29 research outputs found

    A hybrid method for the QoS analysis and parameter optimization in time-critical random access wireless sensor networks

    Full text link
    [EN] Evolution in electronics has led to the development of complex applications in wireless sensor networks (WSNs), where efficient and swift event reporting is needed. In time-critical applications, achieving an adequate report latency is particularly relevant as it allows a proper reaction from the network to the occurring phenomena. It is evident that mean report latency is insufficient as a QoS indicator for time-critical applications. Instead, high percentiles or the whole distribution are much better suited. In certain applications such as target tracking and positioning, the transmission of a certain number of event packets is required to accurately characterize the occurring phenomena. Building on this, we present a hybrid method for obtaining the probability distribution of report latency in random access (RA) WSN protocols. In this method, the distribution of the number of detecting nodes is obtained by simulation, which then allows us to obtain the desired QoS parameters analytically. In this study, we use our method to obtain and optimize the event report latency and energy consumption in RA WSNs. Results show that modifying the transmission parameters during backoff increases the robustness of RA event reporting and also enhances the performance of the WSN in environments where multiple types of events can be detected.This work has been supported by the Ministry of Economy and Competitiveness of Spain through the project TIN2013-47272-C2-1-R, by CONACyT under project Basic Science 183370 and by IPN SIP project 20150584. The research of Israel Leyva-Mayorga is partially funded by grant 383936 CONACYT-Gobierno del Estado de Mexico 2014Leyva-Mayorga, I.; Pla, V.; MartĂ­nez Bauset, J.; Rivero-Angeles, ME. (2017). A hybrid method for the QoS analysis and parameter optimization in time-critical random access wireless sensor networks. Journal of Network and Computer Applications. 83:190-203. https://doi.org/10.1016/j.jnca.2017.01.027S1902038

    On the Use of Graphs for Node Connectivity in Wireless Sensor Networks for Hostile Environments

    Full text link
    [EN] Wireless sensor networks (WSNs) have been extensively studied in the literature. However, in hostile environments where node connectivity is severely compromised, the system performance can be greatly affected. In this work, we consider such a hostile environment where sensor nodes cannot directly communicate to some neighboring nodes. Building on this, we propose a distributed data gathering scheme where data packets are stored in different nodes throughout the network instead to considering a single sink node. As such, if nodes are destroyed or damaged, some information can still be retrieved. To evaluate the performance of the system, we consider the properties of different graphs that describe the connections among nodes. It is shown that the degree distribution of the graph has an important impact on the performance of the system. A teletraffic analysis is developed to study the average buffer size and average packet delay. To this end, we propose a reference node approach, which entails an approximation for the mathematical modeling of these networks that effectively simplifies the analysis and approximates the overall performance of the system.The authors wish to thank the Consejo Nacional de Ciencia y Tecnologia (CONACyT), the Comision de Operacion y Fomento de Actividades Academicas, Instituto Politecnico Nacional (COFAA-IPN, project numbers 20196225 and 20196678), and the Estimulos al Desempeno de los Investigadores del Instituto Politecnico Nacional (EDI-IPN) for the support given for this work. The work of V. Pla was supported by Grant PGC2018-094151-B-I00 (MCIU/AEI/FEDER, UE).García-González, E.; Chimal-Eguía, JC.; Rivero-Angeles, ME.; Pla, V. (2019). On the Use of Graphs for Node Connectivity in Wireless Sensor Networks for Hostile Environments. Journal of Sensors. 2019:1-22. https://doi.org/10.1155/2019/7409329S1222019Eren, T. (2017). The effects of random geometric graph structure and clustering on localizability of sensor networks. International Journal of Distributed Sensor Networks, 13(12), 155014771774889. doi:10.1177/1550147717748898Clauset, A., Shalizi, C. R., & Newman, M. E. J. (2009). Power-Law Distributions in Empirical Data. SIAM Review, 51(4), 661-703. doi:10.1137/070710111Hakimi, S. L. (1962). On Realizability of a Set of Integers as Degrees of the Vertices of a Linear Graph. I. Journal of the Society for Industrial and Applied Mathematics, 10(3), 496-506. doi:10.1137/011003

    QoS Analysis for a Non-Preemptive Continuous Monitoring and Event Driven WSN Protocol in Mobile Environments

    Full text link
    Evolution in wireless sensor networks (WSNs) has allowed the introduction of new applications with increased complexity regarding communication protocols, which have to ensure that certain QoS parameters are met. Specifically, mobile applications require the system to respond in a certain manner in order to adequately track the target object. Hybrid algorithms that perform Continuous Monitoring (CntM) and Event-Driven (ED) duties have proven their ability to enhance performance in different environments, where emergency alarms are required. In this paper, several types of environments are studied using mathematical models and simulations, for evaluating the performance of WALTER, a priority-based nonpreemptive hybrid WSN protocol that aims to reduce delay and packet loss probability in time-critical packets. First, randomly distributed events are considered. This environment can be used to model a wide variety of physical phenomena, for which report delay and energy consumption are analyzed by means of Markov models. Then, mobile-only environments are studied for object tracking purposes. Here, some of the parameters that determine the performance of the system are identified. Finally, an environment containing mobile objects and randomly distributed events is considered. It is shown that by assigning high priority to time-critical packets, report delay is reduced and network performance is enhanced.This work was partially supported by CONACyT under Project 183370. The research of Vicent Pla has been supported in part by the Ministry of Economy and Competitiveness of Spain under Grant TIN2013-47272-C2-1-R.Leyva Mayorga, I.; Rivero-Angeles, ME.; Carreto-Arellano, C.; Pla, V. (2015). QoS Analysis for a Non-Preemptive Continuous Monitoring and Event Driven WSN Protocol in Mobile Environments. International Journal of Distributed Sensor Networks. 2015:1-16. https://doi.org/10.1155/2015/471307S1162015Arampatzis, T., Lygeros, J., & Manesis, S. (s. f.). A Survey of Applications of Wireless Sensors and Wireless Sensor Networks. Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005. doi:10.1109/.2005.1467103Ramachandran, C., Misra, S., & Obaidat, M. S. (2008). A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks. International Journal of Communication Systems, 21(10), 1047-1073. doi:10.1002/dac.937Misra, S., Singh, S., Khatua, M., & Obaidat, M. S. (2013). Extracting mobility pattern from target trajectory in wireless sensor networks. International Journal of Communication Systems, 28(2), 213-230. doi:10.1002/dac.2649Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660-670. doi:10.1109/twc.2002.804190Younis, O., & Fahmy, S. (s. f.). Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach. IEEE INFOCOM 2004. doi:10.1109/infcom.2004.1354534Manjeshwar, A., & Agrawal, D. P. (s. f.). TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001. doi:10.1109/ipdps.2001.925197Manjeshwar, A., & Agrawal, D. P. (2002). APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless. Proceedings 16th International Parallel and Distributed Processing Symposium. doi:10.1109/ipdps.2002.1016600Sharif, A., Potdar, V., & Rathnayaka, A. J. D. (2010). Prioritizing Information for Achieving QoS Control in WSN. 2010 24th IEEE International Conference on Advanced Information Networking and Applications. doi:10.1109/aina.2010.166Alappat, V. J., Khanna, N., & Krishna, A. K. (2011). Advanced Sensor MAC protocol to support applications having different priority levels in Wireless Sensor Networks. 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM). doi:10.1109/chinacom.2011.6158175Alam, K. M., Kamruzzaman, J., Karmakar, G., & Murshed, M. (2012). Priority Sensitive Event Detection in Hybrid Wireless Sensor Networks. 2012 21st International Conference on Computer Communications and Networks (ICCCN). doi:10.1109/icccn.2012.6289220Raja, A., & Su, X. (2008). A Mobility Adaptive Hybrid Protocol for Wireless Sensor Networks. 2008 5th IEEE Consumer Communications and Networking Conference. doi:10.1109/ccnc08.2007.159Srikanth, B., Harish, M., & Bhattacharjee, R. (2011). An energy efficient hybrid MAC protocol for WSN containing mobile nodes. 2011 8th International Conference on Information, Communications & Signal Processing. doi:10.1109/icics.2011.6173629Lee, Y.-D., Jeong, D.-U., & Lee, H.-J. (2011). Empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications. International Journal of Communication Systems, 26(4), 505-514. doi:10.1002/dac.1360Deepak, K. S., & Babu, A. V. (2013). Improving energy efficiency of incremental relay based cooperative communications in wireless body area networks. International Journal of Communication Systems, 28(1), 91-111. doi:10.1002/dac.2641Yuan Li, Wei Ye, & Heidemann, J. (s. f.). Energy and latency control in low duty cycle MAC protocols. IEEE Wireless Communications and Networking Conference, 2005. doi:10.1109/wcnc.2005.1424589Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), 535-547. doi:10.1109/49.840210Wei Ye, Heidemann, J., & Estrin, D. (s. f.). An energy-efficient MAC protocol for wireless sensor networks. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. doi:10.1109/infcom.2002.101940

    Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions

    No full text
    Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, this communication model also has a clear disadvantage: it has a multitude of vulnerabilities and security threats. The nature of the P2P philosophy itself means that there is no centralized server responsible for uploading, storing, and verifying the authenticity of the shared files and packets. A direct consequence of this is that P2P networks are a good choice for hackers for the spread of malicious software or malware in general since there is no mechanism to control what content is shared. In this paper, we present a mathematical model for P2P networks to study the effect of two different attacks on these systems, namely, malware and denial of service. To analyze the behavior of the cyber attacks and identify important weaknesses, we develop different Markov chains that reflect the main dynamics of the system and the attacks. Specifically, our model considers the case in which a certain number of nodes are infected with a cyber worm that is spread throughout the network as the file is shared among peers. This allows observation of the final number of infected peers when an initial number (we evaluate the system for from 1 to 14 initial nodes) of malicious nodes infect the system. For the DoS attack, our model considers the portion of peers that are unable to communicate and the average attack duration to study the performance degradation of such an attack. A two-pronged approach was used to study the impact of the attacks on P2P networks; the first focused only on the P2P network, and the second focused on the attacks and the network

    Residual energy-based transmission schemes for event reporting wireless sensor networks

    No full text
    International audienceWSNs are complex systems that are mainly limited by the battery life of the nodes in order to have an adequate performance. In most cases, it is possible to have a re-deployment of new nodes in order to prolong the systems lifetime. This leads to a situation where some nodes have a low energy level while other nodes (the majority of nodes instants after the re-deployment procedure) have high energy levels. In this environments, it is clear that ancient nodes, those with low energy level, have to contend for the shared medium against the majority of high energy nodes. As such, the remaining battery life of low energy nodes would be rapidly consumed. In this paper, we propose to extend the battery life of low energy nodes by means of assigning prioritized access to the shared channel to those nodes in order to content among a low population of such nodes, while delaying the contention access of high energy nodes which can support higher number of collisions before energy depletion. This is done by studying two different transmission strategies referred to as “hard” and “soft” transmission probabilities. Results show that, a soft transmission strategy achieves better results in terms of reduced energy consumption than both the conventional protocol or a hard transmission assignment

    Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection

    No full text
    Nowadays, the use of sensor nodes for the IoT is widespread. At the same time, cyberattacks on these systems have become a relevant design consideration in the practical deployment of wireless sensor networks (WSNs). However, there are some types of attacks that have to be prevented or detected as fast as possible, like, for example, attacks that put lives in danger. In this regard, a primary user emulation (PUE) attack in a structural health monitoring (SHM) system falls inside this category since nodes failing to report structural damages may cause a collapse of the building with no warning to people inside it. Building on this, we mathematically model an energy and resource utilization-efficient WSN based on the cognitive radio (CR) technique to monitor the SHM of buildings when a seismic activity occurs, making efficient use of scarce bandwidth when a PUE attack is in progress. The main performance metrics considered in this work are average packet delay and average energy consumption. The proposed model allows an additional tool for the prompt identification of such attacks in order to implement effective countermeasures
    corecore