337 research outputs found

    On perimeter coverage in wireless sensor networks

    Get PDF
    Many sensor network applications require the tracking and the surveillance of target objects. However, in current research, many studies have assumed that a target object can be sufficiently monitored by a single sensor. This assumption is invalid in some situations, especially, when the target object is so large that a single sensor can only monitor a certain portion of it. In this case, several sensors are required to ensure a 360 coverage of the target. To minimize the amount of energy required to cover the target, the minimum set of sensors should be identified. Centralized algorithms are not suitable for sensor applications. In this paper, we describe our novel distributed algorithm for finding the minimum cover. Our algorithm requires fewer messages than earlier mechanisms and we provide a formal proof of correctness and time of convergence. We further demonstrate our performance improvement through extensive simulations. © 2006 IEEE.published_or_final_versio

    Perimeter coverage scheduling in wireless sensor networks using sensors with a single continuous cover range

    Get PDF
    In target monitoring problem, it is generally assumed that the whole target object can be monitored by a single sensor if the target falls within its sensing range. Unfortunately, this assumption becomes invalid when the target object is very large that a sensor can only monitor part of it. In this paper, we study the perimeter coverage problem where the perimeter of a big object needs to be monitored, but each sensor can only cover a single continuous portion of the perimeter. We describe how to schedule the sensors so as to maximize the network lifetime in this problem. We formally prove that the perimeter coverage scheduling problem is NP-hard in general. However, polynomial time solution exists in some special cases. We further identify the sufficient conditions for a scheduling algorithm to be a 2-approximation solution to the general problem, and propose a simple distributed 2-approximation solution with a small message overhead. Copyright © 2010 K.-S. Hung and K.-S. Lui.published_or_final_versio

    On perimeter coverage in wireless sensor networks with minimum cost

    Get PDF
    One of the major applications of sensor networks is tracking and surveillance. Very often, a single sensor is sufficient to monitor a single target. However, when the object is very large, several sensors have to work together to monitor the object continuously. In this paper, we study how to identify a set of sensors that can cover the perimeter of a large target with the minimum cost. We develop a novel distributed algorithm that requires fewer messages than existing mechanisms. Our algorithm can be extended to solve the problem when the sensor range is adjustable. We provide a formal proof of correctness and convergence time analysis of our algorithm. We further demonstrate the performance through extensive simulations. © 2011 Inderscience Enterprises Ltd.postprin

    Image transmission in sensor networks

    Get PDF
    Wireless sensor networks allow fine-grained monitoring of the environment. However, as sensors have physical limitations in energy, processing power, and memory, etc., techniques have to be developed to efficiently utilize the limited resource available in a sensor network. In this paper, we study the image tranmission problem in sensor networks. Cameras are installed in various locations of a wide area to take images of targeted objects. These images have to be sent back to a centralized server, which may be very far away from the cameras. Therefore, the images have to traverse the sensors hop by hop to the server. As images usually contain a large amount of data, if they are sent individually, the communication overheads will be huge. To reduce the overheads, we can pre-process the images in the sensors before sending them back to the server, but this pre-processing requires extra energy in the sensors. In this paper, we study how images can be efficiently transmitted through a sensor network. We aim at reducing the energy needed in transmitting the images while maintaining the quality of the combined image. © 2005 IEEE.published_or_final_versio

    On attack-resilient wireless sensor networks with novel recovery strategies

    Get PDF
    proceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 1-6In a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes. We find that a compromised WSN can be made resilient to such attacks by introducing new resources, such as new nodes and new keys. Based on this observation, we propose two recovering strategies, namely, link replacement strategy and node replenishment strategy, to replace the compromised links and the functions of the compromised region, respectively. Simulation results indicate that our proposed strategies can improve the network resilience of a compromised WSN significantly with a small amount of additional resources. ©2009 IEEE.published_or_final_versio

    Bandwidth-guaranteed multicast in multi-channel multi-interface wireless mesh networks

    Get PDF
    Proceedings of the IEEE International Conference on Communications, 2009, p. 1-5We consider multi-channel multi-interface wireless mesh networks with a schedule-based MAC protocol, where conflict-free transmission is ensured by requiring links assigned with the same channel and within the mutual interference range of each other to be active at different time slots. When a (point-to-multipoint) multicast call arrives, the call is accepted if a multicast distribution tree can be established for connecting the source node with all the receiving nodes, and with sufficient bandwidth reserved on each link. Otherwise, the call is rejected. To maximize the call acceptance rate, the multicast tree must be constructed judiciously upon each call arrival. Aiming at minimizing the carried load on the most-heavily loaded channel, and maximizing the residual capacity of the most heavily loaded node, an integer linear program (ILP) is formulated for multicast tree construction. Since solving ILP can be time-consuming, an efficient heuristic algorithm is then proposed. We compare the two tree construction algorithms by simulations. We found that both algorithms give comparable call acceptance rate, but the heuristic algorithm requires much shorter running time. ©2009 IEEE.published_or_final_versio

    Link layer multi-priority frame forwarding

    Get PDF
    With increasing demand for multimedia and real-time applications, local area network (LAN) technologies are rapidly being upgraded to support Quality-of-Service (QoS). Many QoS-enabled LANs are making use of resource allocation mechanisms that can discriminate among traffic classes of different priorities. When such LANs are interconnected by bridges to form an extended LAN, it is necessary to upgrade the bridges so that they are QoS-enabled as well. For example, the IEEE 802.1p standard defines a framework for priority queuing in bridges. Alternatively, frame forwarding decisions at the link layer may be modified to recognize frame priorities and alternate paths may be used for differentiating QoS. In this paper, we describe a novel bridge protocol that can forward frames of different priorities using different paths. Our protocol ensures that the forwarding path of a higher priority frame is never longer than the forwarding path of a lower priority frame.published_or_final_versio

    Interface placement in constructing widest spanning tree for multi-channel multi-interface wireless mesh networks

    Get PDF
    Proceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 2560-2564Widest spanning tree is a broadcast tree with its bottleneck link bandwidth maximized. It provides a cost effective broadcasting solution in multi-channel multi-interface wireless mesh networks. To find the widest spanning tree, existing algorithms jointly consider channel assignment, routing and scheduling while assuming the number of network interface cards (NICs) at each node is given. In this paper, we treat the number of NICs at each node as a design parameter, whereas the total number of NICs in the system is given. By properly placing more NICs to more "critical" nodes, the bandwidth of the spanning tree can be further increased. To this end, a new Integer Linear Programming (ILP) is formulated for solving the widest spanning tree problem based on joint optimization of interface placement, channel assignment, routing and scheduling. Numerical results show that interface placement provides a significant boost to the bandwidth of the widest spanning tree found. © 2009 IEEE.published_or_final_versio

    Improving file distribution performance by grouping in peer-to-peer networks

    Get PDF
    It has been shown that the peer-to-peer paradigm is more efficient than the traditional client-server model for file sharing among a large number of users. Given a group of leechers who wants to download a single file and a group of seeds who possesses the whole file, the minimum time needed for distributing the file to all users can be calculated based on their bandwidth availabilities. A scheduling algorithm has been developed so that every leecher can obtain the file within this minimum time. Unfortunately, this mechanism is not optimal with regard to the average download time among the peers. In this paper, we study how to reduce the average download time without prolonging the time needed for all leechers to obtain the file from a theoretical perspective. Based on the bandwidth capacities, the seeds and leechers are divided into different groups. We identify the necessary conditions for grouping to bring about benefits. We also study the impact on performance when leechers leave the system before the downloading process is complete. To evaluate our mechanism, we conduct extensive simulations and compare the performance with a BitTorrentlike file sharing algorithm. The results show that our grouping protocol successfully reduces the average download time over a wide range of system configurations. © 2009 IEEE.published_or_final_versio

    Hybrid approach for localization in anisotropic sensor networks

    Get PDF
    In many real-world applications including agricultural, meterological, military applications, etc, localization techniques are widely used to estimate the geographic locations of sensor nodes based on the precision positions of a few anchors equipped with special hardware. Existing localization algorithms mainly try to improve their accuracy in position estimation by using various heuristic-based or mathematical techniques. Every node in the network follows the same technique to find its physical location. However, each individual method with its own strength can only outperform the others in some but not all nodes. Based on this observation, we develop a hybrid approach for the localization problem. Each node collects the same kind of information. By analysing the information, a node can decide what is the best localization algorithm to use. Different nodes can make their own decisions. Our simulation results reveal that the hybrid approach is effective that it outpeforms existing algorithms. To the best of our knowledge, our work presents the first effort in solving the absolute localization problem by adopting a hybrid approach. © 2006 IEEE.published_or_final_versio
    corecore