scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

On efficiency improvement of energy harvesting wireless sensor networks

27 Jun 2016-pp 56-59
TL;DR: This work offers an approach for the system performance estimation and a choice of network operation strategy to improve reliability and survivability of wireless sensor networks.
Abstract: In the near future, networked wireless devices outnumber traditional electronic appliances. Internet of Things will enable a plethora of new applications in environmental monitoring, agricultural industry, medical diagnostics, security and transportation business, in analysis of equipment performance, conditions, troubleshooting and monitoring. Nowadays, the concept of wireless sensor networks is considered as an important part of Internet of Things. Thus, it is very important to improve reliability and survivability of wireless sensor networks. Recent advances in energy harvesting technology provided fault tolerance of wireless sensors. However, sensor networks efficiency has to be improved as well. To fill this gap we offer an approach for the system performance estimation and a choice of network operation strategy.
Citations
More filters
Journal ArticleDOI
TL;DR: This work offers a corresponding approach that combines graph theory and stochastic process-based models to address the properties of intrusions and defense mechanisms, and uses basic survivability models, that generate the probabilities for graph elements.
Abstract: The Internet of Things (IoT) has evolved from theoretical research to market deployment. The IoT will enable a plethora of new applications in various areas of human activity and will provide tremendous opportunities for societies around the world. However, implementation is hampered by fears that the societal costs of the IoT outweigh its benefits. Failure of, or hacking into, IoT applications can, for example, disable home security systems, destroy crops, and destabilize hospitals. To unlock the IoT’s potential, it needs to provide application survivability. For this purpose, it needs a tradeoff between IoT resources and system survivability. In previous works, there has been a lack of quantitative methods considering this problem, which combines specificity of network topology, intrusion details, and properties of intrusion detection/prevention system. In this work, we offer a corresponding approach that combines graph theory and stochastic process-based models. The network topology is described as a probabilistic graph. To address the properties of intrusions and defense mechanisms, we use basic survivability models, that generate the probabilities for graph elements. Therefore, the criterion of system survivability is a function defined on the created graph. An approach for deduction and computation of this survivability metric is discussed. Survivability optimization problems are formulated. In some important practical cases, closed-form solutions are offered.

10 citations

Journal ArticleDOI
Juan Xu1, Xingxin Xu1, Xu Ding1, Lei Shi1, Yang Lu1 
TL;DR: Simulation results show that adopting SIC andWCE can greatly improve communication capability and channel utilization ratio, and increase throughput by 200% to 500% while prolonging the network lifetime.
Abstract: In wireless sensor networks (WSN), communication interference and the energy limitation of sensor nodes seriously hamper the network performance such as throughput and network lifetime. In this paper, we focus on the Successive Interference Cancellation (SIC) and Wireless Energy Transmission (WET) technology aiming to design a heuristic power control algorithm and an efficient cross-layer strategy to realize concurrency communication and improve the network throughput, channel utilization ratio and network lifetime. We realize that the challenge of this problem is that joint consideration of communication interference and energy shortage makes the problem model more complicated. To solve the problem efficiently, we adopt link scheduling strategy, time-slice scheduling scheme and energy consumption optimization protocol to construct a cross-layer optimization problem, then use an approximate linearization method to transform it into a linear problem which yields identical optimal value and solve it to obtain the optimal work strategy of wireless charging equipment (WCE). Simulation results show that adopting SIC andWCE can greatly improve communication capability and channel utilization ratio, and increase throughput by 200% to 500% while prolonging the network lifetime. key words: concurrency communication, successive interference cancellation, power control, charging strategy, cross-layer optimization

1 citations


Cites background from "On efficiency improvement of energy..."

  • ...Energy acquisition [10], [11] is to harvest energy from the environment, such as sunlight, tides and winds....

    [...]

Proceedings ArticleDOI
01 Sep 2020
TL;DR: This work describes the simulation of data gathering using mobile sinks by Manufacturing and Transportation Simulation System and analyzed ways to optimize the mobile sink movement in the process of gathering spatio-temporal data.
Abstract: Wireless sensor networks are often used to monitor the air quality in large cities. Data collection and transmission are the most important operations of WSN. Various techniques for spatial-temporal data gathering have been designed recent years. The main goal of these methods is to increase the life of the geosensor network. Using mobile sinks is one of the most popular method for solving this problem. This work describes the simulation of data gathering using mobile sinks by Manufacturing and Transportation Simulation System. Authors analyzed ways to optimize the mobile sink movement in the process of gathering spatio-temporal data.
References
More filters
Journal ArticleDOI
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Abstract: The advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are different technical issues that researchers are currently resolving. The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also points out the open research issues and intends to spark new interests and developments in this field.

14,048 citations


"On efficiency improvement of energy..." refers background in this paper

  • ...Small sensors, which consist of sensing, data processing, and communicating modules, are combined by wireless channels into wireless sensor networks [2]....

    [...]

Journal ArticleDOI
TL;DR: This paper classifies sensor network denial-of-sleep attacks in terms of an attacker's knowledge of the medium access control (MAC) layer protocol and ability to bypass authentication and encryption protocols and introduces a framework for preventing denial- of- sleep attacks in sensor networks.
Abstract: Wireless platforms are becoming less expensive and more powerful, enabling the promise of widespread use for everything from health monitoring to military sensing. Like other networks, sensor networks are vulnerable to malicious attack. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networks infeasible. This paper explores the denial-of-sleep attack, in which a sensor node's power supply is targeted. Attacks of this type can reduce the sensor lifetime from years to days and have a devastating impact on a sensor network. This paper classifies sensor network denial-of-sleep attacks in terms of an attacker's knowledge of the medium access control (MAC) layer protocol and ability to bypass authentication and encryption protocols. Attacks from each classification are then modeled to show the impacts on four sensor network MAC protocols, i.e., Sensor MAC (S-MAC), Timeout MAC (T-MAC), Berkeley MAC (B-MAC), and Gateway MAC (G-MAC). Implementations of selected attacks on S-MAC, T-MAC, and B-MAC are described and analyzed in detail to validate their effectiveness and analyze their efficiency. Our analysis shows that the most efficient attack on S-MAC can keep a cluster of nodes awake 100% of the time by an attacker that sleeps 99% of the time. Attacks on T-MAC can keep victims awake 100% of the time while the attacker sleeps 92% of the time. A framework for preventing denial-of-sleep attacks in sensor networks is also introduced. With full protocol knowledge and an ability to penetrate link-layer encryption, all wireless sensor network MAC protocols are susceptible to a full domination attack, which reduces the network lifetime to the minimum possible by maximizing the power consumption of the nodes' radio subsystem. Even without the ability to penetrate encryption, subtle attacks can be launched, which reduce the network lifetime by orders of magnitude. If sensor networks are to meet current expectations, they must be robust in the face of network attacks to include denial-of-sleep.

230 citations

Journal ArticleDOI
Jinsung Byun1, Boungju Jeon1, Junyoung Noh1, Young-Il Kim1, Sehyun Park1 
TL;DR: A ZigBee-based intelligent self-adjusting sensor (ZiSAS) in order to address concerns about the trade-off between the performance and cost of WSNs in home environments is proposed.
Abstract: Wireless sensor networks (WSNs) have been becoming increasingly essential in recent years because of their ability to manage real-time situational information for various novel services. Recently, the scope of WSN technologies has been expanded to places such as the home, in order to provide the residents with various intelligent services, such as home automation services or home energy management services. However, due to their architectural constraints, such as the trade-off between the performance and cost, WSNs are not effectively implemented in home environments. Therefore, this paper proposes a ZigBee-based intelligent self-adjusting sensor (ZiSAS) in order to address these concerns. This paper presents a situation-based selfadjusting scheme, an event-based self-adjusting sensor network, and hardware and middleware implementation. We also introduce some smart home services using the proposed system. We implemented our system in real test bed and conducted an experiment. Our experiment shows that we reduce the system's energy consumption.

200 citations


"On efficiency improvement of energy..." refers background in this paper

  • ...WSNs have a wide range of potential customer applications such as smart home [3] etc....

    [...]

Journal ArticleDOI
TL;DR: A novel IoT network architecture that integrates software defined networking (SDN) and data distribution service (DDS) middleware is described that will improve service delivery of IoT systems and will bring flexibility to the network.
Abstract: The Internet of Things (IoT) is the result of many different enabling technologies such as embedded systems, wireless sensor networks, cloud computing, big-data, etc., which are used to gather, process, infer, and transmit data. Combining all these technologies requires a research effort to address all the challenges of these technologies, especially for sensing and delivering information from the physical world to cloud-hosted services. In this article we outline the most important issues related to standardization efforts, mobility of objects, networking and gateway access, and QoS support. In particular, we describe a novel IoT network architecture that integrates software defined networking (SDN) and data distribution service (DDS) middleware. The proposed architecture will improve service delivery of IoT systems and will bring flexibility to the network.

153 citations


"On efficiency improvement of energy..." refers background in this paper

  • ...Nowadays, the concept of Wireless Sensor Networks (WSNs) is considered as an important part of IoT [1]....

    [...]

  • ...IoT will enable a plethora of new applications in environmental monitoring, agricultural industry, medical diagnostics, security and transportation business, in analysis of equipment performance, conditions, troubleshooting and monitoring....

    [...]

  • ...I. INTRODUCTION The Internet of Things (IoT) is evolved from a stage of research and innovation to a stage of market deployment....

    [...]

Journal ArticleDOI
TL;DR: The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way and shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs.
Abstract: Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known security mechanisms usually awake the sensor nodes before these nodes are allowed to execute the security processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed analysis of energy distribution shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs.

61 citations


"On efficiency improvement of energy..." refers background in this paper

  • ...The situation of DoB threat can arise in many cases [6] -[9]....

    [...]