Reservation-based and contention-based MAC protocols have their own advantages in data transmissions under mobile sensor networks. This paper presents a quantitative analysis of two types of MAC protocols in throughpu...
详细信息
ISBN:
(纸本)9781538639917
Reservation-based and contention-based MAC protocols have their own advantages in data transmissions under mobile sensor networks. This paper presents a quantitative analysis of two types of MAC protocols in throughput, delay, and energy efficiency under various traffic loads environments using queueing theory. The analytical and simulation results show the design strategies of hybrid MAC protocols for mobile dynamic traffic scenarios.
In recent years, wireless sensor networks offer cost-effective solutions to various surveillance and tracking applications with the developments in sensor techniques. In many of these applications, sensor nodes that a...
详细信息
ISBN:
(纸本)9781479946181
In recent years, wireless sensor networks offer cost-effective solutions to various surveillance and tracking applications with the developments in sensor techniques. In many of these applications, sensor nodes that are equipped with directional sensors and they operate autonomously in unattended environments. The deployment strategy of directional sensor nodes is critical to improve target detection and tracking accuracy. In this paper, deployment of passive infrared motion (PIR) sensors is analyzed in terms of coverage issue. A PIR sensor Deployment (PSD) problem is addressed using deployment schemes that are based on computational geometry. Finally, the performance of deployment schemes is evaluated in a Java based simulation environment.
We present a technique to identify transmission timing for ieee802.15.4 based Wireless sensor Networks (WSNs) in the presence of WiFi interference. Our technique is based on modeling WiFi traffic with a Modulated Mark...
详细信息
ISBN:
(纸本)9781509014590
We present a technique to identify transmission timing for ieee802.15.4 based Wireless sensor Networks (WSNs) in the presence of WiFi interference. Our technique is based on modeling WiFi traffic with a Modulated Markov Poisson Process (MMPP) model in order to enable us to predict when WiFi transmissions take place and avoid them. We have evaluated the accuracy of our model in a small test-bed. Results are promising and suggest that our approach can increase the reliability of ieee802.15.4 transmissions.
In this paper, we investigate the manner in which energy consumption in drone deliveries is affected by windy environmental conditions. We know in fact that the energy consumption of the drone will depend on the stati...
详细信息
ISBN:
(纸本)9781665439299
In this paper, we investigate the manner in which energy consumption in drone deliveries is affected by windy environmental conditions. We know in fact that the energy consumption of the drone will depend on the static and dynamic parameters of the scenario where it moves and according to these it decides, during the mission, to detour from the originally planned path to take advantage of the wind changes. In order to validate this, we simulate possible deliveries among fixed destinations relying on a real data-set of recorded winds obtained from different weather stations in Corsica, France. For our analysis, we will mainly concentrate on the evaluation of the delivery scheme proposed in the literature, where completing a delivery means finding a cycle for the drone that is feasible, i.e., that can be completed with the available energy autonomy of the drone.
Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availa...
详细信息
ISBN:
(纸本)9781665439299
Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availability in energy-neutral or batteryless applications. In this work, we propose a compensation method which re-maps on-demand measurements to virtually duty-cycled readings in the value domain by taking the duration of the last off-time into account. We evaluate our compensation algorithm based on Sensirion's SGP30 sensor and achieve up to 79% accuracy improvement compared to uncompensated measurements.
Constrained Application Protocol (CoAP) was developed to support the communication between resource constrained nodes via low-power links. As an Internet protocol, CoAP needs congestion control primarily to stabilize ...
详细信息
ISBN:
(纸本)9781509014590
Constrained Application Protocol (CoAP) was developed to support the communication between resource constrained nodes via low-power links. As an Internet protocol, CoAP needs congestion control primarily to stabilize the networking operation. In this paper we propose a new round trip time based adaptive congestion control scheme, which improves CoAP by utilizing the retransmission count information in estimating the retransmission timeout. An experiment is conducted based on Californium CoAP framework and real devices. It shows that the proposed scheme significantly improves CoAP in terms of throughput and rate of successful transaction.
The paper is motivated by recent surge of interest in utilization of a large number of sensor nodes in cyber-physical systems (CPSs) and the critical importance of managing sensor's restricted resources. In this r...
详细信息
ISBN:
(纸本)9781538639917
The paper is motivated by recent surge of interest in utilization of a large number of sensor nodes in cyber-physical systems (CPSs) and the critical importance of managing sensor's restricted resources. In this regard, we propose a multi-sensor and open-loop estimation algorithm with an information-based triggering mechanism. In the open-loop topology considered in this paper, each sensor transfers its measurements to the fusion centre (FC) only in occurrence of specific events (asynchronously). Events are identified using the information-based triggering mechanism without incorporation of a feedback from the FC and/or implementation of a local filter at the sensor level. We propose a multi-sensor triggering approach based on the projection of each local observation into the state-space which corresponds to the achievable gain in the sensor's information state vector. The simulation results show that the proposed multi sensor information-based triggering mechanism closely follows its full-rate estimation counterpart.
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifyin...
详细信息
ISBN:
(纸本)9781479946181
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifying the nodes of malware propagation, (ii) leading a flying robot along a path in the WSN that guarantees the minimum recovery time to (iii) heal the infected nodes. We formulate the targeted curing problem as a binary integer problem and determine the optimal solution by a central solver. We use the analytical result as a benchmark to evaluate the recovery time of the proposed solution. The achieved results show a satisfactory performance in terms of tracking the presence of an ongoing epidemic and healing the nodes.
暂无评论