scholarly journals Reliability and Failure Rate Evaluation of Lifetime Extension Analysis of Ad Hoc and Wireless Sensor Networks

2020 ◽  
Vol 7 (3) ◽  
pp. 411-420
Author(s):  
Amir Majid
2020 ◽  
Vol 12 (6) ◽  
pp. 83-97
Author(s):  
Amir J. Majid

An Algorithm to extend sensor lifetime and energy is implemented for different scenarios of ad hoc and wireless sensor networks. The goal is to prolong the lifetimes of sensors, covering a number of targeted zones by creating subsets of sensors, in which each subset covers entirely the targeted zones. Probabilistic analysis is assumed in which each sensor covers one or more targets, according to their coverage failure probabilities. Case studies of different sensor subsets arrangements are considered such as load switching, variable target load demands as well as a perturbation in sensor planner locations.


2005 ◽  
Vol 1 (2) ◽  
pp. 245-252 ◽  
Author(s):  
P. Davis ◽  
A. Hasegawa ◽  
N. Kadowaki ◽  
S. Obana

We propose a method for managing the spontaneous organization of sensor activity in ad hoc wireless sensor systems. The wireless sensors exchange messages to coordinate responses to requests for sensing data, and to control the fraction of sensors which are active. This method can be used to manage a variety of sensor activities. In particular, it can be used for reducing the power consumption by battery operated devices when only low resolution sensing is required, thus increasing their operation lifetimes.


2018 ◽  
Vol 14 (11) ◽  
pp. 155014771881130 ◽  
Author(s):  
Jaanus Kaugerand ◽  
Johannes Ehala ◽  
Leo Mõtus ◽  
Jürgo-Sören Preden

This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. For example, assigning processing intervals of network nodes, defining validity and simultaneity requirements for data items, determining the size of memory required for buffering the data streams produced by ad hoc nodes and other relevant aspects. The data streams produced periodically and sometimes intermittently by sensor nodes arrive to the fusion nodes with variable delays, which results in sporadic temporal order of inputs. Using data from individual nodes in the order of arrival (i.e. freshest data first) does not, in all cases, yield the optimal results in terms of data temporal consistency and fusion accuracy. We propose time-selective data fusion strategy, which combines temporal alignment, temporal constraints and a method for computing delay of sensor readings, to allow fusion node to select the temporally compatible data from received streams. A real-world experiment (moving vehicles in urban environment) for validation of the strategy demonstrates significant improvement of the accuracy of fusion results.


2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sign in / Sign up

Export Citation Format

Share Document