This article is motivated by the recent recognition that channel fading for new wireless applications is not always well described by traditional models used for mobile communication systems. In particular, fading dat...
详细信息
This article is motivated by the recent recognition that channel fading for new wireless applications is not always well described by traditional models used for mobile communication systems. In particular, fading data collected for vehicle-to-vehicle and wirelesssensornetwork applications has motivated new models for conditions in which channel fading statistics can be worse than Rayleigh. We review the use of statistical channel models, describe our example applications, and provide both measured and modeling results for these severe fading conditions.
wirelesssensornetworking is a viable communicationtechnology among low-cost and energy-limited sensor nodes deployed in an environment. Due to high operational features, the application area of this technology is e...
详细信息
wirelesssensornetworking is a viable communicationtechnology among low-cost and energy-limited sensor nodes deployed in an environment. Due to high operational features, the application area of this technology is extended significantly but with some energy related challenges. One main cause of the nodes energy wasting in these networks is idle listening characterized with no communication activity. This drawback can be mitigated by the means of energy-efficient multiple access control schemes so as to minimize idle listening. In this paper, we discuss the applicability of distributed learning algorithms namely reinforcement learning towards multiple access control (MAC) in wirelesssensornetworks. We perform a comparative review of relevant work in the literature and then present a cooperative multi agent reinforcement learning framework for MAC design in wirelesssensornetworks. Accordingly, the paper concludes with some major challenges and open issues of distributed MAC design using reinforcement learning.
wirelesssensornetworks (WSNs) are promising technology in structural health monitoring (SHM) applications for their low cost and high efficiency. The limited wirelesssensors and restricted power resources in WSNs h...
详细信息
wirelesssensornetworks (WSNs) are promising technology in structural health monitoring (SHM) applications for their low cost and high efficiency. The limited wirelesssensors and restricted power resources in WSNs highlight the significance of optimal wirelesssensor placement (OWSP) during designing SHM systems to enable the most useful information to be captured and to achieve the longest network lifetime. This paper presents a holistic approach, including an optimization criterion and a solution algorithm, for optimally deploying self-organizing multi-hop WSNs on large-scale structures. The combination of information effectiveness represented by the modal independence and the network performance specified by the network connectivity and network lifetime is first formulated to evaluate the performance of wirelesssensor configurations. Then, an information-fusing firefly algorithm (IFFA) is developed to solve the OWSP problem. The step sizes drawn from a Levy distribution are adopted to drive fireflies toward brighter individuals. Following the movement with Levy flights, information about the contributions of wirelesssensors to the objective function as carried by the fireflies is fused and applied to move inferior wirelesssensors to better locations. The reliability of the proposed approach is verified via a numerical example on a long-span suspension bridge. The results demonstrate that the evaluation criterion provides a good performance metric of wirelesssensor configurations, and the IFFA outperforms the simple discrete firefly algorithm.
Recently, Underwater wirelesssensornetworks (UWSNs) gained much attention of researcher due to its usefulness. Unlike terrestrial sensornetworks, radio waves are not suitable for UWSNs due to harsh underwater envir...
详细信息
ISBN:
(纸本)9781467383158
Recently, Underwater wirelesssensornetworks (UWSNs) gained much attention of researcher due to its usefulness. Unlike terrestrial sensornetworks, radio waves are not suitable for UWSNs due to harsh underwater environment. However, acoustic signals gained advantage over the radio waves for underwater communication. UWSNs have distinct characteristics i.e., high propagation delay, low frequency, high bit error rate and limited energy. Therefore, designing an efficient routing protocol for underwater sensornetworks is quiet challenging. The major constraint of UWSNs is the limited battery of the sensor nodes. The replacement or recharging of batteries is a hectic job due to harsh underwater environment. Therefore we propose an energy efficient routing protocol, iIA-EEDBR, for UWSNs. iIA-EEDBR selects a forwarding node which has least depth, high residual energy and least number of neighbors. iIA-EEDBR improves the network lifetime by introducing sleep nodes in the UWSNs. When a node dies in the network, a sleep node takes over the performance of that particular dead node to avoid creation of routing holes. Due to the creation of the routing holes the network performances is affected and degraded. Therefore, iIA-EEDBR prevents the creation of routing holes.
The hybrid cloud extends the private cloud model by using both local and remote resources. The private cloud will rely on the resources leased from public cloud providers for the execution of private cloud application...
详细信息
The hybrid cloud extends the private cloud model by using both local and remote resources. The private cloud will rely on the resources leased from public cloud providers for the execution of private cloud applications. The paper presents optimal scheduling across public and private clouds in complex hybrid cloud environment. The contributions of this paper have three aspects. 1) The proposed hybrid cloud scheduling policy considers the benefits of private cloud applications and public cloud provider, it can adapt to the changes in the system to find the scheduling optimization. The scheduling optimization is decomposed and conducted across the private cloud and public cloud. 2) Secondly, The paper describes negotiations in hybrid cloud marketplace and gives an example to explain how these rules are resolved by the cloud marketplace. 3) Thirdly, the paper proposes an optimal scheduling algorithm across public and private clouds. The paper also describes negotiations in hybrid cloud marketplace and gives an example to explain how these rules are resolved by the cloud marketplace. In the simulations, the profit of public cloud provider and resource utilization of the proposed algorithm are better than other related works.
In wirelesssensornetworks, nodes usually construct tree structure in any monitored area to enable data aggregation and to transmit aggregated data by multi-hopping through neighbors to a remote sink (BS) which resul...
详细信息
In wirelesssensornetworks, nodes usually construct tree structure in any monitored area to enable data aggregation and to transmit aggregated data by multi-hopping through neighbors to a remote sink (BS) which results in significant energy savings. Furthermore, a captured sensor node might generate a fictitious data and misguide the Sink (BS). Hence, secure communication between nodes have generally vital importance. Secret shared keys are needed to be established among sensor nodes for secure communication among them. In the present work a new algorithm is introduced to construct such a tree of sensor nodes in wirelesssensornetworks. This algorithm implements a sleep/wake scheduling technique to keep redundant nodes inactive while maintaining initial sensing coverage with active nodes. Redundant nodes can replace the failure nodes to keep network tasks that enhances the network lifetime by efficient utilization. Hence the objective of this research work is to jointly design the scheme for sensor scheduling, tree construction with active nodes, and secret pair-wise keys establishment with their parent and children such that the network lifetime can be maximized. Thereafter, sensor nodes communicate with each other securely using secret pair-wise keys.
WSNs have become pervasive and are used in many applications and services. Usually, deployments of WSNs are task-oriented and domain-specific, thereby precluding reuse when other applications and services are contempl...
详细信息
WSNs have become pervasive and are used in many applications and services. Usually, deployments of WSNs are task-oriented and domain-specific, thereby precluding reuse when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology that can aid in tackling this issue, as it enables the sharing of resources/infrastructure by multiple independent entities. In this article we critically review the state of the art and propose a novel architecture for WSN virtualization. The proposed architecture has four layers (physical layer, virtual sensor layer, virtual sensor access layer, and overlay layer) and relies on a constrained application protocol. We illustrate its potential by using it in a scenario where a single WSN is shared by multiple applications, one of which is a fire monitoring application. We present the proof-of-concept prototype we have built along with the performance measurements, and discuss future research directions.
In this paper we present the technology choices for implementing wirelesssensornetworks (WSN), which can be used for in-situ environmental monitoring. WSN is an embedded, massively distributed networking paradigm co...
详细信息
ISBN:
(纸本)0889865523
In this paper we present the technology choices for implementing wirelesssensornetworks (WSN), which can be used for in-situ environmental monitoring. WSN is an embedded, massively distributed networking paradigm consisting of large number of intelligent, multitask sensor devices connected mainly via short-range wireless links. The unique features, requirements, and applications of WSN lead to many open design and implementation issues. In this paper, we survey the sensornetworktechnology by focusing on its basic structure and usage. In addition, we define two problems in WSN (coverage and communication) that are the core of any WSN deployment. Finally, we present an initial experimental result of a simple WSN test-bed using our design methodology with applications to environmental monitoring.
Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable research attention in recent years. Although theoretical study has shown its potential to g...
详细信息
Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable research attention in recent years. Although theoretical study has shown its potential to generate information-theoretic secure keys, great challenges remain when transforming the theory into practice. This article provides an overview of the physical layer key generation process and discusses its practical challenges. Different passive and active attacks are analyzed and evaluated through numerical study. A new key generation scheme using random probing signals, and combining user generated randomness and channel randomness, is introduced as a countermeasure against active attacks. The numerical results show that the proposed scheme achieves higher security strength than existing schemes using constant probing signals under active attacks. Future research topics on physical layer key generation are discussed.
暂无评论