scholarly journals The self-protection problem in wireless sensor networks

2007 ◽  
Vol 3 (4) ◽  
pp. 20 ◽  
Author(s):  
Dan Wang ◽  
Qian Zhang ◽  
Jiangchuan Liu
Author(s):  
Maytham Safar ◽  
Hasan Al-Hamadi ◽  
Dariush Ebrahimi

Wireless sensor networks (WSN) have emerged in many applications as a platform to collect data and monitor a specified area with minimal human intervention. The initial deployment of WSN sensors forms a network that consists of randomly distributed devices/nodes in a known space. Advancements have been made in low-power micro-electronic circuits, which have allowed WSN to be a feasible platform for many applications. However, there are two major concerns that govern the efficiency, availability, and functionality of the network—power consumption and fault tolerance. This paper introduces a new algorithm called Power Efficient Cluster Algorithm (PECA). The proposed algorithm reduces the power consumption required to setup the network. This is accomplished by effectively reducing the total number of radio transmission required in the network setup (deployment) phase. As a fault tolerance approach, the algorithm stores information about each node for easier recovery of the network should any node fail. The proposed algorithm is compared with the Self Organizing Sensor (SOS) algorithm; results show that PECA consumes significantly less power than SOS.


2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Jesús M. T. Portocarrero ◽  
Flávia C. Delicato ◽  
Paulo F. Pires ◽  
Nadia Gámez ◽  
Lidia Fuentes ◽  
...  

Autonomic computing (AC) is a promising approach to meet basic requirements in the design of wireless sensor networks (WSNs), and its principles can be applied to efficiently manage nodes operation and optimize network resources. Middleware for WSNs supports the implementation and basic operation of such networks. In this systematic literature review (SLR) we aim to provide an overview of existing WSN middleware systems that address autonomic properties. The main goal is to identify which development approaches of AC are used for designing WSN middleware system, which allow the self-management of WSN. Another goal is finding out which interactions and behavior can be automated in WSN components. We drew the following main conclusions from the SLR results: (i) the selected studies address WSN concerns according to the self-*properties of AC, namely, self-configuration, self-healing, self-optimization, and self-protection; (ii) the selected studies use different approaches for managing the dynamic behavior of middleware systems for WSN, such as policy-based reasoning, context-based reasoning, feedback control loops, mobile agents, model transformations, and code generation. Finally, we identified a lack of comprehensive system architecture designs that support the autonomy of sensor networking.


Faraway sensor kind out breeze up obviously practical reaction for the testing troubles in different tiers, as an instance, ordinary checking, enterprise and navy packages. at ease structure customs should be obliged remote sensor systems, wherein as it has a few detainment in asset use. Sensor focus focuses are battery controlled, growing the self-enough life of a wireless Sensor Networks in a trying out improvement trouble. anyway meanwhile the rate for gobbling up noteworthiness for sensor is excessive. to vanquish this difficulty, encryption and keying strategy is applied, so that it will lessen the wide variety for transmissions used to plan the brand new key when antique key is hacked. Identified records are encoded making use of RC4 encryption estimation in this correspondence structure. in this paper we middle round encryption and keying systems that is a promising other preference to lower the structure exertion. The rekeying convention understands customer express statistics, as an example, region records as a key seed. This gadget consists of operational modes. In first gadget, each inside monitors its one – bob associates downstream focus focuses. So we reveal the entire technique to streamline the transmission of correspondence shape amidst key time through blended and keying framework.


Sign in / Sign up

Export Citation Format

Share Document