Sensor-data gathering using multi-hop connections in a wireless sensor network is being widely used, and a tree topology for data gathering is considered promising because it eases data aggregation. Therefore, many sensor-tree-creation algorithms have been proposed. The sensors in a tree, however, generally run on batteries, so long tree lifetime is one of the most important factors in collecting sensor data from a tree over a long period. It has been proven that creating the longest-lifetime tree is a non-deterministic-polynomial complete problem; thus, all previously proposed sensor-tree-creation algorithms are heuristic. To evaluate a heuristic algorithm, the time complexity of the algorithm is very important, as well as the quantitative evaluation of the lifetimes of the created trees and algorithm speed. This paper proposes an algorithm called assured switching with accurate graph optimization (ASAGAO) that can create a sensor tree with a much longer lifetime much faster than other sensor-tree-creation algorithms. In addition, it has much smaller time complexity.
Anh-Huy NGUYEN Yosuke TANIGAWA Hideki TODE
With the rapid increase in IoT (Internet of Things) applications, more sensor devices, generating periodic data flows whose packets are transmitted at regular intervals, are being incorporated into WSNs (Wireless Sensor Networks). However, packet collision caused by the hidden node problem is becoming serious, particularly in large-scale multi-hop WSNs. Moreover, focusing on periodic data flows, continuous packet collisions among periodic data flows occur if the periodic packet transmission phases become synchronized. In this paper, we tackle the compounded negative effect of the hidden node problem and the continuous collision problem among periodic data flows. As this is a complex variant of the hidden node problem, there is no simple and well-studied solution. To solve this problem, we propose a new MAC layer mechanism. The proposed method predicts a future risky duration during which a collision can be caused by hidden nodes by taking into account the periodic characteristics of data packet generation. In the risky duration, each sensor node stops transmitting data packets in order to avoid collisions. To the best of our knowledge, this is the first paper that considers the compounded effect of hidden nodes and continuous collisions among periodic data flows. Other advantages of the proposed method include eliminating the need for any new control packets and it can be implemented in widely-diffused IEEE 802.11 and IEEE 802.15.4 devices.
Yimin ZHAO Song XIAO Hongping GAN Lizhao LI Lina XIAO
To efficiently collect sensor readings in cluster-based wireless sensor networks, we propose a structural compressed network coding (SCNC) scheme that jointly considers structural compressed sensing (SCS) and network coding (NC). The proposed scheme exploits the structural compressibility of sensor readings for data compression and reconstruction. Random linear network coding (RLNC) is used to re-project the measurements and thus enhance network reliability. Furthermore, we calculate the energy consumption of intra- and inter-cluster transmission and analyze the effect of the cluster size on the total transmission energy consumption. To that end, we introduce an iterative reweighed sparsity recovery algorithm to address the all-or-nothing effect of RLNC and decrease the recovery error. Experiments show that the SCNC scheme can decrease the number of measurements required for decoding and improve the network's robustness, particularly when the loss rate is high. Moreover, the proposed recovery algorithm has better reconstruction performance than several other state-of-the-art recovery algorithms.
The compressive sensing has been applied to develop an effective framework for simultaneously localizing multiple targets in wireless sensor networks. Nevertheless, existing methods implicitly use analog measurements, which have infinite bit precision. In this letter, we focus on off-grid target localization using quantized measurements with only several bits. To address this, we propose a novel localization framework for jointly estimating target locations and dealing with quantization errors, based on the novel application of the variational Bayesian Expectation-Maximization methodology. Simulation results highlight its superior performance.
This paper focuses on on-demand wireless sensor networks (WSNs) where a wake-up receiver is installed into each node. In on-demand WSNs, each node sends a wake-up signal including a wake-up ID assigned to a specific destination node in order to remotely activate its main radio interface. This wake-up control helps each node to reduce energy consumed during idle periods, however, the wake-up signal transmitted before every data transmission results in overhead, which degrades communication quality and increases energy consumption at each sender node. In order to reduce the overhead for wake-up control, in this paper, we propose three schemes. First, we propose a scheme called Double Modulation (DM), where each node embeds the sensing data to be transmitted into the payload field of a wake-up signal. The destination interprets the wake-up message differently depending on its wake-up state: if it is in a sleep state, it treats the message as a wake-up signal, otherwise it extracts the sensing data from the detected message. Second, we propose a scheme called Overhearing (OH), where each node observes the frames transmitted by a destination node and suppresses the transmission of wake-up signal when detecting the active state of their destination. Finally, we propose a hybrid scheme that combines OH and DM schemes. Our simulation results show that the proposed schemes can effectively reduce the negative impact of wake-up overhead, and significantly improve data collection rate and energy-efficiency in comparison to on-demand WSN without the proposed schemes.
The methods proposed in this paper enable resynchronization when a synchronization deviation occurs in a sensor node without a beacon or an ack in a wireless sensor network under ultra-limited but stable resources such as the energy generated from tiny solar cell batteries. The method for a single-hop network is straightforward; when a receiver does not receive data, it is simply placed in recovery mode, in which the receiver sets its cycle length TB to (b±γ)T, where b is non-negative integer, 0 < γ < 1, and T is its cycle length in normal mode, and in which the receiver sets its active interval WB to a value that satisfies WB ≥ W + γT, where W is its active interval in normal mode. In contrast, a sender stays in normal mode. Resynchronization methods for linear multi-hop and tree-based multi-hop sensor networks are constructed using the method for a single-hop network. All the methods proposed here are complete because they are always able to resynchronize networks. The results of simulations based on the resynchronization methods are given and those of an experiment using actual sensor nodes with wireless modules are also presented, which show that the methods are feasible.
Dongping YU Yan GUO Ning LI Qiao SU
As an emerging and promising technique, device-free localization (DFL) has drawn considerable attention in recent years. By exploiting the inherent spatial sparsity of target localization, the compressive sensing (CS) theory has been applied in DFL to reduce the number of measurements. In practical scenarios, a prior knowledge about target locations is usually available, which can be obtained by coarse localization or tracking techniques. Among existing CS-based DFL approaches, however, few works consider the utilization of prior knowledge. To make use of the prior knowledge that is partly or erroneous, this paper proposes a novel faulty prior knowledge aided multi-target device-free localization (FPK-DFL) method. It first incorporates the faulty prior knowledge into a three-layer hierarchical prior model. Then, it estimates location vector and learns model parameters under a variational Bayesian inference (VBI) framework. Simulation results show that the proposed method can improve the localization accuracy by taking advantage of the faulty prior knowledge.
Xiaojuan ZHU Yang LU Jie ZHANG Zhen WEI
Topological inference is the foundation of network performance analysis and optimization. Due to the difficulty of obtaining prior topology information of wireless sensor networks, we propose routing topology inference, RTI, which reconstructs the routing topology from source nodes to sink based on marking packets and probing locally. RTI is not limited to any specific routing protocol and can adapt to a dynamic and lossy networks. We select topological distance and reconstruction time to evaluate the correctness and effectiveness of RTI and then compare it with PathZip and iPath. Simulation results indicate that RTI maintains adequate reconstruction performance in dynamic and packet loss environments and provides a global routing topology view for wireless sensor networks at a lower reconstruction cost.
Hiroyuki YOMO Akitoshi ASADA Masato MIYATAKE
The introduction of a drone-based mobile sink into wireless sensor networks (WSNs), which has flexible mobility to move to each sensor node and gather data with a single-hop transmission, makes cumbersome multi-hop transmissions unnecessary, thereby facilitating data gathering from widely-spread sensor nodes. However, each sensor node spends significant amount of energy during their idle state where they wait for the mobile sink to come close to their vicinity for data gathering. In order to solve this problem, in this paper, we apply a wake-up receiver to each sensor node, which consumes much smaller power than the main radio used for data transmissions. The main radio interface is woken up only when the wake-up receiver attached to each node detects a wake-up signal transmitted by the mobile sink. For this mobile and on-demand data gathering, this paper proposes a route control framework that decides the mobility route for a drone-based mobile sink, considering the interactions between wake-up control and physical layer (PHY) and medium access control (MAC) layer operations. We investigate the optimality and effectiveness of the route obtained by the proposed framework with computer simulations. Furthermore, we present experimental results obtained with our test-bed of a WSN employing a drone-based mobile sink and wake-up receivers. All these results give us the insight on the role of wake-up receiver in mobile and on-demand sensing data gathering and its interactions with protocol/system designs.
Van-Trung NGUYEN Ryo ISHIKAWA Koichiro ISHIBASHI
This paper proposes Code-Modulated Synchronized (CMS) -OOK modulation scheme for normally-off wireless sensor networks, and demonstrates the operation of the transmitter for the CMS-OOK using 65nm SOTB (Silicon-On Thin Buried Oxide) CMOS technology. Based on investigating RF characteristics of SOTB CMOS, analog part of a CMS-OOK transmitter was designed, fabricated and evaluated in combination with based-FPGA digital part. With code modulation and controlling the carrier frequency by body bias of the SOTB devices, the spectrum of a CMS-OOK transmitter output is widen to achieve -62dBm/MHz peak power spectrum density at 15 MHz bandwidth. Chip of analog part on-board is supplied by 1V for power amplifier and 0.75V for the rest. It consumes average 83µW according to 83nJ/bit at 1kbps data transmission.
Wenjie YU Xunbo LI Zhi ZENG Xiang LI Jian LIU
In this paper, the problem of lifetime extension of wireless sensor networks (WSNs) with redundant sensor nodes deployed in 3D vegetation-covered fields is modeled, which includes building communication models, network model and energy model. Generally, such a problem cannot be solved by a conventional method directly. Here we propose an Artificial Bee Colony (ABC) based optimal grouping algorithm (ABC-OG) to solve it. The main contribution of the algorithm is to find the optimal number of feasible subsets (FSs) of WSN and assign them to work in rotation. It is verified that reasonably grouping sensors into FSs can average the network energy consumption and prolong the lifetime of the network. In order to further verify the effectiveness of ABC-OG, two other algorithms are included for comparison. The experimental results show that the proposed ABC-OG algorithm provides better optimization performance.
Alberto GALLEGOS Taku NOGUCHI Tomoko IZUMI Yoshio NAKATANI
In this paper we propose the Zone-based Energy Aware data coLlection (ZEAL) protocol. ZEAL is designed to be used in agricultural applications for wireless sensor networks. In these type of applications, all data is often routed to a single point (named “sink” in sensor networks). The overuse of the same routes quickly depletes the energy of the nodes closer to the sink. In order to minimize this problem, ZEAL automatically creates zones (groups of nodes) independent from each other based on the trajectory of one or more mobile sinks. In this approach the sinks collects data queued in sub-sinks in each zone. Unlike existing protocols, ZEAL accomplish its routing tasks without using GPS modules for location awareness or synchronization mechanisms. Additionally, ZEAL provides an energy saving mechanism on the network layer that puts zones to sleep when there are no mobile sinks nearby. To evaluate ZEAL, it is compared with the Maximum Amount Shortest Path (MASP) protocol. Our simulations using the ns-3 network simulator show that ZEAL is able to collect a larger number of packets with significantly less energy in the same amount of time.
Xuegang WU Xiaoping ZENG Bin FANG
Clustering is known to be an effective means of reducing energy dissipation and prolonging network lifetime in wireless sensor networks (WSNs). Recently, game theory has been used to search for optimal solutions to clustering problems. The residual energy of each node is vital to balance a WSN, but was not used in the previous game-theory-based studies when calculating the final probability of being a cluster head. Furthermore, the node payoffs have also not been expressed in terms of energy consumption. To address these issues, the final probability of being a cluster head is determined by both the equilibrium probability in a game and a node residual energy-dependent exponential function. In the process of computing the equilibrium probability, new payoff definitions related to energy consumption are adopted. In order to further reduce the energy consumption, an assistant method is proposed, in which the candidate nodes with the most residual energy in the close point pairs completely covered by other neighboring sensors are firstly selected and then transmit same sensing data to the corresponding cluster heads. In this paper, we propose an efficient energy-aware clustering protocol based on game theory for WSNs. Although only game-based method can perform well in this paper, the protocol of the cooperation with both two methods exceeds previous by a big margin in terms of network lifetime in a series of experiments.
Chun-Hao LIAO Makoto SUZUKI Hiroyuki MORIKAWA
Concurrent transmission (CT) is a revolutionary multi-hop protocol that significantly improves the MAC- and network-layer efficiency by allowing synchronized packet collisions. Although its superiority has been empirically verified, there is still a lack of studies on how the receiver survives such packet collisions, particularly in the presence of the carrier frequency offsets (CFO) between the transmitters. This work rectifies this omission by providing a comprehensive evaluation of the physical-layer receiver performance under CT, and a theoretical analysis on the fading duration of the beating effect resulting from the CFO. The main findings from our evaluations are the following points. (1) Beating significantly affects the receiver performance, and an error correcting mechanism is needed to combat the beating. (2) In IEEE 802.15.4 systems, the direct sequence spread spectrum (DSSS) plays such a role in combatting the beating. (3) However, due to the limited length of DSSS, the receiver still suffers from the beating if the fading duration is too long. (4) On the other hand, the basic M-ary FSK mode of IEEE 802.15.4g is vulnerable to CT due to the lack of error correcting mechanism. In view of the importance of the fading duration, we further theoretically derive the closed form of the average fading duration (AFD) of the beating under CT in terms of the transmitter number and the standard deviation of the CFO. Moreover, we prove that the receiver performance can be improved by having higher CFO deviations between the transmitters due to the shorter AFD. Finally, we estimate the AFD in the real system by actually measuring the CFO of a large number of sensor nodes.
Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.
In wireless sensor networks, the on-off attacker nodes can present good behaviors and then opportunistically and selectively behave badly to compromise the network. Such misbehaving nodes are usually difficult to be spotted by the network system in a short term. To address this issue, in this study, we propose a reputation scheme to mitigate the on-off attack. In addition, a penalty module is properly designed so that the reputation scheme can effectively respond to the on-off misbehaviors and make such nodes quickly detected by the system, hence the minimization of their influence. We confirm the feasibility and effectiveness of the proposed scheme through simulation tests.
Qiang GAO Wenping MA Wei LUO Feifei ZHAO
Key predistribution schemes (KPSs) have played an important role in security of wireless sensor networks (WSNs). Due to comprehensive and simple structures, various types of combinatorial designs are used to construct KPSs. In general, compared to random KPSs, combinatorial KPSs have higher local connectivity but lower resilience against a node capture attack. In this paper, we apply two methods based on hash chains on KPSs based on transversal designs (TDs) to improve the resilience and the expressions for the metrics of the resulting schemes are derived.
Yuriko YOSHINO Masafumi HASHIMOTO Naoki WAKAMIYA
In this paper, we focus on two-layer wireless sensor networks (WSNs) that consist of sensor-concentrator and inter-concentrator networks. In order to collect as much data as possible from a wide area, improving of network capacity is essential because data collection applications often require to gather data within a limited period, i.e., acceptable collection delay. Therefore, we propose a two-stage scheduling method for inter-concentrator networks. The proposed method first strictly schedules time slots of links with heavy interference and congestion by exploiting the combination metric of interference and traffic demand. After that, it simply schedules time slots of the remaining sinks to mitigate complexity. Simulation-based evaluations show our proposal offers much larger capacity than conventional scheduling algorithms. In particular, our proposal improves up to 70% capacity compared with the conventional methods in situations where the proportion of one- and two-hop links is small.
Yating GAO Guixia KANG Jianming CHENG Ningbo ZHANG
Wireless sensor networks usually deploy sensor nodes with limited energy resources in unattended environments so that people have difficulty in replacing or recharging the depleted devices. In order to balance the energy dissipation and prolong the network lifetime, this paper proposes a routing spanning tree-based clustering algorithm (RSTCA) which uses routing spanning tree to analyze clustering. In this study, the proposed scheme consists of three phases: setup phase, cluster head (CH) selection phase and steady phase. In the setup phase, several clusters are formed by adopting the K-means algorithm to balance network load on the basis of geographic location, which solves the randomness problem in traditional distributed clustering algorithm. Meanwhile, a conditional inter-cluster data traffic routing strategy is created to simplify the networks into subsystems. For the CH selection phase, a novel CH selection method, where CH is selected by a probability based on the residual energy of each node and its estimated next-time energy consumption as a function of distance, is formulated for optimizing the energy dissipation among the nodes in the same cluster. In the steady phase, an effective modification that counters the boundary node problem by adjusting the data traffic routing is designed. Additionally, by the simulation, the construction procedure of routing spanning tree (RST) and the effect of the three phases are presented. Finally, a comparison is made between the RSTCA and the current distributed clustering protocols such as LEACH and LEACH-DT. The results show that RSTCA outperforms other protocols in terms of network lifetime, energy dissipation and coverage ratio.
Sho SASAKI Yuichi MIYAJI Hideyuki UEHARA
A number of battery-driven sensor nodes are deployed to operate a wireless sensor network, and many routing protocols have been proposed to reduce energy consumption for data communications in the networks. We have proposed a new routing policy which employs a nearest-neighbor forwarding based on hop progress. Our proposed routing method has a topology parameter named forwarding angle to determine which node to connect with as a next-hop, and is compared with other existing policies to clarify the best topology for energy efficiency. In this paper, we also formulate the energy budget for networks with the routing policy by means of stochastic-geometric analysis on hop-count distributions for random planar networks. The formulation enables us to tell how much energy is required for all nodes in the network to forward sensed data in a pre-deployment phase. Simulation results show that the optimal topology varies according to node density in the network. Direct communication to the sink is superior for a small-sized network, and the multihop routing is more effective as the network becomes sparser. Evaluation results also demonstrate that our energy formulation can well approximate the energy budget, especially for small networks with a small forwarding angle. Discussion on the error with a large forwarding angle is then made with a geographical metric. It is finally clarified that our analytical expressions can obtain the optimal forwarding angle which yields the best energy efficiency for the routing policy when the network is moderately dense.