scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Challenges, protocols and case studies in design of reliable energy efficient wireless sensor networks

TL;DR: The main purpose of this paper is to provide technical approaches to address three key challenges in designing of reliable and endurable wireless sensor networks, namely communication reliability, operation with significantly low and effective power sources and multi-tier network architecture.
Abstract: Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has been placed on incorporating energy harvesting devices in wireless sensor networks. The main purpose of this paper is to focus on the systematic study of the design principles of wireless sensor networks and to provide technical approaches to address three key challenges in designing of reliable and endurable wireless sensor networks. The key challenges are namely communication reliability, operation with significantly low and effective power sources and multi-tier network architecture.
Citations
More filters
Journal ArticleDOI
TL;DR: This evaluation intends to propose a new approach for examining methods by considering the methodology-based parameters such as capabilities and constraints, examined inputs and outputs in each method, type of algorithm used in the methods, the purpose of using algorithms, etc.

154 citations

Journal Article
TL;DR: A multi-objective swarm intelligence algorithm – which is based on Shuffled Frog-leaping and Firefly Algorithms (SFFA) – is presented as a clustering-based protocol for WSNs.
Abstract: Swarm intelligence-based algorithms are soft computing techniques, which have already been applied to solve a broad range of optimization problems. Generally, clustering is the most common technique, which, balances the energy consumption among all sensor nodes and minimizes traffic and overhead during data transmission phases of Wireless Sensor Networks. The performance scope of the existing clustering protocols is fixed and hence, cannot adapt to all possible areas of applications. In this paper, a multi-objective swarm intelligence algorithm – which is based on Shuffled Frog-leaping and Firefly Algorithms (SFFA) – is presented as a clustering-based protocol for WSNs. The multi-objective fitness function of SFFA considers different criteria such as cluster heads’ distances from the sink, residual energy of nodes, inter- and intra-cluster distances and finally overlap and load of clusters to select the most proper cluster heads at each round. The parameters of SFFA in clustering phase can be adapted and tuned to achieve the best performance based on the network requirements. The simulation outcomes demonstrated an average lifetime improvement of up to 49.1%, 38.3%, 7.1%, and 11.3% compared to LEACH, ERA, SIF, and FSFLA in different network scenarios, respectively.

8 citations


Cites background or methods from "Challenges, protocols and case stud..."

  • ...WSNs face many challenges, including energy restrictions, security, communication reliability, design, etc. (Musale & Chaudhari, 2017)....

    [...]

  • ...Some of these challenges are connectivity, coverage, communication control, bandwidth management, security, energy management and lifetime (Musale & Chaudhari, 2017)....

    [...]

  • ...…methods include data gathering, data correlation, energy harvesting, beam forming, resource allocation using cross-layer design, opportunistic transmission schemes (sleep-wake scheduling), portable relays and sinks, optimal deployment, clustering and multi-hop routing (Musale & Chaudhari, 2017)....

    [...]

Journal ArticleDOI
TL;DR: A simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN is introduced.
Abstract: Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.

6 citations


Cites background from "Challenges, protocols and case stud..."

  • ...wireless local area network (WLAN) [2, 3], wireless sensor network (WSN) [4, 5], mobile adhoc network (MANET) [6, 7], etc....

    [...]

Proceedings ArticleDOI
01 Dec 2017
TL;DR: This paper underscores the fact of analysis of the behavior of wireless sensor network using different factors and protocols so that it can predict the behavior and analyze the superficiality.
Abstract: Wireless sensor network (WSN) is a dynamic self — configured device which is used for the communicational purpose to monitor different scenarios. To the best of our knowledge, the main challenge faced in the field of wireless sensor network is computing, monitoring and the size of the sensor. In this paper we underscore the fact of analysis of the behavior of wireless sensor network using different factors and protocols. By analysis we can predict the behavior and analyze the superficiality.

4 citations

Proceedings ArticleDOI
23 Jul 2018
TL;DR: The approaches considered and the algorithm for assessing the quality of TelSys projects show that their application will be promising in the existing implementation and will allow their further dissemination not only to wireless telecommunications but also to other objects and processes of special-purpose projects.
Abstract: The article considers the algorithm for estimating and correcting the quality of wireless telecommunications, designed using CASE/PDM/CAD technologies. The algorithm takes into account the following parameters: power, frequency, sensitivity, noise immunity, bandwidth, security, gain, amplitude-frequency and phase-frequency characteristics, selectivity, frequency range overlap, nonlinear distortion, dynamic range, transient response, receiver/transmitter/channel communication, etc. Applying the convolution procedure to the indicators, the algorithm makes it possible to evaluate and correct the quality of wireless telecommunications, taking into account the optimization of spending money and time for examination at the lack of information of the telecommunications network status. This approach opens the possibility for further automation of scientific research when solving the problem of improving the design of telecommunication systems based on CASE/PDM/ CAD technologies. The proposed expert method for assessing the quality of wireless telecommunications can be extended to other objects and processes of the TelSys project. The approaches considered and the algorithm for assessing the quality of TelSys projects show that their application will be promising in the existing implementation and will allow their further dissemination not only to wireless telecommunications but also to other objects and processes of special-purpose projects.

3 citations


Cites methods from "Challenges, protocols and case stud..."

  • ...When analyzing the status of TelSys project models in conditions of information threats and risks, experts need to evaluate the technical characteristics and quality of wireless telecommunications performance in order to improve their performance and optimization [1, 2, 3, 4]....

    [...]

References
More filters
Journal ArticleDOI
01 Jan 2012
TL;DR: In this article, a system architecture to provide end-to-end network connectivity for autonomous teams of robots is discussed, where the core of the proposed system is a cyber-physical controller whose goal is to ensure network connectivity as robots move to accomplish their assigned tasks.
Abstract: In this paper, a system architecture to provide end-to-end network connectivity for autonomous teams of robots is discussed. The core of the proposed system is a cyber-physical controller whose goal is to ensure network connectivity as robots move to accomplish their assigned tasks. Due to channel quality uncertainties inherent to wireless propagation, we adopt a stochastic model where achievable rates are modeled as random variables. The cyber component of the controller determines routing variables that maximize the probability of having a connected network for given positions. The physical component determines feasible robot trajectories that are restricted to safe configurations which ensure these probabilities stay above a minimum reliability level. Local trajectory planning algorithms are proposed for simple environments and leveraged to obtain global planning algorithms to handle complex surroundings. The resulting integrated controllers are robust in that end-to-end communication survives with high probability even if individual point-to-point links are likely to fail with significant probability. Experiments demonstrate that the global planning algorithm succeeds in navigating a complex environment while ensuring that end-to-end communication rates meet or exceed prescribed values within a target failure tolerance.

137 citations

01 Jan 2012
TL;DR: The core of the proposed system is a cyber-physical controller whose goal is to ensure network connectivity as robots move to accomplish their assigned tasks and which succeeds in navigating a complex environment while ensuring that end-to-end communication rates meet or exceed prescribed values within a target failure tolerance.
Abstract: In this paper, a system architecture to provide end-to-end network connectivity for autonomous teams of robots is discussed. The core of the proposed system is a cyber- physical controller whose goal is to ensure network connec- tivity as robots move to accomplish their assigned tasks. Due to channel quality uncertainties inherent to wireless propagation, we adopt a stochastic model where achievable rates are modeled as random variables. The cyber component of the controller determines routing variables that maximize the probability of having a connected network for given positions. The physical component determines feasible robot trajectories that are restricted to safe configurations which ensure these probabilities stay above a minimum reliability level. Local trajectory planning algorithms are proposed for simple envir- onments and leveraged to obtain global planning algorithms to handle complex surroundings. The resulting integrated con- trollers are robust in that end-to-end communication survives with high probability even if individual point-to-point links are likely to fail with significant probability. Experiments demon- strate that the global planning algorithm succeeds in navigating a complex environment while ensuring that end-to-end com- munication rates meet or exceed prescribed values within a target failure tolerance.

120 citations


"Challenges, protocols and case stud..." refers background in this paper

  • ...Some works solve the problem by adopting empirical models, investigate the path loss and also help to find the root mean square delay spread of the RF signal [9]....

    [...]

  • ...Radio signals are prone to blockage, multipath fading due to stationary or moving metallic structures near the communicating devices, and radio interferences from machinery and other sources [9]....

    [...]

Proceedings ArticleDOI
03 Nov 2011
TL;DR: ODMAC is presented, an on demand MAC protocol for EH-WSNs which is able to support individual duty cycles for nodes with different energy profiles, and each node is ability to increase its energy consumption, thus its performance, to the level that the energy consumed is at the same level to the energy harvested.
Abstract: Energy Harvesting (EH) provides a promising solution to one of the biggest problems faced by Wireless Sensor Networks (WSN), namely the energy supply. By harvesting energy from the surrounding environment, the sensors can have an in finite lifetime without any needs for battery recharge or replacement. Battery-powered WSNs are typically designed to maximize the energy conservation in order to postpone as much as possible the inevitable battery depletion. Instead, EH-WSNs are being designed on a different principle. The focus is on maximizing the network performance while operating at a state that is energetically sustainable. In this paper, we present ODMAC, an on demand MAC protocol for EH-WSNs which is able to support individual duty cycles for nodes with different energy profiles. Hence, each node is able to increase its energy consumption, thus its performance, to the level that the energy consumed is at the same level to the energy harvested. The protocol is implemented and evaluated using the OPNET simulator.

103 citations


"Challenges, protocols and case stud..." refers background or methods in this paper

  • ...The synchronized methods like Time Division Multiple Access based MAC protocols and WiseMAC provide energy efficient network performance by assigning the different time frames for node transmitting / receiving and node sleeping, but synchronized wireless sensor networks are usually difficult to implement, especially with limited energy source....

    [...]

  • ...In [8], such errors were further found to recur in deterministic regions around the rotation cycle, and the temporal and spatial distributions of such error regions were identified from bit error patterns in transmitted probes....

    [...]

  • ...Therefore, well-designed network architecture is critical for fulfilling such requirements [8]....

    [...]

  • ...Therefore, MAC protocols such as B-MAC, S-MAC, SpeckMAC and On-Demand MAC [8], etc....

    [...]

  • ...Therefore, MAC protocols such as B-MAC, S-MAC, SpeckMAC and On-Demand MAC [8], etc. were proposed to deal with nonsynchronized wireless sensor networks, where reliable system performance was demonstrated in their specific environments....

    [...]

Journal ArticleDOI
TL;DR: Architectural aspects related to WSNs in some way connected with a satellite link are addressed, a topic that presents challenging interworking aspects and requirements of the most meaningful WSN applications have been drawn and matched to characteristics of various satellite/space systems.
Abstract: This paper is not a survey related to generic wireless sensor networks (WSNs), which have been largely treated in a number of survey papers addressing more focused issues; rather, it specifically addresses architectural aspects related to WSNs in some way connected with a satellite link, a topic that presents challenging interworking aspects. The main objective is to provide an overview of the potential role of a satellite segment in future WSNs. In this perspective, requirements of the most meaningful WSN applications have been drawn and matched to characteristics of various satellite/space systems in order to identify suitable integrated configurations. Copyright © 2012 John Wiley & Sons, Ltd.

91 citations


"Challenges, protocols and case stud..." refers background in this paper

  • ...The various routing metrics such as ETX and ETT [4] have been proposed to this end....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes user selection and power allocation schemes for a multi-user, multi-relay cooperative cellular system in order to minimize the cost of transmission and presents an algorithm to enhance fairness among users in these schemes.
Abstract: Energy consumption in wireless communication system is rapidly increasing due to growing wireless multimedia access. Combating adverse effects of excessive energy consumption demands for energy-aware system design, leading to a new research paradigm called green communication. In this paper, we propose user selection and power allocation schemes for a multi-user, multi-relay cooperative cellular system in order to minimize the cost of transmission. In the proposed schemes, the cost function is first formulated to optimize the weighted sum powers of base and relay stations. It is then extended to a more general multi-objective scheme which jointly optimizes the sum power and throughput keeping a balance between them. In both of the schemes, quality-of-service is guaranteed in terms of end-to-end signal-to-noise ratio. To make the proposed schemes realistic, we assume the presence of estimation errors in channel state information. An algorithm to enhance fairness among users in these schemes is also presented. Simulation results are presented to confirm the performance of proposed schemes in terms of energy efficiency, system throughput, outage probability, and fairness to end users.

87 citations


"Challenges, protocols and case stud..." refers background in this paper

  • ...The utilization of renewable energy sources for wireless sensor systems is useful for sustainable monitoring systems [7] [5], but very limited today due to a range of reasons....

    [...]

  • ...Moreover, most channel estimation algorithms will no longer work when energy consumption is to be taken into consideration for wireless sensor network design, as they usually assume high processing capability of sensor nodes and unlimited power availability [7]....

    [...]