31 |
Duality and Genetic Algorithms for the Worst-Case-Coverage Deployment Problem in Wireless Sensor NetworksPeng, Yi-yang 21 July 2005 (has links)
In this thesis, we propose and evaluate algorithms for solving the worst-case-coverage deployment problem in ad-hoc wireless sensor networks. The worst-case-coverage deployment problem is to deploy additional sensors in the wireless sensor field to optimize the worst-case coverage. We derive a duality theorem that reveals the close relation between the maximum breach path and the minimum Delaunay cut. The duality theorem is similar to the well-known max-flow-min-cut theorem in the field of network optimization. The major difference lies in the fact that the object function we study in this paper is nonlinear rather than linear. Based on the duality theorem, we propose an efficient dual algorithm to solve the worst-case-coverage deployment problem. In addition, we propose a genetic algorithm for deploying a number of additional sensors simultaneously. We use analytical proofs and simulation results to justify the usage of the proposed approaches.
|
32 |
The Baseband Signal Processing and Circuit Design for 2.45GHz Mode of the IEEE802.15.4 Low Rate-Wireless Personal Area Network (LR-WPAN)Liu, Tung-yu 11 August 2005 (has links)
The baseband part of IEEE 802.15.4 operated in 2.45 GHz mode is designed and implemented in this essay. First, the features of IEEE 802.15.4 WPAN(Wireless Personal Area Network), PHY layer and MAC Layer are introduced. Then the algorithm and VHDL of the baseband part of transceiver are designed and verified by FPGA board and logical analyzer.
|
33 |
Connectivity improvement scheme in wireless sensor networkChen, Chi-chang 17 July 2007 (has links)
Under the current environment of Wireless Senor Networks (WSN), security is always one of the topics that everyone discussed about. Because of the limitations of WSN¡¦s unique resource, this results in the security of WSN needs to especially consider the calculating ability, memory capacity, characteristics of wireless communication, limited battery power supply, etc. Random key pre-distribution (RKP) is the one of the key distribution that is developed for the sake of safe communication of WSN, the characteristic of RKP is that there must have at least one common pre-distributed key in the two independent nodes in order to compose a pair-wise key, so that the safe communication can be carried out. However, if the nodes are distributed in the loose environment, the numbers of neighbors would be lower due to the decrease of average node degree. Then the connectivity of the entire network would decrease because it is not easy for the RKP to establish the pair-wise key. This paper would set the improvement of the entire network¡¦s connectivity under the loose environment as the starting point to extend the RKP-DE that only considers one-hop neighbor information, and reverse the flow path of RKP-DE and propose RKP- DEinverse from the viewpoint of two-hop neighbor information. Then RKP-DE and RKP- DEinverse are merged and become a new method ¡V RKP- DEtwo_hop, so as to try to prove that we can raise the connectivity of the whole network effectively.
|
34 |
The Improved Broadcast Authentication Schemes in Wireless Sensor NetworksYang, Li-Wei 15 July 2008 (has links)
In the environment of wireless sensor network, while one node want to send a message to another node, the most natural way is used broadcasting to distribute the message to the whole network. In the other words, as long as one node sends messages to the other node, its neighbor nodes can also listen to these messages, and then receive them. The advantage of broadcast networks is that can efficiently distribute data to multiple receivers. However, it has some drawbacks. A sensor network may be deployed in hostile environment where there are malicious attacks. The malicious attacker can send false messages to his neighbor nodes, and then rely on these neighbor nodes to distribute over the network. So if there are not any schemes of the security authentication in the message when a node wants to use broadcast, everyone can impersonate the sender and broadcast false messages. We call this a packet injection attack. So security is a main challenge in broadcast network. In order to authenticate a broadcast message¡Ait would conform to two conditions. First, insure that the data is transmitted from the claimed source. Second, the messages are not be modified en route. TESLA has been proposed to provide such services for sensor networks¡Ait mainly use time synchronization and delay disclosure key to protect encryption key¡CHowever, this scheme still has some drawbacks, so we propose some schemes to modify TESLA in this paper, and we will show these schemes can achieve better performance than previous ones.
|
35 |
MCCA: The Novel Ways for Multiple Cluster Collision Avoidance in TDMA Cluster-based Wireless Sensor NetworksTsai, Ping-cheng 24 July 2008 (has links)
Wireless sensor networks typically consist of a significant number of low-cost sensor nodes which can collaborate among each other to execute a wide range of applications, such as environmental and health monitoring, intrusion detection, etc. Basically, sensor nodes are mainly battery-powered and have a limited amount of energy to spend, thereby they are not likely to be recharged or replenished after being deployed in an inaccessible sensed environment. As a result, in the past decade, power saving has become a critical issue for the design of a media access control (MAC) protocol in wireless sensor networks. By incorporating power-saving mechanism into MAC, we expect to maximize the lifetime of a sensor network. Intuitively, a large amount of research tends to make use of the TDMA protocol because it has inherently more favorable characteristics when compared to the CSMA protocol, that is, sensor nodes only need to wake up to transmit or receive data at its allocated time slots, and other time slots they can go into sleep mode. By doing so, it can reduce power consumption. However, in this master thesis, we found that there exists a rather acute problem, called the Multiple-Cluster Collision (MCC) problem, in the TDMA cluster-based protocol that will degrade the system performance drastically. Therefore, in this thesis, we propose the approach, called Multiple Cluster Collision Problem (MCCP), to perfectly eliminate the MCC problem by sensor nodes. Finally, we will compare our approach with SRSA, proposed by Tao WU et al., to show that the performance of our approach outperforms SRSA in terms of collision reduction, throughput and so on.
|
36 |
Lifetime Maximization Schemes with Optimal Power Control for Multimedia Traffic in Wireless Sensor NetworksLu, Y-Jen 23 June 2009 (has links)
Power saving for extending session lifetime is an important research subject in wireless sensor networks (WSNs). Recognizing the fact that Quality of Service can be deteriorated by insufficient transmit power, this work studies how to minimize power consumption while achieve a satisfactory QoS of data streams in WSNs. A cross-layer routing scheme is proposed to maximize session lifetime by adjusting individual transmit power on intermediate nodes. The thesis is divided into two major parts for analyzing our proposition. In the first part, we propose an efficient routing scheme with optimal power management and on-demand quality control for WSNs. When source node issues a QoS provision for route discovery, an adjustment of transmit power is computed for each pass-by node by taking into its individual wireless link account. Then, an optimal route associated with lowest power consumption and consistent QoS can be selected among all of the candidate routes. In the second part, by following the definition of QoS criterion in the first part, we further consider the problem of how to balance the needs on constraining end-to-end quality and prolonging lifetime in an established route. The problem can be interpreted as a non-linear optimization paradigm, which is then shown to be a max-min composite formulation. To solve the problem, we propose two methods, (1) route-associated power management (RAPM), and (2) link-associated power management (LAPM). Considering computation-restricted sensor nodes, the RAPM scheme is two-fold simplification; not only it can reduce power computation, but it also quickly determines the longest lifetime and proper transmit power for nodes. On the other hand, if computational cost is not a major concern in a sink node, the LAPM algorithm is more suitable than RAPM to solve the lifetime maximization problem, in terms of accuracy. Finally, we analyze the performance of these two methods. The results demonstrate that the LAPM scheme is very comparable to a heuristic approach.
|
37 |
A Heuristic Algorithm for Maximizing Lifetime in Sensor NetworkWu, De-kai 15 July 2009 (has links)
Wireless sensor network has applications in environmental surveillance,
healthcare, and military operations. Because the energy of sensor nodes is
limited and nodes are unable to supply energy in real time, the purpose of
many researches is to prolong lifetime of sensor network. Lifetime is times
that the sink can collect data from all sensor nodes. When a user proposes
a query, then the sink gathers data from all sensor nodes.
The problem defined in the previous research is given a sensor network
and residual energy of each node, and the energy consumption of transmitting
a unit message between two nodes. Then this problem is to find a directed
tree that maximize minimum residual energy. In this thesis, we define a new
problem that given a sensor network and residual energy of each node, and the
energy consumption of transmitting a unit message between two nodes. Then
our problem is to find a path of each node, which maximize minimum residual
energy. We prove this problem is NP-complete. We propose a heuristic
algorithm and a similar heuristic algorithm for this problem.
|
38 |
The Path Adjustment of Load-balance Directed Diffusion in Wireless Sensor NetworksChen, Tsung-han 24 July 2009 (has links)
none
|
39 |
Wind energy harvesting for bridge health monitoringMcEvoy, Travis Kyle 11 July 2011 (has links)
The work discussed in this thesis provides a review of pertinent literature, a design methodology, analytical model, concept generation and development, and conclusions about energy harvesting to provide long-term power for bridge health monitoring. The methodology gives structure for acquiring information and parameters to create effective energy harvesters. The methodology is used to create a wind energy harvester to provide long-term power to a wireless communication network. An analytical model is developed so the system can be scaled for different aspects of the network. A proof of concept is constructed to test the methodology's effectiveness, and validate the feasibility and analytical model. / text
|
40 |
Energy Saving Methods in Wireless Sensor NetworksJAWAD ALI, SYED, ROY, PARTHA January 2008 (has links)
To predict the lifetime of wireless sensor networks before their installation is an important concern. The IEEE 802.15.4 standard is specifically meant to support long battery life time; still there are some precautions to be taken by which a sensor network system application based on the standard can be made to run for longer time periods. This thesis defines a holistic approach to the problem of energy consumption in sensor networks and suggests a choice of node architecture, network structure and routing algorithm to support energy saving in the network. The idea and thrust of the thesis is that stand-alone measures such as selecting a low-power microcontroller with embedded transceiver will not alone be sufficient to achieve energy saving over the entire network. A comprehensive design study with energy saving as a primary task must be made. Focus given on the design objectives needs to look at different aspects – application code, network configuration code, routing algorithms etc to come up with an energy efficient network.
|
Page generated in 0.0376 seconds