target Tracking (MTT). Behavioural data obtained while tracking the targets
including the targetsâ previous locations is recorded as metadata to compute the target
sampling interval, target importance and local monitoring interval so that tracking
continuity and energy-efficiency are improved. The subsequent sensor groups that track
the targets are selected proactively according to the information associated with the
predicted target location probability such that the overall tracking performance is
optimized or nearly-optimized. One sensor node from each of the selected groups is
elected as a main node for management operations so that energy efficiency and load
balancing are improved. A decision algorithm is proposed to allow the âconflictâ nodes
that are located in the sensing areas of more than one target at the same time to decide
their preferred target according to the target importance and the distance to the target. A
tracking recovery mechanism is developed to provide the tracking reliability in the
event of target loss.
The problem of task mapping and scheduling in WSNs is also considered. A
Biological Independent Task Allocation (BITA) algorithm and a Biological Task
Mapping and Scheduling (BTMS) algorithm are developed to execute an application
using a group of sensor nodes. BITA, BTMS and the functional specialization of the
sensor groups in target tracking are all inspired from biological behaviours of
differentiation in zygote formation.
Simulation results show that compared with other well-known schemes, the
proposed tracking, task mapping and scheduling schemes can provide a significant
improvement in energy-efficiency and computational time, whilst maintaining
acceptable accuracy and seamless tracking, even with abrupt manoeuvring targets.Queen Mary university of London full Scholarshi
- âŠ