scholarly journals Worst Case Age of Information in Wireless Sensor Networks: A Multi-Access Channel

2020 ◽  
Vol 9 (3) ◽  
pp. 321-325 ◽  
Author(s):  
Mohammad Moltafet ◽  
Markus Leinonen ◽  
Marian Codreanu
2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Sangil Choi ◽  
Wooksik Lee ◽  
Teukseob Song ◽  
Jong-Hoon Youn

Neighbor discovery is a significant research topic in wireless sensor networks. After wireless sensor devices are deployed in specific areas, they attempt to determine neighbors within their communication range. This paper proposes a new Block design-based Asynchronous Neighbor Discovery protocol for sensor networks calledBAND. We borrow the concept of combinatorial block designs for neighbor discovery. First, we summarize a practical challenge and difficulty of using the original block designs. To address this challenge, we create a new block generation technique for neighbor discovery schedules and provide a mathematical proof of the proposed concept. A key aspect of the proposed protocol is that it combines two block designs in order to construct a new block for neighbor discovery. We analyze the worst-case neighbor discovery latency numerically between our protocol and some well-known protocols in the literature. Our protocol reveals that the worst-case latency is much lower than others. Finally, we evaluate the performance ofBANDand existing representative protocols through the simulation study. The results of our simulation study show that the average and maximum latency ofBANDis about 40% lower than that of existing protocols. Furthermore,BANDspends approximately 30% less energy than others during the neighbor discovery process.


2019 ◽  
Vol 7 (2) ◽  
pp. 7-16
Author(s):  
Poonam Mittal ◽  

Dynamic and cooperative nature of sensor nodes in Wireless Sensor Networks raises question on security. Various researchers work in this direction to spot malicious, selfish and compromised nodes. Various mechanisms followed are uniqueness of clustering, reputation system and an operation at specific nodes. LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round. Clustering process carried out in two stages takes the role of the reputation scheme and reveals specific operation at CH, IN and MNs beside their usual activities in cluster based wireless sensor networks. This paper mentioned the final structure of the security framework, corresponding attacks and defense mechanism of the model. It also discusses various security level processes of wireless sensor networks. Results implies that in a cluster-based protocol such as LEACH in which optimally 5% of the nodes are cluster heads it is likely that a significant portion of the network can be paralyzed or the entire network disabled, in the worst-case scenario, if these cluster heads are compromised. Our main contribution in this paper is our novel approach in maintaining trusted clusters through a trust-based decision-making cluster head election algorithm.


Author(s):  
Anthony Plummer ◽  
Mahmoud Taghizadeh ◽  
Subir Biswas

This chapter presents a history-based statistical channel access mechanism for enabling traffic prioritization in wireless sensor networks. Prioritized access is realized such that low priority non-real-time sensors can access channel bandwidth that is unused by high priority real-time traffic. The key idea is for the low priority sensor nodes to first observe and statistically model the channel usage pattern by the high priority traffic, then make advantageous probabilistic transmissions so that the non-priority traffic throughput is maximized while protecting the high-priority traffic from disruptions. The chapter details a practical whitespace measurement scheme and presents a channel history based prioritization protocol. The access mechanism is implemented in a TelosB mote-based sensor testbed in which the non-priority motes continually measure the RSSI to infer the channel usage pattern and probabilistically access the channel while different types of traffic are sent by high-priority TelosB motes.


Sign in / Sign up

Export Citation Format

Share Document