3,073 research outputs found

    Gossip Algorithms for Distributed Signal Processing

    Full text link
    Gossip algorithms are attractive for in-network processing in sensor networks because they do not require any specialized routing, there is no bottleneck or single point of failure, and they are robust to unreliable wireless network conditions. Recently, there has been a surge of activity in the computer science, control, signal processing, and information theory communities, developing faster and more robust gossip algorithms and deriving theoretical performance guarantees. This article presents an overview of recent work in the area. We describe convergence rate results, which are related to the number of transmitted messages and thus the amount of energy consumed in the network for gossiping. We discuss issues related to gossiping over wireless links, including the effects of quantization and noise, and we illustrate the use of gossip algorithms for canonical signal processing tasks including distributed estimation, source localization, and compression.Comment: Submitted to Proceedings of the IEEE, 29 page

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Monitoring of Wireless Sensor Networks

    Get PDF

    Performance Analysis of Multiple Access Techniques for LTE system under Symbol Error Rate (SER) Calculation

    Full text link
    In the recent years, so many technologies in multiple access trends have influenced the field of Wireless Sensor Networks in significant ways. Various trends are readily available technology of ubiquitous wireless sensor networks as well as wireless communication networks and progress in the development of two multiple access techniques are compared in this scenario: the OFDMA and SC-FDMA. The OFDMA and SC-FDMA transceivers are modeled and simulated considering both the interleaved and localized subcarriers mapping schemes. WSNs have the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. To prolong the networklsquo;s hop in terms of single and two hop using both techniques should be used in the sensor nodes. The minimization of computing and storage platforms as well as the development of novel micro sensors and sensor materials with high reliability force encourages technology in research on WSN. In this paper, we will proposed the field of multipath routing in wireless sensor networks, and mainly focus on the technology of SER of WSNs

    Practical and Robust Power Management for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks: WSNs) consist of tens or hundreds of small, inexpensive computers equipped with sensors and wireless communication capabilities. Because WSNs can be deployed without fixed infrastructure, they promise to enable sensing applications in environments where installing such infrastructure is not feasible. However, the lack of fixed infrastructure also presents a key challenge for application developers: sensor nodes must often operate for months or years at a time from fixed or limited energy sources. The focus of this dissertation is on reusable power management techniques designed to facilitate sensor network developers in achieving their systems\u27 required lifetimes. Broadly speaking, power management techniques fall into two categories. Many power management protocols developed within the WSN community target specific hardware subsystems in isolation, such as sensor or radio hardware. The first part of this dissertation describes the Adaptive and Robust Topology control protocol: ART), a representative hardware-specific technique for conserving energy used by packet transmissions. In addition to these single-subsystem approaches, many applications can benefit greatly from holistic power management techniques that jointly consider the sensing, computation, and communication costs of potential application configurations. The second part of this dissertation extends this holistic power management approach to two families of structural health monitoring applications. By applying a partially-decentralized architecture, the cost of collecting vibration data for analysis at a centralized base station is greatly reduced. Finally, the last part of this dissertation discusses work toward a system for clinical early warning and intervention. The feasibility of this approach is demonstrated through preliminary study of an early warning component based on historical clinical data. An ongoing clinical trial of a real-time monitoring component also provides important guidelines for future clinical deployments based on WSNs
    • …
    corecore