No Arabic abstract
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy usage,(3) only uses single hop communication thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance using simulation with real sensor data streams. Our results demonstrate that our approach is accurate and imposes a reasonable communication load and level of power consumption.
Time synchronization is important for a variety of applications in wireless sensor networks including scheduling communication resources, coordinating sensor wake/sleep cycles, and aligning signals for distributed transmission/reception. This paper describes a non-hierarchical approach to time synchronization in wireless sensor networks that has low overhead and can be implemented at the physical and/or MAC layers. Unlike most of the prior approaches, the approach described in this paper allows all nodes to use exactly the same distributed algorithm and does not require local averaging of measurements from other nodes. Analytical results show that the non-hierarchical approach can provide monotonic expected convergence of both drifts and offsets under broad conditions on the network topology and local clock update stepsize. Numerical results are also presented verifying the analysis under two particular network topologies.
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is one to three orders of magnitude lower.
Wireless sensor networks become integral part of our life. These networks can be used for monitoring the data in various domain due to their flexibility and functionality. Query processing and optimization in the WSN is a very challenging task because of their energy and memory constraint. In this paper, first our focus is to review the different approaches that have significant impacts on the development of query processing techniques for WSN. Finally, we aim to illustrate the existing approach in popular query processing engines with future research challenges in query optimization.
In this paper, we first remodel the line coverage as a 1D discrete problem with co-linear targets. Then, an order-based greedy algorithm, called OGA, is proposed to solve the problem optimally. It will be shown that the existing order in the 1D modeling, and especially the resulted Markov property of the selected sensors can help design greedy algorithms such as OGA. These algorithms demonstrate optimal/efficient performance and have lower complexity compared to the state-of-the-art. Furthermore, it is demonstrated that the conventional continuous line coverage problem can be converted to an equivalent discrete problem and solved optimally by OGA. Next, we formulate the well-known weak barrier coverage problem as an instance of the continuous line coverage problem (i.e. a 1D problem) as opposed to the conventional 2D graph-based models. We demonstrate that the equivalent discrete version of this problem can be solved optimally and faster than the state-of-the-art methods using an extended version of OGA, called K-OGA. Moreover, an efficient local algorithm, called LOGM, is proposed to mend barrier gaps due to sensor failure. In the case of m gaps, LOGM is proved to select at most 2m-1 sensors more than the optimal while being local and implementable in distributed fashion. We demonstrate the optimal/efficient performance of the proposed algorithms via extensive simulations.
In this paper, we quantitatively (mathematically) reason the energy savings achieved by the Leveling and Sectoring protocol. Due to the energy constraints on the sensor nodes (in terms of supply of energy) energy awareness has become crucial in networking protocol stack. The understanding of routing protocols along with energy awareness in a network would help in energy opti-mization with efficient routing .We provide analytical modelling of the energy wastage in the absence of Leveling and Sectoring protocol by considering the network in the form of binary tree, nested tree and Q-ary tree. The simulation results reflect the energy wastage in the absence of Levelling and Sectoring based hybrid protocol.