• Title/Summary/Keyword: WSNs(Wireless Sensor Networks)

Search Result 375, Processing Time 0.025 seconds

Linear network coding in convergecast of wireless sensor networks: friend or foe?

  • Tang, Zhenzhou;Wang, Hongyu;Hu, Qian;Ruan, Xiukai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3056-3074
    • /
    • 2014
  • Convergecast is probably the most common communication style in wireless sensor networks (WSNs). And linear network coding (LNC) is a promising concept to improve throughput or reliability of convergecast. Most of the existing works have mainly focused on exploiting these benefits without considering its potential adverse effect. In this paper, we argue that LNC may not always benefit convergecast. This viewpoint is discussed within four basic scenarios: LNC-aided and none-LNC convergecast schemes with and without automatic repeat request (ARQ) mechanisms. The most concerned performance metrics, including packet collection rate, energy consumption, energy consumption balance and end-to-end delay, are investigated. Theoretical analyses and simulation results show that the way LNC operates, i.e., conscious overhearing and the prerequisite of successfully decoding, could naturally diminish its advantages in convergecast. And LNC-aided convergecast schemes may even be inferior to none-LNC ones when the wireless link delivery ratio is high enough. The conclusion drawn in this paper casts a new light on how to effectively apply LNC to practical WSNs.

Analytical Approach of Multicasting-supported Inter-Domain Mobility Management in Sensor-based Fast Proxy Mobile IPv6 Networks

  • Jang, Ha-Na;Jeong, Jong-Pil
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.1-11
    • /
    • 2012
  • IP-based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health care, home automation, environmental monitoring, industrial control, vehicle telematics, and agricultural monitoring. In all these applications, a fundamental issue is the mobility in the sensor network, particularly with regards to energy efficiency. Because of the energy inefficiency of network-based mobility management protocols, they can be supported via IP-WSNs. In this paper, we propose a network-based mobility-supported IP-WSN protocol called mSFP, or the mSFP: "Multicasting-supported Inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks". Based on [8,20], we present its network architecture and evaluate its performance by considering the signaling and mobility cost. Our analysis shows that the proposed scheme reduces the signaling cost, total cost, and mobility cost. With respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 7% and the total cost by 3%. With respect to the number of hops, the proposed scheme reduces the signaling cost by 6.9%, the total cost by 2.5%, and the mobility cost by 1.5%. With respect to the number of IP-WSN nodes, the proposed scheme reduces the mobility cost by 1.6%.

Efficient Cluster Radius and Transmission Ranges in Corona-based Wireless Sensor Networks

  • Lai, Wei Kuang;Fan, Chung-Shuo;Shieh, Chin-Shiuh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1237-1255
    • /
    • 2014
  • In wireless sensor networks (WSNs), hierarchical clustering is an efficient approach for lower energy consumption and extended network lifetime. In cluster-based multi-hop communications, a cluster head (CH) closer to the sink is loaded heavier than those CHs farther away from the sink. In order to balance the energy consumption among CHs, we development a novel cluster-based routing protocol for corona-structured wireless sensor networks. Based on the relaying traffic of each CH conveys, adequate radius for each corona can be determined through nearly balanced energy depletion analysis, which leads to balanced energy consumption among CHs. Simulation results demonstrate that our clustering approach effectively improves the network lifetime, residual energy and reduces the number of CH rotations in comparison with the MLCRA protocols.

Multipath Routing Based on Opportunistic Routing for Improving End-to-end Reliability in Large-scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 종단 간 전송 성공률 향상을 위한 기회적 라우팅 기반 다중 경로 전송 방안)

  • Kim, SangDae;Kim, KyongHoon;Kim, Ki-Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.4
    • /
    • pp.177-186
    • /
    • 2019
  • In wireless sensor networks, the transmission success ratio would be decreased when the scale of the WSNs increased. To defeat this problem, we propose a multipath routing based on opportunistic routing for improving end-to-end reliability in large-scale wireless sensor networks. The proposed scheme exploits the advantages of existing opportunistic routing and achieves high end-to-end success ratio by branching like a multipath routing through local decision without information of the whole network. As a result of the simulation result, the proposed scheme shows a similar or higher end-to-end transmission success ratio and less energy consumption rather than the existing scheme.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

Static Worst-Case Energy and Lifetime Estimation of Wireless Sensor Networks

  • Liu, Yu;Zhang, Wei;Akkaya, Kemal
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.2
    • /
    • pp.128-152
    • /
    • 2010
  • With the advance of computer and communication technologies, wireless sensor networks (WSNs) are increasingly used in many aspects of our daily life. However, since the battery lifetime of WSN nodes is restricted, the WSN lifetime is also limited. Therefore, it is crucial to determine this limited lifetime in advance for preventing service interruptions in critical applications. This paper proposes a feasible static analysis approach to estimating the worstcase lifetime of a WSN. Assuming known routes with a given sensor network topology and SMAC as the underlying MAC protocol, we statically estimate the lifetime of each sensor node with a fixed initial energy budget. These estimations are then compared with the results obtained through simulation which run with the same energy budget on each node. Experimental results of our research on TinyOS applications indicate that our approach can safely and accurately estimate worst-case lifetime of the WSN. To the best of our knowledge, our work is the first one to estimate the worst-case lifetime of WSNs through a static analysis method.

An Adaptive MAC Protocol considering Real Time in Wireless Sensor Networks

  • On, Jeong-Seok;Kim, Jae-Hyun;Oh, Young-Yul;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1329-1338
    • /
    • 2007
  • Leading MAC protocols developed for duty-cycled WSNs such as B-MAC employ a long preamble and channel sampling. The long preamble introduces excess latency at each hop and suffers from excess energy consumption at non-target receivers. In this paper we propose AS-MAC (Asynchronous Sensor MAC), a low power MAC protocol for wireless sensor networks (WSNs). AS-MAC solves these problems by employing a series of preload approach that retains the advantages of low power listening and independent sleep schedule. Moreover AS-MAC offers an additional advantage such as flexible duty cycle as data rate varies. We demonstrate that AS-MAC is better performance than B-MAC through analysis and evaluation.

Role-based Self-Organization Protocol of Clustering Hierarchy for Wireless Sensor Networks (무선 센서 네트워크를 위한 계층형 클러스터링의 역할 기반 자가 구성 프로토콜)

  • Go, Sung-Hyun;Kim, Hyoung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.137-145
    • /
    • 2008
  • In general, a large-scale wireless sensor network(WSNs) is composed of hundreds of or thousands of sensor nodes. In this large-scale wireless sensor networks, it is required to maintain and manage the networks to lower management cost and obtain high energy efficiency. Users should be provided with sensing service at the level of quality for users through an efficient system. In evaluating the result data quality provided from this network to users, the number of sensors related to event detection has an important role. Accordingly, the network protocol which can provide proper QoS at the level of users demanding quality should be designed in a way such that the overall system function has not to be influenced even if some sensor nodes are in error. The energy consumption is minimized at the same time. The protocol suggested in this article is based on the LEACH protocol and is a role-based self-Organization one that is appropriate for large-scale networks which need constant monitoring.

  • PDF

Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment (Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜)

  • Lee, Young sook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Recently, the use of sensor devices is gradually increasing. As various sensor device emerge and the related technologies advance, there has been a dramatic increase in the interest in heterogeneous wireless sensor networks (WSNs). While sensor device provide us many valuable benefits, automatically and remotely supported services offered and accessed remotely through WSNs also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication among the involved parties: users, sensors and gateways. An user authentication protocol for wireless sensor networks is designed to restrict access to the sensor data only to user. In 2019, Chen et al. proposed an efficient user authentication protocol. However, Ryu et al. show that it's scheme still unstable and inefficient. It cannot resist offline password guessing attack and session key attack. In this paper, we propose an improved protocol to overcome these security weaknesses by storing secret data in device. In addition, security properties like session-key security, perfect forward secrecy, known-key security and resistance against offline password attacks are implied by our protocol.

Implementation of 6LoWPAN Testbed: Location Tracking Service Based on Google Map (구글맵을 이용한 위치 추적 서비스를 제공하는 6LoWPAN 테스트베드 구현)

  • Kim, Kye-Won;Seo, Jae-Wan;Hwang, Dae-Joon;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.13-26
    • /
    • 2009
  • Wireless Sensor Networks (WSNs) is one of the key technologies that make it possible to provide u-service in a ubiquitous society, however, it has disadvantages such as difficulty of managing sensor nodes and weaknesses of stability or mobility in large-scale WSNs. In order to solve these problems, 6LoWPAN that integrates with WSNs and IP networks has been studied widely. In this paper, we propose a Location Tracking Service Based on Google Map (LTSGM) system using 6LoWPAN. Since LTSGM system provides visual location information of sensor nodes through Google Map, it is possible to makes it easier than ever to manage sensor nodes in large-scale WSNs. Moreover, LTSGM can be used for various services such as applications for disaster or crime because it can trace the location of mobile nodes. Implementation of LTSGM system will be a test platform for 6LoWPAN.

  • PDF