921 resultados para wireless sensor networks


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cooperative relaying has been shown to be an effective method to significantly improve the error-rate performance in wireless networks. This technique combats fading by exploiting the spatial diversity made available through cooperating nodes that relay signals for each other. In the context of wireless sensor networks, cooperative relaying can be applied to reduce the energy consumption in sensor nodes and thus extend the network lifetime. Realizing this benefit, however, requires a careful incorporation of this technique into the routing process to exploit diversity gains. In this chapter, we introduce the basic concepts required to understand cooperative relaying and review current state of the art energy-efficient routing protocols that realize cooperative relaying.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Medium access control for wireless sensor networks has been an active
research area in the past decade. This chapter discusses a set of important medium access control (MAC) attributes and possible design trade-offs in protocol design, with an emphasis on energy efficiency. Then we categorize existing MAC protocols into five groups, outline the representative protocols, and compare their advantages and disadvantages in the context of wireless sensor network. Finally, thoughts for practitioners are presented and open research issues are also discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) suffer from a wide range of security attacks due to their limited processing and energy capabilities. Their use in numerous mission critical applications, however, requires that fast recovery from such attacks be achieved. Much research has been completed on detection of security attacks, while very little attention has been paid to recovery from an attack. In this paper, we propose a novel, lightweight authentication protocol that can secure network and node recovery operations such as re-clustering and reprogramming. Our protocol is based on hash functions and we compare the performance of two well-known lightweight hash functions, SHA-1 and Rabin. We demonstrate that our authentication protocol can be implemented efficiently on a sensor network test-bed with TelosB motes. Further, our experimental results show that our protocol is efficient both in terms of computational overhead and execution times which makes it suitable for low resourced sensor devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) are proposed as powerful means for fine grained monitoring in different classes of applications at very low cost and for extended periods of time. Among various solutions, supporting WSNs with intelligent mobile platforms for handling the data management, proved its benefits towards extending the network lifetime and enhancing its performance. The mobility model applied highly affects the data latency in the network as well as the sensors’ energy consumption levels. Intelligent-based models taking into consideration the network runtime conditions are adopted to overcome such problems. In this chapter, existing proposals that use intelligent mobility for managing the data in WSNs are surveyed. Different classifications are presented through the chapter to give a complete view on the solutions lying in this domain. Furthermore, these models are compared considering various metrics and design goals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Water and Nitrogen (N) are critical inputs for crop production. Remote sensing data collected from multiple scales, including ground-based, aerial, and satellite, can be used for the formulation of an efficient and cost effective algorithm for the detection of N and water stress. Formulation and validation of such techniques require continuous acquisition of ground based spectral data over the canopy enabling field measurements to coincide exactly with aerial and satellite observations. In this context, a wireless sensor in situ network was developed and this paper describes the results of the first phase of the experiment along with the details of sensor development and instrumentation set up. The sensor network was established based on different spatial sampling strategies and each sensor collected spectral data in seven narrow wavebands (470, 550, 670, 700, 720, 750, 790 nm) critical for monitoring crop growth. Spectral measurements recorded at required intervals (up to 30 seconds) were relayed through a multi-hop wireless network to a base computer at the field site. These data were then accessed by the remote sensing centre computing system through broad band internet. Comparison of the data from the WSN and an industry standard ground based hyperspectral radiometer indicated that there were no significant differences in the spectral measurements for all the wavebands except for 790nm. Combining sensor and wireless technologies provides a robust means of aerial and satellite data calibration and an enhanced understanding of issues of variations in the scale for the effective water and nutrient management in wheat.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sensor Networks have applications in diverse fields. They can be deployed for habitat modeling, temperature monitoring and industrial sensing. They also find applications in battlefield awareness and emergency (first) response situations. While unique addressing is not a requirement of many data collecting applications of wireless sensor networks, it is vital for the success of applications such as emergency response. Data that cannot be associated with a specific node becomes useless in such situations. In this work we propose a novel dynamic addressing mechanism for wireless sensor networks that are not location-aware. The scheme enables successful reuse of addresses in event-driven wireless sensor networks introducing minimal latencies and efficiently addressing packet loss. It also eliminates the need for network-wide Duplicate Address Detection (DAD) to ensure uniqueness of network level addresses.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless sensor networks have attracted a lot of attention recently. In this paper, we develop a channel model based on the elliptical model for multipath components involving randomly placed scatterers in the scattering region with sensors deployed on a field. We verify that in a sensor network, the use of receive diversity techniques improves the performance of the system. Extensive performance analysis of the system is carried out for both single and multiple antennas with the applied receive diversity techniques. Performance analyses based on variations in receiver height, maximum multipath delay and transmit power have been performed considering different numbers of antenna elements present in the receiver array, Our results show that increasing the number of antenna elements for a wireless sensor network does indeed improve the BER rates that can be obtained.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) are deployed in numerous mission critical applications in which the network needs to remain active for as long as possible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering stationary WSNs with low resources. In this paper, we determine the additional resources required in implementing these protocols in a mobile WSN.

We present recovery protocols on TinyOS motes for a low-resourced, mobile deployment. We describe the issues we encountered in the implementation. We present times, RAM and ROM needed to run the recovery protocols and compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost increase.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network (WSN). We then propose a novel connectivity model for a WSN using first order Reed-Muller Codes. While the model has a hierarchical structure, we have shown that it works equally well for a Distributed WSN. Though one can use any communication model, we prefer to use the communication model suggested by Ruj and Roy [1] for all computations and results in our work. Two suitable secure (symmetric) cryptosystems can then be applied for the two different models, connectivity and communication respectively. By doing so we have shown how resiliency and scalability are appreciably improved as compared to Ruj and Roy [1].

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rapid technological advances have enabled the development of low-cost sensor networks for various monitoring tasks, where it is important to estimate the positions of a number of regular sensor nodes whose locations cannot be known apriori. We address the problem of localizing the regular nodes with range-based location references obtained from certain anchor nodes referred to as beacons, particularly in an adverse environment where some of the beacons may be compromised. We propose an innovative modular solution featuring two lightweight modules that are for dedicated functionalities, respectively, but can also be closely integrated. First, we harness simple geometric triangular rules and an efficient voting technique to enable the attack detection module, which identifies and filters out malicious location references. We then develop a secure localization module that computes and clusters certain reference points, and the position of the concerned regular node is estimated with the centroid of the most valuable reference points identified. Extensive simulations show that our attack detection module can detect compromised beacons effectively, and the secure localization module can subsequently provide a dependable localization service in terms of bounded estimation error. The integrated system turns out to be tolerant of malicious attacks even in highly challenging scenarios.