Publish/Subscribe (Pub/Sub) systems have been used in traditional distributedcomputing applications to provide effective and efficient event services. Recently, the design of Pub/Sub systems are proposed for wireless...
详细信息
ISBN:
(纸本)9781424415014
Publish/Subscribe (Pub/Sub) systems have been used in traditional distributedcomputing applications to provide effective and efficient event services. Recently, the design of Pub/Sub systems are proposed for wireless sensor networks (WSNs). Some of the proposed Pub/Sub protocols address the issue of establishing event delivery path with low routing cost by using geographic information. However, they have not considered how to reduce redundant event delivery, which may cause high resource consumption and poor system scalability. In this paper, we propose protocols which address both issues. More specifically, our protocols use geographic information to save routing cost, and meanwhile reduce redundant event delivery by letting the subscribers share the event delivery paths. Three highly scalable and efficient Pub/Sub protocols for WSNs, namely Shortest Delivery Path (SDP), Shortest Delivery Path with Lower Delivery Overhead (SDP-LDO), and Lowest Delivery Overhead (LDO), are designed to achieve different performance goals. The results of theoretical and experimental evaluation show that the proposed protocols can significantly improve the resource efficiency and scalability of a Pub/Sub system compared to the previous solutions. Our protocols can also be used to achieve a good tradeoff between the costs of event subscribing and event delivery.
In this paper, Mobile-Agent-based Information-Driven Multiresolution Algorithm (MAIDM) is presented for Target Tracking in Wireless sensor Networks (WSN), in order to provide better accuracy and degree of fault tolera...
详细信息
ISBN:
(纸本)9780769529097
In this paper, Mobile-Agent-based Information-Driven Multiresolution Algorithm (MAIDM) is presented for Target Tracking in Wireless sensor Networks (WSN), in order to provide better accuracy and degree of fault tolerance while meeting the energy requirement. In a clustered-based wireless sensor networks, mobile agent is used to process data of nodes with multiresolution algorithm according to information contribution of different nodes, and the size of mobile agent is determined by the maximum value of the information contribution along the path of mobile agent. A balance has to be struck between the energy efficiency object and fault tolerance/accuracy object. Simulation results show that MAIDM performs better than IDSQ from perspectives of fault tolerance and accuracy, MAIDM 's energy-efficient performance is better than AIM-CSIP.
With the extensive implementations of wireless sensor networks in many areas, it is imperative to have better management of the coverage and energy consumption of such networks. These networks consist of large number ...
详细信息
ISBN:
(纸本)9781424415014
With the extensive implementations of wireless sensor networks in many areas, it is imperative to have better management of the coverage and energy consumption of such networks. These networks consist of large number of sensor nodes and therefore a multi-agent system approach needs to be taken in order for a more accurate model. Three coordination algorithms are being put to the test in this paper: (i) fully distributed Q-learning which we refer to as independent learner (IL), (ii) distributed Value Function (DVF) and (iii) an algorithm we developed which is a variation of the IL, Coordinated algorithm (COOrd). The results show that the IL and DVF algorithm performed for higher sensor node densities but at low sensor node densities, the three algorithms have similar performance.
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-eff...
详细信息
ISBN:
(纸本)0769529097
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-efficient collection of the physical information from the target area. The coverage preserving data gathering (CPDG) problem is to build up a tree, which minimizes the total energy consumption, and preserves the original coverage to ensure the result correctness. This problem can be formalized as 0-1 Integer linear Programming, and solved by an efficient heuristic algorithm. Furthermore, an improved algorithm is also proposed to balance the energy consumption among all the sensor nodes. The experimental results show that CPDG algorithm can conserve the energy about 30% of PEDAP protocol, which is regarded as one of the most efficient data gathering protocols as we know.
Our work addresses the spatiotemporally varying nature of data traffic in environmental monitoring and surveillance applications. By employing a network-controlled mobile basestation (MB), we present a simple energy-e...
详细信息
Directed diffusion (DD) is typical data-centric protocol for wireless sensor networks, all nodes in a directed diffusion-based network are application-a-ware, and this enables diffusion to achieve energy savings by se...
详细信息
ISBN:
(纸本)9781424413119
Directed diffusion (DD) is typical data-centric protocol for wireless sensor networks, all nodes in a directed diffusion-based network are application-a-ware, and this enables diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network. But at the beginning of routing being established, interest must be flooded throughout the network, it leads heavy traffic. For this reason, an improved directed diffusion (IDD) is proposed in this paper. IDD cluster all nodes into clusters, and select a few nodes as cluster heads the others as cluster members, interest is flooded only among cluster heads, cluster members sense data and transmit their sensing data to its cluster head, cluster head compresses and aggregates sensing data received from its cluster members and sends this sensing data to base station along a reinforcement path. Simulation results show that IDD has higher energy efficient than DD, it can reduce data transmission delay and prolong the lifetime of wireless sensor networks.
Due to the electrically small antenna of wireless sensor in automotive Tire Pressure Monitoring System (TPMS), wireless transmission efficiency of TPMS is low. To increase the wireless transmission efficiency of TPMS ...
详细信息
ISBN:
(纸本)9781424413119
Due to the electrically small antenna of wireless sensor in automotive Tire Pressure Monitoring System (TPMS), wireless transmission efficiency of TPMS is low. To increase the wireless transmission efficiency of TPMS system, a wheel antenna is proposed in this paper. The wheel antenna consists of a valve and a wheel. The three-dimensional electromagnetic (3D EM) simulation model of the wheel antenna is presented. The simulation results are used for the design of wheel antenna matching circuit and the determination of wireless sensor input power. To evaluate wireless transmission performance, the test methods of received power and wireless data transmission are used. The vehicle-carrying test results show that the TPMS with the wheel antenna has a better performance than the previous TPMS system with a dynamic antenna.
sensor nodes can be compromised by attackers to launch various attacks, one of which is false data injection attack. The attacker injects large amount of bogus data through the compromised node. This will lead to netw...
详细信息
ISBN:
(纸本)9781424413119
sensor nodes can be compromised by attackers to launch various attacks, one of which is false data injection attack. The attacker injects large amount of bogus data through the compromised node. This will lead to network resources exhaustion. We propose a novel contact-based approach (CTrace) to traceback to the attack origins. In CTrace, each node maintains information of its neighbors in proximity of radius R hops. The node at R hops away is called contact. With certain probability, each node marks its identification information into an arriving packet. By collecting a few packets, each node is able to construct a partial attack path back to one of its contact. CTrace build the whole attack path using a series of REQ and PATH_SEG message exchanges between a sensor node and its contact. CTrace requires only a small number of packets to track down the source node injecting false data.
This paper presents the e-SENSE middleware architecture for distributed processing of context information in dynamic wireless sensor networks. At the lower layer, sensor nodes organize into clusters spontaneously base...
详细信息
ISBN:
(纸本)9781424415014
This paper presents the e-SENSE middleware architecture for distributed processing of context information in dynamic wireless sensor networks. At the lower layer, sensor nodes organize into clusters spontaneously based on shared context. These clusters form the basis for the service-oriented processing layer, where the functionality of the sensor network is expressed using service task graphs supporting distributed execution of applications. The higher layer is responsible for complex context inference and recognition. As a concrete example we evaluate the distributed recognition of human activities in a car assembly process.
One of risky problems in ad-hoc environments is the unsafe nodes. The unsafe nodes could eavesdrop or juggle the packets, or even cause damage to the communication of the whole network. Normally, it is common to use k...
详细信息
ISBN:
(纸本)9781424413119
One of risky problems in ad-hoc environments is the unsafe nodes. The unsafe nodes could eavesdrop or juggle the packets, or even cause damage to the communication of the whole network. Normally, it is common to use key authentication to preclude unsafe nodes. However, key distribution method seems not practical in the ad-hoc environment. We propose a genetic algorithm approach to solve this problem. By applying the multi-objective optimization, We devise a mechanism to guarantee each node's authentication. Our experiment shows' this mechanism provides a good capability in the ad-hoc environment.
暂无评论