Spelling suggestions: "subject:"data aggregation."" "subject:"mata aggregation.""
1 |
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Surveykakani, phani priya January 2013 (has links)
Wireless sensor networks have many sensor devices that send their data to the sink or base station for further processing. This is called direct delivery. But this leads to heavy traffic in the network and as the nodes are limited with energy, this decreases the lifetime of the network. So data aggregation technique is introduced to improve the lifetime. This technique aggregates or merges the multiple incoming packets in to single packet and forwards it to sink. There is different data aggregation techniques based on the topology of the network. This report clearly explains the purpose of data aggregation and gathering in WSN, data aggregation in flat networks and data aggregation in hierarchical networks, different data aggregation techniques in cluster based networks, chain based, tree based and grid based networks. Data aggregation technique can successfully minimize the data traffic and energy consumption only when it is carried out in a secure manner. Part2 of the survey explains the possible attacks that affect data aggregation in wireless sensor network. The secure data aggregation techniques in wireless sensor networks are also discussed in this report.
|
2 |
Extending the Lifetime of Wireless Sensor Networks with Spatial Data AggregationZou, Shoudong 11 1900 (has links)
In this thesis, we propose mechanisms to extend the lifetime of wireless sensor networks. In-network data aggregation is considered on both tree-based and flow-based routing protocols during the process of data collection to reduce redundant transmissions. In the flow-based data collection design, we introduce the concept of flow loss multiplier to express the impact of data aggregation over
correlated data. The application has the freedom to set the flow loss multiplier to reflect its specific knowledge of correlation.
We also introduce traffic balancing as a complementary technique to data aggregation. It helps avoid exhausting the energy of any sensor node while leaving large amounts of energy at other nodes. In tree-based data collection schemes, we adjust the tree structure judiciously to balance energy consumption before any node's failure
due to total residual energy depletion. In flow-based schemes, after aggregation, data flows are split and the fragments are spread to increase network lifetime.
We investigate the impact of performing greedily data aggregation at the "best" aggregation site regardless of its location, the results of our analysis show that only applying 2-way data aggregation may limit the ability to explore more complex aggregation possibilities. To address this problem, we propose an aggressive data aggregation
for a specified application, contour map reconstruction. Based on the simulation results, our aggregation scheme is shown to be able to eliminate large volume of contour data and retain satisfying data accuracy.
|
3 |
Data aggregation for capacity managementLee, Yong Woo 30 September 2004 (has links)
This thesis presents a methodology for data aggregation for capacity management. It is assumed that there are a very large number of products manufactured in a company and that every product is stored in the database with its standard unit per hour and attributes that uniquely specify each product. The methodology aggregates products into families based on the standard units-per-hour and finds a subset of attributes that unambiguously identifies each family. Data reduction and classification are achieved using well-known multivariate statistical techniques such as cluster analysis, variable selection and discriminant analysis. The experimental results suggest that the efficacy of the proposed methodology is good in terms of data reduction.
|
4 |
Performance of data aggregation for wireless sensor networksFeng, Jie 02 July 2010
This thesis focuses on three fundamental issues that concern data aggregation protocols for periodic data collection in sensor networks: <i>which</i> sensor nodes should report their data, <i>when</i> should they report it, and should they use <i>unicast</i> or <i>broadcast</i> based protocols for this purpose.
<p>
The issue of when nodes should report their data is considered in the context of real-time monitoring applications. The first part of this thesis shows that asynchronous aggregation, in which the time of each nodes transmission is determined adaptively based on its local history of past packet receptions from its children, outperforms synchronous aggregation by providing lower delay for a given end-to-end loss rate.
<p>
Second, new broadcast-based aggregation protocols that minimize the number of packet transmissions, relying on multipath delivery rather than automatic repeat request for reliability, are designed and evaluated. The performance of broadcast-based aggregation is compared to that of unicast-based aggregation, in the context of both real-time and delay-tolerant data collection.
<p>
Finally, this thesis investigates the potential benefits of dynamically, rather than semi-statically, determining the set of nodes reporting their data, in the context of applications in which coverage of some monitored region is to be maintained. Unicast and broadcast-based coverage-preserving data aggregation protocols are designed and evaluated. The performance of the proposed protocols is compared to that of data collection protocols relying on node scheduling.
|
5 |
Performance of data aggregation for wireless sensor networksFeng, Jie 02 July 2010 (has links)
This thesis focuses on three fundamental issues that concern data aggregation protocols for periodic data collection in sensor networks: <i>which</i> sensor nodes should report their data, <i>when</i> should they report it, and should they use <i>unicast</i> or <i>broadcast</i> based protocols for this purpose.
<p>
The issue of when nodes should report their data is considered in the context of real-time monitoring applications. The first part of this thesis shows that asynchronous aggregation, in which the time of each nodes transmission is determined adaptively based on its local history of past packet receptions from its children, outperforms synchronous aggregation by providing lower delay for a given end-to-end loss rate.
<p>
Second, new broadcast-based aggregation protocols that minimize the number of packet transmissions, relying on multipath delivery rather than automatic repeat request for reliability, are designed and evaluated. The performance of broadcast-based aggregation is compared to that of unicast-based aggregation, in the context of both real-time and delay-tolerant data collection.
<p>
Finally, this thesis investigates the potential benefits of dynamically, rather than semi-statically, determining the set of nodes reporting their data, in the context of applications in which coverage of some monitored region is to be maintained. Unicast and broadcast-based coverage-preserving data aggregation protocols are designed and evaluated. The performance of the proposed protocols is compared to that of data collection protocols relying on node scheduling.
|
6 |
Data aggregation for capacity managementLee, Yong Woo 30 September 2004 (has links)
This thesis presents a methodology for data aggregation for capacity management. It is assumed that there are a very large number of products manufactured in a company and that every product is stored in the database with its standard unit per hour and attributes that uniquely specify each product. The methodology aggregates products into families based on the standard units-per-hour and finds a subset of attributes that unambiguously identifies each family. Data reduction and classification are achieved using well-known multivariate statistical techniques such as cluster analysis, variable selection and discriminant analysis. The experimental results suggest that the efficacy of the proposed methodology is good in terms of data reduction.
|
7 |
Extending the Lifetime of Wireless Sensor Networks with Spatial Data AggregationZou, Shoudong Unknown Date
No description available.
|
8 |
Data-level privacy through data perturbation in distributed multi-application environmentsde Souza, Tulio January 2016 (has links)
Wireless sensor networks used to have a main role as a monitoring tool for environmental purposes and animal tracking. This spectrum of applications, however, has dramatically grown in the past few years. Such evolution means that what used to be application-specific networks are now multi application environments, often with federation capabilities. This shift results in a challenging environment for data privacy, mainly caused by the broadening of the spectrum of data access points and involved entities. This thesis first evaluates existing privacy preserving data aggregation techniques to determine how suitable they are for providing data privacy in this more elaborate environment. Such evaluation led to the design of the set difference attack, which explores the fact that they all rely purely on data aggregation to achieve privacy, which is shown through simulation not to be suitable to the task. It also indicates that some form of uncertainty is required in order to mitigate the attack. Another relevant finding is that the attack can also be effective against standalone networks, by exploring the node availability factor. Uncertainty is achieved via the use of differential privacy, which offers a strong and formal privacy guarantee through data perturbation. In order to make it suitable to work in a wireless sensor network environment, which mainly deals with time-series data, two new approaches to address it have been proposed. These have a contrasting effect when it comes to utility and privacy levels, offering a flexible balance between privacy and data utility for sensed entities and data analysts/consumers. Lastly, this thesis proposes a framework to assist in the design of privacy preserving data aggregation protocols to suit application needs while at the same time complying with desired privacy requirements. The framework's evaluation compares and contrasts several scenarios to demonstrate the level of flexibility and effectiveness that the designed protocols can provide. Overall, this thesis demonstrates that data perturbation can be made significantly practical through the proposed framework. Although some problems remain, with further improvements to data correlation methods and better use of some intrinsic characteristics of such networks, the use of data perturbation may become a practical and efficient privacy preserving mechanism for wireless sensor networks.
|
9 |
Privacy-Preserving Distributed Data Aggregation Scheme with Public Verification in Smart GridLai, Yi-Lung 28 August 2012 (has links)
The issue of energy shortage has arisen in recent years.
All countries must discuss the manner to reduce energy consumption, and smart grid is a better one of the solutions.
According to related researches, energy consumption can be effectively reduced using energy management information of smart grids.
By using smart grids, electricity suppliers can learn about the current energy consumption of neighborhoods, and control the electrical energy generation and price of electrical energy. Users can learn the current price of electrical energy and obtain energy management information from smart meters for energy management and device control. However, electricity consumptions of users may divulge the privacy information of users. Therefore, privacy of users and communication security of smart grid become crucial security issues. In this thesis, we propose a provably secure power usage data aggregation scheme for smart grids. Electricity suppliers can learn about the current power usage of neighborhoods without knowing the individual electricity consumption of each user, and use the current power usage of neighborhoods to arrange energy distribution. Therefore, electricity suppliers cannot use the data to reveal lifestyles of each user. In our scheme, the transmission information is encrypted and signed to prevent theft or tampering of data. Finally, we also provide formal proofs for our scheme in this thesis.
|
10 |
Performance analysis of data aggregation and security in WSN-satellite integrated networksVerma, Suraj, Pillai, Prashant, Hu, Yim Fun January 2013 (has links)
No / Recently there has been an exponential rise in the use of Wireless Sensor Networks (WSNs) in various applications. While WSNs have been primarily used as independent networks, researchers are now looking into ways of integrating them with other existing networks. One such network is the satellite network which provides a reliable communication backbone to remote areas that lack appropriate terrestrial infrastructure. However, due to the integration of the two networks with different transmission and operational characteristics interoperability and security become major concerns. This paper presents an ns-2 based simulation framework of a WSN-satellite integrated network that is used to evaluate the effects of data aggregation and security mechanisms on overall network performance. The average end-to-end packet delay, overall energy consumption and aggregation efficiency are considered for this analysis. This paper also looks into the effects of implementing hop-by-hop security and end-to-end security and justifies the need for end-to-end security in the WSN-satellite integrated networks.
|
Page generated in 0.2714 seconds