scholarly journals An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

2022 ◽  
Vol 71 (2) ◽  
pp. 3821-3838
Author(s):  
Idrees Sarhan Kocher
2017 ◽  
Vol 14 (1) ◽  
pp. 146-150
Author(s):  
Xiaohui Wang ◽  
Tongqian Peng

Maximizing the network lifetime is one of design challenges for data transmission in wireless sensor networks (WSNs) which is caused by the energy sink-hole problem. Recent researches show the energy sink-hole problem can be overcome by balancing the sensor energy consumptions. The paper proposes a new energy-balanced transmission scheme for maximizing network lifetime in wireless sensor networks, which focused on the corona-based WSN only with two coronas and we simulate the network base on the different radius of coronas because experiments show that the lifetime of corona-based WSN using two coronas is optimum for maximizing lifetime in the free space environments. Experimental simulation shows that the design method maximizes lifetime more than 10% than the existing methods.


2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
X. Liu ◽  
X. Zhang ◽  
J. Yu ◽  
C. Fu

Wireless Sensor Networks (WSNs) are increasingly involved in many applications. However, communication overhead and energy efficiency of sensor nodes are the major concerns in WSNs. In addition, the broadcast communication mode of WSNs makes the network vulnerable to privacy disclosure when the sensor nodes are subject to malicious behaviours. Based on the abovementioned issues, we present a Queries Privacy Preserving mechanism for Data Aggregation (QPPDA) which may reduce energy consumption by allowing multiple queries to be aggregated into a single packet and preserve data privacy effectively by employing a privacy homomorphic encryption scheme. The performance evaluations obtained from the theoretical analysis and the experimental simulation show that our mechanism can reduce the communication overhead of the network and protect the private data from being compromised.


2014 ◽  
Vol 672-674 ◽  
pp. 1949-1953
Author(s):  
Bin Bin Yu ◽  
Liang Hu

In wireless sensor networks, raw data is just collected and stored as binary value in the relation databases. In the Internet of Things (IoT), it requires machine to understand these multi-sources heterogeneous data’s meanings in specific environment and the interoperable service to share these with other different machines. In order to address these issues, construction of content-aware model based on multi-sources heterogeneous data is necessary to be proposed in the paper, we discussed the IoT theory, new features and problems of the IoT data and based on semantic technology, we put forward the method of content-aware construction based on multi-sources heterogeneous data sensed in the IoT and explained in detail all parts of it. Finally, an experimental simulation platform was given to demonstrate the feasibility and validity of this method.


2020 ◽  
Vol 16 (11) ◽  
pp. 155014772097294
Author(s):  
Hong Zhang ◽  
Shigen Shen ◽  
Qiying Cao ◽  
Xiaojun Wu ◽  
Shaofeng Liu

Wireless sensor networks, as a multi-hop self-organized network system formed by wireless communication, are vulnerable to malware diffusion by breaking the data confidentiality and service availability, owing to their low configuration and weak defense mechanism. To reveal the rules of malware diffusion in the really deployed wireless sensor networks, we propose a model called Malware Diffusion Based on Cellular Automaton to describe the dynamics of malware diffusion based on cellular automaton. According to the model, we first analyze and obtain the differential equations, which can reflect the various state dynamics of sensor nodes with cellular automaton. Then, we attain the equilibrium points of the model Malware Diffusion Based on Cellular Automaton to determine the threshold for whether malware will diffuse or die out in wireless sensor networks. Furthermore, we compute the basic regeneration number of the model Malware Diffusion Based on Cellular Automaton using the next-generation matrix and prove the stability of the equilibrium points. Finally, via experimental simulation, we verify the effectiveness of the model Malware Diffusion Based on Cellular Automaton, which can provide administrators with the theoretical guidance on suppressing malware diffusion in wireless sensor networks.


2021 ◽  
Vol 3 (1) ◽  
pp. 31-39
Author(s):  
Bhalaji N

The biggest challenges faced by wireless sensor networks (WSNs) are the network lifetime and consumption of energy. To reduce the amount of energy used by WSNs, high quality clustering proves to be a crucial approach. There are multiple criteria that need to be evaluated depending on the cluster’s quality and incorporating all these criteria will prove to be cumbersome process, leading to high-quality clustering. Hence, in this paper we propose an algorithm that is used to produce high quality clusters. Cluster quality is set as the deciding criterion to determine the quality of the clusters thereby categorizing them as intra- and inter-clusters based on their distances to eliminate error rate. Using fuzzy logic, the optimal cluster head is chosen. Similarly, based on the maximum and minimum distance between the nodes, the maximum and minimum energy present in every cluster is determined. The major advantages of the proposed methodology are large-scale networks with large nodes count, better scalability, independence of key CHs, low error rate and high reliability. Using internal and external criteria, the validity of the clustering quality can be measured. Experimental simulation shows that the proposed methodology will be useful in improving the network lifetime and energy consumption. Hence the proposed node further enhances the death of the last node and first node when compared using other methodology.


2021 ◽  
Vol 10 (4) ◽  
pp. 1-13
Author(s):  
Idrees Sarhan Kocher

Wireless Sensor Networks (WSN) is now an evolving technology and has a broad range of applications, such as battlefield surveillance, traffic surveillance, detection of forest fires, detection of floods, etc. The communication nature of the wireless sensor network is unprotected and dangerous due to deployment in hostile environments, restricted resources, an automatic nature, and untrusted media for broadcast transmission. For wireless sensor networks, several routing protocols have been suggested, but none of them have been developed with protection as a target. The majority function in routing algorithms currently in place for sensor networks optimize a restricted capacities in sensor nodes and the application based design of WSNs. A WSNs, however, are exposed to a number of possible threats that impede the network's regular activity. Thus, there is a strong need to provide the routing protocols of the OSI structure layer with a safe mechanism to prevent an attacker from obstructing it.   The well-known attacks against all layers are discussed in this systematic roadmap, and debilitating attacks against routing protocols are analyzed and defined in particular. Several suggested attack countermeasures, design considerations and paper contributions are also included in the routing protocols. The assertion of the study is that WSN routing protocols must be built with protection in mind, and this is the only efficient solution in WSNs for safe routing. The aim of this paper is also to provide problems, attacks and countermeasures related to protection. Finally, it is hoped that this roadmap would inspire potential researchers to come up with smarter and better protection measures and make their network safer. The first such research analysis of secure routing protocols in WSNs is this roadmap study.


Sign in / Sign up

Export Citation Format

Share Document