• Title/Summary/Keyword: Node-Threshold

Search Result 162, Processing Time 0.032 seconds

Dual-hop Routing Protocol for Improvement of Energy Consumption in Layered WSN Sensor Field

  • Song, Young-Il;LEE, WooSuk;Kwon, Oh Seok;Jung, KyeDong;Lee, Jong-Yong
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.27-33
    • /
    • 2016
  • This paper proposes to increase the node energy efficiency, which rapidly drops during the transmission of L-TEEN (Layered Threshold sensitive Energy Efficient sensor Network protocol), using the method of DL-TEEN (Dual-hop Layered TEEN). By introducing dual-hop method in the data transmission, the proposed single-hop method for short-range transmission and multi-hop transmission method between the cluster heads for remote transmission was introduce. By introducing a partial multi-hop method in the data transmission, a single-hop method for short range transmission method between the cluster heads for remote transmission was introduces. In the proposed DL-TEEN, the energy consumption of cluster head for remote transmission reduces and increases the energy efficiency of sensor node by reducing the transmission distance and simplifying the transmission routine for short-range transmission. As compared the general L-TEEN, it was adapted to a wider sensor field.

Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization

  • Yan, Jun;Yu, Kegen;Cao, Yangqin;Chen, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4418-4437
    • /
    • 2017
  • In this paper a three-phase secure compressive sensing (CS) and received signal strength (RSS) based target localization approach is proposed to mitigate the effect of malicious node attack. RSS measurements are first arranged into a group of subsets where the same measurement can be included in multiple subsets. Intermediate target position estimates are then produced using individual subsets of RSS measurements and the CS technique. From the intermediate position estimates, the residual error vector and residual error square vector are formed. The least median of residual error square is utilized to define a verifier parameter. The selected residual error vector is utilized along with a threshold to determine whether a node or measurement is under attack. The final target positions are estimated by using only the attack-free measurements and the CS technique. Further, theoretical analysis is performed for parameter selection and computational complexity evaluation. Extensive simulation studies are carried out to demonstrate the advantage of the proposed CS-based secure localization approach over the existing algorithms.

Optimized Charging in Large-Scale Deployed WSNs with Mobile Charger

  • Qin, Zhenquan;Lu, Bingxian;Zhu, Ming;Sun, Liang;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5307-5327
    • /
    • 2016
  • Restricted by finite battery energy, traditional wireless sensor networks (WSNs) can only maintain for a limited period of time, resulting in serious performance bottleneck in long-term deployment of WSN. Fortunately, the advancement in the wireless energy transfer technology provides a potential to free WSNs from limited energy supply and remain perpetual operational. A mobile charger called wireless charging vehicle (WCV) is employed to periodically charge each sensor node and keep its energy level above the minimum threshold. Aiming at maximizing the ratio of the WCV's vocation time over the cycle time as well as guaranteeing the perpetual operation of networks, we propose a feasible and optimal solution to this issue within the context of a real-time large-scale deployed WSN. First, we develop two different types of charging cycles: initialization cycles and renewable cycles and give relevant algorithms to construct these two cycles for each sensor node. We then formulate the optimization problem into an optimal construction algorithm and prove its correctness through theoretical analysis. Finally, we conduct extensive simulations to demonstrate the effectiveness of our proposed algorithms.

A Overlay Transmission Method of End-to-end Host for Transmission Rate Improvement (전송률 향상을 위한 종단간 호스트의 오버레이 전송 기법)

  • Koo, Myung-Mo;Jeong, Won-Chang;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.275-283
    • /
    • 2005
  • In this paper, we propose an overlay transmission method of end-to-end host to solve decrease in transmission rate caused by congestion in the application using multicast. In this proposed method, we've selected an overlay end-to-end host (OEH) for overcast transmission for each node, and the OEH can transmit duplicative packets. When the loss rate is more than the overcast threshold, the receivers of node in congestion are dropping from current layers and the OEH of lower nodes can request overcast transmission to OEH of non-congestion nodes for receiveing packets. In simulation results, it was known that the proposed method improves transmission rates over those of existing methods.

  • PDF

A Threshold based Connectivity Enhancement Scheme for Mobile Ad-hoc Networks (MANET에서 경로 연속성 증대방안에 대한 연구)

  • Jang Yunchul;Park Sangioon;Kim Byunggi
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.215-219
    • /
    • 2005
  • Generally, the mobile nodes in MANET have the limited power capacity available for actual communications. Thus, the power management is very important for packet routing or forwarding. Although MTPR, MBCR and MMBCR are proposed to treat the problem of power consumption, there have been few researches resolving the link breakdown that is occurred by the power exhaustion during transmission. In this sense, the reliable scheme should be required to ensure the routing connectivity. In this paper, we propose three schemes to enforce the routing connectivity. If the signal strength is dropped below a signal threshold, the candidate route is previously selected to prepare the link breakdown. Also, on multi-channel, we propose the lifetime increment scheme of a node that it manage its available power to the needed power of a new link. The simulation results show the enforcement of the link connectivity and the performance improvements of the delay time through the effective connection management.

Energy-aware Selective Compression Scheme for Solar-powered Wireless Sensor Networks (태양 에너지 기반 무선 센서 네트워크를 위한 에너지 적응형 선택적 압축 기법)

  • Kang, Min Jae;Jeong, Semi;Noh, Dong Kun
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1495-1502
    • /
    • 2015
  • Data compression involves a trade-off between delay time and data size. Greater delay times require smaller data sizes and vice versa. There have been many studies performed in the field of wireless sensor networks on increasing network life cycle durations by reducing data size to minimize energy consumption; however, reductions in data size result in increases of delay time due to the added processing time required for data compression. Meanwhile, as energy generation occurs periodically in solar energy-based wireless sensor networks, redundant energy is often generated in amounts sufficient to run a node. In this study, this excess energy is used to reduce the delay time between nodes in a sensor network consisting of solar energy-based nodes. The energy threshold value is determined by a formula based on the residual energy and charging speed. Nodes with residual energy below the threshold transfer data compressed to reduce energy consumption, and nodes with residual energy above the threshold transfer data without compression to reduce the delay time between nodes. Simulation based performance verifications show that the technique proposed in this study exhibits optimal performance in terms of both energy and delay time compared with traditional methods.

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

Low-Complexity Graph Sampling Algorithm Based on Thresholding (임계값 적용에 기반한 저 복잡도 그래프 신호 샘플링 알고리즘)

  • Yoon-Hak Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.895-900
    • /
    • 2023
  • We study low-complexity graph sampling which selects a subset of nodes from graph nodes so as to reconstruct the original signal from the sampled one. To achieve complexity reduction, we propose a graph sampling algorithm with thresholding which selects a node with a cost lower than a given threshold at each step without fully searching all of the remaining nodes to find one with the minimum cost. Since it is important to find the threshold as close to a minimum cost as possible to avoid degradation of the reconstruction performance, we present a mathematical expression to compute the threshold at each step. We investigate the performance of the different sampling methods for various graphs, showing that the proposed algorithm runs 1.3 times faster than the previous method while maintaining the reconstruction performance.

The establishment of Proactive Routing Selection and Maintenance Algorithms for Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크에서 사전 활성화 라우팅 선택과 관리유지 알고리즘의 구축)

  • Cho, Young-Joo;Lee, Yeo-Jin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.73-80
    • /
    • 2007
  • In conventional on-demand mobile ad hoc routing algorithms, an alternate path is sought only after an active path is broken. It incurs a significant cost in terms of money and time in detecting the disconnection and establishing a new route. In this thesis, we propose proactive route selection and maintenance to conventional mobile ad hoc on-demand routing algorithms. The key idea for this research is to only consider a path break to be likely when the signal power of a received packet drops below an optimal threshold value and to generate a forewarning packet. In other words, if a path is lost with high probability, the neighboring node that may easily be cut off notifies the source node by sending a forewarning packet. Then the source node can initiate route discovery early and switched to a reliable path potentially avoiding the disconnection altogether. For the simulational study, network simulator(NS2) is used. The result of simulation shows that the algorithm significantly improves the performance of networks comparing to conventional on-demand routing protocols based on DSR and AODV in terms of packet delivery ratio, packet latency and routing overhead.

An Adaptive Temporal Suppression for Reducing Network Traffic in Wireless Sensor Networks (무선 센서 네트워크에서 통신량 감소를 위한 적응적 데이터 제한 기법)

  • Min, Joonki;Kwon, Youngmi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.60-68
    • /
    • 2012
  • Current wireless sensor networks are considered to support more complex operations ranging from military to health care which require energy-efficient and timely transmission of large amounts of data. In this paper, we propose an adaptive temporal suppression algorithm which exploits a temporal correlation among sensor readings. The proposed scheme can significantly reduce the number of transmitted sensor readings by sensor node, and consequently decrease the energy consumption and delay. Instead of transmitting all sensor readings from sensor node to sink node, the proposed scheme is to selectively transmit some elements of sensor readings using the adaptive temporal suppression, and the sink node is able to reconstruct the original data without deteriorating data quality by linear interpolation. In our proposed scheme, sensing data stream at sensor node is divided into many small sensing windows and the transmission ratio in each window is decided by the window complexity. It is defined as the number of a fluctuation point which has greater absolute gradient than threshold value. We have been able to achieve up about 90% communication reduction while maintaining a minimal distortion ratio 6.5% in 3 samples among 4 ones.