The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] wireless sensor network(254hit)

21-40hit(254hit)

  • Maximizing Lifetime of Data-Gathering Sensor Trees in Wireless Sensor Networks

    Hiroshi MATSUURA  

     
    PAPER-Network

      Pubricized:
    2019/06/10
      Vol:
    E102-B No:12
      Page(s):
    2205-2217

    Sensor-data gathering using multi-hop connections in a wireless sensor network is being widely used, and a tree topology for data gathering is considered promising because it eases data aggregation. Therefore, many sensor-tree-creation algorithms have been proposed. The sensors in a tree, however, generally run on batteries, so long tree lifetime is one of the most important factors in collecting sensor data from a tree over a long period. It has been proven that creating the longest-lifetime tree is a non-deterministic-polynomial complete problem; thus, all previously proposed sensor-tree-creation algorithms are heuristic. To evaluate a heuristic algorithm, the time complexity of the algorithm is very important, as well as the quantitative evaluation of the lifetimes of the created trees and algorithm speed. This paper proposes an algorithm called assured switching with accurate graph optimization (ASAGAO) that can create a sensor tree with a much longer lifetime much faster than other sensor-tree-creation algorithms. In addition, it has much smaller time complexity.

  • Adaptive Channel Access Control Solving Compound Problem of Hidden Nodes and Continuous Collisions among Periodic Data Flows

    Anh-Huy NGUYEN  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Network

      Pubricized:
    2019/05/21
      Vol:
    E102-B No:11
      Page(s):
    2113-2125

    With the rapid increase in IoT (Internet of Things) applications, more sensor devices, generating periodic data flows whose packets are transmitted at regular intervals, are being incorporated into WSNs (Wireless Sensor Networks). However, packet collision caused by the hidden node problem is becoming serious, particularly in large-scale multi-hop WSNs. Moreover, focusing on periodic data flows, continuous packet collisions among periodic data flows occur if the periodic packet transmission phases become synchronized. In this paper, we tackle the compounded negative effect of the hidden node problem and the continuous collision problem among periodic data flows. As this is a complex variant of the hidden node problem, there is no simple and well-studied solution. To solve this problem, we propose a new MAC layer mechanism. The proposed method predicts a future risky duration during which a collision can be caused by hidden nodes by taking into account the periodic characteristics of data packet generation. In the risky duration, each sensor node stops transmitting data packets in order to avoid collisions. To the best of our knowledge, this is the first paper that considers the compounded effect of hidden nodes and continuous collisions among periodic data flows. Other advantages of the proposed method include eliminating the need for any new control packets and it can be implemented in widely-diffused IEEE 802.11 and IEEE 802.15.4 devices.

  • Structural Compressed Network Coding for Data Collection in Cluster-Based Wireless Sensor Networks

    Yimin ZHAO  Song XIAO  Hongping GAN  Lizhao LI  Lina XIAO  

     
    PAPER-Network

      Pubricized:
    2019/05/21
      Vol:
    E102-B No:11
      Page(s):
    2126-2138

    To efficiently collect sensor readings in cluster-based wireless sensor networks, we propose a structural compressed network coding (SCNC) scheme that jointly considers structural compressed sensing (SCS) and network coding (NC). The proposed scheme exploits the structural compressibility of sensor readings for data compression and reconstruction. Random linear network coding (RLNC) is used to re-project the measurements and thus enhance network reliability. Furthermore, we calculate the energy consumption of intra- and inter-cluster transmission and analyze the effect of the cluster size on the total transmission energy consumption. To that end, we introduce an iterative reweighed sparsity recovery algorithm to address the all-or-nothing effect of RLNC and decrease the recovery error. Experiments show that the SCNC scheme can decrease the number of measurements required for decoding and improve the network's robustness, particularly when the loss rate is high. Moreover, the proposed recovery algorithm has better reconstruction performance than several other state-of-the-art recovery algorithms.

  • Several Bits Are Enough: Off-Grid Target Localization in WSNs Using Variational Bayesian EM Algorithm

    Yan GUO  Peng QIAN  Ning LI  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:7
      Page(s):
    926-929

    The compressive sensing has been applied to develop an effective framework for simultaneously localizing multiple targets in wireless sensor networks. Nevertheless, existing methods implicitly use analog measurements, which have infinite bit precision. In this letter, we focus on off-grid target localization using quantized measurements with only several bits. To address this, we propose a novel localization framework for jointly estimating target locations and dealing with quantization errors, based on the novel application of the variational Bayesian Expectation-Maximization methodology. Simulation results highlight its superior performance.

  • Low-Overhead Wake-Up Control for Wireless Sensor Networks Employing Wake-Up Receivers

    Naoki TAMURA  Hiroyuki YOMO  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    732-740

    This paper focuses on on-demand wireless sensor networks (WSNs) where a wake-up receiver is installed into each node. In on-demand WSNs, each node sends a wake-up signal including a wake-up ID assigned to a specific destination node in order to remotely activate its main radio interface. This wake-up control helps each node to reduce energy consumed during idle periods, however, the wake-up signal transmitted before every data transmission results in overhead, which degrades communication quality and increases energy consumption at each sender node. In order to reduce the overhead for wake-up control, in this paper, we propose three schemes. First, we propose a scheme called Double Modulation (DM), where each node embeds the sensing data to be transmitted into the payload field of a wake-up signal. The destination interprets the wake-up message differently depending on its wake-up state: if it is in a sleep state, it treats the message as a wake-up signal, otherwise it extracts the sensing data from the detected message. Second, we propose a scheme called Overhearing (OH), where each node observes the frames transmitted by a destination node and suppresses the transmission of wake-up signal when detecting the active state of their destination. Finally, we propose a hybrid scheme that combines OH and DM schemes. Our simulation results show that the proposed schemes can effectively reduce the negative impact of wake-up overhead, and significantly improve data collection rate and energy-efficiency in comparison to on-demand WSN without the proposed schemes.

  • Simple and Complete Resynchronization for Wireless Sensor Networks Open Access

    Hiromi YAGIRI  Takeshi OKADOME  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    679-689

    The methods proposed in this paper enable resynchronization when a synchronization deviation occurs in a sensor node without a beacon or an ack in a wireless sensor network under ultra-limited but stable resources such as the energy generated from tiny solar cell batteries. The method for a single-hop network is straightforward; when a receiver does not receive data, it is simply placed in recovery mode, in which the receiver sets its cycle length TB to (b±γ)T, where b is non-negative integer, 0 < γ < 1, and T is its cycle length in normal mode, and in which the receiver sets its active interval WB to a value that satisfies WB ≥ W + γT, where W is its active interval in normal mode. In contrast, a sender stays in normal mode. Resynchronization methods for linear multi-hop and tree-based multi-hop sensor networks are constructed using the method for a single-hop network. All the methods proposed here are complete because they are always able to resynchronize networks. The results of simulations based on the resynchronization methods are given and those of an experiment using actual sensor nodes with wireless modules are also presented, which show that the methods are feasible.

  • Incorporation of Faulty Prior Knowledge in Multi-Target Device-Free Localization

    Dongping YU  Yan GUO  Ning LI  Qiao SU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:3
      Page(s):
    608-612

    As an emerging and promising technique, device-free localization (DFL) has drawn considerable attention in recent years. By exploiting the inherent spatial sparsity of target localization, the compressive sensing (CS) theory has been applied in DFL to reduce the number of measurements. In practical scenarios, a prior knowledge about target locations is usually available, which can be obtained by coarse localization or tracking techniques. Among existing CS-based DFL approaches, however, few works consider the utilization of prior knowledge. To make use of the prior knowledge that is partly or erroneous, this paper proposes a novel faulty prior knowledge aided multi-target device-free localization (FPK-DFL) method. It first incorporates the faulty prior knowledge into a three-layer hierarchical prior model. Then, it estimates location vector and learns model parameters under a variational Bayesian inference (VBI) framework. Simulation results show that the proposed method can improve the localization accuracy by taking advantage of the faulty prior knowledge.

  • Routing Topology Inference for Wireless Sensor Networks Based on Packet Tracing and Local Probing

    Xiaojuan ZHU  Yang LU  Jie ZHANG  Zhen WEI  

     
    PAPER-Network

      Pubricized:
    2018/07/19
      Vol:
    E102-B No:1
      Page(s):
    122-136

    Topological inference is the foundation of network performance analysis and optimization. Due to the difficulty of obtaining prior topology information of wireless sensor networks, we propose routing topology inference, RTI, which reconstructs the routing topology from source nodes to sink based on marking packets and probing locally. RTI is not limited to any specific routing protocol and can adapt to a dynamic and lossy networks. We select topological distance and reconstruction time to evaluate the correctness and effectiveness of RTI and then compare it with PathZip and iPath. Simulation results indicate that RTI maintains adequate reconstruction performance in dynamic and packet loss environments and provides a global routing topology view for wireless sensor networks at a lower reconstruction cost.

  • On-Demand Data Gathering with a Drone-Based Mobile Sink in Wireless Sensor Networks Exploiting Wake-Up Receivers Open Access

    Hiroyuki YOMO  Akitoshi ASADA  Masato MIYATAKE  

     
    INVITED PAPER

      Pubricized:
    2018/04/13
      Vol:
    E101-B No:10
      Page(s):
    2094-2103

    The introduction of a drone-based mobile sink into wireless sensor networks (WSNs), which has flexible mobility to move to each sensor node and gather data with a single-hop transmission, makes cumbersome multi-hop transmissions unnecessary, thereby facilitating data gathering from widely-spread sensor nodes. However, each sensor node spends significant amount of energy during their idle state where they wait for the mobile sink to come close to their vicinity for data gathering. In order to solve this problem, in this paper, we apply a wake-up receiver to each sensor node, which consumes much smaller power than the main radio used for data transmissions. The main radio interface is woken up only when the wake-up receiver attached to each node detects a wake-up signal transmitted by the mobile sink. For this mobile and on-demand data gathering, this paper proposes a route control framework that decides the mobility route for a drone-based mobile sink, considering the interactions between wake-up control and physical layer (PHY) and medium access control (MAC) layer operations. We investigate the optimality and effectiveness of the route obtained by the proposed framework with computer simulations. Furthermore, we present experimental results obtained with our test-bed of a WSN employing a drone-based mobile sink and wake-up receivers. All these results give us the insight on the role of wake-up receiver in mobile and on-demand sensing data gathering and its interactions with protocol/system designs.

  • 83nJ/bit Transmitter Using Code-Modulated Synchronized-OOK on 65nm SOTB for Normally-Off Wireless Sensor Networks

    Van-Trung NGUYEN  Ryo ISHIKAWA  Koichiro ISHIBASHI  

     
    PAPER

      Vol:
    E101-C No:7
      Page(s):
    472-479

    This paper proposes Code-Modulated Synchronized (CMS) -OOK modulation scheme for normally-off wireless sensor networks, and demonstrates the operation of the transmitter for the CMS-OOK using 65nm SOTB (Silicon-On Thin Buried Oxide) CMOS technology. Based on investigating RF characteristics of SOTB CMOS, analog part of a CMS-OOK transmitter was designed, fabricated and evaluated in combination with based-FPGA digital part. With code modulation and controlling the carrier frequency by body bias of the SOTB devices, the spectrum of a CMS-OOK transmitter output is widen to achieve -62dBm/MHz peak power spectrum density at 15 MHz bandwidth. Chip of analog part on-board is supplied by 1V for power amplifier and 0.75V for the rest. It consumes average 83µW according to 83nJ/bit at 1kbps data transmission.

  • On Maximizing the Lifetime of Wireless Sensor Networks in 3D Vegetation-Covered Fields

    Wenjie YU  Xunbo LI  Zhi ZENG  Xiang LI  Jian LIU  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2018/03/01
      Vol:
    E101-D No:6
      Page(s):
    1677-1681

    In this paper, the problem of lifetime extension of wireless sensor networks (WSNs) with redundant sensor nodes deployed in 3D vegetation-covered fields is modeled, which includes building communication models, network model and energy model. Generally, such a problem cannot be solved by a conventional method directly. Here we propose an Artificial Bee Colony (ABC) based optimal grouping algorithm (ABC-OG) to solve it. The main contribution of the algorithm is to find the optimal number of feasible subsets (FSs) of WSN and assign them to work in rotation. It is verified that reasonably grouping sensors into FSs can average the network energy consumption and prolong the lifetime of the network. In order to further verify the effectiveness of ABC-OG, two other algorithms are included for comparison. The experimental results show that the proposed ABC-OG algorithm provides better optimization performance.

  • Zone-Based Energy Aware Data Collection Protocol for WSNs

    Alberto GALLEGOS  Taku NOGUCHI  Tomoko IZUMI  Yoshio NAKATANI  

     
    PAPER-Network

      Pubricized:
    2017/08/28
      Vol:
    E101-B No:3
      Page(s):
    750-762

    In this paper we propose the Zone-based Energy Aware data coLlection (ZEAL) protocol. ZEAL is designed to be used in agricultural applications for wireless sensor networks. In these type of applications, all data is often routed to a single point (named “sink” in sensor networks). The overuse of the same routes quickly depletes the energy of the nodes closer to the sink. In order to minimize this problem, ZEAL automatically creates zones (groups of nodes) independent from each other based on the trajectory of one or more mobile sinks. In this approach the sinks collects data queued in sub-sinks in each zone. Unlike existing protocols, ZEAL accomplish its routing tasks without using GPS modules for location awareness or synchronization mechanisms. Additionally, ZEAL provides an energy saving mechanism on the network layer that puts zones to sleep when there are no mobile sinks nearby. To evaluate ZEAL, it is compared with the Maximum Amount Shortest Path (MASP) protocol. Our simulations using the ns-3 network simulator show that ZEAL is able to collect a larger number of packets with significantly less energy in the same amount of time.

  • An Efficient Energy-Aware and Game-Theory-Based Clustering Protocol for Wireless Sensor Networks

    Xuegang WU  Xiaoping ZENG  Bin FANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/08/29
      Vol:
    E101-B No:3
      Page(s):
    709-722

    Clustering is known to be an effective means of reducing energy dissipation and prolonging network lifetime in wireless sensor networks (WSNs). Recently, game theory has been used to search for optimal solutions to clustering problems. The residual energy of each node is vital to balance a WSN, but was not used in the previous game-theory-based studies when calculating the final probability of being a cluster head. Furthermore, the node payoffs have also not been expressed in terms of energy consumption. To address these issues, the final probability of being a cluster head is determined by both the equilibrium probability in a game and a node residual energy-dependent exponential function. In the process of computing the equilibrium probability, new payoff definitions related to energy consumption are adopted. In order to further reduce the energy consumption, an assistant method is proposed, in which the candidate nodes with the most residual energy in the close point pairs completely covered by other neighboring sensors are firstly selected and then transmit same sensing data to the corresponding cluster heads. In this paper, we propose an efficient energy-aware clustering protocol based on game theory for WSNs. Although only game-based method can perform well in this paper, the protocol of the cooperation with both two methods exceeds previous by a big margin in terms of network lifetime in a series of experiments.

  • Receiver Performance Evaluation and Fading Duration Analysis for Concurrent Transmission

    Chun-Hao LIAO  Makoto SUZUKI  Hiroyuki MORIKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/07
      Vol:
    E101-B No:2
      Page(s):
    582-591

    Concurrent transmission (CT) is a revolutionary multi-hop protocol that significantly improves the MAC- and network-layer efficiency by allowing synchronized packet collisions. Although its superiority has been empirically verified, there is still a lack of studies on how the receiver survives such packet collisions, particularly in the presence of the carrier frequency offsets (CFO) between the transmitters. This work rectifies this omission by providing a comprehensive evaluation of the physical-layer receiver performance under CT, and a theoretical analysis on the fading duration of the beating effect resulting from the CFO. The main findings from our evaluations are the following points. (1) Beating significantly affects the receiver performance, and an error correcting mechanism is needed to combat the beating. (2) In IEEE 802.15.4 systems, the direct sequence spread spectrum (DSSS) plays such a role in combatting the beating. (3) However, due to the limited length of DSSS, the receiver still suffers from the beating if the fading duration is too long. (4) On the other hand, the basic M-ary FSK mode of IEEE 802.15.4g is vulnerable to CT due to the lack of error correcting mechanism. In view of the importance of the fading duration, we further theoretically derive the closed form of the average fading duration (AFD) of the beating under CT in terms of the transmitter number and the standard deviation of the CFO. Moreover, we prove that the receiver performance can be improved by having higher CFO deviations between the transmitters due to the shorter AFD. Finally, we estimate the AFD in the real system by actually measuring the CFO of a large number of sensor nodes.

  • A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks

    Jae Kwan LEE  Tae Ho CHO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/27
      Vol:
    E101-B No:2
      Page(s):
    489-499

    Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.

  • On Mitigating On-Off Attacks in Wireless Sensor Networks

    Zhe WEI  Fang WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:1
      Page(s):
    298-301

    In wireless sensor networks, the on-off attacker nodes can present good behaviors and then opportunistically and selectively behave badly to compromise the network. Such misbehaving nodes are usually difficult to be spotted by the network system in a short term. To address this issue, in this study, we propose a reputation scheme to mitigate the on-off attack. In addition, a penalty module is properly designed so that the reputation scheme can effectively respond to the on-off misbehaviors and make such nodes quickly detected by the system, hence the minimization of their influence. We confirm the feasibility and effectiveness of the proposed scheme through simulation tests.

  • Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs

    Qiang GAO  Wenping MA  Wei LUO  Feifei ZHAO  

     
    LETTER

      Vol:
    E101-A No:1
      Page(s):
    157-159

    Key predistribution schemes (KPSs) have played an important role in security of wireless sensor networks (WSNs). Due to comprehensive and simple structures, various types of combinatorial designs are used to construct KPSs. In general, compared to random KPSs, combinatorial KPSs have higher local connectivity but lower resilience against a node capture attack. In this paper, we apply two methods based on hash chains on KPSs based on transversal designs (TDs) to improve the resilience and the expressions for the metrics of the resulting schemes are derived.

  • A Two-Stage Scheduling to Improve Capacity for Inter-Concentrator Communication in Hierarchical Wireless Sensor Networks

    Yuriko YOSHINO  Masafumi HASHIMOTO  Naoki WAKAMIYA  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    58-69

    In this paper, we focus on two-layer wireless sensor networks (WSNs) that consist of sensor-concentrator and inter-concentrator networks. In order to collect as much data as possible from a wide area, improving of network capacity is essential because data collection applications often require to gather data within a limited period, i.e., acceptable collection delay. Therefore, we propose a two-stage scheduling method for inter-concentrator networks. The proposed method first strictly schedules time slots of links with heavy interference and congestion by exploiting the combination metric of interference and traffic demand. After that, it simply schedules time slots of the remaining sinks to mitigate complexity. Simulation-based evaluations show our proposal offers much larger capacity than conventional scheduling algorithms. In particular, our proposal improves up to 70% capacity compared with the conventional methods in situations where the proportion of one- and two-hop links is small.

  • A New Energy Efficient Clustering Algorithm Based on Routing Spanning Tree for Wireless Sensor Network

    Yating GAO  Guixia KANG  Jianming CHENG  Ningbo ZHANG  

     
    PAPER-Network

      Pubricized:
    2017/05/26
      Vol:
    E100-B No:12
      Page(s):
    2110-2120

    Wireless sensor networks usually deploy sensor nodes with limited energy resources in unattended environments so that people have difficulty in replacing or recharging the depleted devices. In order to balance the energy dissipation and prolong the network lifetime, this paper proposes a routing spanning tree-based clustering algorithm (RSTCA) which uses routing spanning tree to analyze clustering. In this study, the proposed scheme consists of three phases: setup phase, cluster head (CH) selection phase and steady phase. In the setup phase, several clusters are formed by adopting the K-means algorithm to balance network load on the basis of geographic location, which solves the randomness problem in traditional distributed clustering algorithm. Meanwhile, a conditional inter-cluster data traffic routing strategy is created to simplify the networks into subsystems. For the CH selection phase, a novel CH selection method, where CH is selected by a probability based on the residual energy of each node and its estimated next-time energy consumption as a function of distance, is formulated for optimizing the energy dissipation among the nodes in the same cluster. In the steady phase, an effective modification that counters the boundary node problem by adjusting the data traffic routing is designed. Additionally, by the simulation, the construction procedure of routing spanning tree (RST) and the effect of the three phases are presented. Finally, a comparison is made between the RSTCA and the current distributed clustering protocols such as LEACH and LEACH-DT. The results show that RSTCA outperforms other protocols in terms of network lifetime, energy dissipation and coverage ratio.

  • Energy Budget Formulation in Progress-Based Nearest Forwarding Routing Policy for Energy-Efficient Wireless Sensor Networks

    Sho SASAKI  Yuichi MIYAJI  Hideyuki UEHARA  

     
    PAPER-Wireless networks

      Pubricized:
    2017/07/14
      Vol:
    E100-D No:12
      Page(s):
    2808-2817

    A number of battery-driven sensor nodes are deployed to operate a wireless sensor network, and many routing protocols have been proposed to reduce energy consumption for data communications in the networks. We have proposed a new routing policy which employs a nearest-neighbor forwarding based on hop progress. Our proposed routing method has a topology parameter named forwarding angle to determine which node to connect with as a next-hop, and is compared with other existing policies to clarify the best topology for energy efficiency. In this paper, we also formulate the energy budget for networks with the routing policy by means of stochastic-geometric analysis on hop-count distributions for random planar networks. The formulation enables us to tell how much energy is required for all nodes in the network to forward sensed data in a pre-deployment phase. Simulation results show that the optimal topology varies according to node density in the network. Direct communication to the sink is superior for a small-sized network, and the multihop routing is more effective as the network becomes sparser. Evaluation results also demonstrate that our energy formulation can well approximate the energy budget, especially for small networks with a small forwarding angle. Discussion on the error with a large forwarding angle is then made with a geographical metric. It is finally clarified that our analytical expressions can obtain the optimal forwarding angle which yields the best energy efficiency for the routing policy when the network is moderately dense.

21-40hit(254hit)