scholarly journals Minimized Delay with Reliability Guaranteed by Using Variable Width Tiered Structure Routing in WSNs

2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Jinhuan Zhang ◽  
Jun Long ◽  
Guihu Zhao ◽  
Hao Zhang

Data collection should take reliability and delay into consideration. To address these problems, a novel variable width tiered structure routing scheme named variable width tiered structure routing (VWTSR) is proposed. The proposed VWTSR scheme integrates two core phases, namely, circular tiers and cells partition, and distributed in-network aggregation. The key idea of VWTSR is to partition the network into circular tiers with different widths and each tier is further partitioned into cells. Those cells that do not interfere with each other could simultaneously finish data aggregation by broadcast and retransmission within each cell. Moreover, the tier width could meet the goal that when collecting nodes in outer layer finish transmission to parent collecting nodes in inner layer, the collecting nodes in inner layer just finish data aggregation, thus minimizing the latency while maintaining reliability for data collection. The problem is formulated as to minimize the delay under reliability constraint by controlling the system parameters. To demonstrate the effectiveness of the proposed scheme, extensive theoretical analysis and simulations are conducted to evaluate the performance of VWTSR. The analysis and simulations show that VWTSR leads to lower delay subject to reliability constraint than the existing scheme.

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Chang Xu ◽  
Xiaodong Shen ◽  
Liehuang Zhu ◽  
Yan Zhang

With the pervasiveness and increasing capability of smart devices, mobile crowdsensing has been applied in more and more practical scenarios and provides a more convenient solution with low costs for existing problems. In this paper, we consider an untrusted aggregator collecting a group of users’ data, in which personal private information may be contained. Most previous work either focuses on computing particular functions based on the sensing data or ignores the collusion attack between users and the aggregator. We design a new protocol to help the aggregator collect all the users’ raw data while resisting collusion attacks. Specifically, the bitwise XOR homomorphic functions and aggregate signature are explored, and a novel key system is designed to achieve collusion resistance. In our system, only the aggregator can decrypt the ciphertext. Theoretical analysis shows that our protocol can capture k-source anonymity. In addition, extensive experiments are conducted to demonstrate the feasibility and efficiency of our algorithms.


2019 ◽  
Vol 17 (4) ◽  
pp. 450-460
Author(s):  
Hai Liu ◽  
Zhenqiang Wu ◽  
Changgen Peng ◽  
Feng Tian ◽  
Laifeng Lu

Considering the untrusted server, differential privacy and local differential privacy has been used for privacy-preserving in data aggregation. Through our analysis, differential privacy and local differential privacy cannot achieve Nash equilibrium between privacy and utility for mobile service based multiuser collaboration, which is multiuser negotiating a desired privacy budget in a collaborative manner for privacy-preserving. To this end, we proposed a Privacy-Preserving Data Aggregation Framework (PPDAF) that reached Nash equilibrium between privacy and utility. Firstly, we presented an adaptive Gaussian mechanism satisfying Nash equilibrium between privacy and utility by multiplying expected utility factor with conditional filtering noise under expected privacy budget. Secondly, we constructed PPDAF using adaptive Gaussian mechanism based on negotiating privacy budget with heuristic obfuscation. Finally, our theoretical analysis and experimental evaluation showed that the PPDAF could achieve Nash equilibrium between privacy and utility. Furthermore, this framework can be extended to engineering instances in a data aggregation setting


2021 ◽  
Author(s):  
◽  
Micheal Albert Olinga

ABSTRACT Background: Epilepsy is a neurological condition, which affects the nervous system. It is usually diagnosed after a person has had a least two sutures that were not caused by some known medical condition like; Alcohol withdrawal, extremely low blood sugar, heart problems, or some other medical condition. Epilepsy can also be diagnosed after a seizure if a patient has a condition that places them at risk for having another seizure. Methodology: The study had both quantitative and qualitative methods of data collection like; data collection tools. The data was collected from 30 respondents who were especially epileptic clients in the catchment area of the whole Centre. Data aggregation, entry, and analysis were done using the Micro-soft excel tool. Results: The study showed that the majority of the respondents were not married (66.7%), majority of the respondents were below the age of 19 years (40%), also most of the respondents were not educated (40%), (10%) and (23.3%) blamed epilepsy on witchcraft and curse from God, (93.7%) have ever missed clinic day, (55%) had come alone to the clinic. Recommendations; therefore are that the concerned authority and well-wishers are called upon to take up the findings or conduct their study related to these problems to see the way forward. In conclusion, drug adherences, discrimination, low family social support, were the major factors affecting the management of epilepsy. These challenges would majorly be resolved through health education and counseling of the entire communities.


2020 ◽  
Vol 22 (2) ◽  
pp. 122-133
Author(s):  
Camila Maria Sitko

Context: In general, teachers and students have distorted views about the functioning of a scientific work. This research uses the episode of the historical construction of the Second Law of Movement and seven distorted views on the subject. Objectives: This work aims to exemplify the distorted views students can construct about scientific endeavour if a didactic approach that does not consider the history and philosophy of science is used. Design: Seven distorted views regarding scientific work are explained and, subsequently, exemplified from the episode in question, showing how this history is seen, in general, in textbooks, and by most teachers. Environment and participants: This is a theoretical analysis, not including participants. The materials used were primary and secondary bibliographic sources. Data collection and analysis: Seven distorted views on science, from the episode of the historical construction of the Second Law of Movement, were collected, and a historical-philosophical reflection was carried out on them. Results: Following the presentation of the views and examples, criticism and allusion to how this episode should be treated are offered. Conclusions: Throughout the text, as well as in its final considerations, relevant aspects to be worked on in the classroom are discussed, for a critical view of the construction of scientific knowledge.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2819 ◽  
Author(s):  
Yosra Zguira ◽  
Hervé Rivano ◽  
Aref Meddeb

Intelligent Transport Systems (ITS) are an essential part of the global world. They play a substantial role for facing many issues such as traffic jams, high accident rates, unhealthy lifestyles, air pollution, etc. Public bike sharing system is one part of ITS and can be used to collect data from mobiles devices. In this paper, we propose an efficient, “Internet of Bikes”, IoB-DTN routing protocol based on data aggregation which applies the Delay Tolerant Network (DTN) paradigm to Internet of Things (IoT) applications running data collection on urban bike sharing system based sensor network. We propose and evaluate three variants of IoB-DTN: IoB based on spatial aggregation (IoB-SA), IoB based on temporal aggregation (IoB-TA) and IoB based on spatiotemporal aggregation (IoB-STA). The simulation results show that the three variants offer the best performances regarding several metrics, comparing to IoB-DTN without aggregation and the low-power long-range technology, LoRa type. In an urban application, the choice of the type of which variant of IoB should be used depends on the sensed values.


2011 ◽  
Vol 120 ◽  
pp. 168-171
Author(s):  
Xiao Min Cheng ◽  
Cun Jie Liao ◽  
Zi Qing Ye

Data collection and processing of human faces are hot spots of reverse engineering. This paper studies the data collection of human faces, the pre-treatment of point clouds, and analyzes the error of data collection at the same time. Data collection mostly uses proper system parameters to get desired point clouds. Pretreatment of point clouds deletes the desultory points first, then merge the point clouds. Finally, analyze the errors that are caused in the process of data collection, mostly analyze the effects of equipment, ambient light, and system parameters on accuracy of data collection, then find the best treatment to get a desirable experimental result.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0260634
Author(s):  
Ahmed Salim ◽  
Ahmed Ismail ◽  
Walid Osamy ◽  
Ahmed M. Khedr

Compressive Sensing (CS) based data collection schemes are found to be effective in enhancing the data collection performance and lifetime of IoT based WSNs. However, they face major challenges related to key distribution and adversary attacks in hostile and complex network deployments. As a result, such schemes cannot effectively ensure the security of data. Towards the goal of providing high security and efficiency in data collection performance of IoT based WSNs, we propose a new security scheme that amalgamates the advantages of CS and Elliptic Curve Cryptography (ECC). We present an efficient algorithms to enhance the security and efficiency of CS based data collection in IoT-based WSNs. The proposed scheme operates in five main phases, namely Key Generation, CS-Key Exchange, Data Compression with CS Encryption, Data Aggregation and Encryption with ECC algorithm, and CS Key Re-generation. It considers the benefits of ECC as public key algorithm and CS as encryption and compression method to provide security as well as energy efficiency for cluster based WSNs. Also, it solves the CS- Encryption key distribution problem by introducing a new key sharing method that enables secure exchange of pseudo-random key between the BS and the nodes in a simple way. In addition, a new method is introduced to safeguard the CS scheme from potential security attacks. The efficiency of our proposed technique in terms of security, energy consumption and network lifetime is proved through simulation analysis.


Sign in / Sign up

Export Citation Format

Share Document