Results 1 - 10
of
24
Cross-layer design for lifetime maximization in interference-limited wireless sensor networks
, 2006
"... We consider the joint optimal design of the physical, medium access control (MAC), and routing layers to maximize the lifetime of energy-constrained wireless sensor networks. The problem of computing lifetime-optimal routing flow, link schedule, and link transmission powers for all active time slots ..."
Abstract
-
Cited by 88 (6 self)
- Add to MetaCart
(Show Context)
We consider the joint optimal design of the physical, medium access control (MAC), and routing layers to maximize the lifetime of energy-constrained wireless sensor networks. The problem of computing lifetime-optimal routing flow, link schedule, and link transmission powers for all active time slots is formulated as a non-linear optimization problem. We first restrict the link schedules to the class of interference-free time division multiple access (TDMA) schedules. In this special case, we formulate the optimization problem as a mixed integerconvex program, which can be solved using standard techniques. Moreover, when the slots lengths are variable, the optimization problem is convex and can be solved efficiently and exactly using interior point methods. For general non-orthogonal link schedules, we propose an iterative algorithm that alternates between adaptive link scheduling and computation of optimal link rates and transmission powers for a fixed link schedule. The performance of this algorithm is compared to other design approaches for several network topologies. The results illustrate the advantages of load balancing, multihop routing, frequency reuse, and interference mitigation in increasing the lifetime of energy-constrained networks. We also briefly discuss computational approaches to extend this algorithm to large networks.
Wireless sensor networks for intrusion detection: packet traffic modeling
, 2006
"... ..."
(Show Context)
Joint Routing and Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
"... Abstract—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetime, in which wireless link bandwidth has been optimistically assumed to be sufficient. This article shows that ignor ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
(Show Context)
Abstract—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetime, in which wireless link bandwidth has been optimistically assumed to be sufficient. This article shows that ignoring the bandwidth constraint can lead to infeasible routing solutions. As energy constraint affects how data should be routed, link bandwidth also affects not only the routing topology but also the allowed data rate on each link. In this paper, we discuss the sufficient condition on link bandwidth that makes a routing solution feasible, then provide mathematical optimization models to tackle both energy and bandwidth constraints. We first present a basic mathematical model to address using uniform transmission power for routing without data aggregation, then extend it to handle nonuniform transmission power, and then routing with data aggregation. We propose two efficient heuristics to compute the routing topology and link data rate. Simulation results show that these heuristics provide more feasible routing solutions than previous work, and provide significant improvement on throughput and lifetime. Index Terms—Sensor networks, routing, cross layer design, optimization. I.
Energy-Aware Routing in the Cognitive Packet Network
- in: International Conference on Smart Grids, Green Communications, and IT Energy-aware Technologies (Energy ’11
, 2011
"... An energy aware routing protocol (EARP) is proposed to minimise a perfor-mance metric that combines the total consumed power in the network and the QoS that is specified for the flows. The algorithm uses source routing based on the functionalities provided by the Cognitive Packet Network (CPN), run- ..."
Abstract
-
Cited by 11 (3 self)
- Add to MetaCart
An energy aware routing protocol (EARP) is proposed to minimise a perfor-mance metric that combines the total consumed power in the network and the QoS that is specified for the flows. The algorithm uses source routing based on the functionalities provided by the Cognitive Packet Network (CPN), run-ning autonomously at each input node to the network based on smart packets which gather relevant information throughout the network using reinforcement learning at each of the intermediate nodes. Measurements on an experimental test-bed that uses EARP are presented and they indicate that it offers a reduc-tion in power consumption, as compared to a purely QoS driven approach, and also respects the requested QoS level.
Joint Power Control, Scheduling and Routing for Multihop Energy Harvesting Sensor Networks
"... We study wireless multihop energy harvesting sensor networks employed for random field estimation. The sensors sense the random field and generate data that is to be sent to a fusion node for estimation. Each sensor has an energy harvesting source and can operate in two modes: Wake and Sleep. We con ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
(Show Context)
We study wireless multihop energy harvesting sensor networks employed for random field estimation. The sensors sense the random field and generate data that is to be sent to a fusion node for estimation. Each sensor has an energy harvesting source and can operate in two modes: Wake and Sleep. We consider the problem of obtaining jointly optimal power control, routing and scheduling policies that ensure a fair utilization of network resources. This problem has a high computational complexity. Therefore, we develop a computationally efficient suboptimal approach to obtain good solutions to this problem. We study the optimal solution and performance of the suboptimal approach through some numerical examples. Categories and Subject Descriptors
Quantifying factors affecting quality of service in mobile ad hoc networks
- Simulation
, 2005
"... Support for quality of service (QoS) is increasingly important in mobile ad hoc networks (MANETs) with the emergence of delay-sensitive applications. This article quantifies the impact of factors and their interactions on the performance of real-time flows through statistical analysis of data gather ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
Support for quality of service (QoS) is increasingly important in mobile ad hoc networks (MANETs) with the emergence of delay-sensitive applications. This article quantifies the impact of factors and their interactions on the performance of real-time flows through statistical analysis of data gathered in simulation.The factors considered include QoS architecture, routing protocol, medium access control (MAC) protocol, mobility model, and offered load.The QoS architectures considered include stateless (Swan), stateful (Insignia), and no support for QoS. For routing, proactive (OLSR) and reactive (DSR, AODV) protocols are considered. The IEEE 802.11 distributed coordination function (DCF) and its QoS-aware extension enhanced DCF (EDCF) are the MAC protocols considered. The authors find that the stateless architecture of Swan better supports QoS than the stateful approach of Insignia or the classic architecture in the two mobility models considered.
Cross-layer Optimization in Sensor Networks with Energy Constraints
"... A typical wireless sensor network consists of sensors powered by small batteries that are difficult to replace if not impossible. Hence, the sensor nodes can only transmit a finite number of bits before they run out of energy. Thus, reducing the energy consumption per bit for end-to-end data transmi ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
A typical wireless sensor network consists of sensors powered by small batteries that are difficult to replace if not impossible. Hence, the sensor nodes can only transmit a finite number of bits before they run out of energy. Thus, reducing the energy consumption per bit for end-to-end data transmission is an important design consideration for such networks. We assume that each information bit collected by a sensor is useful for a finite amount of time; after this time the information may become irrelevant. Hence all the bits collected by the sensors need to be communicated to a hub node before a certain deadline. Therefore, the maximum endto-end transmission delay for each bit must be controlled to meet a given deadline under the hard energy constraint. Since all layers of the protocol stack affect the energy consumption and delay for the end-to-end transmission of each bit, an
An mmse based weighted aggregation scheme for event detection using wireless sensor network
- 14th European Signal Processing Conference, EUSIPCO 2006
, 2006
"... We consider design of wireless sensor network for event detection application. An MMSE based weighted aggrega-tion scheme is proposed for event detection application using wireless sensor network. Accuracy and the network lifetime are the two performance evaluating parameters considered here. We com ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
We consider design of wireless sensor network for event detection application. An MMSE based weighted aggrega-tion scheme is proposed for event detection application using wireless sensor network. Accuracy and the network lifetime are the two performance evaluating parameters considered here. We compare the performance of the proposed scheme with the previously known schemes. 1.
Autonomic System to protect Wireless Sensor Networks from External Attacks
"... The increased deployment of ubiquitous wireless sensor (WSN) networks has exponentially increased the complexity to detect wireless sensor network attacks and protect against them. In this paper, we investigated the vulnerabilities in wireless sensor networks, developed a comprehensive taxonomy of w ..."
Abstract
- Add to MetaCart
(Show Context)
The increased deployment of ubiquitous wireless sensor (WSN) networks has exponentially increased the complexity to detect wireless sensor network attacks and protect against them. In this paper, we investigated the vulnerabilities in wireless sensor networks, developed a comprehensive taxonomy of wireless sensor network attacks that has been used to guide our approach to develop, and successfully implement autonomic system capable of detecting and protecting wireless sensor networks from a wide range of attacks.Proposed system depends on analyzing packet flow information to detect the attacks. Where by analyzing information of packet flow, the autonomic system can be determines the behavior of the network if normal or abnormal.
Contents lists available at ScienceDirect Computer Networks
"... journal homepage: www.elsevier.com/locate/comnet ..."
(Show Context)