383 research outputs found

    Topology-aware transmission scheduling for distributed highway traffic monitoring wireless sensor networks

    Get PDF
    Wireless sensor networks have been deployed along highways for traffic monitoring. The thesis studies a set of transmission scheduling methods for optimizing network throughput, message transfer delay, and energy efficiency. Today\u27s traffic monitoring systems are centrally managed. Several studies have envisioned the advantages of distributed traffic management techniques. The thesis is based on previously proposed hierarchical sensor network architecture, for which the routing and transmission scheduling methods are derived. Wireless sensor networks have a lifetime limited by battery energy of the sensors. The thesis proposes to assign schedules for nodes to transmit and receive packets and turning off their radios during other times to save energy. The schedules are assigned to minimize the end-to-end packet delivery latency and maximize the network throughput. Conflict-free transmission slots are assigned to sensors along road segments leading to a common intersection based on locally discovered topology. The slot assignment adopts a heuristic that rotates among segments, assigns closest possible slots to neighboring nodes in a pipelined fashion, and exploits radio capture effects when possible. Based on the single-intersection approach, centralized and distributed multi-intersection scheduling methods are proposed to resolve conflicts among nodes belonging to different intersections. The centralized approach designates a controller as the leader to collect topology information of a set of contiguous intersections and assign schedules using the same single-intersection algorithm. The distributed approach has each intersection determine its own schedule independently and then exchange the topology information and schedules with its adjacent intersections to resolve conflicts locally. Based on simulation studies in ns-2, the centralized approach achieves better performance, while the distributed approach tries to approach the centralized performance at much lower communication costs. A communication cost analysis is performed to assess the trade-off between the centralized and distributed approaches

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Practical Aggregation in the Edge

    Get PDF
    Due to the increasing amounts of data produced by applications and devices, cloud infrastructures are becoming unable to timely process and provide answers back to users. This has led to the emergence of the edge computing paradigm that aims at moving computations closer to end user devices. Edge computing can be defined as performing computations outside the boundaries of cloud data centres. This however, can be materialised across very different scenarios considering the broad spectrum of devices that can be leveraged to perform computations in the edge. In this thesis, we focus on a concrete scenario of edge computing, that of multiple devices with wireless capabilities that collectively form a wireless ad hoc network to perform distributed computations. We aim at devising practical solutions for these scenarios however, there is a lack of tools to help us in achieving such goal. To address this first limitation we propose a novel framework, called Yggdrasil, that is specifically tailored to develop and execute distributed protocols over wireless ad hoc networks on commodity devices. As to enable distributed computations in such networks, we focus on the particular case of distributed data aggregation. In particular, we address a harder variant of this problem, that we dub distributed continuous aggregation, where input values used for the computation of the aggregation function may change over time, and propose a novel distributed continuous aggregation protocol, called MiRAge. We have implemented and validated both Yggdrasil and MiRAge through an extensive experimental evaluation using a test-bed composed of 24 Raspberry Pi’s. Our results show that Yggdrasil provides adequate abstractions and tools to implement and execute distributed protocols in wireless ad hoc settings. Our evaluation is also composed of a practical comparative study on distributed continuous aggregation protocols, that shows that MiRAge is more robust and achieves more precise aggregation results than competing state-of-the-art alternatives
    corecore