22 research outputs found
Utility-Based Decision-Making in Wireless Sensor Networks
We consider challenges associated with application domains in which a large number of distributed, networked sensors must perform a sensing task repeatedly over time. For the tasks we consider, there are three significant challenges to address. First, nodes have resource constraints imposed by their finite power supply, which motivates computations that are energy-conserving. Second, for the applications we describe, the utility derived from a sensing task may vary depending on the placement and size of the set of nodes who participate, which often involves complex objective functions for nodes to target. Finally, nodes must attempt to realize these global objectives with only local information.
We present a model for such applications, in which we define appropriate global objectives based on utility functions and specify a cost model for energy consumption. Then, for an important class of utility functions, we present distributed algorithms which attempt to maximize the utility derived from the sensor network over its lifetime. The algorithms and experimental results we present enable nodes to adaptively change their roles over time and use dynamic reconfiguration of routes to load balance energy consumption in the network.National Science Foundation (ANIR-9986397
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where
the lifetime of the network relies on battery powered nodes. Transmitting at
high power reduces the lifetime of both the nodes and the network. One
efficient way of power management is to control the power at which the nodes
transmit. In this paper, a virtual multiple input multiple output wireless
sensor network (VMIMO-WSN)communication architecture is considered and the
power control of sensor nodes based on the approach of game theory is
formulated. The use of game theory has proliferated, with a broad range of
applications in wireless sensor networking. Approaches from game theory can be
used to optimize node level as well as network wide performance. The game here
is categorized as an incomplete information game, in which the nodes do not
have complete information about the strategies taken by other nodes. For
virtual multiple input multiple output wireless sensor network architecture
considered, the Nash equilibrium is used to decide the optimal power level at
which a node needs to transmit, to maximize its utility. Outcome shows that the
game theoretic approach considered for VMIMO-WSN architecture achieves the best
utility, by consuming less power.Comment: 12 pages, 8 figure
A Parallelizable Acceleration Framework for Packing Linear Programs
This paper presents an acceleration framework for packing linear programming
problems where the amount of data available is limited, i.e., where the number
of constraints m is small compared to the variable dimension n. The framework
can be used as a black box to speed up linear programming solvers dramatically,
by two orders of magnitude in our experiments. We present worst-case guarantees
on the quality of the solution and the speedup provided by the algorithm,
showing that the framework provides an approximately optimal solution while
running the original solver on a much smaller problem. The framework can be
used to accelerate exact solvers, approximate solvers, and parallel/distributed
solvers. Further, it can be used for both linear programs and integer linear
programs
Utility-based joint sensor selection and congestion control for task-oriented WSNs
Task-centric wireless sensor network environments are often characterized by the simultaneous operation of multiple tasks. Individual tasks compete for constrained resources and thus need resource mediation algorithms at two levels. First, different sensors must be allocated to different tasks based on the combination of sensor attributes and task requirements. Subsequently, sensor data rates on various data routes must be dynamically adapted to share the available wireless bandwidth, especially when links experience traffic congestion. In this paper we investigate heuristics for incrementally modifying the sensor-task matching process to incorporate changes in the transport capacity constraints or feasible task utility values
Resource-aware task scheduling by an adversarial bandit solver method in wireless sensor networks
This article was published in the Eurasip Journal on Wireless Communications and Networking [©2016 Springer International Publishing.] and the definite version is available at: http://dx.doi.org/10.1186/s13638-015-0515-y. The article website is at: http://jwcn.eurasipjournals.springeropen.com/articles/10.1186/s13638-015-0515-yA wireless sensor network (WSN) is composed of a large number of tiny sensor nodes. Sensor nodes are very resource-constrained, since nodes are often battery-operated and energy is a scarce resource. In this paper, a resource-aware task scheduling (RATS) method is proposed with better performance/resource consumption trade-off in a WSN. Particularly, RATS exploits an adversarial bandit solver method called exponential weight for exploration and exploitation (Exp3) for target tracking application of WSN. The proposed RATS method is compared and evaluated with the existing scheduling methods exploiting online learning: distributed independent reinforcement learning (DIRL), reinforcement learning (RL), and cooperative reinforcement learning (CRL), in terms of the tracking quality/energy consumption trade-off in a target tracking application. The communication overhead and computational effort of these methods are also computed. Simulation results show that the proposed RATS outperforms the existing methods DIRL and RL in terms of achieved tracking performance. © 2016, Khan.Publishe
Improving the Resilience of Wireless Sensor Networks Against Security Threats: A Survey and Open Research Issues
Wireless Sensor Network (WSN)
technology has gained importance in recent years due to its various benefits,
practicability and extensive utilization in diverse applications. The
innovation helps to make real-time automation, monitoring, detecting and
tracking much easier and more effective than previous technologies. However, as
well as their benefits and enormous potential, WSNs are vulnerable to cyber-attacks.
This paper is a systematic literature review of the security-related threats
and vulnerabilities in WSNs. We review the safety of and threats to each WSN
communication layer and then highlight the importance of trust and reputation,
and the features related to these, to address the safety vulnerabilities.
Finally, we highlight the open research areas which need to be addressed in
WSNs to increase their flexibility against security threats