• Title/Summary/Keyword: WSNs

Search Result 416, Processing Time 0.025 seconds

Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage

  • Liu, Xiaoshuang;Kang, Guixia;Zhang, Ningbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.126-148
    • /
    • 2015
  • Different from the existing works on coverage problems in wireless sensor networks (WSNs), this paper considers the exposure-path prevention problem by using the percolation theory in three dimensional (3D) WSNs, which can be implemented in intruder detecting applications. In this paper, to avoid the loose bounds of critical density, a bond percolation-based scheme is proposed to put the exposure-path problem into a 3D uniform lattice. Within this scheme, the tighter bonds of critical density for omnidirectional and directional sensor networks under random sensor deployment-a 3D Poisson process are derived. Extensive simulation results show that our scheme generates tighter bounds of critical density with no exposure path in 3D WSNs.

Multi-Agent System for Fault Tolerance in Wireless Sensor Networks

  • Lee, HwaMin;Min, Se Dong;Choi, Min-Hyung;Lee, DaeWon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1321-1332
    • /
    • 2016
  • Wireless sensor networks (WSN) are self-organized networks that typically consist of thousands of low-cost, low-powered sensor nodes. The reliability and availability of WSNs can be affected by faults, including those from radio interference, battery exhaustion, hardware and software failures, communication link errors, malicious attacks, and so on. Thus, we propose a novel multi-agent fault tolerant system for wireless sensor networks. Since a major requirement of WSNs is to reduce energy consumption, we use multi-agent and mobile agent configurations to manage WSNs that provide energy-efficient services. Mobile agent architecture have inherent advantages in that they provide energy awareness, scalability, reliability, and extensibility. Our multi-agent system consists of a resource manager, a fault tolerance manager and a load balancing manager, and we also propose fault-tolerant protocols that use multi-agent and mobile agent setups.

Self-Localized Packet Forwarding in Wireless Sensor Networks

  • Dubey, Tarun;Sahu, O.P.
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.477-488
    • /
    • 2013
  • Wireless Sensor Networks (WSNs) are comprised of sensor nodes that forward data in the shape of packets inside a network. Proficient packet forwarding is a prerequisite in sensor networks since many tasks in the network, together with redundancy evaluation and localization, depend upon the methods of packet forwarding. With the motivation to develop a fault tolerant packet forwarding scheme a Self-Localized Packet Forwarding Algorithm (SLPFA) to control redundancy in WSNs is proposed in this paper. The proposed algorithm infuses the aspects of the gossip protocol for forwarding packets and the end to end performance of the proposed algorithm is evaluated for different values of node densities in the same deployment area by means of simulations.

A Software Update Method Using Clustering WSNs (클러스터링을 이용한 SW 업데이트 방법)

  • Jeong, Hyeyeong;Ahn, Byoungchul
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.245-251
    • /
    • 2014
  • Wireless Sensor Networks(WSNs) are applied to many monitoring applications. Present sensor nodes can perform many functions at the same time and contain complex software. During the lifetime of sensor nodes, they are required to reprogram their software because of their new functions, software, software bug fixes. The nodes are inaccessible physically or it is very difficult to upgrade their software by one by one. To upgrade the software of sensor nodes in WSNs remotely, this paper presents an energy efficient method by selecting an optimal relay node. The CHR(Cluster Head Relay) method is compared with SPIN and RANDOM method. Three methods are simulated in NS-2 with the same environmental parameters. Simulation results show that CHR shows faster update time and less power consumption compared with other two methods.

A Relative Location based Clustering Algorithm for Wireless Sensor Networks (센서의 상대적 위치정보를 이용한 무선 센서 네트워크에서의 클러스터링 알고리즘)

  • Jung, Woo-Hyun;Chang, Hyeong-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.212-221
    • /
    • 2009
  • This paper proposes a novel centralized clustering algorithm, "RLCA : Relative Location based Clustering Algorithm for Wireless Sensor Networks," for constructing geographically well-distributed clusters in general WSNs. RLCA does not use GPS and controls selection-rate of cluster-head based on distances between sensors and BS. We empirically show that RLCA's energy efficiency is higher than LEACH's.

RESTful Architecture of Wireless Sensor Network for Building Management System

  • Dinh, Ngoc-Thanh;Kim, Young-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.46-63
    • /
    • 2012
  • The concept of an "intelligent building" received significant attention from academic, industry and standard development organizations when technically termed a building management system (BMS). Wireless sensor networks (WSNs) and their recent development enhanced monitoring and control applications for the building's areas. This paper surveys and analyzes advantages of the main current and emerging approaches that may be fit for BMS. Specifically, we discuss challenges including interoperability, integration, overhead, and bandwidth limitation of WSNs in BMS. Based on analyses, we highlight the advantages of an IP-based and RESTful architecture approach as the most suitable solution for BMS using WSNs (BMS-WSN). The paper also describes our future direction and design for BMS-WSN based on these advantages. The purpose is to enable interaction of users with BMS-WSN in the same way as with any website while ensuring energy efficiency. A test-bed implementation and evaluation of a BMS application is also introduced in this paper to demonstrate the feasibility and benefits of IP-based and RESTful architecture for BMS.

CHS : Cluster Head Self-election algorithm in WSNs (센서 네트워크에서 클러스터 헤드 자가 선출 알고리즘)

  • Choi, Koung-Jin;Jung, Suk-Moon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.534-537
    • /
    • 2009
  • Clustering protocol of Wireless sensor networks(WSNs) can not only reduce the volume of inter-node communication by the nodes's data aggregation but also extend the nodes's sleep times by cluster head's TDMA-schedule coordination. In order to extend the network lifetime of WSNs, we propose CHS algorithm to select cluster-head using three variables. It consists of initial and current energy of nodes, round information, and total numbers which have been selected as cluster head until current round.

  • PDF

Survey on Security in Wireless Sensor

  • Li, Zhijun;Gong, Guang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.233-248
    • /
    • 2008
  • Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There are numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose unique security challenges and make innovative approaches desirable. In this paper, we present a survey on security issues in wireless sensor networks. We address several network models for security protocols in WSNs, and explore the state of the art in research on the key distribution and management schemes, typical attacks and corresponding countermeasures, entity and message authentication protocols, security data aggregation, and privacy. In addition, we discuss some directions of future work.

Energy-efficient charging of sensors for UAV-aided wireless sensor network

  • Rahman, Shakila;Akter, Shathee;Yoon, Seokhoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.80-87
    • /
    • 2022
  • Lack of sufficient battery capacity is one of the most important challenges impeding the development of wireless sensor networks (WSNs). Recent innovations in the areas of wireless energy transfer and rechargeable batteries have made it possible to advance WSNs. Therefore, in this article, we propose an energy-efficient charging of sensors in a WSN scenario. First, we have formulated the problem as an integer linear programming (ILP) problem. Then a utility function-based greedy algorithm named UGreedy/UF1 is proposed for solving the problem. Finally, the performance of UGreedy/UF1 is analyzed along with other baseline algorithms: UGreedy/UF2, 2-opt TSP, and Greedy TSP. The simulation results show that UGreedy/UF1 performs better than others both in terms of the deadline missing ratio of sensors and the total energy consumption of UAVs.

An Abnormal Breakpoint Data Positioning Method of Wireless Sensor Network Based on Signal Reconstruction

  • Zhijie Liu
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.377-384
    • /
    • 2023
  • The existence of abnormal breakpoint data leads to poor channel balance in wireless sensor networks (WSN). To enhance the communication quality of WSNs, a method for positioning abnormal breakpoint data in WSNs on the basis of signal reconstruction is studied. The WSN signal is collected using compressed sensing theory; the common part of the associated data set is mined by exchanging common information among the cluster head nodes, and the independent parts are updated within each cluster head node. To solve the non-convergence problem in the distributed computing, the approximate term is introduced into the optimization objective function to make the sub-optimization problem strictly convex. And the decompressed sensing signal reconstruction problem is addressed by the alternating direction multiplier method to realize the distributed signal reconstruction of WSNs. Based on the reconstructed WSN signal, the abnormal breakpoint data is located according to the characteristic information of the cross-power spectrum. The proposed method can accurately acquire and reconstruct the signal, reduce the bit error rate during signal transmission, and enhance the communication quality of the experimental object.