8,371 research outputs found
Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks
Neighbor discovery is a fundamental service for initialization and managing
network dynamics in wireless sensor networks and mobile sensing applications.
In this paper, we present a novel design principle named Talk More Listen Less
(TMLL) to reduce idle-listening in neighbor discovery protocols by learning the
fact that more beacons lead to fewer wakeups. We propose an extended neighbor
discovery model for analyzing wakeup schedules in which beacons are not
necessarily placed in the wakeup slots. Furthermore, we are the first to
consider channel occupancy rate in discovery protocols by introducing a new
metric to trade off among duty-cycle, latency and channel occupancy rate.
Guided by the TMLL principle, we have designed Nihao, a family of
energy-efficient asynchronous neighbor discovery protocols for symmetric and
asymmetric cases. We compared Nihao with existing state of the art protocols
via analysis and real-world testbed experiments. The result shows that Nihao
significantly outperforms the others both in theory and practice.Comment: 9 pages, 14 figures, published in IEEE INFOCOM 201
The impact of wakeup schedule distribution in synchronous power save protocols on the performance of multihop wireless networks
By definition, the operation of an asynchronous power save protocol permits an arbitrary distribution of nodes' wakeup schedules. This wakeup schedule distribution creates an uncoordinated pattern of times at which nodes will attempt to transmit. Intuitively, we would expect that some patterns will be more (or less) favorable than others for a given traffic pattern.
We investigate the impact of this wakeup pattern on network capacity and present simulation data showing that the capacity associated with the best wakeup patterns is significantly larger than that of the worst. This result not only gives insight to the behavior of such protocols, but also acts as a feasibility study showing the potential benefit of mechanisms by which nodes adapt their wakeup schedules to obtain improved performance
Timing is everything: the impact of wakeup schedule distribution on asynchronous power save protocols
Asynchronous power save protocols have been proposed for use in ad hoc networks. In many protocols, nodes independently follow a common periodic wakeup schedule, each with some unknown offset relative to its neighbors.
The schedule is defined to ensure deterministic intervals of overlap between nodes, regardless of the distribution of the nodes' wakeup schedules. This paper studies the sensitivity of a simple asynchronous power save
protocol to the actual distribution of the nodes' wakeup schedules. In practical terms: For given topology and traffic load, are there particularly "good" or "bad" distributions?
We define a simplified model of network operation that allows us to study this question in simulation. The results show that the performance variation has a narrow probability distribution, but with long tails. The variation is shown to derive largely from timing dependencies rather than overall capacity of the system. The result suggests the feasibility of manipulating the wakeup schedule distribution to improve performance. Although the best wakeup distributions often mitigate the performance penalty imposed by the power save
protocol, their relative rarity implies that randomized strategies will not be sufficient to obtain maximum advantage
Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks
In this paper we propose Time Synchronized One-Time-Password scheme to
provide secure wake up authentication. The main constraint of wireless sensor
networks is their limited power resource that prevents us from using radio
transmission over the network to transfer the passwords. On the other hand
computation power consumption is insignificant when compared to the costs
associated with the power needed for transmitting the right set of keys. In
addition to prevent adversaries from reading and following the timeline of the
network, we propose to encrypt the tokens using symmetric encryption to prevent
replay attacks.Comment: International Journal Of Advanced Smart Sensor Network Systems
(IJASSN), Vol 3, No.1, January 2013
http://airccse.org/journal/ijassn/papers/3113ijassn01.pd
- β¦