1,238 research outputs found
Cooperative Coded Data Dissemination for Wireless Sensor Networks
In this poster paper we present a data dissemination transmission abstraction
for over the air programming (OAP) protocol which is fundamentally different
from the previous hop by hop transmission protocols. Instead of imposing the
greedy requirement that at least one node in the ith hop receives all packets
before transmitting packets to the next hop and its neighbours, we take
advantage of the spatial diversity and broadcast nature of wireless
transmission to adopt a cooperative approach in which node broadcast whatever
packets it has received with the expectation that it will recover the lost
packets with high probability by overhearing the broadcast transmissions of its
neighbours. The use of coded transmissions ensures that this does not lead to
the broadcast storm problem. We validate the improved performance our of
proposed transmission scheme with respect to the previous state of the art OAP
protocols on a proof-of-concept two-hops TelosB wireless sensor network
testbed.Comment: This paper appears in: 2016 13th Annual IEEE International Conference
on Sensing, Communication, and Networking (SECON), London, 2016, pp. 1-
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
This chapter discusses the need of security and privacy protection mechanisms
in aggregation protocols used in wireless sensor networks (WSN). It presents a
comprehensive state of the art discussion on the various privacy protection
mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed
by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA
protocol and proposes a mechanism to plug that vulnerability. To demonstrate
the need of security in aggregation process, the chapter further presents
various threats in WSN aggregation mechanisms. A large number of existing
protocols for secure aggregation in WSN are discussed briefly and a protocol is
proposed for secure aggregation which can detect false data injected by
malicious nodes in a WSN. The performance of the protocol is also presented.
The chapter concludes while highlighting some future directions of research in
secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs
The advent and development in the field of Wireless Sensor Networks (WSNs) in
recent years has seen the growth of extremely small and low-cost sensors that
possess sensing, signal processing and wireless communication capabilities.
These sensors can be expended at a much lower cost and are capable of detecting
conditions such as temperature, sound, security or any other system. A good
protocol design should be able to scale well both in energy heterogeneous and
homogeneous environment, meet the demands of different application scenarios
and guarantee reliability. On this basis, we have compared six different
protocols of different scenarios which are presenting their own schemes of
energy minimizing, clustering and route selection in order to have more
effective communication. This research is motivated to have an insight that
which of the under consideration protocols suit well in which application and
can be a guide-line for the design of a more robust and efficient protocol.
MATLAB simulations are performed to analyze and compare the performance of
LEACH, multi-level hierarchal LEACH and multihop LEACH.Comment: NGWMN with 7th IEEE Inter- national Conference on Broadband and
Wireless Computing, Communication and Applications (BWCCA 2012), Victoria,
Canada, 201
A Cross-Layer Design Framework for Wireless Sensor Networks with Environmental Monitoring Applications
In the past few years, wireless sensor networks (WSNs) are becoming more and more attractive because they can provide services that are not possible or not feasible before. In this paper, we address the design issues of an important type of WSNs, i.e., WSNs that enable environmental monitoring applications. We first provide an overview and analysis for our ongoing research project about a WSN for coastal-area acoustic monitoring. Based on the analysis, we then propose a cross-layer design framework for future WSNs that provide environmental monitoring services. The focus of the framework is the network layer design and the key idea of the framework is to fully understand and exploit both the physical layer characteristics and the requirements of upper layer applications and services. Particularly, for the physical layer characteristics, our framework 1) can enable advanced communication technologies such as cooperative communication and network coding; 2) can utilize the transmission characteristics for identifying/authenticating a sender; and 3) can exploit the communication pattern as a mean of sensing. For the requirements of applications and services, our framework 1) is service-oriented; 2) can enable distributed applications; 3) can utilize the fact that many applications do not have strict delay constraints. To illustrate the advantages of the framework, we also conduct a case study that may be a typical scenario in the near future. We believe that our study in this work can provide a guideline for future WSN design
SECURING MULTIHOP NETWORK BY DETECTING AND LOCATING POLLUTION ATTACKS USING SPACEMAC.
It has been widely observed that providing security is one of the challenging task in Wireless sensor network(WSN). Program images need to be updated continuously as network programming happens in WSN. Many Networking protocols provide an efficient way to update these program images running on sensor nodes. One of the cryptographically strong protocol called DELUGE exists to address this challenge, but it involves high computational cost such as power consumption and communication costs. So Multiple one way key chain is proposed to secure a multihop network programming protocol which is lower in power consumption and communication costs. Even though one way key chain is used to provide security, network with static topology is considered. Network is made dynamic by adding mobility nodes to it. But the extra node added may not always be the genuine node. If it is an attacker node, there can be several pollution attacks. Attacker node travels through the network, and pollute the entire network. Wirelesss sensor network may not be able to detect these pollution attacks. In this paper, we are proposing a MAC scheme called Spacemac. It expands the network by adding nodes to it. Using SpaceMac, i) it detects the polluted packets early at the intermediate nodes. ii) it identifies the exact location of an attacker and eliminates them
Network coding for reliable wireless sensor networks
Wireless sensor networks are used in many applications and are now a key element
in the increasingly growing Internet of Things. These networks are composed of
small nodes including wireless communication modules, and in most of the cases
are able to autonomously con gure themselves into networks, to ensure sensed data
delivery. As more and more sensor nodes and networks join the Internet of Things,
collaboration between geographically distributed systems are expected. Peer to peer
overlay networks can assist in the federation of these systems, for them to collaborate.
Since participating peers/proxies contribute to storage and processing, there is no
burden on speci c servers and bandwidth bottlenecks are avoided.
Network coding can be used to improve the performance of wireless sensor networks.
The idea is for data from multiple links to be combined at intermediate encoding
nodes, before further transmission. This technique proved to have a lot of potential
in a wide range of applications. In the particular case of sensor networks, network
coding based protocols and algorithms try to achieve a balance between low packet
error rate and energy consumption. For network coding based constrained networks
to be federated using peer to peer overlays, it is necessary to enable the storage
of encoding vectors and coded data by such distributed storage systems. Packets
can arrive to the overlay through any gateway/proxy (peers in the overlay), and lost
packets can be recovered by the overlay (or client) using original and coded data that
has been stored. The decoding process requires a decoding service at the overlay
network. Such architecture, which is the focus of this thesis, will allow constrained
networks to reduce packet error rate in an energy e cient way, while bene ting from an e ective distributed storage solution for their federation. This will serve as
a basis for the proposal of mathematical models and algorithms that determine the
most e ective routing trees, for packet forwarding toward sink/gateway nodes, and
best amount and placement of encoding nodes.As redes de sensores sem fios são usadas em muitas aplicações e são hoje consideradas um elemento-chave para o desenvolvimento da Internet das Coisas. Compostas por nós de pequena dimensão que incorporam módulos de comunicação sem fios, grande parte destas redes possuem a capacidade de se configurarem de forma autónoma, formando sistemas em rede para garantir a entrega dos dados recolhidos. (…
- …