This paper presents a novel MAC protocol for Wireless sensornetworks (WSN)s designated Tone-Propagated MAC (TP-MAC). This protocol is specially suited for early warning and tracking applications, where sensor nodes g...
详细信息
ISBN:
(纸本)9783540709688
This paper presents a novel MAC protocol for Wireless sensornetworks (WSN)s designated Tone-Propagated MAC (TP-MAC). This protocol is specially suited for early warning and tracking applications, where sensor nodes generate sporadic asynchronous traffic (mainly consisting of uplink alert messages and downlink control messages) with stringent latency requirements. This protocol aims to maximize energy-efficiency while minimizing latency in source-to-sink and sink-to-source communication. This difficult objective is achieved integrating scheduled channel polling (i.e. synchronized low power listening) with rapid fast path establishment based on the propagation of short wake-up tones. An analytical model was used to compare TP-MAC with SCP-MAC. The results show that TP-MAC is able to achieve better target latencies even when its duty-cycle is lower during periods of inactivity. The results also show that the advantage of using TP-MAC increases with the hop-distance between source and sink.
The proceedings contain 220 papers. The topics discussed include: designing strategies on frame structure in the rate adaptive communication;alternative packet forwarding for otherwise discarded packets;generalized pa...
ISBN:
(纸本)0769530486
The proceedings contain 220 papers. The topics discussed include: designing strategies on frame structure in the rate adaptive communication;alternative packet forwarding for otherwise discarded packets;generalized partially bent functions;an architecture of policy-based application-aware network QoS management for large-scale heterogeneous networks;codes with low peak-to-average power ratio for multi-code CDMA;threshold signatures in dynamic groups;lightweight session key management scheme in sensornetworks;home device authentication method based on PKI;typical behavior patterns extraction and anomaly detection algorithm based on accumulated home sensor data;search system for behavior time segments from accumulated sensor data in room environment;active RFID-based object management system in sensor-embedded environment;and novel wireless mesh networking architectures for future smart homes.
Target classification is important in wireless sensor network (WSN). This paper proposes a collaborative peer-to-peer (P2P) training and classifying method with support vector machine (SVM) for WSN. The proposed metho...
详细信息
ISBN:
(纸本)9780769530482
Target classification is important in wireless sensor network (WSN). This paper proposes a collaborative peer-to-peer (P2P) training and classifying method with support vector machine (SVM) for WSN. The proposed method incrementally carries out the training process with the collaboration of sensor nodes in P2P paradigm. For decreasing energy consumption and improving accuracy, the collaboration of sensor nodes is implemented by autonomously selecting the proper set of sensor nodes to carry out the training process according to several feasible measures of energy consumption and information utility. Because of the purposeful sensor nodes selection, dynamic collaborative SVM can conquer the inevitable missing rate and false rate of samples in WSN. Results demonstrate that the proposed dynamic collaborative SVM can effectively implement target classification in WSN. It is also verified that the proposed dynamic collaborative SVM has outstanding performance in energy efficiency and time delay.
To balance energy consumption among cluster-heads in multi-hop wireless sensornetworks, we propose an energy-efficient distance based probabilistic clustering scheme. Our scheme considers a distance from the sink(bas...
详细信息
ISBN:
(纸本)9783540754756
To balance energy consumption among cluster-heads in multi-hop wireless sensornetworks, we propose an energy-efficient distance based probabilistic clustering scheme. Our scheme considers a distance from the sink(base station) to each node as well as the residual energy of each node as the criterion of cluster-head election. Through simulation experiments, we show that our scheme is more effective than LEACH and EEUC in prolonging the lifespan of multi-hop wireless sensornetworks.
Target numeration is of great importance for activity monitoring applications in wireless sensornetworks (WSNs);however it is also a challenging problem in a WSN only equipped with simple amplitude sensors. Only a fe...
详细信息
ISBN:
(纸本)0769530486
Target numeration is of great importance for activity monitoring applications in wireless sensornetworks (WSNs);however it is also a challenging problem in a WSN only equipped with simple amplitude sensors. Only a few algorithms have been proposed to solve the problem of target counting, and their accuracy and computational complexity is not satisfactory. This paper provides a two-step energy-based target numeration (EBTN) algorithm that firstly groups the sensor nodes that detect a target into separate clusters, and then calculates the number of targets covered by each cluster based on the total signal energy collected over the cluster A polynomial regression function is used to approximate the signal strength over a cluster and the total energy is estimated by taking the integral of the function over the area. By combining with preliminary clustering step, energy-based target counting greatly improves the counting accuracy. Experiments also show that EBTN requires lower node density and computational complexity compared with other algorithms.
Wireless Ad hoc sensornetworks are characterized by several constraints, such as bandwidth, delay, power, etc. These networks are examined by constructing a tree network. A core node usually chosen to be the median o...
详细信息
ISBN:
(纸本)97830540726050
Wireless Ad hoc sensornetworks are characterized by several constraints, such as bandwidth, delay, power, etc. These networks are examined by constructing a tree network. A core node usually chosen to be the median or center of the multicast tree network with a tend to minimize a performance metric, such as delay or bandwidth. In this paper, we present new efficient strategy for constructing and maintaining a core node in multicast tree for wireless ad hoc sensornetworks that undergo dynamic changes based on local information. The new core (centdian) function is defined by convex combination that signifies total bandwidth and delay constraints. We provide two bounds of O(d) and O(d + l) time for maintaining the centdian using local updates, where l is the hop count between the new center and the new centdian and d is the diameter. We also show a O(n log n) time solution for finding centdian in the Euclidian complete network using interesting observations. Finally a simulation is presented.(1)
In a city area network hundreds of video cameras, infrared and laser sensors are deployed for online monitoring of physical phenomenon over a geographical area. This is a popular application of sensornetworks. next g...
详细信息
ISBN:
(纸本)9781424410750
In a city area network hundreds of video cameras, infrared and laser sensors are deployed for online monitoring of physical phenomenon over a geographical area. This is a popular application of sensornetworks. nextgeneration intelligent sensing systems and networks are divided into two categories, an always-on mode - where every sensor information is piped to a base station (for resolution of a problem), and a snapshot mode - where a user queries the network for an instantaneous summary of the observed environment. Snapshot mode sensornetworks are highly dependent on relevant sensing due to the accuracy required in a short time and the sensitive nature of the problem (query). This paper summarises the sensor relevance establishment problem in data acquisition. We describe its use in a framework that models the observed environment at each sensor node as a function of time, and uses an adaptive learning method to sample data with the corresponding relevance metric. We take the sensor network towards the problem by considering the relevance metric at given time step. The sensor relevance establishment problem has been split into two steps. In step one, the relevant sensor type is discovered based upon the IEEE 1451.4 Transducers Electronic Data Sheets (TEDS). TEDS description model can be used to discover the sensor type and their geographical locations and other important information such as uncertainty measurement functions and information fusion rules necessary to fuse multi-sensor data. In step two, the most useful sensor selection is determined using the relevant information data metric. This step is modelled using the Kullback-Leibler Divergence (KLD) method to measure the information relevance distance between the TEDS modelled relevant sensors determined in step one. As proof of our concept we have simulated the 3D environment using a real-time distributed robotics software Player/Stage/Gazebo. The preliminary results have been demonstrated on a simple auto
The nextgeneration of mobile networks is expected to utilize multiple radio access technologies (RAT), seamlessly integrated to form a heterogeneous wireless network. On the arrival of service request, an access netw...
详细信息
ISBN:
(纸本)0769530486
The nextgeneration of mobile networks is expected to utilize multiple radio access technologies (RAT), seamlessly integrated to form a heterogeneous wireless network. On the arrival of service request, an access network must be assigned to the user. A request can be due to a new connection call within a cell, an intrasystem or inter-system handover attempt. In case of handoff, it must be realized as fast as possible. However, some factors as the authentication service has an important impact on the final handover latency. The problem is increased in the case of vertical handover. This paper describes the reference architecture for access management in which the handovers take place;we measure the handover latency and we make an analysis of the impact that the authentication procedure has in the final delay of the handover execution on heterogeneous mobile communicationnetworks.
Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensornetworks. Collaborative beamforming (CB) and coop...
详细信息
ISBN:
(纸本)9781424403523
Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensornetworks. Collaborative beamforming (CB) and cooperative transmission (CT) have recently emerged as new communication techniques that enable and leverage effective resource sharing among collaborative/cooperative nodes. In this paper, we seek to maximize the lifetime of sensornetworks by using the new idea that closely located nodes can use CB/CT to reduce the load or even avoid packet forwarding requests to nodes that have critical battery life. First, we study the effectiveness of CB/CT to improve the signal strength at a faraway destination using energy in nearby nodes. Then, a 2D disk case is analyzed to assess the resulting performance improvement. For general networks, if information-generation rates are fixed, the new routing problem is formulated as a linear programming problem;otherwise, the cost for routing is dynamically adjusted according to the amount of energy remaining and the effectiveness of CB/CT. From the analysis and simulation results, it is seen that the proposed schemes can improve the lifetime by about 90% in the 2D disk network and by about 10% in the general networks, compared to existing schemes.
暂无评论