8,196 research outputs found

    Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks

    Full text link
    Neighbor discovery is a fundamental service for initialization and managing network dynamics in wireless sensor networks and mobile sensing applications. In this paper, we present a novel design principle named Talk More Listen Less (TMLL) to reduce idle-listening in neighbor discovery protocols by learning the fact that more beacons lead to fewer wakeups. We propose an extended neighbor discovery model for analyzing wakeup schedules in which beacons are not necessarily placed in the wakeup slots. Furthermore, we are the first to consider channel occupancy rate in discovery protocols by introducing a new metric to trade off among duty-cycle, latency and channel occupancy rate. Guided by the TMLL principle, we have designed Nihao, a family of energy-efficient asynchronous neighbor discovery protocols for symmetric and asymmetric cases. We compared Nihao with existing state of the art protocols via analysis and real-world testbed experiments. The result shows that Nihao significantly outperforms the others both in theory and practice.Comment: 9 pages, 14 figures, published in IEEE INFOCOM 201

    The impact of wakeup schedule distribution in synchronous power save protocols on the performance of multihop wireless networks

    Get PDF
    By definition, the operation of an asynchronous power save protocol permits an arbitrary distribution of nodes' wakeup schedules. This wakeup schedule distribution creates an uncoordinated pattern of times at which nodes will attempt to transmit. Intuitively, we would expect that some patterns will be more (or less) favorable than others for a given traffic pattern. We investigate the impact of this wakeup pattern on network capacity and present simulation data showing that the capacity associated with the best wakeup patterns is significantly larger than that of the worst. This result not only gives insight to the behavior of such protocols, but also acts as a feasibility study showing the potential benefit of mechanisms by which nodes adapt their wakeup schedules to obtain improved performance

    Timing is everything: the impact of wakeup schedule distribution on asynchronous power save protocols

    Get PDF
    Asynchronous power save protocols have been proposed for use in ad hoc networks. In many protocols, nodes independently follow a common periodic wakeup schedule, each with some unknown offset relative to its neighbors. The schedule is defined to ensure deterministic intervals of overlap between nodes, regardless of the distribution of the nodes' wakeup schedules. This paper studies the sensitivity of a simple asynchronous power save protocol to the actual distribution of the nodes' wakeup schedules. In practical terms: For given topology and traffic load, are there particularly "good" or "bad" distributions? We define a simplified model of network operation that allows us to study this question in simulation. The results show that the performance variation has a narrow probability distribution, but with long tails. The variation is shown to derive largely from timing dependencies rather than overall capacity of the system. The result suggests the feasibility of manipulating the wakeup schedule distribution to improve performance. Although the best wakeup distributions often mitigate the performance penalty imposed by the power save protocol, their relative rarity implies that randomized strategies will not be sufficient to obtain maximum advantage

    Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks

    Get PDF
    In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network to transfer the passwords. On the other hand computation power consumption is insignificant when compared to the costs associated with the power needed for transmitting the right set of keys. In addition to prevent adversaries from reading and following the timeline of the network, we propose to encrypt the tokens using symmetric encryption to prevent replay attacks.Comment: International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.1, January 2013 http://airccse.org/journal/ijassn/papers/3113ijassn01.pd
    • …
    corecore