this paper studies means of archiving energy balance in Wireless sensor Networks (WSNs) as criterion to increase network lifetime. While protocols for balancing energy through centralized computation have been establi...
详细信息
ISBN:
(纸本)9781509014590
this paper studies means of archiving energy balance in Wireless sensor Networks (WSNs) as criterion to increase network lifetime. While protocols for balancing energy through centralized computation have been established, effective solutions for more realistic distributed settings are still an open research field. In this work, we present a novel approach for balancing energy in WSNs in a distributed manner by solving a sequence of modular strategic subgames. In addition, we prove theoretical bounds for its solution quality. To the best of our knowledge, we are the first to explicitly provide theoretical bounds for distributed WSN energy balancing schemes. We do so by formulating two specific routing games in which sensor nodes act as strategic agents with interests in energy balance. the first formulated game is a monotone utility game and by exploiting and adapting some existing results, we can prove a meaningful relative bound for its solution value via our distributed modular subgames scheme under realistic conditions. For the second game we provide an absolute bound. We round up our theoretical results by an experimental evaluation, where our modular subgames scheme shows increased performance compared to state-of-the-art algorithms.
this paper presents initial results and future directions for data description and payload encodings for heterogeneous networks in IP based building intelligence systems. the efficiency of several open standards for s...
详细信息
ISBN:
(纸本)9781457705137
this paper presents initial results and future directions for data description and payload encodings for heterogeneous networks in IP based building intelligence systems. the efficiency of several open standards for sensor data representation are evaluated along with a consideration of the complexity of implementation and suitability for use in development of 6lowPAN based intelligent building systems. A combination of a simplified generic XML schema for data description combined with Google Protobuffer encoding is suggested as the basis for further development of the architecture as this combines simple, platform independent implementation for developers with efficient compression and payload encoding for limited bandwidth6lowPAN networks.
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field....
详细信息
ISBN:
(纸本)9781479946181
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field. Combining the two techniques, MaWi not only achieves a high localization accuracy, but also effectively reduces human labor in building fingerprint databases: to avoid war-driving, MaWi is designed to work with low quality fingerprint databases that can be efficiently built by only one person. Our experiments demonstrate that MaWi, with a fingerprint database as scarce as one data sample at each spot, outperforms the state-of-the-art proposals working on a richer fingerprint database.
In this paper we study the problem of minimum connected dominating set in geometric k-disk graphs. this research is motivated by the problem of virtual backbone construction in wireless ad hoc and sensor networks, whe...
详细信息
ISBN:
(纸本)9781424431748
In this paper we study the problem of minimum connected dominating set in geometric k-disk graphs. this research is motivated by the problem of virtual backbone construction in wireless ad hoc and sensor networks, where the coverage area of nodes are disks with different radii. We derive the size relationship of any maximal independent set and the minimum connected dominating set in geometric k-disk graphs, and apply it to analyze the performances of two distributed connected dominating set algorithms we propose in this paper these algorithms have a bounded performance ratio and low communication overhead, and therefore have the potential to be applied in real ad hoc and sensor networks.
Withthe growth of cities and population, urban corporation faces potential challenges. One such challenge is regulating parking spaces. this become a tedious job during weekends and festival season. Improper regulati...
详细信息
Pattern recognition approaches are commonly adopted by many wireless sensor network applications due to their traditional effectiveness in detecting and recognising events. Nonetheless, employing off-the-shelf pattern...
详细信息
Real deployments of the IoT require security. CoAP is being standardized as an application layer protocol for the Internet of things (IoT). CoAP proposes to use DTLS to provide end-to-end security to protect the IoT. ...
详细信息
ISBN:
(纸本)9780769547077
Real deployments of the IoT require security. CoAP is being standardized as an application layer protocol for the Internet of things (IoT). CoAP proposes to use DTLS to provide end-to-end security to protect the IoT. DTLS is a heavyweight protocol and its headers are too long to fit in a single ieee 802.15.4 MTU. 6LoWPAN provides header compression mechanisms to reduce the size of upper layer headers. 6LoWPAN header compression mechanisms can be used to compress the security headers as well. In this paper we propose 6LoWPAN header compression for DTLS. We link our compressed DTLS withthe 6LoWPAN standard using standardized mechanisms. We show that our proposed DTLS compression significantly reduces the number of additional security bits. For example, only for the DTLS Record header that is added in every DTLS packet, the number of additional security bits can be reduced by 62%. Our compressed-DTLS is the first lightweight 6LoWPAN extension for DTLS.
Designing a distributed wireless sensor network can be a difficult effort without using simulation tools. these tools should provide a robust and efficient solution for the problem with quick response time. However, a...
详细信息
ISBN:
(纸本)9781479946181
Designing a distributed wireless sensor network can be a difficult effort without using simulation tools. these tools should provide a robust and efficient solution for the problem with quick response time. However, available simulation tools for designing wireless sensor networks are very limited. Authors in [1] proposed an interactive design tool based on Dijkstra's algorithm which can assist rapid design of sensor network. However, it has a very high execution time when the network size is relatively large, i.e. n >= 50. Moreover, it produces a suboptimal solution with large number of router nodes. In this paper, we present efficient and robust synthesis algorithms which exclusively reduce run time for large networks as much as 1000% and also produce a synthesized network with a reduced number of router nodes as much as 150% in comparison to similar previous works.
the process of computingthe physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks because manual or assisted localization is ...
详细信息
ISBN:
(纸本)0769523315
the process of computingthe physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks because manual or assisted localization is often impractical due to time requirements, economic constraints or inherent limitations of deployment scenarios. We have developed a service for reliably localizing wireless sensor networks in environments conducive to ranging errors by using a custom hardware-software solution for acoustic ranging and a family of self-localization algorithms. the ranging solution improves on previous work, extending the practical measurement range threefold (20-30m) while maintaining a distance-invariant median measurement error of about 1% of maximum range (33cm). the localization scheme is based on least squares scaling with soft constraints. Evaluation using ranging results obtained from sensor network field experiments shows that the localization scheme is resilient against large-magnitude ranging errors and sparse range measurements, both of which are common in large-scale outdoor sensor network deployments.
A distributed Wireless sensor Network(WSN) is a collection of n sensors with limited hardware resources. Due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such a...
ISBN:
(纸本)9781424421701
A distributed Wireless sensor Network(WSN) is a collection of n sensors with limited hardware resources. Due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as key distribution center. distributedsensor networks may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptious use by an adversary. therefore, this paper presents broadcast authentication involving multipath key with aggregators in sensor networks. the making multipath key is a new key management in spite of sensor network limitations.
暂无评论