Results 1 - 10
of
96
GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks
- ACM Wireless Networks (WINET
"... Although data forwarding algorithms and protocols have been among the rst set of issues explored in sensor networking, how to reliably deliver sensing data through a vast eld of small, vulnerable sensors remains a research challenge. In this paper we present GRAdient Broadcast (GRAB), a new set of ..."
Abstract
-
Cited by 169 (5 self)
- Add to MetaCart
Although data forwarding algorithms and protocols have been among the rst set of issues explored in sensor networking, how to reliably deliver sensing data through a vast eld of small, vulnerable sensors remains a research challenge. In this paper we present GRAdient Broadcast (GRAB), a new set of mechanisms and protocols which is designed specifically for robust data delivery in face of unreliable nodes and fallible wireless links. Similar to previous work [13, 14], GRAB builds and maintains a cost eld, providing each sensor the direction to forward sensing data. Dierent from all the previous approaches, however, GRAB forwards data along a band of interleaved mesh from each source to the receiver. GRAB controls the width of the band by the amount of credit carried in each data message, allowing the sender to adjust the robustness of data delivery. GRAB design harnesses the advantage of large scale and relies on the collective eorts of multiple nodes to deliver data, without dependency on any individual ones. We have evaluated the GRAB performance through both analysis and extensive simulation. Our analysis shows quantitatively the advantage of interleaved mesh over multiple parallel paths. Our simulation further con rms the analysis results and shows that GRAB can successfully deliver over 90% of packets with relatively low energy cost, even under the adverse conditions of 30% node failures compounded with 15% link message losses.
MMSPEED: Multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks
- IEEE Trans. on Mobile Computing
, 2006
"... Abstract—In this paper, we present a novel packet delivery mechanism called Multi-Path and Multi-SPEED Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor networks. The QoS provisioning is performed in two quality domains, namely, timeliness and reliability. Multiple QoS le ..."
Abstract
-
Cited by 140 (0 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we present a novel packet delivery mechanism called Multi-Path and Multi-SPEED Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor networks. The QoS provisioning is performed in two quality domains, namely, timeliness and reliability. Multiple QoS levels are provided in the timeliness domain by guaranteeing multiple packet delivery speed options. In the reliability domain, various reliability requirements are supported by probabilistic multipath forwarding. These mechanisms for QoS provisioning are realized in a localized way without global network information by employing localized geographic packet forwarding augmented with dynamic compensation, which compensates for local decision inaccuracies as a packet travels towards its destination. This way, MMSPEED can guarantee end-to-end requirements in a localized way, which is desirable for scalability and adaptability to large scale dynamic sensor networks. Simulation results show that MMSPEED provides QoS differentiation in both reliability and timeliness domains and, as a result, significantly improves the effective capacity of a sensor network in terms of number of flows that meet both reliability and timeliness requirements up to 50 percent (12 flows versus 18 flows).
Recent and Emerging Topics in Wireless Industrial Communications: A Selection
, 2007
"... In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systemsforwirelessindustrialcommunications.Wehaveselected topicsthathaveeitheremergedashottopicsintheindustrial communicationscommunityinthelastfewyears(likewireless sensornetworks),orwhi ..."
Abstract
-
Cited by 96 (1 self)
- Add to MetaCart
(Show Context)
In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systemsforwirelessindustrialcommunications.Wehaveselected topicsthathaveeitheremergedashottopicsintheindustrial communicationscommunityinthelastfewyears(likewireless sensornetworks),orwhichcouldbeworthwhileresearchtopicsin thenextfewyears(forexamplecooperativediversitytechniques for error control, cognitive radio/opportunistic spectrum access for mitigation of external interferences).
A survey of multimedia streaming in wireless sensor networks
- IEEE Communications Survey & Tutorials
, 2008
"... Abstract—A wireless sensor network with multimedia capa-bilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture video of events of interest. In this survey, we focus on the video encoding at the video sensors and the real-ti ..."
Abstract
-
Cited by 60 (2 self)
- Add to MetaCart
(Show Context)
Abstract—A wireless sensor network with multimedia capa-bilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture video of events of interest. In this survey, we focus on the video encoding at the video sensors and the real-time transport of the encoded video to a base station. Real-time video streams have stringent requirements for end-to-end delay and loss during network transport. In this survey, we categorize the requirements of multimedia traffic at each layer of the network protocol stack and further classify the mechanisms that have been proposed for multimedia streaming in wireless sensor networks at each layer of the stack. Specifically, we consider the mechanisms operating at the application, transport, network, and MAC layers. We also review existing cross-layer approaches and propose a few possible cross-layer solutions to optimize the performance of a given wireless sensor network for multimedia streaming applications. Index Terms—Cross-layer mechanisms, medium access con-trol, multimedia, video streaming, wireless sensor networks. I.
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
- MOBIHOC'07
, 2007
"... Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node rep ..."
Abstract
-
Cited by 46 (6 self)
- Add to MetaCart
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol that is to be used in resource constrained environment such as a sensor network. Further, they are vulnerable to specific adversary models introduced in this paper. The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks and we show that it is completely satisfactory with respect to the requirements. Extensive simulations also show that our protocol is highly efficient in communication, memory, and computation, that it sets out an improved attack detection probability compared to the best solutions in the literature, and that it is resistant to the new kind of attacks we introduce in this paper, while other solutions are not.
Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks
- in Proc. of the IEEE Infocom
, 2005
"... Abstract — In this paper, we present a novel packet delivery ..."
Abstract
-
Cited by 44 (0 self)
- Add to MetaCart
(Show Context)
Abstract — In this paper, we present a novel packet delivery
Detection of denial-of-message attacks on sensor network broadcasts
- in Proceedings of IEEE Symposium on Security and Privacy
, 2005
"... So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some sensor nodes might be adversarial. In these environments, malicious sensor nodes can deprive other nodes from receiving a broa ..."
Abstract
-
Cited by 43 (2 self)
- Add to MetaCart
(Show Context)
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some sensor nodes might be adversarial. In these environments, malicious sensor nodes can deprive other nodes from receiving a broadcast message. We call this attack a Denial-of-Message Attack (DoM). In this paper, we model and analyze this attack, and present countermeasures. We present SIS, a Secure Implicit Sampling scheme that permits a broadcasting base station to probabilistically detect the failure of nodes to receive its broadcast, even if these failures result from an attacker motivated to induce these failures undetectably. SIS works by eliciting authenticated acknowledgments from a subset of nodes per broadcast, where the subset is unpredictable to the attacker and tunable so as to mitigate acknowledgment implosion on the base station. We use a game-theoretic approach to evaluate this scheme in the face of an optimal attacker that attempts to maximize the number of nodes it denies the broadcast while remaining undetected by the base station, and show that SIS significantly constrains such an attacker even in sensor networks exhibiting high intrinsic loss rates. We also discuss extensions that permit more targeted detection capabilities. 1.
Information Assurance in Sensor Networks
- In Proceedings of the ACM Conference on Wireless Sensor Networks and Applications (WSNA
, 2003
"... Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance for the user. Information Assurance is an ability to disseminate different information at different assurance levels to th ..."
Abstract
-
Cited by 29 (1 self)
- Add to MetaCart
(Show Context)
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance for the user. Information Assurance is an ability to disseminate different information at different assurance levels to the end-user. The assurance level is determined by the criticality of the sensed phenomenon. Thus, information assurance capability allows a sensor network to deliver critical information with high assurance albeit potentially at a higher cost, while saving energy by delivering less important information at a lower assurance level.
Design and Analysis of Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks
- In ACM SIGMOBILE Mobile Computing and Communications Review
, 2004
"... Sensor networks have many potential applications in biology, physics, medi-cine, and the military. One major challenge in sensor networks is to maximize network life under the constraint of limited power supply. The paper addresses energy-efficiency in the context of routing and data gathering. A ne ..."
Abstract
-
Cited by 24 (1 self)
- Add to MetaCart
Sensor networks have many potential applications in biology, physics, medi-cine, and the military. One major challenge in sensor networks is to maximize network life under the constraint of limited power supply. The paper addresses energy-efficiency in the context of routing and data gathering. A new protocol is proposed: Hybrid Indirect Transmission (HIT). HIT is based on a hybrid ar-chitecture that consists of one or more clusters, each of which is based on mul-tiple, multi-hop indirect transmissions. In order to minimize both energy con-sumption and network delay, parallel transmissions are used both among mul-tiple clusters and within a cluster. This is made possible by having each sensor independently compute a medium access controlling TDMA schedule. The com-putation within each sensor is intelligent yet simple. Formal analysis shows that it requires O(n) space and O(nu logn) time complexities, and O(1) setup mes-sages prior to the computation, where n is the total number of sensors. HIT does not require sensor nodes with CDMA capability, or the remote base sta-tion to compute a data gathering schedule. Performance is evaluated by simu-lating and comparing HIT with three other existing protocols, including Low
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
"... Abstract- Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within ..."
Abstract
-
Cited by 18 (11 self)
- Add to MetaCart
(Show Context)
Abstract- Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the use of fault tolerance mechanisms through redundancy improves query reliability in the presence of unreliable wireless communication and sensor faults, it could cause the energy of the system to be quickly depleted. Therefore, there is an inherent tradeoff between query reliability vs. energy consumption in query-based wireless sensor systems. In this paper, we develop adaptive fault tolerant quality of service (QoS) control algorithms based on hop-by-hop data delivery utilizing “source ” and “path ” redundancy, with the goal to satisfy application QoS requirements while prolonging the lifetime of the sensor system. We develop a mathematical model for the lifetime of the sensor system as a function of system parameters including the “source ” and “path ” redundancy levels utilized. We discover that there exists optimal “source ” and “path ” redundancy under which the lifetime of the system is maximized while satisfying application QoS requirements. Numerical data are presented and validated through extensive simulation, with physical interpretations given, to demonstrate the feasibility of our algorithm design.