共查询到20条相似文献,搜索用时 0 毫秒
1.
Abidalrahman Moh’d Nauman Aslam William Phillips William Robertson 《Ad hoc Networks》2013,11(8):2588-2604
This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability. 相似文献
2.
Sensor networks comprise of sensor nodes with limited battery power that are deployed at different geographical locations to monitor physical events. Information gathering is a typical but an important operation in many applications of wireless sensor networks (WSNs). It is necessary to operate the sensor network for longer period of time in an energy efficient manner for gathering information. One of the popular WSN protocol, named low energy adaptive clustering hierarchy (LEACH) and its variants, aim to prolong the network lifetime using energy efficient clustering approach. These protocols increase the network lifetime at the expense of reduced stability period (the time span before the first node dies). The reduction in stability period is because of the high energy variance of nodes. Stability period is an essential aspect to preserve coverage properties of the network. Higher is the stability period, more reliable is the network. Higher energy variance of nodes leads to load unbalancing among nodes and therefore lowers the stability period. Hence, it is perpetually attractive to design clustering algorithms that provides higher stability, lower energy variance and are energy efficient. In this paper to overcome the shortcomings of existing clustering protocols, a protocol named stable energy efficient clustering protocol is proposed. It balances the load among nodes using energy-aware heuristics and hence ensures higher stability period. The results demonstrate that the proposed protocol significantly outperforms LEACH and its variants in terms of energy variance and stability period. 相似文献
3.
Wireless Networks - The utilization of wireless sensor networks (WSNs) is proliferating in our daily life. It depends on the environmental monitoring such as weather tracking, battled field, etc.... 相似文献
4.
LI LI DONG Shu-song WEN Xiang-mingInstitute of Continuing Education School Beijing University of Posts Telecommunications Beijing China 《中国邮电高校学报(英文版)》2006,13(3):71-75
~~An energy efficient clustering routing algorithm for wireless sensor networks1. Mainwaring A, Polastre J, Szewczyk R, et al. Wireless sensor networks for habitat monitoring. Proceedings of the ACM International Workshop on Wireless Sensor Networks and A… 相似文献
5.
无线传感器网络的分布式能量有效非均匀成簇算法 总被引:4,自引:0,他引:4
研究了现有成簇路由算法,提出了分布式能量有效成簇路由算法,该算法主要包括3部分内容:一是选择候选簇头时通过引入平均能量因子来平衡全网节点的剩余能量情况;二是构造了基于能量和距离的能量消耗率函数以平衡节点的能量效率;三是首次提出了基于同构单跳网络的分布式能量有效非均匀成簇路由算法.理论和仿真结果均说明该算法优于EECS,生命周期比EECS延长达到约30%. 相似文献
6.
Wireless sensor networks are being deployed for some practical applications and their security has received considerable attention.It is an important challenge to find out suitable key agreement and encryption scheme for wireless sensor networks due to limitations of the power,computation capability and storage resources.In this paper,an efficient key agreement and encryption scheme for wireless sensor networks is presented.Results of analysis and simulations among the proposed scheme and other schemes show that the proposed scheme has some advantages in terms of energy consumption,computation requirement,storage requirement and security. 相似文献
7.
With the development of wireless technologies, video streaming services over heterogeneous wireless networks have become more popular in recent years. Video streaming schemes for heterogeneous networks should consider vertical handover in which the link capacity is varied significantly, because the quality experienced for a video streaming service is affected by the network status. When a vertical handover occurs, an abrupt bandwidth change and substantial handover latency lead to bursty packet loss and discontinuity of the video playback. In this paper, we propose a handover-aware video streaming scheme to provide seamless video streaming services over heterogeneous wireless networks. The proposed scheme adjusts its sending rate and the quality level of the transmitted video streams according to the significant bandwidth variation that occurs in a vertical handover. To expedite the response to the bandwidth variation due to a handover, our scheme uses an explicit notification message that informs the streaming server of a client's handover occurrence. In order to evaluate the performance, we use a simulation environment for a vertical handover between wireless local area networks and cellular networks. Through the simulation results, we prove that our scheme improves the experienced quality of video streaming in vertical handovers. 相似文献
8.
Wireless Networks - An important challenge in wireless sensor networks is energy conservation. Recently, several hybrid, dynamic and static clustering protocols have been proposed to solve this... 相似文献
9.
We present in this paper a new energy-efficient communication scheme called CNS (Compression with Null Symbol) that combines the power of data compression and communication through silent symbol. The concept of communication through silent symbol is borrowed from the energy efficient schemes proposed in Sinha (Proceedings of 6th IEEE consumer communications and networking conference (CCNC), Las Vegas, pp. 1–5, 2009), Ghosh et al. (Proceedings of 27th IEEE international performance computing and communications conference (IPCCC), USA, pp. 85–92, 2008), and Sinha and Sinha (Proceedings of international conference on distributed computing and internet technologies (ICDCIT), LNCS, pp. 139–144, 2008). We show that the average theoretical energy saving at the transmitter by CNS is 62.5%, assuming an ideal channel and for equal likelihood of all possible binary strings of a given length. Next, we propose a transceiver design that uses a hybrid modulation scheme utilizing FSK and ASK so as to keep the cost/complexity of the radio devices low. Considering an additive white gaussian noise (AWGN) channel and a non-coherent detection based receiver, CNS shows a saving in transmitter energy by 30% when compared to binary FSK, for equal likelihood of all possible binary strings of a given length. Simultaneously, there is a saving of 50% at the receiver for all types of data modulation due to halving of the transmitted data duration, compared to binary encoding. In contrast, RBNSiZeComm proposed in Sinha (Proceedings of 6th IEEE consumer communications and networking conference (CCNC), Las Vegas, pp. 1–5, 2009), TSS proposed in Ghosh et al. (Proceedings of 27th IEEE international performance computing and communications conference (IPCCC), USA, pp. 85–92, 2008) and RZE proposed in Sinha and Sinha (Proceedings of international conference on distributed computing and internet technologies (ICDCIT), LNCS, pp. 139–144, 2008) generate average transmitter energy savings of about 41, 20, and 35.2%, respectively. Also, at the receiver side, while RBNSiZeComm does not generate any saving, TSS and RZE produce about 36.9 and 12.5% savings on an average, respectively. Considering certain data types that may occur in the context of some wireless sensor networks (WSN) based applications (e.g., remote healthcare, agricultural WSNs, etc.), our simulation results demonstrate that for AWGN noisy channels, the transmitter side savings vary from about 33–50% on an average, while for RBNSiZeComm, this saving is about 33–61% on the same data set (Sinha in Proceedings of 6th IEEE consumer communications and networking conference (CCNC), Las Vegas, pp. 1–5, 2009). Thus, taking into account the low cost/complexity of the proposed transceiver, these results clearly establish that CNS can be a suitable candidate for communication in low power wireless sensor networks, such as in remote healthcare applications, body area networks, home automation, WSNs for agriculture and many others. 相似文献
10.
11.
The presence of cluster heads (CHs) in a clustered wireless sensor network (WSN) leads to improved data aggregation and enhanced network lifetime. Thus, the selection of appropriate CHs in WSNs is a challenging task, which needs to be addressed. A multicriterion decision-making approach for the selection of CHs is presented using Pareto-optimal theory and technique for order preference by similarity to ideal solution (TOPSIS) methods. CHs are selected using three criteria including energy, cluster density and distance from the sink. The overall network lifetime in this method with 50% data aggregation after simulations is 81% higher than that of distributed hierarchical agglomerative clustering in similar environment and with same set of parameters. Optimum number of clusters is estimated using TOPSIS technique and found to be 9–11 for effective energy usage in WSNs. 相似文献
12.
13.
In wireless ad hoc sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. Topology management schemes such as GAF put the redundant nodes for routing to sleep in order to save the energy. The radio range will affect the number of neighbouring nodes, which collaborate to forward data to a base station or sink. In this paper we study a simple linear network and deduce the relationship between optimal radio range and traffic. We find that half of the power can be saved if the radio range is adjusted appropriately compared with the best case where equal radio ranges are used. 相似文献
14.
In wireless sensor network (MSN), reliability is the main issue to design any routing technique. To design a comprehensive reliable wireless sensor network, it is essential to consider node failure and energy constrain as inevitable phenomena. In this paper we present energy efficient node fault diagnosis and recovery for wireless sensor networks referred as energy efficient fault tolerant multipath routing scheme for wireless sensor network. The scheme is based on multipath data routing. One shortest path is used for main data routing in our scheme and other two backup paths are used as alternative path for faulty network and to handle the overloaded traffic on main channel. Shortest pat data routing ensures energy efficient data routing. Extensive simulation results have revealed that the performance of the proposed scheme is energy efficient and can tolerates more than 60% of fault. 相似文献
15.
Joint source coding and data rate adaptation for energy efficient wireless video streaming 总被引:5,自引:0,他引:5
Luna C.E. Eisenberg Y. Berry R. Pappas T.N. Katsaggelos A.K. 《Selected Areas in Communications, IEEE Journal on》2003,21(10):1710-1720
Rapid growth in wireless networks is fueling demand for video services from mobile users. While the problem of transmitting video over unreliable channels has received some attention, the wireless network environment poses challenges such as transmission power management that have received little attention previously in connection with video. Transmission power management affects battery life in mobile devices, interference to other users, and network capacity. We consider energy efficient transmission of a video sequence under delay and quality constraints. The selection of source coding parameters is considered jointly with transmitter power and rate adaptation, and packet transmission scheduling. The goal is to transmit a video frame using the minimal required transmission energy under delay and quality constraints. Experimental results are presented that illustrate the advantages of the proposed approach. 相似文献
16.
17.
Wireless Networks - Currently, IEEE 802.11 standard for ad-hoc wireless mode is inadequate for multi-hop network. Recent efforts for the advancement of 802.11 standards, such as 11e for QoS support... 相似文献
18.
Zvi Rosberg Ren Ping Liu Tuan Le Dinh Yi Fei Dong Sanjay Jha 《Wireless Networks》2010,16(7):1913-1927
Typical wireless sensor network deployments are expected to be in unattended terrains where link packet error rate may be
as high as 70% and path length could be up to tens of hops. In coping with such harsh conditions, we introduce a new notion
of statistical reliability to achieve a balance between data reliability and energy consumption. Under this new paradigm, the energy efficiency of a
comprehensive set of statistically reliable data delivery protocols are analyzed. Based on the insight gained, we propose
a hybrid system which combines the energy efficient and statistically reliable transport (eESRT) protocol with the implicit
and explicit ARQ (ieARQ) protocol. This hybrid system adaptively switches between eESRT and ieARQ machanisms according to
a dynamic hop threshold H_sw proposed in this work. Simulation and experiment results confirm our theoretical findings and demonstrate the advantages
the hybrid system in boosting energy efficiency, reducing end to end delay, and in overcoming the “avalanche” effect. 相似文献
19.
Wireless Networks - Energy conservation and fault tolerance are the most two important challenging issues for the development of large scale wireless sensor networks (WSNs). Failure of cluster... 相似文献
20.
Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, security threats need to be addressed and, taking into account its limited resources, the use of symmetric cryptography is strongly recommended. In this paper, a light-weight authentication model for wireless sensor networks composed of a key management and an authentication protocol is presented. It is based on the use of simple symmetric cryptographic primitives with very low computational requirements, which obtains better results than other proposals in the literature. Compared to SPINS and BROSK protocols, the proposal can reduce energy consumption by up to 98% and 67%, respectively. It also scales well with the size of the network, due to it only requiring one interchanged message, independently of the total number of nodes in the network. 相似文献