3,527 research outputs found

    Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks

    Get PDF
    In this paper, a family of ant colony algorithms called DAACA for data aggregation has been presented which contains three phases: the initialization, packet transmission and operations on pheromones. After initialization, each node estimates the remaining energy and the amount of pheromones to compute the probabilities used for dynamically selecting the next hop. After certain rounds of transmissions, the pheromones adjustment is performed periodically, which combines the advantages of both global and local pheromones adjustment for evaporating or depositing pheromones. Four different pheromones adjustment strategies are designed to achieve the global optimal network lifetime, namely Basic-DAACA, ES-DAACA, MM-DAACA and ACS-DAACA. Compared with some other data aggregation algorithms, DAACA shows higher superiority on average degree of nodes, energy efficiency, prolonging the network lifetime, computation complexity and success ratio of one hop transmission. At last we analyze the characteristic of DAACA in the aspects of robustness, fault tolerance and scalability.Comment: To appear in Journal of Computer and System Science

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    Sencar Based Load Balanced Clustering With Mobile Data Gathering In Wireless Sensor Networks

    Get PDF
    The wireless sensor networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consumption of the sensor node is high. This results in reduced lifetime of the network. Some of the WSN architectures have been proposed based on Mobile Elements such as three-layer framework is for mobile data collection, which includes the sensor layer, cluster head layer, and mobile collector layer (called SenCar layer). This framework employs distributed load balanced clustering and dual data uploading, it is referred to as LBC-DDU.In the sensor layer a distributed load balanced clustering algorithm is used for sensors to self-organize themselves into clusters. The cluster head layer use inter-cluster transmission range it is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving in the inter-cluster communications. Through this transmissions cluster head information is send to the SenCar for its moving trajectory planning.This is done by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. Then the results show each cluster has at most two cluster heads. LBC-DDU achieves higher energy saving per node and energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sinks

    Joint Routing and STDMA-based Scheduling to Minimize Delays in Grid Wireless Sensor Networks

    Get PDF
    In this report, we study the issue of delay optimization and energy efficiency in grid wireless sensor networks (WSNs). We focus on STDMA (Spatial Reuse TDMA)) scheduling, where a predefined cycle is repeated, and where each node has fixed transmission opportunities during specific slots (defined by colors). We assume a STDMA algorithm that takes advantage of the regularity of grid topology to also provide a spatially periodic coloring ("tiling" of the same color pattern). In this setting, the key challenges are: 1) minimizing the average routing delay by ordering the slots in the cycle 2) being energy efficient. Our work follows two directions: first, the baseline performance is evaluated when nothing specific is done and the colors are randomly ordered in the STDMA cycle. Then, we propose a solution, ORCHID that deliberately constructs an efficient STDMA schedule. It proceeds in two steps. In the first step, ORCHID starts form a colored grid and builds a hierarchical routing based on these colors. In the second step, ORCHID builds a color ordering, by considering jointly both routing and scheduling so as to ensure that any node will reach a sink in a single STDMA cycle. We study the performance of these solutions by means of simulations and modeling. Results show the excellent performance of ORCHID in terms of delays and energy compared to a shortest path routing that uses the delay as a heuristic. We also present the adaptation of ORCHID to general networks under the SINR interference model

    Restricting Barrier and Finding the Shortest Path in Wireless Sensor Network Using Mobile Sink

    Get PDF
    Wireless Sensor Network (WSN) is a collection of spatially deployed in wireless sensors. In general, sensing field could contain various barriers which cause loss of information transferring towards the destination. As a remedy, this proposed work presents an energy-efficient routing mechanism based on cluster in mobile sink. The scope of this work is to provide a mobile sink in a single mobile node which begins data-gathering from starting stage, then immediately collects facts from cluster heads in single-hop range and subsequently, it returns to the starting stage. During the movement of the mobile sink if the barrier exists in the sensing field it can be detected using Spanning graph and Grid based techniques. The possible locations for the mobile sink movement can be reduced easily by Spanning graph. At last, Barrier avoidance-shortest route was established for mobile sink using Dijkstra algorithm. The Distributed location information is collected using a Timer Bloom Filter Aggregation (TBFA) scheme. In the TBFA scheme, the location information of Mobile node (MNs) is maintained by Bloom filters by each Mobile agent (MA). Since the propagation of the whole Bloom filter for every Mobile node (MN) movement leads to high signaling overhead, each Mobile agent (MA) only propagates changed indexes in the Bloom filter when a pre-defined timer expires. To verify the performance of the TBFA scheme, an analytical model is developed on the signaling overhead and the latency and devise an algorithm to select an appropriate timer value. Extensive simulation and Network Simulator 2(NS2) results are given to show the accuracy of analytical models and effectiveness of the proposed method
    • …
    corecore