scholarly journals Efficient group-based discovery for wireless sensor networks

2017 ◽  
Vol 13 (7) ◽  
pp. 155014771771905 ◽  
Author(s):  
Pengpeng Chen ◽  
Ying Chen ◽  
Shouwan Gao ◽  
Qiang Niu ◽  
Jun Gu

Due to the combination of constrained power, low duty cycle, and high mobility, neighbor discovery is one of the most challenging problems in wireless sensor networks. Existing discovery designs can be divided into two types: pairwise-based and group-based. The former schemes suffer from high discovery delay, while the latter ones accelerate the discovery process but incur too much energy overhead, far from practical. In this article, we propose a novel efficient group-based discovery method based on relative distance, which makes a delicate trade-off between discovery delay and energy consumption. Instead of directly referring to the wake-up schedules of a whole group of nodes, efficient group-based discovery selectively recommends nodes that are most likely to be neighbors, in which the probability is calculated based on the nodes’ relative distance. Moreover, the sequence of received signal strengths are employed to estimate the relative distance for avoiding the effect of the node distribution. Extensive simulations are conducted to verify the effectiveness of the design. The results indicate that efficient group-based discovery statistically achieves a good trade-off between energy cost and discovery latency. Efficient group-based discovery also shows one order of magnitude reduction in discovery delay with a maximum of 6.5% increase in energy consumption compared with typical discovery methods.

Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3319 ◽  
Author(s):  
Liangxiong Wei ◽  
Weijie Sun ◽  
Haixiang Chen ◽  
Ping Yuan ◽  
Feng Yin ◽  
...  

With the quick development of Internet of Things (IoT), one of its important supporting technologies, i.e., wireless sensor networks (WSNs), gets much more attention. Neighbor discovery is an indispensable procedure in WSNs. The existing deterministic neighbor discovery algorithms in WSNs ensure that successful discovery can be obtained within a given period of time, but the average discovery delay is long. It is difficult to meet the need for rapid discovery in mobile low duty cycle environments. In addition, with the rapid development of IoT, the node densities of many WSNs greatly increase. In such scenarios, existing neighbor discovery methods fail to satisfy the requirement in terms of discovery latency under the condition of the same energy consumption. This paper proposes a group-based fast neighbor discovery algorithm (GBFA) to address the issues. By carrying neighbor information in beacon packet, the node knows in advance some potential neighbors. It selects more energy efficient potential neighbors and proactively makes nodes wake up to verify whether these potential neighbors are true neighbors, thereby speeding up neighbor discovery, improving energy utilization efficiency and decreasing network communication load. The evaluation results indicate that, compared with other methods, GBFA decreases the average discovery latency up to 10 . 58 % at the same energy budget.


Author(s):  
José-F. Martínez ◽  
Ana-B. García ◽  
Iván Corredor ◽  
Lourdes López ◽  
Vicente Hernández ◽  
...  

Author(s):  
V. O. Kerimov

Wireless sensor networks are widely used in many modern settings. In order to build substantial networks each sensor must be cheap. So it follows that, since resources of individual sensor are limited, there is a need to create protocols that would use them sparingly and evenly in order to maximize lifetime of the network. To reach this goal some useful self-organizing tree-based protocols were created that use different properties of the network nodes, such as number of children, number of hops from the ultimate sink, distance and remaining energy, to optimally select and reselect parent node in a network. However, there is also a challenge of providing security of the network. In this paper we propose a way of integrating a simple security method akin to iterative filtering into the protocol and discuss corresponding trade-off between attack prevention and increase of energy consumption.


Sign in / Sign up

Export Citation Format

Share Document