Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For...Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.展开更多
Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio fre...Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design.展开更多
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ...On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.展开更多
In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sens...In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sensor nodes in inaccessible areas.Therefore,how to increase the network lifetime of the WSN is deserved to be studied.In this study,a WSN routing algorithm was proposed based on block clustering and springboard nodes to increase the network lifetime of the WSN.Firstly,by analyzing the influence of communication transmission distance on network energy consumption,block clustering was introduced to control node transmission distance in order to reduce total network energy consumption.In addition,a network transmission model was proposed based on springboard nodes and the advantages of network energy consumption of this model against multi-hop between clusters were analyzed.The simulation results show that,compared with the LEACH algorithm,EECPK-means algorithm and energy centroid clustering algorithm,the proposed routing algorithm effectively prolongs the network lifetime of WSN.展开更多
When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is co...When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is commonly known as the “hot spot” or “energy hole” phenomenon. To resolve this issue, a Multi-Hop Decentralized Cluster-Based Routing (MDCR) protocol is proposed. This algorithm uses orphan nodes as intermediate nodes to form inter-cluster multi-hop routing and balance the energy consumption among sensor nodes. Simulation experiments have shown that MDCR is significantly better at prolonging network lifetime compared to the Adaptive Decentralized Re-Clustering Protocol.展开更多
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co...This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.展开更多
Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation bet...Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and we propose a new collaboration technique which stimulates intermediate nodes to forward packets toward their destination. Some nodes show selfish behavior by denying the forwarding packets to other nodes in commercial networks in an effort to preserve their own energy. This paper applies a technique which is used to prolong the network lifetime, based on a node’s energy and trust value, and additionally incorporates fuzzy logic, which stimulates nodes to forward packets by rewarding cooperation. According to simulation results, the proposed approach surpasses the Nuglets (virtual currency) approach and the Reputation approach in network energy and thus prolongs the network lifetime. Additionally, our proposed approach demonstrates better results in the number of dropped packets, PDR and forwarded packets to neighboring nodes.展开更多
In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. ...In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC)is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements展开更多
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic...Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.展开更多
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in...In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in such a network is the localization of underwater nodes.Localization is required for tracking objects and detecting the target.It is also considered tagging of data where sensed contents are not found of any use without localization.This is useless for application until the position of sensed content is confirmed.This article’s major goal is to review and analyze underwater node localization to solve the localization issues in UWSN.The present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes underwater.Also,a detailed subdivision of these localization schemes is given.Further,these localization schemes are compared from different perspectives.The detailed analysis of these schemes in terms of certain performance metrics has been discussed in this paper.At the end,the paper addresses several future directions for potential research in improving localization problems of UWSN.展开更多
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart environments.Battery power is one of the most significant resources in WSN.For enhancing a power facto...Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart environments.Battery power is one of the most significant resources in WSN.For enhancing a power factor,the clustering techniques are used.During the forward of data in WSN,more power is consumed.In the existing system,it works with Load Balanced Cluster-ing Method(LBCM)and provides the lifespan of the network with scalability and reliability.In the existing system,it does not deal with end-to-end delay and deliv-ery of packets.For overcoming these issues in WSN,the proposed Genetic Algo-rithm based on Chicken Swarm Optimization(GA-CSO)with Load Balanced Clustering Method(LBCM)is used.Genetic Algorithm generates chromosomes in an arbitrary method then the chromosomes values are calculated using Fitness Function.Chicken Swarm Optimization(CSO)helps to solve the complex opti-mization problems.Also,it consists of chickens,hens,and rooster.It divides the chicken into clusters.Load Balanced Clustering Method(LBCM)maintains the energy during communication among the sensor nodes and also it balances the load in the gateways.The proposed GA-CSO with LBCM improves the life-span of the network.Moreover,it minimizes the energy consumption and also bal-ances the load over the network.The proposed method outperforms by using the following metrics such as energy efficiency,ratio of packet delivery,throughput of the network,lifetime of the sensor nodes.Therefore,the evaluation result shows the energy efficiency that has achieved 83.56%and the delivery ratio of the packet has reached 99.12%.Also,it has attained linear standard deviation and reduced the end-to-end delay as 97.32 ms.展开更多
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ...Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.展开更多
In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y ...In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y different from other types of WSNs, in which the sensor nodes are deployed along elongated geographic areas and form a chain-type network topo-logy structure. This paper investigates the node scheduling prob-lem in the chain-type WSN. Firstly, a node dormant scheduling mode is analyzed theoretical y from geographic coverage, and then three neighboring nodes scheduling criteria are proposed. Sec-ondly, a hybrid coverage scheduling algorithm and dead areas are presented. Final y, node scheduling in mine tunnel WSN with uniform deployment (UD), non-uniform deployment (NUD) and op-timal distribution point spacing (ODS) is simulated. The results show that the node scheduling with UD and NUD, especial y NUD, can effectively extend the network survival time. Therefore, a strat-egy of adding a few mobile nodes which activate the network in dead areas is proposed, which can further extend the network survival time by balancing the energy consumption of nodes.展开更多
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica...The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.展开更多
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety...Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine.展开更多
A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of th...A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of the main issues in the WSN which creates higher packet drop,delay,and energy consumption during the communication.Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets.In this paper,Artificial Neural Network(ANN)based Node Failure Detection(NFD)is developed with cognitive radio for detecting the location of the node failure.The ad hoc on-demand distance vector(AODV)routing protocol is used for transmitting the data from the source node to the base station.Moreover,the Mahalanobis distance is used for detecting an adjacent node to the node failure which is used to create the routing path without any node failure.The performance of the proposed ANN-NFD method is analysed in terms of throughput,delivery rate,number of nodes alive,drop rate,end to end delay,energy consumption,and overhead ratio.Furthermore,the performance of the ANN-NFD method is evaluated with the header to base station and base station to header(H2B2H)protocol.The packet delivery rate of the ANN-NFD method is 0.92 for 150 nodes that are high when compared to the H2B2H protocol.Hence,the ANN-NFD method provides data consistency during data transmission under node and battery failure.展开更多
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf...To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes.展开更多
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t...In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.展开更多
基金supported by the Natural Science Foundation under Grant No.61962009Major Scientific and Technological Special Project of Guizhou Province under Grant No.20183001Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No.2018BDKFJJ003,2018BDKFJJ005 and 2019BDKFJJ009.
文摘Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
基金The National High Technology Research and Deve-lopment Program of China (863Program) (No.2003AA143040).
文摘Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Natural Science Foundation of China(No.60503015)
文摘On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated.
基金National Natural Science Foundation of China(Nos.61661025,61661026)。
文摘In the wireless sensor networks(WSN),the sensor nodes have limited battery life and are deployed in hostile environments.It is very difficult to recharging or replacement of the batteries after deployment for the sensor nodes in inaccessible areas.Therefore,how to increase the network lifetime of the WSN is deserved to be studied.In this study,a WSN routing algorithm was proposed based on block clustering and springboard nodes to increase the network lifetime of the WSN.Firstly,by analyzing the influence of communication transmission distance on network energy consumption,block clustering was introduced to control node transmission distance in order to reduce total network energy consumption.In addition,a network transmission model was proposed based on springboard nodes and the advantages of network energy consumption of this model against multi-hop between clusters were analyzed.The simulation results show that,compared with the LEACH algorithm,EECPK-means algorithm and energy centroid clustering algorithm,the proposed routing algorithm effectively prolongs the network lifetime of WSN.
文摘When energy consumption by wireless sensor nodes gets off balance, partitions in the network appear because several of the nodes stop functioning. The respective network’s lifetime also diminishes. This problem is commonly known as the “hot spot” or “energy hole” phenomenon. To resolve this issue, a Multi-Hop Decentralized Cluster-Based Routing (MDCR) protocol is proposed. This algorithm uses orphan nodes as intermediate nodes to form inter-cluster multi-hop routing and balance the energy consumption among sensor nodes. Simulation experiments have shown that MDCR is significantly better at prolonging network lifetime compared to the Adaptive Decentralized Re-Clustering Protocol.
文摘This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.
文摘Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and we propose a new collaboration technique which stimulates intermediate nodes to forward packets toward their destination. Some nodes show selfish behavior by denying the forwarding packets to other nodes in commercial networks in an effort to preserve their own energy. This paper applies a technique which is used to prolong the network lifetime, based on a node’s energy and trust value, and additionally incorporates fuzzy logic, which stimulates nodes to forward packets by rewarding cooperation. According to simulation results, the proposed approach surpasses the Nuglets (virtual currency) approach and the Reputation approach in network energy and thus prolongs the network lifetime. Additionally, our proposed approach demonstrates better results in the number of dropped packets, PDR and forwarded packets to neighboring nodes.
文摘In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC)is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements
文摘Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
文摘In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in such a network is the localization of underwater nodes.Localization is required for tracking objects and detecting the target.It is also considered tagging of data where sensed contents are not found of any use without localization.This is useless for application until the position of sensed content is confirmed.This article’s major goal is to review and analyze underwater node localization to solve the localization issues in UWSN.The present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes underwater.Also,a detailed subdivision of these localization schemes is given.Further,these localization schemes are compared from different perspectives.The detailed analysis of these schemes in terms of certain performance metrics has been discussed in this paper.At the end,the paper addresses several future directions for potential research in improving localization problems of UWSN.
基金supported by a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute(KHIDI)funded by the Ministry of Health&Welfare,Republic of Korea(Grant Number:HI21C1831)the Soonchunhyang University Research Fund.
文摘Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart environments.Battery power is one of the most significant resources in WSN.For enhancing a power factor,the clustering techniques are used.During the forward of data in WSN,more power is consumed.In the existing system,it works with Load Balanced Cluster-ing Method(LBCM)and provides the lifespan of the network with scalability and reliability.In the existing system,it does not deal with end-to-end delay and deliv-ery of packets.For overcoming these issues in WSN,the proposed Genetic Algo-rithm based on Chicken Swarm Optimization(GA-CSO)with Load Balanced Clustering Method(LBCM)is used.Genetic Algorithm generates chromosomes in an arbitrary method then the chromosomes values are calculated using Fitness Function.Chicken Swarm Optimization(CSO)helps to solve the complex opti-mization problems.Also,it consists of chickens,hens,and rooster.It divides the chicken into clusters.Load Balanced Clustering Method(LBCM)maintains the energy during communication among the sensor nodes and also it balances the load in the gateways.The proposed GA-CSO with LBCM improves the life-span of the network.Moreover,it minimizes the energy consumption and also bal-ances the load over the network.The proposed method outperforms by using the following metrics such as energy efficiency,ratio of packet delivery,throughput of the network,lifetime of the sensor nodes.Therefore,the evaluation result shows the energy efficiency that has achieved 83.56%and the delivery ratio of the packet has reached 99.12%.Also,it has attained linear standard deviation and reduced the end-to-end delay as 97.32 ms.
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
文摘Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.
基金supported by the China Doctoral Discipline New Teacher Foundation(200802901507)the Sichuan Province Basic Research Plan Project(2013JY0165)the Cultivating Programme of Excellent Innovation Team of Chengdu University of Technology(KYTD201301)
文摘In order to reduce power consumption of sensor nodes and extend network survival time in the wireless sensor network (WSN), sensor nodes are scheduled in an active or dormant mode. A chain-type WSN is fundamental y different from other types of WSNs, in which the sensor nodes are deployed along elongated geographic areas and form a chain-type network topo-logy structure. This paper investigates the node scheduling prob-lem in the chain-type WSN. Firstly, a node dormant scheduling mode is analyzed theoretical y from geographic coverage, and then three neighboring nodes scheduling criteria are proposed. Sec-ondly, a hybrid coverage scheduling algorithm and dead areas are presented. Final y, node scheduling in mine tunnel WSN with uniform deployment (UD), non-uniform deployment (NUD) and op-timal distribution point spacing (ODS) is simulated. The results show that the node scheduling with UD and NUD, especial y NUD, can effectively extend the network survival time. Therefore, a strat-egy of adding a few mobile nodes which activate the network in dead areas is proposed, which can further extend the network survival time by balancing the energy consumption of nodes.
基金Project(60873081)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0787)supported by Program for New Century Excellent Talents in UniversityProject(11JJ1012)supported by the Natural Science Foundation of Hunan Province,China
文摘The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.
基金Projects 20070411065 supported by the China Postdoctoral Science Foundation0801028B by the Jiangsu Postdoctoral Science Research Foundation
文摘Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine.
文摘A wireless sensor network(WSN)consists of several tiny sensor nodes to monitor,collect,and transmit the physical information from an environment through the wireless channel.The node failure is considered as one of the main issues in the WSN which creates higher packet drop,delay,and energy consumption during the communication.Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets.In this paper,Artificial Neural Network(ANN)based Node Failure Detection(NFD)is developed with cognitive radio for detecting the location of the node failure.The ad hoc on-demand distance vector(AODV)routing protocol is used for transmitting the data from the source node to the base station.Moreover,the Mahalanobis distance is used for detecting an adjacent node to the node failure which is used to create the routing path without any node failure.The performance of the proposed ANN-NFD method is analysed in terms of throughput,delivery rate,number of nodes alive,drop rate,end to end delay,energy consumption,and overhead ratio.Furthermore,the performance of the ANN-NFD method is evaluated with the header to base station and base station to header(H2B2H)protocol.The packet delivery rate of the ANN-NFD method is 0.92 for 150 nodes that are high when compared to the H2B2H protocol.Hence,the ANN-NFD method provides data consistency during data transmission under node and battery failure.
基金supported by the National Basic Research Program of China(2007CB310703)the High Technical Research and Development Program of China(2008AA01Z201)+1 种基金the National Natural Science Foundlation of China(60821001,60802035,60973108)Chinese Universities Science Fund(BUPT2009RC0504)
文摘To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes.
文摘In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.