Forthcoming articles

 


International Journal of Sensor Networks

 

These articles have been peer-reviewed and accepted for publication in IJSNet, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJSNet are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Sensor Networks (65 papers in press)

 

Regular Issues

 

  • Recent Advances in Wireless Sensor Networks with Environmental Energy Harvesting
    by Lei Shu, Wanjiun Liao, Jaime Lloret, Lei Wang 

  • BEAM: Branch-based Efficient and Adaptive Multicast for Wireless Sensor Networks   Order a copy of this article
    by Daehee Kim, Sejun Song, Baek-Young Choi 
    Abstract: Multicast has been largely used for one-to-many distribution in Wireless Sensor Networks (WSNs). However, existing multicast protocols have various overhead issues such as large forwarding states, control messages, packet header sizes, computation time, and energy consumption. In this paper, we propose a resilient and efficient branch-based multicast protocol, BEAM that reduces forwarding states and control messages by building efficient multicast paths on-demand using branch-based membership establishment, and that efficiently decreases packet header and computation overhead using branch-based data forwarding. Furthermore, for long-lived WSNs, BEAM resiliently keeps maintaining efficient multicast path with low overhead on continuous membership establishments based on quality of branches. Extensive evaluation results show that BEAM has less overhead complexity, packet overhead by 40%, and energy consumption by 30% than existing stateless multicast protocols.
    Keywords: Wireless Sensor Network; Branch-Based Multicast; Geographic Multicast; Source Multicast; Energy Efficient Multicast; Green Sensor Network.
    DOI: 10.1504/IJSNET.2015.10001256
     
  • A Novel Rumor Propagation Model on Social Networks   Order a copy of this article
    by Ailian Wang, Weili Wu, Junjie Chen 
    Abstract: In information age, the malevolent spreading of rumors on social networks put forward a new challenge to the security of network and society, it's extremely important to study the inherent laws of rumor spreading in online social networks and propose effective control strategies for rumors. In this paper, based on cellular automaton model, we propose a new rumor spreading model. We first show the propagation characteristics of online social networks rumors spread. Then experimental simulation is carried out under periodic boundary constraints in the process of rumor spread, and the result is compared with real data. In addition, the immunization strategy to suppress the rumor spreading is analyzed with detailed scenarios. The results show that the new model is indeed able to characterize the propagation behavior on online social networks.
    Keywords: Cellular automaton; Social network; Cellular state; Rumor spreading model; Immunization Strategy.
    DOI: 10.1504/IJSNET.2016.10001227
     
  • A Correlation-based Coverage Aware and Energy Balanced Probabilistic Flooding Algorithm   Order a copy of this article
    by Jianping Wang, Rong Huihui, Wei Sun, Qiyue Li 
    Abstract: Aiming at the costly explicit and implicit acknowledgements (ACKs) and the serious energy imbalance of the existing flooding algorithm, a correlation-based coverage aware and energy balanced probabilistic flooding algorithm (CCEP) is proposed in this paper. CCEP distinguishes previous flooding algorithms with three features: (1) it exploits the link correlation between neighbors; the one-hop neighbors that have high link correlation are assigned to an aggregate explicit or implicit acknowledgement (aggregate ACK), thus effectively ameliorates the ACK implosion problem and saves energy on both data transmit and ACKs; (2) it balances the residual energy of sensor nodes; (3) it achieves target reliability and energy effi-ciency by tracking real-time aggregate ACKs and probabilistically deciding whether or not to retransmit a packet. The simulation results reveal that CCEP saves more than 50% energy on explicit and implicit ACKs in most cases while achieving target reliability; CCEP simultaneously reduces network variance of residual energy, thus prolonging the network lifetime.
    Keywords: Sensor networks; Link correlation; Probabilistic flooding; Target reliability; Energy balance; Coverage aware.
    DOI: 10.1504/IJSNET.2016.10001360
     
  • The Extra-Bit Technique for Reducing Idle Listening in Data Collection   Order a copy of this article
    by Thomas Erlebach, Aram Rasul 
    Abstract: Data collection is one of the predominant operations in wireless sensor networks. This paper focuses on the problem of efficient data collection in a setting where some nodes may not possess data each time data is collected. In that case, idle listening slots may occur, which lead to a waste of energy and an increase in latency. To alleviate these problems, successive-slot schedules were proposed by Zhao and Tang (Infocom 2011). In this paper, we introduce a so-called extra-bit technique to reduce idle listening further. Each packet includes an extra bit that informs the receiver whether further data packets will follow or not. The extra-bit technique leads to significantly reduced idle listening and improved latency in many cases. We prove that every successive-slot schedule is also an extra-bit schedule. We then consider the special case of linear networks and prove that the optimal length of a successive-slot schedule (or extra-bit schedule) is 4N-6 time slots, where N >= 3 is the number of nodes excluding the sink. Furthermore, we determine the optimal schedule length for balanced multi-chains. We then consider the setting where two frequencies (channels) can be used for transmission and determine the optimal schedule length for chains and balanced multi-chains in that case as well. Finally, the proposed extra-bit technique is compared with the successive-slot technique with respect to the expected amount of idle listening, and it is shown that the extra-bit technique reduces idle listening substantially.rn
    Keywords: Wireless Sensor Network; Transmission Scheduling; Oblivious Schedule; Extra-Bit Schedule; Successive-Slot Schedule.
    DOI: 10.1504/IJSNET.2016.10001535
     
  • A Novel Computational Geometry Based Node Deployment Scheme in 3-D Wireless Sensor Network   Order a copy of this article
    by Niharika Anand 
    Abstract: Deployment in Wireless Sensor Network (WSN) is an important aspect and depends on the application, the WSN is designed for. In this research, a deterministic approach for sensor deployment in three- dimensional (3- D) surface has been proposed, in order to maximize the coverage. For this purpose sectoring of the terrain approach is utilized which is based on the Voronoi Diagram and then the Delaunay Triangulation is performed on the sectors to establish the connectivity of the deployed nodes. The basic idea is to give a deployment technique that works for the 3-D terrain. The traditional Voronoi Diagram algorithm is modified for sectoring the terrain and the simulated results validate the proposed algorithm. The performance of the proposed algorithm is compared with other deployment techniques like Territorial Predator Scent Marking Algorithm (TPSMA) and random deployment on the basis of coverage ratio and uniformity and comparison show the enhanced result as compared to other techniques.
    Keywords: Voronoi Diagrams; Delaunay Triangulation; Wireless Sensor Network (WSN).
    DOI: 10.1504/IJSNET.2016.10001538
     
  • EGL: Efficient Geometry-based Localization in Wireless Sensor Networks   Order a copy of this article
    by Ali Sayyed, Gustavo Medeiros De Araujo, Leandro Buss Becker 
    Abstract: Localization of sensor nodes is one of the most challenging issues in wireless sensor networks. Position information of nodes helps in effective coverage, routing, data collection, target tracking and event detection. Several approaches have been proposed in the literature for localization of randomly deployed sensor nodes, including range-based, range-free and mobile beacon based techniques. This paper describes a localization scheme using a mobile node (UAV) for efficient location estimation of the sensor nodes. UAV equipped with a GPS unit, scan the sensing field while broadcasting its current position periodically. The sensor nodes receive UAV messages, find three boundary points on it communication circle and then with the help of simple geometry rules estimate their locations. The scheme does not require extra hardware or data communication and does not require the ordinary sensor nodes to spend energy on any interaction with neighboring nodes. Several enhancements, including beacon scheduling, UAV Speed selection, detection and correction of boundary points errors, are explained for performance and efficiency improvement. This scheme is accurate and efficient enough to tolerate obstacles and only requires broadcasting of beacon messages by the mobile node. The performance of the proposed scheme has been evaluated by simulation using Omnet++. Obtained results show that localization accuracy can be adjusted by properly selecting UAV speed and beacon interval along with the UAV scan pattern.
    Keywords: wireless sensor networks; mobility; localization; positioning; geometry; mobile node; UAV.
    DOI: 10.1504/IJSNET.2016.10001280
     
  • Joint Spatial-Temporal Access Scheme of Multi-hop Cognitive Radio Sensor Networks   Order a copy of this article
    by Chi Xu, Meng Zheng, Wei Liang, Haibin Yu 
    Abstract: This paper investigates a novel channel access scheme for delay-sensitive multi-hop cognitive radio sensor networks (CRSNs) employing fixed relaying with decode-and-forward and selection diversity combining. Specifically, we first formulate a two-dimensional spatial-temporal opportunity model in which free opportunity and sharing opportunity are defined, and then propose a joint spatial-temporal access scheme (JSTAS) to achieve successive channel access for continuous data transmission. By spatial sensing and temporal sensing, the cognitive sensors with JSTAS control the transmission powers by fully considering their maximum transmission powers, the interference constraints of multiple primary receivers and the interference from one primary transmitter. To evaluate the proposed JSTAS, we derive the closed-form outage probability under Rayleigh fading channels and make comparisons between five different schemes. Simulation results demonstrate that JSTAS has better outage performance than that of pure spatial or temporal access scheme under all considered scenarios.
    Keywords: cognitive radio sensor networks; multi-hop; delay-sensitive; spatial-temporal opportunity; channel access; outage probability.
    DOI: 10.1504/IJSNET.2016.10001281
     
  • A Novel Route Discovery Procedure for Congestion Avoidance in Multi-hop WSNs   Order a copy of this article
    by Omer Chughtai, Nasreen Badruddin, Azlan Awang, Maaz Rehan 
    Abstract: Due to high data traffic and resource-constrained nature of the Wireless Sensor Network (WSN), congestion occurs which leads to severe packet loss and high energy consumption. Since an efficient route discovery procedure can avoid congestion and balance the traffic load, a reliable congestion-aware routing is important and requires careful design consideration. In this article, a novel route discovery procedure for congestion avoidance (RDCA) in multi-hop WSNs has been proposed. RDCA is based on an objective function that incorporates the implicit behaviour of traffic load and consumed energy of the sensor nodes and signal strength between them along with the hop count. The results show that RDCA has a significant impact over Energy, Traffic Load, and Link Quality Aware Ad Hoc Routing (ETLAODV) and Energy efficient and QoS based routing (EQSR) in terms of Packet Delivery Ratio (PDR), End-to-End (ETE) delay, energy consumption, and average throughput.
    Keywords: Congestion-aware routing; Traffic load balancing; Congestion avoidance; Route discovery; WSNs.
    DOI: 10.1504/IJSNET.2016.10001262
     
  • Transmission Power Control and Sensor Node Reprogramming for Smartphone-WSN Interaction   Order a copy of this article
    by Jeongyeup Paek, JeongGil Ko, Sang Gi Hong, Byung-Bog Lee, Naesoo Kim 
    Abstract: Recent advances in both hardware and software had led the smartphones to become an attractive candidate as a mobile gateway and data-user for wireless sensor networks that have the capability to monitor the physical phenomena in various dimensions. Together, wireless sensing systems and smartphones can enable new services that allow users to gather and process fine-grained local sensor data for improving the quality and user-experience of various applications. In this work, we outline a number of remaining technical challenges before such a system architecture is practically made real. We discuss important consideration points for future system developers, and propose schemes to address two of the general yet critical challenges. Specifically, we propose an empirical link stability scoring algorithm to improve the energy efficiency of active-probing-based transmission power control schemes by 15%, and introduce a method to efficiently exchange sensor nodes' execution binaries using Android and iOS installation packages. These schemes, when included in a system of smart devices interconnecting with locally deployed wireless sensors, can be used to implement a practical and low-power system for personalized sensing applications.
    Keywords: Smartphone-based Sensor Networks; Transmission Power Control; Sensor Network Remote Reprogramming;.
    DOI: 10.1504/IJSNET.2016.10001402
     
  • Energy-Aware Task Scheduling by a True Online Reinforcement Learning in Wireless Sensor Networks   Order a copy of this article
    by Md. Muhidul Islam Khan 
    Abstract: Wireless Sensor Networks (WSNs) are an attractive platform for various pervasive computing applications. A typical WSN application is composed of different tasks which need to be scheduled on each sensor node. However, the severe energy limitations pose a particular challenge for developing WSN applications, and the scheduling of tasks has typically a strong influence on the achievable performance and energy consumption. In this paper, an energy-aware task scheduling method is proposed to achieve better energy consumption/performance trade-off in a target tracking application. Particularly, the proposed method exploits a true online reinforcement learning algorithm. A framework is proposed where it is possible to trade the application performance and the required energy consumption by a weighted reward function and can therefore achieve different energy/performance results of the overall application. By exchanging data among neighboring nodes it is possible to improve this energy/performance trade-off. The proposed method is compared with the existing approaches exploiting online learning: distributed independent reinforcement learning (DIRL), reinforcement learning (RL), cooperative reinforcement learning (CRL) and exponential weight for exploration and exploitation (Exp3), in terms of tracking quality and energy consumption trade-off in a target tracking application. Simulation results show that our proposed method is superior to existing methods for this kind of application.
    Keywords: Wireless sensor networks; Task scheduling; Energy-awareness; True online reinforcement learning; Distributed independent reinforcement learning; Cooperative reinforcement learning; Adversarial Bandit solvers.
    DOI: 10.1504/IJSNET.2016.10001403
     
  • Does the Assumption of Exponential Arrival Distributions in Wireless Sensor Networks Hold?   Order a copy of this article
    by Krishna Doddapaneni, Ali Tasiran, Enver Ever, Fredrick A. Omondi, Purav Shah, Leonardo Mostarda, Orhan Gemikonakli 
    Abstract: Wireless Sensor Networks have seen a tremendous growth in various applicationrnareas despite prominent performance and availability challenges. One of therncommon configurations to prolong the lifetime and deal with the path loss phenomenarnis having a multi-hop set-up with clusters and cluster heads to relay the information.rnAlthough researchers continue to address these challenges, the type of distributionsrnfor arrivals at the cluster head and intermediary routing nodes is still an interestingrnarea of investigation. The general practice in published works is to compare an empiricalrnexponential arrival distribution of wireless sensor networks with a theoreticalrnexponential distribution in a Q-Q plot diagram. In this paper, we show that such comparisonsrnbased on simple eye checks are not sufficient since, in many cases, incorrectrnconclusions may be drawn from such plots. After estimating the Maximum Likelihoodrnparameters of empirical distributions, we generate theoretical distributionsrnbased on the estimated parameters. By conducting Kolmogorov-Smirnov Test Statisticsrnfor each generated inter-arrival time distributions, we find out, if it is possible tornrepresent the traffic into the cluster head by using theoretical distribution. Empiricalrnexponential arrival distribution assumption of wireless sensor networks holds onlyrnfor a few cases. There are both theoretically known such as Gamma, Log-normalrnand Mixed Log-Normal of arrival distributions and theoretically unknown such asrnnon-Exponential and Mixed cases of arrival in wireless sensor networks. The work isrnfurther extended to understand the effect of delay on inter-arrival time distributionsrnbased on the type of medium access control used in wireless sensor networks.
    Keywords: Wireless Sensor Networks; Performance; Maximum-Likelihood Estimates of Empirical Distributions; Exponential Distribution; Non-Exponential Empirical Distributions; Gamma; Log-normal Distributions; Mixed Log-Normal Distributions;Histograms and Empirical Densities; Q-Q Plots; P-values; Kolmogorov-Smirnov Test Statistics; Theoretical and Empirical Densities and Cumulative Distribution Functions.
    DOI: 10.1504/IJSNET.2016.10001413
     
  • Data Estimation with Predictive Switching Mechanism in Wireless Sensor Networks   Order a copy of this article
    by Jyotirmoy Karjee, Martin Kleinsteuber 
    Abstract: In Wireless Sensor Networks (WSN), sink node needs to store data and torntrack data efficiently in a timely manner. As data is stored in a regular time interval, massive data is being collected which results in poor data tracking at a sink node. To overcome this problem, an Online Data Tracking and Estimation (ODTE) algorithm is developed at a sink node. ODTE algorithm does the following operations: (a) captures continuous data and does online data tracking at regular time interval; (b) it measures a Distortion Factor (D.F) which estimates an optimal data from massive data collected at a sink node. Moreover, data transmission overhead is another major issue at a sink node while transmitting continuous data from sensor nodes. To solve this, we develop Data Prediction Systems (DPS) models in WSN. It allows sensor nodes to transmit data to a sink node within a limit, controlled by a switching operation. This make a sink node for predicting data for sensor nodes thereby reducing transmission overhead in WSN. We validate ODTE algorithm and prediction models using simulation results.
    Keywords: Wireless sensor networks; spatial correlation; online tracking; estimation;rndata prediction.
    DOI: 10.1504/IJSNET.2016.10001414
     
  • An Energy Efficient Routing Scheme by using GPS information for Wireless Sensor Networks   Order a copy of this article
    by Byungseok Kang 
    Abstract: A wireless sensor network (or IoT network) is a collection of distributed nodes. These nodes gather data from various sensors and relay that information to a central point through a wireless network. There, the data can be aggregated and have something useful done with it. These types of networks deal primarily with the transmission of small amounts of data that needs to be sent very efficiently. In this paper we propose an energy efficient routing algorithm based on the Global Positioning System (GPS) information. Proposed scheme track the destinations location based on the beacon messages of the main route nodes. Through the experiments, proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as Energy-Efficient Ant-Based Routing Algorithm (EEABR) and Ladder Diffusion.
    Keywords: Energy efficient routing; GPS; Energy Efficiency; WSN.
    DOI: 10.1504/IJSNET.2016.10001447
     
  • In-network Data Processing in Wireless Sensor Networks Using Compressed Sensing   Order a copy of this article
    by Vishal Krishna Singh, Manish Kumar 
    Abstract: One of the major energy consuming tasks in wireless sensor networks (WSNs) is the task of data transmission. The lifetime of such a network can be significantly enhanced by, minimizing the in-network transmissions and dividing the transmission load symmetrically over the network. To overcome the issues of non-uniform energy dissipation and networks lifespan, a novel hierarchical compressive sampling (HCS) scheme is proposed. Based on the well-known hybrid compressed sensing scheme, the proposed HCS aims at minimizing the overall in-network communication during the data gathering process by obtaining correlated sensor readings through a hierarchical clustering scheme. The proposed HCS is able to identify the optimal position for the application of compressed sensing (CS) in the routing structure, to achieve symmetric load distribution in a randomly deployed network. The equal distribution of transmission load is validated through a heat map generated for showing the receiving and transmission activity at each node. An energy consumption model, based on the energy required by the radio, the processor and in the CS process, is proposed and the lifetime of the network is simulated for different sink positions. Simulations prove the efficacy of the proposed HCS over various CS based data processing schemes.
    Keywords: Hybrid CS; Energy conservation; In-network transmissions; Large scale sensor network; Symmetric load distribution.
    DOI: 10.1504/IJSNET.2016.10001449
     
  • Lifetime Maximization of wireless sensor networks with multiple sinks using multiple paths and variable communication range   Order a copy of this article
    by Vasavi Junapudi, Siba Udgata 
    Abstract: Maximizing network life time in a wireless sensor network used for maintainingrncrucial events and parameters is an important research area. In this paper, we define the life time of the network as the number of messages it is able to transfer to the sink node. We consider multiple links and propose three different variants of the algorithm to enhance the network life time in terms of number of messages successfully transmitted to any of the sink. The first algorithm constructs tree with sink node as the root to every other node and the nodes choose the sink based on the shortest path. Sink shifting happens based on the predefined shift rate. In the second approach, we try to find alternate path to reach the same sink before finally shifting to other sink. In the third approach, we increase the communication range in stages such that, it can avoid crucial nodes and reach the sink node by spending more energy. The performance compared and shown that the network life time is enhanced with the help of second and third approach by 8.75% and 33.42% than Cluster based algorithm for sink Selection (CASS). Alternate Path with variable communication range has improved the network life time by 22.90% over Alternate Path approach.
    Keywords: Wireless Sensor Networks; Multiple Sinks; Routing; Adjustable/Variable Communication Range; Network Life Time.
    DOI: 10.1504/IJSNET.2016.10001453
     
  • Clustering algorithm for wireless sensor networks : the honeybee swarms nest-sites selection process based approach   Order a copy of this article
    by Ado Adamou Abba Ari, Nabila Labraoui, Blaise Omer Yenké, Abdelhak Gueroui 
    Abstract: The design of low-power, scalable and energy efficient clustering protocols in order to extend the lifetime of wireless sensor networks remain an active area of research. Cluster-based sensor networks with data aggregation on cluster heads is the most popular approach for optimizing the energy consumption of nodes, in order to maximize the overall network lifetime. Clustering is also used for optimizing QoS and scalability in sensor networks. In the case of large scale networks, the management of nodes becomes a challenge. It is therefore necessary that, these sensors act in a self-organized manner to perform tasks for the overall network. A number of novel protocols, architectures, algorithms and applications has been proposed and implemented. Swarm intelligence provides the most powerful models of social insects that provide a global intelligence through local and simple actions in a self-organized and distributed manner. In this paper, we proposed a distributed clustering approach based on the nest-sites selection process of a honeybee swarm. In the design of our proposed algorithm, we focused on the distribution of load balancing among each cluster member in order to extend network lifetime. The performance of the proposed approach was evaluated by performing extensive experiments and the results demonstrated that our algorithm delivers better performance in terms of network lifetime, amount of packets received by the base station, end-to-end delay, energy consumption and efficiency.
    Keywords: Wireless sensor networks; Clustering; Cluster Head; Swarm Intelligence; Honeybees; NEST.

  • Regression Model Based Consensus for Clock Synchronization of Wireless Sensor Network   Order a copy of this article
    by Guoyong Shi 
    Abstract: Consensus is a process of reaching an agreed state throughout a distributed network by exchanging local information. Stochastic averaging matrix operation on a subset of state vectors is an effective and scalable method for arriving at a consensus state in a finite-dimensional space. In this work we extend this principle to a novel modelbased consensus process. The model is a linear regression model that is associated to each network node. Each node updates the regression model coefficients by exchanging locally the model output only. Upon receiving a set of output messages from neighboring nodes, the receiving node makes a consensus operation (typically averaging) and uses the result to update the regression model coefficients. We show that this kind of regression-based averaging scheme is able to synchronize all model parameters throughout the network, consequently, the model outputs of all nodes would have achieved consensus as well. In the second part of this work we apply the developed method to clock synchronization problem of wireless sensor network (WSN). We treat both clock drift and offset uncertainty and model them as the regression model coefficients. By only locally exchanging clock readings between neighboring nodes, each node adjusts its drift and offset parameters. Simulation verifies that the network-wide clock readings can be synchronized gradually. The effectiveness of this synchronization method is compared to other traditional clock synchronization methods. The main advantage of the new method is its robustness and reduced variation of the clock errors, a measure that characterizes the degree of network clock consensus.
    Keywords: Clock synchronization; linear regression; model-based consensus; network coordination; wireless sensor network (WSN).
    DOI: 10.1504/IJSNET.2016.10001461
     
  • Lightweighted and Energy-Aware Mikey-Ticket For E-Health Applications in the Context of Internet of Things   Order a copy of this article
    by Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani 
    Abstract: E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data privacy concerns, security issues constitute a major obstacle to their safe deployment. To secure e-health communications, key management protocols play a vital role in the security process. Nevertheless, current e-health systems are unable to run existing standardized key management protocols due to their limited energy power and computational capabilities. In this paper, we introduce two solutions to tailor MIKEY-Ticket protocol to constrained environments. Firstly, we propose a new header compression scheme to reduce the size of MIKEYs header from 12 Bytes to 3 Bytes in the best compression case. Secondly, we present a new exchange mode to reduce the number of exchanged messages from six to four. We have used a formal validation method to evaluate and validate the security properties of our new tailored MIKEY-Ticket protocol. In addition, we have evaluated both communication and computational costs to demonstrate the energy gain. The results show a decrease in MIKEY-Ticket overhead and a considerable energy gain without compromising its security properties.
    Keywords: E-health; Internet of Things; MIKEY-Ticket; Security; Key Management; Data Confidentiality.

  • A Highly Efficient Human Activity Classification Method Using Mobile Data from Wearable Sensors   Order a copy of this article
    by Lihuan Yuan, Qiang Liu, Mengchi Lu, Sihang Zhou, Chengzhang Zhu, Jianping Yin 
    Abstract: Effectively recognizing human activity from wearable sensors is a valuable yet challenging task due to the intrinsic data complexity and the inevitable dynamic nature of diverse application scenarios. Existing works are weak to address human activity dynamics and to capture the low-level structural relationships between an activity and the context in a consecutive time window in a real- time manner. In this paper, we propose a novel bag-level human activity classification method that can efficiently recognize activities from sensing data. The proposed method hierarchically captures the low-level instance characteristics and the high-level intra-bag information. Meanwhile, this method leverages the learning speed by jointly using random projection and least squares, which inherits from extreme learning machine with solid theoretical foundation. Experiments results over the USC- HAD dataset demonstrate that the proposed method consistently outperforms the state-of-the-art instance-level and bag-level detection methods in terms of both recognition accuracy and learning speed.
    Keywords: activity recognition; wearable sensors; machine learning; multi-instance learning.
    DOI: 10.1504/IJSNET.2016.10001462
     
  • Gateway Bandwidth Arrangement of Data Transmission in Cyber-Physical System   Order a copy of this article
    by Hao Wang, Jianzhong Li, Hong Gao 
    Abstract: Along with the development of wireless communication technology, different wireless technologies suitable for variety situations have been widely used. Wireless technologies with different characteristics have deeply promoted the development of Cyber-Physical System. Various kinds of devices such as sensors, actuators and data processors in a Cyber-Physical System have been used to complete different tasks and also be equipped with different kinds of wireless communication technologies in order to meet different needs of work. Meanwhile, all these devices have to make communication mutually to keep the whole system effective. Gateways have been used to connect these equipments with different kinds of wireless technologies. Different devoices pack information in data packets, and transmit them to each other through gateways. We propose a dynamic gateway bandwidth allocation algorithm, in order to maximize total packets delivery ratio. Simulation results have shown that this algorithm is efficient.
    Keywords: packet delivery; bandwidth allocation; hybrid wireless network; Cyber-Physical System.

  • Grid Routing: An Energy-Efficient Routing Protocol for WSNs with Single Mobile Sink   Order a copy of this article
    by Qi Liu, Kai Zhang, Xiaodong Liu, Nigel Linge 
    Abstract: In a traditional wireless sensor network with static sinks, sensor nodes close to the sink run out of their batteries quicker than other nodes due to the increased data traffic towards the sink. These nodes with huge data traffic are easy to become hotspots. Therefore, such networks may prematurely collapse since the sink is unreachable for other remote nodes. To mitigate this problem, sink mobility is proposed, which provides load-balanced data delivery and uniform energy dissipation by shifting the hotspots. However, the latest location update of the mobile sink within the network introduces a high communication overhead. In this paper, we propose Grid Routing, an energy-efficient mobile sink routing protocol, which aims to decrease the advertisement overhead of the sinks position and balance local energy dissipation in a non-uniform network. Simulation results indicate that the Grid Routing shows better performance compared with existing work.
    Keywords: hotspots; hierarchical structure; sink mobility; virtual infrastructure; non-uniform network.

  • CACA-UAN: A Context-Aware Communication Approach to Efficient and Reliable Underwater Acoustic Sensor Networks   Order a copy of this article
    by Qi Liu, Xuedong Chen, Xiaodong Liu, Nigel Linge 
    Abstract: Underwater Acoustic Sensor Networks (UANs) have emerged as a promising technology recently which can be applied in many areas such as military and civil, where the communication between devices is crucial and challenging due to the unique characteristics of underwater acoustic-based environment, such as high latency and low bandwidth. In this paper, context awareness is applied to the design of an underwater communication approach, called Context-Aware Communication Approach for a UAN (CACA-UAN), which aims to improve the overall performance of the underwater communication. According to the results, the proposed CACA-UAN can increase the efficiency and reliability of the underwater communication system.
    Keywords: context-aware; underwater acoustic sensor network; context-aware communication; efficiency; reliability.

  • A New Compression Algorithm For Small Data Communication in Wireless Sensor Network   Order a copy of this article
    by Ammar Tuama, Mohamad Afendee Mohamed, Abdullah Muhammed, Zurina Hanapi 
    Abstract: Energy consumption is one of the most critical issues in wireless sensor network. For a sensor device, transmission of data is considered as the most energy consuming task, and it mostly depends on the size of the data. Fortunately, data compression can be used to minimize the amount of data that needs to be transmitted and thus extend sensors lifetime. However, existing data compression algorithms are not designed to cope with the specific characteristics and limitations of WSNs. Such algorithms normally require ample resources with high data correlation for good performance. Since the sensor deals with small data communication with less or no data correlation, the performance is still lacking behind. In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. Using compression ratio as a comparison parameter, the proposed algorithm is measured against a set of existing algorithms such as LZ77, LZMA, S-LZW, m-LZO, Gzip, and Huffman coding. Two different datasets have been used for this purpose; namely, self-generated dataset and real sensor dataset from Harvard Sensor Library. As a result, the proposed algorithm not only outclasses other existing algorithms but most importantly produces positive compression ratio throughout the whole test where most existing algorithms experience an expansion in data size when dealing with very small data. Moreover, memory usage, number of instructions and execution speed have been also measured for the proposed solution. The results show that the proposed solution imposes a very low memory requirement, less number of instructions per bit while maintaining a fast execution as compared to existing algorithms.
    Keywords: Lossless compression; Dictionary-based algorithm; Data correlation; m-LZO; Gzip; Huffman coding; LZ77; LZMA; S-LZW; Small Data.

  • Detection of In-Progress Phone Calls Using Smartphone Proximity and Orientation Sensors   Order a copy of this article
    by Huiyu Sun, Suzanne Mcintosh, Bin Li 
    Abstract: Smartphones are equipped with multiple embedded sensors, which have been widely used for human activity recognition, context monitoring, and localization. In this paper, we use smartphone sensors to detect in-progress phone calls and classify the caller's activity states. Although Android API provides a built-in listener class to monitor phone calls, it does not associate the caller's activity with each call. Also, the majority of calls (especially to overseas) made nowadays are internet phone calls, which is dicult to monitor with such listeners. Phone call detection has a number of practical uses: it can be used to monitor activities at places where calls are forbidden; it can be used to assist and enrich activity recognition schemes; and it can be used for health monitoring. We propose a real-time phone call detection scheme using smartphone proximity and orientation sensor data and design Android applications to record, upload and display sensor data. We classify the caller's activity states into three categories: sitting/standing, lying down, and walking. Features are extracted from proximity and orientation sensors to train classi ers using three di erent machine learning classi cation algorithms (Naive bayes, logistic regression, and support vector machine). Experiments show that our system achieves an overall accuracy of 91% in successfully detecting and classifying phone calls.
    Keywords: Human Activity Recognition; Smartphone Sensors; Phone Call Detection.

  • Optimal Gateway Placement for Hybrid BANETs-Sensor Networks in Urban Areas   Order a copy of this article
    by Chunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia 
    Abstract: For a given urban area, sensors are well deployed in each subareas divided by streets. We apply the existing Bus-based Adhoc Networks (BANETs) to collect and transmit information from subareas to the data center, which can significantly reduce the number of sensors and the information transmissions. WSNs and BANETs are heterogeneous, and minimal number of gateways are required to connect them because of the higher cost of gateways. In this paper, we propose two gateway placement problems: minimum gateways placement and minimal gateways placement with minimum average delay. We present a (1+ln r)-approximation algorithm and r-approximation algorithm to solve the two problems, where r is the maximum number of subareas covered by a gateway candidate. In the geometric topology of the grid urban area, r<= 4. Extensive comparison simulation show the performance of minimum gateways and minimal gateways with minimum average delay achieves significantly.
    Keywords: wireless sensor networks; Bus-based adhoc networks; gateway placement; approximation algorithm.

  • System-Level Analysis of IEEE 802.11ah Technology for Unsaturated MTC Traffic   Order a copy of this article
    by Aleksandr Ometov, Nader Daneshfar, Ali Hazmi, Sergey Andreev, Luis Felipe Del Carpio, Parth Amin, Johan Torsner, Yevgeni Koucheryavy, Mikko Valkama 
    Abstract: Enabling the Internet of Things, machine-type communications (MTC) is a next big thing in wireless innovation. In this work, we concentrate on the attractive benefits offered by the emerging IEEE 802.11ah technology to support a large number of MTC devices with extended communication ranges. We begin with a comprehensive overview of the novel features introduced by the latest IEEE 802.11ah specifications following by development of a powerful mathematical framework capturing the essential properties of a massive MTC deployment with unsaturated traffic patterns. Further, we compare our analytical findings for a characteristic MTC scenario against respective system-level simulations across a number of important performance indicators. Our analytical results give adequate performance predictions even when simulations are challenged by the excessive computational complexity. In addition, we study the novel IEEE 802.11ah mechanisms offering improved support for massive device populations and conclude on their expected performance.
    Keywords: IEEE 802.11ah; analytical modelling; simulations; MTC/M2M; unsaturated traffic; throughput; delay; power consumption.

  • An Identity based Routing Path Verification Scheme for Wireless Sensor Networks   Order a copy of this article
    by Haibat Khan 
    Abstract: While the ability to express routing policies in Wireless Sensor Networks (WSNs) has been well-studied, unfortunately, the ability to enforce these policies has not been. The core challenge is that if we assume an adversarial, decentralized, and high-speed environment, then how can the receiving node be sure that the path being announced by the incoming packet is the actual path followed by it? In this paper we describe the networking primitive, called Routing Path Verification (RPV), which serves as a tool to enforce routing policies and presents a solution to the defined core challenge. We assess the security of the proposed RPV construction in a formal way. More significantly we augment a suitable key exchange protocol with our proposed RPV construction, to achieve an overall RPV scheme. We also evaluate the computational, communication and storage overhead of our proposed scheme and the experimental results show that the approach is quite scalable.
    Keywords: wireless sensor networks; routing policy control; peer to peer protocols; security protocols; routing security; routing path verification; identity based cryptography.

  • An intelligent closed-loop learning automaton for real-time congestion control in wireless body area networks   Order a copy of this article
    by Samia Allaoua Chelloug 
    Abstract: Recently, a considerable literature has grown up around the theme of Wireless Sensor Networks (WSNs) that are investigated in many applications. So far, Wireless Body Area Networks (WBANs) have emerged as a flexible solution for remote monitoring of mobile patients, nurses and elderly people. Nevertheless, WBANs are challenged by the real-time constraints of medical data. By another hand, WBANs have limited communication and computation capabilities. So, the collected physiological data should be aggregated before being sent to the base station. Moreover, the aggregation process may lead to the congestion problem. In this paper, we propose a closed-loop learning automaton that is based on conditional probabilities to assign each packet to the appropriate queue given the criticality of the sensed data. Our Omnet++ simulation results have been analysed using the Z-test. They confirm the performance of our scheme in terms of the drop ratio and the throughput.
    Keywords: WSNs; WBANs; congestion; learning; criticality; real-time; closed-loop; open-loop; drop ratio; throughput; Bayes rule; Omnet++; Z-test.

  • The Application of Distributed Fiber Sensors in Determination of Seepage in Derince Dam   Order a copy of this article
    by Ayhan Gurbuz 
    Abstract: Monitoring of civil infrastructure systems has emerged as a powerful tool for condition assessment of infrastructure performance. Structures could be monitored periodically from a central station located several kilometers away from the field with help of widespread use of modern telecommunication technologies. Fiber sensing technology is increasingly used in civil engineering applications. Distributed fiber optic sensing offers the ability to measure temperatures, strain, leakage etc. at thousands of points along a single fiber. A case of seepage along plinth of concrete faced Derince Dam, located in Turkey, is measured continuously and presented in this paper while an application of distributed fiber sensor technology is used. The case helps to disclose potential leakage along the plinth in order to minimize any risk.
    Keywords: Optical Fiber Sensing; Seepage; Derince Dam.
    DOI: 10.1504/IJSNET.2017.10007138
     
  • On Reliable Data Delivery in Stochastic Energy HarvestingWireless Sensor Networks   Order a copy of this article
    by Zheng Liu, Xinyu Yang, Wei Yu 
    Abstract: In wireless sensor networks (WSNs), sensor nodes with energy harvesting components have motivation to expend additional energy in conditions of excess, since the surplus energy would be wasted due to energy buffer overflow. In this paper, we focus on using such surplus energy to adjust the redundancy level of erasure codes, so that the data delivery reliability can be improved while the network lifetime is still well conserved. For a single flow, we formulate the problem as the maximization of end-to-end packet delivery probability under energy constraints. Considering the energy profile as a stochastic process, we propose a Lyapunov optimization based algorithm called the Erasure Coding Scheduling Algorithm (ECSA) to solve the problem. ECSA jointly manages the energy, adjusts the redundancy level of erasure codes and makes forwarding and receiving decisions for packet transmissions. ECSA does not require any knowledge of the harvestable energy and achieves an end-to-end packet delivery probability within $e^{-varepsilon-C}$ of optimal, while ensuring the required energy buffer size and the network congestion, which are bounded by size $O(1/varepsilon)$ for any $varepsilon>0$. Through a combination of both theoretical analysis and simulation, we show the effectiveness of ESCA in yielding a near-optimal data delivery reliability. We also show that ESCA can be easily adapted to multi-flow cases and implemented in a distributed manner.
    Keywords: Erasure Codes; Stochastic Energy Harvesting; and Lyapunov Optimization.

  • Localised Information Fusion Techniques for Location Discovery in Wireless Sensor Networks   Order a copy of this article
    by Adnan Abu-Mahfouz, Gerhard Hancke 
    Abstract: Many wireless sensor network (WSN) applications and techniques require sensor location in order to work correctly. Information fusion in WSNs is crucial for location discovery and many information fusion techniques have been used in several location discovery algorithms. In this paper we provide an overview of information fusion techniques used by localisation algorithms in order to enhance and simplify the position computation process. Further, we analyse several approaches that can be used by localised information fusion algorithms and discuss how these approaches enhance the performance of information fusion and make information fusion play a leading role in localisation algorithms. This article provides an introduction to different localised information fusion methods for node location discovery in WSNs and could be used as starting point for implementing existing proposals or designing new techniques.
    Keywords: Localisation system; location discovery; information fusion; localised algorithms; wireless sensor networks; sensor’s position; nearest references; low-error references; malicious node removal; consistency of references; impact of geometry; noisy distance estimate.

  • Data Delivery in Wireless Sensor Networks with Uncontrollable Mobile Nodes   Order a copy of this article
    by Hosam Rowaihy, Ahmed Binsahaq 
    Abstract: Wireless sensor networks (WSNs) consist of low-powered devices that have computation, wireless communication and environment-sensing capabilities. These low-cost sensors are usually deployed in a dense and stationary manner for the periodic sensing of environmental phenomena. WSNs open the door for many monitoring applications in the military, in healthcare, and in environmental and urban studies. Mobile Wireless Sensor Networks (MWSNs) are a subclass of WSNs in which some or all the sensors are mobile. Many environmental applications are designed and deployed on top of MWSNs in which the sensors hosts are uncontrolled by end users (e.g., the OpenSense project for air pollution monitoring in the city of Zurich). MWSNs pose many challenges for newly designed applications. In this paper, we evaluate MWSNs with a location-based application. We test various data delivery schemes used by sensors in MWSNs, including GPRS, Wi-Fi, and Hybrid (both GPRS and Wi-Fi). We perform extensive simulation-based experiments using the ns2 simulator.
    Keywords: WSNs; wireless sensor network; MWSNs; mobile wireless sensor network; mobility; mobile sensors; performance evaluation.

  • Improved Predictive Contention Window-Based Broadcast Optimization Strategy in Vehicular Cyber-Physical System   Order a copy of this article
    by Yan Huo 
    Abstract: Nowadays, huge amount of information gathered from various sensors in the Vehicular Cyber-Physical System (VCPS) may bring in the competition of transmission opportunity and the degradation of channel quality. Therefore, vehicles in communication should avoid intense competition by adjusting their contention window of the MAC protocol. According to the attribute set obtained by the vehicles' information preprocessing, in this paper, we propose an Improved Prediction Contention Window (IPCW) adjustment mechanism to optimize the broadcast performance. Also, the set should be updated via a feedback mechanism, so as to solve the problem of changeable vehicular communication scenarios. After that, an improved Markov model is designed to analyze the backoff procedure and to obtain the window sizes related to the attribute set, for the purpose of creating the reference table by Bayesian personalized ranking algorithm. Besides, an estimation mechanism based on hidden Markov is provided to predict the following vehicle's state and to generated a mapping table that consist of the attribute set and size of window. Comparing with traditional adjustment schemes, extensive simulations demonstrate that the proposed strategy could optimize the broadcast performance effectively in term of reducing collision probability and transmission delay.
    Keywords: Vehicular CPS; broadcast; contention window; fuzzy inference; Hidden Markov model.

  • Quality of Service Control in Proactive Wireless Sensor Networks via Lifetime Planning   Order a copy of this article
    by Peilin Zhang, Mohamed Abdelaal, Oliver Theel 
    Abstract: Successful exploitation of Wireless Sensor Networks (WSNs) is intuitively dependent on the enabling technologies as well as on the provision of application-relevant Quality of Service (QoS) metrics. Current research efforts mostly focus on maximizing the network lifetime without considering the predefined task time. In this article, we firstly provide a survey and a classification of the current state of QoS control methods in WSNs. Subsequently, we propose a novel QoS control method, referred to as lifetime planning. Based on design-time knowledge, lifetime planning provides users/applications with best-effort QoS, while meeting the time span required to complete the assigned task. To this end, an "upper" and a "lower" QoS boundary have to be defined for every QoS metric at the design-time. During run-time, a self-adaptation framework confines the QoS metrics between these boundaries. Lifetime planning outperforms other fixed heuristics and blind adaptation methods. As another proof of concept, we consider an office monitoring scenario with a cluster-tree WSN topology for performance evaluation. The scenario has been designed in the Contiki-OS network simulator, Cooja, using Tmote sky motes. Moreover, a novel QoS model has been engineered to determine the QoS boundaries. Simulation results show that lifetime planning tremendously improves the provided QoS while meeting the task lifetime.
    Keywords: Wireless Sensor Networks; QoS Control; Survey; Energy Management; Lifetime Planning; Self-adaptation.

  • Clustering-Based Energy-Efficient Routing Approach for Underwater Wireless Sensor Networks   Order a copy of this article
    by Gurkan Tuna 
    Abstract: As a result of the time-varying and harsh environment conditions, in underwater wireless sensor network (UWSN) scenarios, along with the excessive error rate of acoustic channels and long propagation delays, one of the most critical issues which must be addressed is to minimize energy consumption of sensor nodes. Moreover, it is hard to replace the batteries of the underwater sensor nodes frequently, therefore extending the lifetime of the nodes is one of the most important design objectives. In UWSNs, although energy dissipation in transmission mainly depends on employed routing algorithms and media access control (MAC) schemes, given the nature and challenges of the acoustic communication in water, all the layers of the protocol stack play an important role on achieving a high energy efficiency. Therefore, novel approaches that handle energy inefficiencies and extend the lifetime of UWSNs are required. In this paper, we propose an energy-efficient routing approach called Clustering-Based Energy-Efficient Routing (CBEER) to prolong the lifetime of UWSNs and evaluate its performance through extensive simulations. Based on a novel clustering-based scheme, the proposed approach can find shortest routing paths to carry data packets and is able to realize uniform network energy consumption profile in the entire underwater sensor network. The simulation based evaluation studies reveal that CBEER performs well in terms of packet delivery ratio and overall network energy consumption.
    Keywords: Clustering; Energy Efficiency; Routing; Underwater Wireless Sensor Network.

  • Cooperative Stackelberg Game Based Optimal Allocation And Pricing Mechanism In Crowdsensing   Order a copy of this article
    by Chunchi Liu, Rong Du, Shengling Wang, Rongfang Bie 
    Abstract: Crowdsensing has been earning increasing credits for effectively integrating the mass sensors to achieve significant tasks that one single sensor cannot imagine. However in many existing works in this field, some key information of the participants is incomplete to each other, hence causing the non-optimality result. Noticing that a potential cooperation between the players, we propose the cooperative Stackelberg game based optimal task allocation and pricing mechanism in a crowdsensing scenario. Aiming at different optimizing criteria, we propose two optimal Stackelberg games that are either with no budget constraint (No-Budget OpSt Game) or with budget constraint (Budget- Feasible OpSt Game). Analysis of their corresponding Stackelberg Equilibrium is then presented. Lastly, we perform extensive simulations to test the impact of the parameters on our model. Results of our two proposed games are progressively compared to show their optimizations in their respective criteria.
    Keywords: Crowdsensing; Stackelberg game; Optimal Mechanism; Budget Feasible; KKT conditions.

  • Malicious Device Inspection Home Area Network in Smart Grids   Order a copy of this article
    by Yang Xiao, Eric McCary 
    Abstract: The electricity industry is entering a new era, which adds powerful and innovative features to the current power grid. Home area networks (HAN) are integral in the operation of this cyber-physical infrastructure and has generally been considered one of the most insecure and vulnerable areas of the smart grid. Literature in the area is lacking and accountability in the HAN is seldom discussed. In this paper, accountability in the HAN is studied. We propose a method, which provides for grouping and inspection of the devices in a HAN in order to pinpoint malicious devices efficiently therein. With this, a higher level of fine-grained accountability can be achieved in the smart grid HAN. The experimental results show that the method is effective in its efficiency and scheme.
    Keywords: accountability; inspection; witness; smart grid.

  • Maximizing Influence in Sensed Heterogenous Social Network with Privacy Preservation   Order a copy of this article
    by Meng Han, Qilong Han, Lijie Li, Ji Li, Yingshu Li 
    Abstract: Maximizing influence in a specific scenario to improve the performance of marketing has a significant impact on targeted advertisements and viral product promotion, which has became one of the most fundamental problems in social data analysis. Many attentions have been paid to extensively analyze the influence in social data. However, most of the existing works, unfortunately, neglect the fact that the sensed location data in the cyber physical world could also play an important role in the influence prorogation process. Furthermore, even though a few works consider a little sensed information to enhance the influence maximization, the privacy protection issue of the sensed data (location, social relationship) was directly exposed to the public. This paper considers the problem of maximizing influence in both sensed location Data and Online Social Data with privacy preserving. We firstly merge both the sensed location data from cyber-physical network and relationship data from online social network into a unified framework with one novel model, then an efficient algorithm to solve the influence maximization problem are provided within our resolution. Besides, our model could not only support our influence maximization problem, but also support other applications related to both sensed location data and online social data. Furthermore, our privacy-preserving mechanism could protect the sensitive location and link information during the whole process of data analysis. Real life datasets are empirically tested with our framework and demonstrate the power of sensed and online data combination to influence maximization.rnThe experiment result also suggests that our framework is outperforming most of the existing alternative resolutions and succeeds in preserving privacy while other resolutions not.
    Keywords: Sensed Data; Location; Social Network; Data Privacy; Influence Maximization.

  • Rotation Based Coverage Control Algorithm and Protocol for Heterogeneous Sensor Networks   Order a copy of this article
    by Quanlong Li, Qing Yang, Lu Su 
    Abstract: This paper studies the problem of coverage control, one fundamental issue in wireless sensor networks (WSN). In many applications of WSN, the target area is required to be covered for a certain degree. To satisfy coverage requirements, redundant sensors are usually deployed, which may cause unnecessary energy consumption on sensor nodes. To address this challenge, some coverage control methods have been proposed to reduce the number of active sensors and prolong the lifetime of sensor networks. However, none of them can be applied to heterogeneous sensor networks that are composed of different types of sensors with different sensing radii. In the previous work[1], this problem was solved by a novel coverage control mechanism for heterogeneous sensor networks. This mechanism, unfortunately, still suffers from a major limitation. That is, it may exhaust the energy of the active sensors, leading to unbalanced energy consumption among the sensor nodes. To tackle this problem, in this paper, we propose a novel distributed rotation based coverage control strategy for heterogeneous sensor networks. This strategy only needs to analyze a few special points coverage to determine each sensor node's working schedule, and thus can significantly reduce the complexity of coverage computation. Theoretical analysis and simulation results show that the proposed coverage control algorithm and protocol can outperform prior work in terms of not only the energy saving but also the energy balancing.
    Keywords: Rotation-based Coverage; Coverage Control; Wireless Sensor Networks.

  • A Novel Task Recommendation Model for Mobile Crowdsourcing Systems   Order a copy of this article
    by Yingjie Wang, Xiangrong Tong, Kai Wang, Baode Fan, Zaobo He, Guisheng Yin 
    Abstract: With the developments of sensors in mobile devices, mobile crowdsourcing systems are attracting more and more attention. How to recommend user-preferred and trustful tasks for users is an important issue to improve efficiency of mobile crowdsourcing systems. This paper proposes a novel task recommendation model for mobile crowdsourcing systems. Considering both user similarity and task similarity, the recommendation probabilities of tasks are derived.\r\nBased on dwell-time, the latent recommendation probability of tasks can be predicted. In addition, trust of tasks is obtained based on their reputations and participation frequencies. Finally, we perform comprehensive experiments towards the Amazon metadata and YOOCHOOSE data sets to verify the effectiveness of the proposed recommendation model.
    Keywords: Mobile crowdsourcing systems; Recommendation model; Similarity; Dwell-time; Trust.

  • Minimum Cost Flow Based Approach for Connectivity Restoration in WSN   Order a copy of this article
    by Eman Shaaban 
    Abstract: A WSN consists of resourced-constrained sensor nodes that cooperate to accomplish specific tasks. In many applications, WSNs operate unattended in harsh environments, which make sensor nodes susceptible to failure due to physical damage or depletion of onboard energy supply. Some of the nodes are critical to the network connectivity and their failure may partition the network into multiple disjoint segments. WSN can autonomously recover from this failure through relocation of some nodes. However such a recovery process remains challenging since tolerating the failed nodes individually is not a globally optimal solution and may cause resource conflict. This paper presents a Recovery approach that forms a topology with Increased Robustness against recurrent failure (RIR). RIR tolerates the failure of multiple connectivity-critical nodes through repositioning of non-critical healthy nodes. RIR can handle multiple simultaneous failures of either collocated or scattered nodes. The approach favors substituting a failed node with one with the highest residual energy in order to sustain the network connectivity for the longest time possible. RIR models the recovery as a Minimum Cost Flow (MCF) problem to determine the best set of node relocations for repairing the network topology while minimizing the motion overhead of the recovery process. The performance of RIR is evaluated through extensive simulation experiments. The simulation results have confirmed the effectiveness of the proposed scheme.
    Keywords: wireless sensor networks; connectivity restoration; node relocation; minimum cost flow; WSN recovery.

  • Accuracy-aware Data Collection in Wireless Sensor Networks   Order a copy of this article
    by Xu Zheng, Ran Bi, Guozhen Tan 
    Abstract: Data collection is a fundamental task in Wireless Sensor Networks. In many practical applications, approximate results with error bound guarantee can satisfy user requirements. To approximate sensed data, the filter based approach is to maintain the filters of each node at both sensor node and base station. The filter of each node is represented by an interval. For a given filter, the sensor node sends the update to the base station if the sensed data is beyond the range of the filter. In this paper, we investigate the accuracy-aware approach for approximate data collection. The filter assignment for optimizing the average of valid filter time is formalized as an integer optimization problem and the hardness of this problem is proven to be NP-Complete. A greedy heuristic based algorithm with low computation overhead is proposed. Moreover, to balance the valid filter time, the filter assignment for optimizing the minimum valid time is formalized as a general max-min problem. We analyze the hardness of the problem and propose an approximation algorithm. The experimental results show that our algorithms achieve better results in terms of communication cost and expected time of valid filters.\r\n
    Keywords: Data Collection; Sensed Data Model; Approximate Algorithms; Wireless Sensor Networks.

  • Energy-Efficient MAC Protocols for Wireless BANs: Comparison, Classification, Applications and Challenges   Order a copy of this article
    by Athar Ali Khan, Nadia N. Qadri, Amna Mahbub, Muhammad Yasir Qadri, Muhammad Iqbal, Muhammad Naeem 
    Abstract: Recent developments in wireless networks, MicroElectroMechanical Systems technology, and integrated circuits has enabled miniaturization of micro/nano sensor nodes. These low-power and intelligent nodes are placed in or around the human body in a strategic manner for numerous new, practical and innovative applications. These applications provide improved data speed, accuracy, and reliable communication of sensors and actuators. This exciting new area of research based on miniaturized sensor nodes is called Body Area Networks. With majority of applications in healthcare, BAN utilizes IEEE 802.15.6 and IEEE 802.15.4j standards. A lot of work is going on to develop communication protocols for BANs. The design of an efficient MAC protocol is an important requirement for BANs applications and a considerable work has been done to achieve this. In this paper, we provide a survey on BAN with special attention given to energy-efficient MAC protocols, its classification, and comparison. This article also discusses an in-depth review on BAN applications and fundamental research challenges.
    Keywords: Body Area Networks; Energy-efficiency; MAC Protocols; Wireless Sensor Networks; Frame Structure.

  • Performance Comparison of Detection Schemes for Spectrum Sensing   Order a copy of this article
    by Quoc Kien Nguyen, Taehyun Jeon 
    Abstract: Internet of things (IoT) is one of the popular terminologies and is expected to be an essential part of the next generation 5G mobile communication systems. IoT includes massive number of devices with different communication interfaces. Therefore, without a proper collision detection method, these devices will be the source of interference to the primary user. There exist numerous spectrum sensing techniques in cognitive radio areas. However, each type of spectrum sensing technique has its pros and cons. In the recent researches about spectrum sensing approaches, the combination of conventional digital signal processing and collaboration in signal detection has been exploited in order to obtain more accurate results. This paper provides performance comparison of different spectrum sensing techniques. Particularly, energy and cyclostationary based detection techniques are reviewed. Furthermore, the two-layer detection procedure, which includes energy-based cyclostationary, is examined and applied to collaborative scenario. The collaborative sensing utilizes signals coming from different receivers with different propagation paths to cope with the high level of noise environment. Furthermore, the information of the received signal at each terminal is exchanged among the others in order to obtain the high accuracy decision. The information from different terminals are combined at the fusion center where the decision is finally made. The simulation result illustrates that with the collaborative spectrum detection the better performance is achieved.
    Keywords: collaborative spectrum sensing; cyclostationary; internet of things; cognitive radio.

  • GRACO: a geographic GReedy routing with an ACO based void handling technique   Order a copy of this article
    by Mouna Rekik, Nathalie Mitton, Zied Chtourou 
    Abstract: Geographic routing has gained much attention as a basic routing primitive in wireless sensor networks due to its memory-less, scalability, efficiency and low overhead features. Greedy forwarding is the simplest geographic routing scheme, it uses the distance as a forwarding criterion. Nevertheless, it may suffer from communication holes, where no next hop candidate is closer to the destination than the node currently holding the packet. For this purpose, a void handling technique is needed to recover from the void problem and successfully deliver data packets if a path does exist between source and destination nodes. Many approaches have been reported to solve this issue at the expense of extra processing and or overhead. This paper proposes GRACO, an efficient geographic routing protocol with a novel void recovery strategy based on ant colony optimization (ACO). GRACO is able to adaptively adjust the forwarding mechanism to avoid the blocking situation and effectively deliver data packets. Compared to GFG, one of the best performing geographic routing protocols, simulation results demonstrate that GRACO can successfully find shorter routing paths with higher delivery rate, less control packet overhead and shorter end-to-end delay.
    Keywords: wireless sensor networks ; geographic routing ; guaranteed delivery ; swarm intelligence ; ant colony optimization.

  • Wideband Open Stub BPF for Cognitive Radio System Applications   Order a copy of this article
    by Seongsoo Cho, Bhanu Shrestha, Jeong Hyun Yi 
    Abstract: In this paper, a compact wideband open stub bandpass filter (BPF) is designed, fabricated, and characterized for cognitive radio system (CRS) application which is an emerging technology in the wireless communication system. The designed bandpass filter can be implemented to a front end of CRS system which can pass the desired signal rejecting all other signals and noise. We fabricated on Teflon substrate with dielectric constant of 2.54 and thickness of 0.54 mm and characterized using vector network analyzer. The experimental results of wideband BPF are found in good agreement with simulated results, showing fractional bandwidth from 4.4 to 8.0 GHz (≈59%), insertion loss (S21) of 33.6 dB, and minimum return loss (S11) of 0.10 dB at 6.2 GHz. The group delay of wide bandpass filter is below 0.19 ns. The features of the design are size reduction, wideband, higher insertion loss, feasibility in implementing to CRS, The designed wide bandpass filter occupied the size of 0.394λg
    Keywords: wireless cognitive radio system; wideband BPF; bandpass filter ; microstrip BPF; CRS; open stub BPF; UWB.

  • Range Adjustable Hybrid Multi Path Routing Algorithm for WSNs   Order a copy of this article
    by Nishant Joshi D, Muralidhar Kulkarni, Shivaprakasha K S 
    Abstract: Multipath routing is an effective way to achieve reliability in Wireless Sensor Networks (WSNs). Node disjoint multipath routing could achieve better load balancing along with reliability. In this paper, an attempt has been made in proposing a novel node disjoint multipath routing algorithm, the Range Adjustable Hybrid Multipath (RAHM). RAHM uses hybrid routing approach which combines the centralized node disjoint multipath selection and localized distributed route reconfiguration. Node disjoint path selection is based on the objective of minimizing the end to end communication drain on each path. The distributed route reconfiguration initiates on the localized node failure events and the route re-establishment is based on the objective of residual energy of the nodes. Data transmission over node disjoint multiple paths of RAHM uses variable transmission ranges. The performance of the proposed algorithm is validated through simulations and compared with Collection Tree Protocol (CTP) and multipath ring routing protocol. RAHM performs around 36% and 76% better in terms of network lifetime parameter compared to CTP and multipath ring routing protocol respectively.
    Keywords: Multipath Routing; Energy Efficient; Hybrid Routing; Variable Transmission Range; Node disjoint.

  • A Radio Link Reliability Prediction Model for Wireless Sensor Networks   Order a copy of this article
    by Wei SUN, Qiyue Li, Jianping Wang, Liangfeng Chen, Daoming Mu 
    Abstract: The Wireless Sensor Network (WSN) has great prospects in monitoring and control of industrial plants and devices. One of the main challenges of developing WSNs for industrial applications is to satisfy their requirements for reliability with strict bounds. Accurate prediction of a radio links reliability is helpful for upper layer protocols to optimize network level Quality of Service performance. In this paper, to predict the bounds of the confidence interval of the Packet Reception Ratio (PRR), a Radio Link Reliability Prediction (RLRP) model is proposed for describing the relation between the reliability metrics bounds and factors that affect it. Based on the RLRP model, the adaptive extended Kalman filter algorithm is adopted to predict the reliability metric. Real world experiments were performed to demonstrate the proposed model. The results indicate that our RLRP model is accurate in predicting the bounds of link reliability, can better reflect the random characteristic of the radio link, and is more sensitive to dynamic changes of the radio link.
    Keywords: Link Reliability Model; Reliability Prediction; Wireless Sensor Network; Kalman Filter.

  • Cross-layer control of wireless sensor network for smart distribution grid   Order a copy of this article
    by Ruju Fang, Jianping Wang, Wei Sun 
    Abstract: This article presents an integrated modeling method providing cross layer control for Wireless Sensor Networks (WSNs) communication which is suitable for Smart Distribution Grid (SDG). There are multiple protocol layers in WSNs communication. In order to meet the Quality of Service (QoS) of application for WSNs, as well as more resource-efficient for the resource-constrained nodes, a cross-layer control algorithm based on theory of Fuzzy Cognitive Map (FCM) is proposed. The cross layer control model of the whole communication system is established by utilizing different influence coefficients among fuzzy cognitive map concepts which represent the subordinate relationships of different protocol layers, such as application layer, network layer, MAC layer and physical layer. Influence coefficients among fuzzy cognitive map concepts can be obtained self-learning and self-training way, which can timely adjust the physical layer,MAC layer,transport layer parameters and routing strategy based on the network environment and control needs.rnFinally, communication performance of cross layer control algorithm is evaluated by received data of WSNs network,the average delay and effective throughput, and so on. Results show that cross layer control scheme based on fuzzy cognitive map proposed in paper can meet the real-time and reliability requirements.rn
    Keywords: Smart distribution grid; Wireless sensor network; Fuzzy cognitive map; Back-off strategy; Cross layer control.

  • Aggregation Aware Early Event Notification Technique for Delay Sensitive Applications in Wireless Sensor Networks   Order a copy of this article
    by Sukhwinder Singh Sran, Jagpreet Singh, Lakhwinder Kaur 
    Abstract: In this paper, an aggregation aware early event notification technique (AAEENT) is proposed for WSNs characterized by unpredictable events. The novelties of the proposed technique are two folds. First, reliable routing policy is proposed to deliver events data over high throughput paths to final destination as early as possible. This reliable routing policy minimizes the number of retransmissions, which in turn reduces network congestion. Second, temporal data aggregation has been used to minimize redundant data at each intermediate node. The proposed technique has been implemented by incorporating proposed policy in Collect protocol of Contiki operating system and is evaluated over Cooja network simulator. For performance analysis, the results are compared with the Constant Delay based aggregation, Random Waiting based aggregation policy and the existing Collect Protocol. From the results, it has been observed that due to reduced network bottlenecks in the proposed technique, the event notification time declined upto 35% and overall power consumption is reduced upto 37% in contrast to existing solutions.
    Keywords: Data Aggregation; Energy Consumption; Energy Efficient Routing; Event Notification Time; Wireless Sensor Networks.

  • A Traceable Threshold Attribute-Based Signcryption for mHealthcare Social Network   Order a copy of this article
    by Yanfei Lu, Xu Wang, Chunqiang Hu, Hui Li, Yan Huo 
    Abstract: With the rapid development of wireless sensor technologies, Mobile Healthcare Social Network (MHSN) built upon Wireless Body Sensor Network (WBSN), has evolved into a innovative next-generation healthcare system in our aging society. Nevertheless, it is vital to focus on the security issues and the tradeoff between privacy preserving and traceability. A novel security mechanism named as the Traceable Threshold Attribute-Based Signcryption (TTABSC) can permits patients to be friends and make a proper tradeoff between privacy and traceability. The proposed scheme leverages a four-party model to prevent the leak of a patients sensitive information, including symptom information, identity and patients health information (PHI). Combining the digital signatures and encryption, we provide a series of performance analysis, including correctness, unforgeability, traceability and privacy. Compared with previous works, our most efficient scheme generates a constant signcryption size.
    Keywords: Mobile Healthcare Social Network; Traceability; Attribute-Based Signcryption; Symptoms-Matching.

  • Flooding in 3-Dimensional Mobile Ad Hoc Networks Using 1-Hop Information   Order a copy of this article
    by Xin Bai, Xiaohui Wei, Sen Bai 
    Abstract: Flooding is a fundamental problem in mobile ad hoc networks (MANETs). Traditional pure flooding suffers from excessive redundancy of transmissions, which causes high overhead and severe interference of the network. Therefore, many flooding algorithms have been proposed to reduce the redundancy of messages. However, former works mostly focus on 2-dimensional MANETs, and their approaches are hard to be extended to 3-dimensional wireless networks. In this paper, we consider the flooding problem for 3-dimensional MANETs. We propose an efficient flooding algorithm using only 1-hop neighbours information to optimize running time of the algorithm. Under the premise of ensuring full delivery, the proposed algorithm selects a minimum set of neighbours for each node to forward messages for reducing redundant transmissions. Simulations have been conducted and the results have shown that the proposed algorithm significantly decreases required transmissions for a flooding.
    Keywords: flooding; mobile ad hoc network; 3-dimensional wireless network.

  • Design   Order a copy of this article
    by Yanguo Zhou, Hailin Zhang, Ruirui Chen, Tao Zhou 
    Abstract: Full-duplex (FD) wireless communications, which allow the co-time co-frequency transmission and reception, have received significant attentions in recent years. Newly emerged advanced cancellation schemes can efficiently mitigate the self-interference caused by the FD wireless communication, thus achieving high spectrum efficiency in the physical-layer as compared with the traditional half-duplex (HD) communications. However, not only the high spectrum efficiency is highly demanded in the physical-layer, but also the high throughput of the data-link layer is urgently needed, resorting to the efficient full-duplex medium access control (FD-MAC) protocol. In this paper, we propose the two-stage-contention based medium access control protocol for full-duplex wireless networks (TF-MAC) to optimize the throughput of FD wireless networks. First, we design a request to send (RTS)/full-duplex clear to send (FCTS)/clear to send (CTS) based handshaking mechanism. Then, the FD back-off algorithm is proposed to reduce the collisions for FD transmissions among all nodes. Finally, based on the two-dimensional Markov chain, we derive the closed-form expression for the throughput of FD wireless networks. The simulation results demonstrate the performance of our proposed TF-MAC protocol.
    Keywords: full-duplex communication; medium access control protocol; request to send/full-duplex clear to send/clear to send handshaking mechanism; full-duplex back-off algorithm; two-stage-contention.

  • Delay Minimizing Depth Based Routing for Multi-Sink Underwater Wireless Sensor Networks   Order a copy of this article
    by Chaitanya Kumar Karn, C.P. Gupta 
    Abstract: Underwater acoustic network is the enabling technology for number of applications viz. ocean exploration, pollution monitoring, etc. Each application requires appropriate network resources. Routing in such networks is challenging due to longer delays and mobility caused due to ocean currents and tides. Existing routing algorithms focus only on delivery of packets with very little consideration to minimizing delay in packet delivery. In this paper, we propose a new beacon-based routing algorithm for underwater sensor networks using multiple sink architecture. DMDBR (Delay Minimizing Depth Based Routing) attempts to minimize delay and uses depth, hop count and possible energy information for making routing decisions. Novelty of our scheme is in a node accepting packets for forwarding if it has sufficient residual energy to forward all the packets in the packet queue. A node declines acting as a forwarder once the estimated residual energy is not sufficient to forward the new packets. Simulation results show that DMBDR improves packet delivery ratio and minimize end-to-end delay in comparison to Depth Based Routing.
    Keywords: Underwater Wireless Sensor Networks (UWSN); Forwarding Factor (FF); Delay Minimizing Depth Based Routing (DMDBR); Beaconing Interval.

  • Sensor Data Distribution and Knowledge Inference Framework for a Cognitive-Based Distributed Storage Sink Environment   Order a copy of this article
    by Nilamadhab Mishra, Hsien-Tsung Chang, Chung-Chih Lin 
    Abstract: Large-scale sensor data distributions and knowledge inferences are major challenges for cognitive-based distributed storage environments. Cognitive storage sinks play an essential role in addressing these challenges. In a data-concentrated distributed cognitive sensor environment, cognitive storage sinks regulate the data distribution operations and infer knowledge from the large amounts of sensor data that are distributed across the conventional sensors. Embedding cognitive functions in conventional sensors is unreasonable, and the knowledge-processing limitations of conventional sensors create a serious problem. To overcome this problem, we propose a cognitive co-sensor platform across a large-scale distributed environment in which the cognitive storage sinks are the regulating authorities of data distributions and knowledge inferences and the conventional sensors are the data sources. Further, we propose a distributed data distribution framework (DDD-framework) for effective data distribution and storage across the distributed cognitive storage sinks by considering both homogeneous and heterogeneous environmental issues. We also propose a distributed knowledge inference framework (DKI-framework) that infers useful patterns for building knowledge intelligence. The analysis and discussion demonstrate that these frameworks can be adequately instigated for the purpose of optimal data distribution and knowledge inference within the horizon of a real-time distributed environment.
    Keywords: Cognitive storage sinks; conventional sensors; distributed data distribution framework (DDD-framework); distributed knowledge inference framework (DKI-framework); distributed storage environment; distributed knowledge inference.

  • A Representative Node Selection based Data Gathering Method for Compressive Sensing in WSNs   Order a copy of this article
    by Chengyang Xie, Jiancong Zhao, Yugang Niu 
    Abstract: In traditional compressive data gathering (CDG) , many rounds of data gathering are required to make sure the accuracy of reconstruction signal such that most of nodes are required to participate in data gathering. By using the spatial and temporal correlation character of sensor readings, we propose a compressive data gathering method based on representative node selection (RNS-CDG) to collect measurement vector via just one routing tree. By means of principal component analysis (PCA) and frame potential (FP), the proposed method can select fewer representative nodes from all nodes, by which a data gathering tree will be constructed. And then, via this routing tree, a measurement vector composed of M projections will be received by Sink for recovering signal. It is shown via simulation results that the proposed method can ensure the accuracy of data reconstruction and reduce the transmissions of network.
    Keywords: Compressive data gathering; spatiotemporal correlation; representative node selection; wireless sensor networks.

  • A Study of Mobile CDSS for Cardiovascular Disease Diagnosis   Order a copy of this article
    by Young-Keun Lee, Sang-seok Yun, Jae-young Choi, Malrey Lee 
    Abstract: Although cardiovascular diseases are the number one cause of death globally, they are often diagnosed in hospitals during the late stages of life. This paper aims to make a cardiovascular disease diagnose system in the mobile environment using the Artificial Neural Network. Survey data has been collected from public institutions based on characteristics including, gender type, age, height, weight, body mass index, high blood glucose, heart rates, end-systolic and end-diastolic pressure, history of cardiac infarction and angina pectoris. The collected data is manipulated through training functions. The training functions are compared using Bayesian Regulation back propagation and Levenberg-Marquardt back propagation. Subsequently, the computed results are analyzed which show significant performance. Finally, the results are analyzed by using performance functions: Mean Squared Error and Sum Squared Error. Consequently, this study validates the accuracy of cardiovascular disease diagnosis by comparing with error rates, trained results, and the actual data.
    Keywords: Mobile Clinical Decision Supporting System; Cardiovascular Diagnosis; Artificial Neural Network; sensor.

  • A dynamic advertisement interval strategy in bluetooth low energy networks   Order a copy of this article
    by Jihun Seo, Changsu Jung, Bhagya Silva, Kijun Han 
    Abstract: Nowadays, many investigators have examined the effects of Bluetooth Low Energy (BLE) for a wide range of applications due to its low-cost and low-power characteristics. Hence, Performance improvement during the discovery process has become one of major concerns. In BLE networks, advertisement interval of advertiser directly influences the performance factors, such as discovery latency and energy consumption, since the advertiser discovers scanners by transmitting advertising Packet Data Units (PDUs). Frequent transmissions of advertising PDUs may result in collisions and serious energy consumption issues. On the contrary, larger advertisement interval may lead to delayed device discovery. In this paper we propose an improved algorithm to enable advertisers to adjust its advertisement interval with respect to the network conditions based on a Carrier Sensing (CS) scheme. The proposed algorithm acquires the network conditions by listening advertising channels before transmission of advertising PDUs, while allowing the advertisers to adjust their parameters accordingly. Simulation results show that the proposed algorithm has outstanding performance compared with basic CS scheme and BLE standard in crowded BLE networks.
    Keywords: Bluetooth Low Energy (BLE); Device Discovery; Internet of Things (IoT); Dynamic Advertisement Interval.

  • Performance evaluation of IEEE 802.15.6-based WBANs under co-channel interference   Order a copy of this article
    by Muhammad Mahtab Alam, Elyes Ben Hamida 
    Abstract: In this paper, interference mitigation and coexistence strategies proposed in IEEE 802.15.6 standard are investigated within the context of co-channel interference. A comparative evaluation of the reference scenario (which does not use any coexistence scheme), two non-collaborative (i.e., time shared, random channel) and one implicitly collaborative (i.e., CSMA/CA) based coexistence schemes is presented for five co-located bodies. Extensive set of physical, medium access control (MAC) parameters are invoked to realise a comprehensive study with enhanced IEEE 802.15.6 proposed channel models. It is concluded that there is trade-off between coexistence schemes. For example, time shared and random channel provides much better packet reception ratio (PRR) and energy efficiency, though they suffer in meeting the delay constraints of the IEEE 802.15.6 standard. Whereas, CSMA/CA based implicit collaborative approach is able to achieve the delay requirements however, it does not perform well both in terms of PRR and energy consumption.
    Keywords: WBAN; wireless body area networks; BBN; body-to-body networks; interference mitigation; coexistence; performance evaluation; IEEE 802.15.6 standard.
    DOI: 10.1504/IJSNET.2016.10001274
     
  • A relay node deployment strategy for energy-balance using a group Gaussian distribution   Order a copy of this article
    by Guojie Du, Yugang Niu, Jiancong Zhao 
    Abstract: Energy is one of the limited resources in a wireless sensor network (WSN), which inevitably results in the energy-hole phenomenon. One of the effective solutions is to deploy a certain number of relay nodes to alleviate the traffic load of sensor nodes. In this paper, the authors focus on the problem of relay node deployment in a layered network. By utilising a set of Gaussian distributions with different deviations in each layer, termed as group Gaussian distribution (GGD), this paper proposes a new relay node deployment strategy to balance energy consumption. Moreover, the energy consumption of each node and the energy-balance condition are analysed. And then, the actual requisite number of relay nodes and the standard deviations of Gaussian distributions in each layer are obtained. Both the theoretical analysis and the simulation results prove that the proposed deployment strategy significantly outperforms other node deployment schemes.
    Keywords: WSNs; wireless sensor networks; limited resource; energy-hole; relay node; deployment strategy; layered network; Gaussian distribution; standard deviations; energy-balance; network lifetime.
    DOI: 10.1504/IJSNET.2016.10001276
     
  • An eccentricity-based data routing protocol for 3D wireless sensor networks   Order a copy of this article
    by A.S.M. Sanwar Hosen, Gi Hwan Cho 
    Abstract: Wireless sensor networks (WSNs) are facing many challenges due to the limited resources. Thus, routing cost minimisation is one of the major issues in order to design a feasible network topology. This paper presents a simple and efficient data routing protocol of constructing three-dimensional (3D) WSN. It points to minimise the routing cost which includes the data gathering from deployed sensor nodes and the data forwarding to the sink(s). For this, the network is divided into 3D subspaces, and a routing centroid (RC) node is elected in the eccentricity region from any node in a subspace. In data forwarding, it selects an intermediate node in such a way that minimises the number of hops towards the sink. The simulation results show that, with benefit of RC node concept, our scheme can significantly reduce the overall data routing cost and then results in prolonging the network lifetime of a 3D WSN.
    Keywords: WSN; wireless sensor network; 3D space; three-dimensional space; space diagonal length; eccentricity; data routing cost; routing centroid node; data routing; network lifetime.
    DOI: 10.1504/IJSNET.2016.10001278
     
  • Sensor network and inertial positioning hybridisation for indoor location and tracking applications   Order a copy of this article
    by Yuri Álvarez López, Guillermo Álvarez Narciandi, Fernando Las-Heras Andrés 
    Abstract: An indoor location system (ILS) for practical asset and people tracking in indoor scenarios using received signal strength (RSS) ZigBee-based sensor network and inertial sensors is presented. A novel algorithm that uses differential signal levels gathered from a set of transmitter nodes is developed for processing RSS data. These levels are introduced into a cost function whose minimum gives the asset location estimation. The use of differential field levels-based algorithm avoids the need of system calibration due to signal strength fluctuation. Moreover, position accuracy is improved by adding inertial sensor information. The method is tested in a real scenario, demonstrating practical indoor positioning when combining ZigBee-based sensor network and inertial sensors information. The influence of the number of ZigBee nodes on the position estimation accuracy has been analysed.
    Keywords: WSN; wireless sensor networks; ILS; indoor location systems; RSS; received signal strength; zigBee; inertial sensors; radio determination.
    DOI: 10.1504/IJSNET.2016.10001270
     
  • Target coverage maximisation for directional sensor networks   Order a copy of this article
    by Zaixin Lu, Weili Wu, Wei Wayne Li 
    Abstract: Wireless sensor networks (WSNs) have applications in many areas, such as biomedical observation, environmental monitoring, and battlefield surveillance. In order to reduce costs and improve reliability, target coverage has been an important problem for WSNs in recent years. In this paper, we investigate target coverage for a special kind of WSNs, called directional sensor networks, in which the sensors have limited monitoring distance and coverage angle. Given a set of targets and a set of sensors, we investigate how to assign proper directions for the sensors such that the number of covered targets is maximised. We show that it is NP-hard to find an optimal solution and we investigate both centralised and distributed approximation algorithms with provable performance guarantee. In addition, we analyse the problem itself from the combinatorics' point of view. Finally we also conduct a simulation experiment to evaluate the practical performance of proposed algorithms.
    Keywords: WSN; wireless sensor network; directional cover; target coverage maximisation; distributed algorithm; approximation algorithm.
    DOI: 10.1504/IJSNET.2015.10001259
     
  • Distributed algorithms for a robust topology using reconfigurable radios wireless sensor networks   Order a copy of this article
    by Yueshi Wu, Mihaela Cardei 
    Abstract: In traditional wireless sensor networks (WSNs) communicating on a single channel, the data throughput measured at the sink is constrained by radio capability, contentions, and collisions, which increase in the region closer to the sink. Using software defined radio (SDR) technology, the distributed algorithm radio-mode assignment (RMA) is used by sensor nodes to reconfigure their radio according to some predefined radio-modes, such that resulting topology is connected to the sink. This mechanism reduces interference and increases data delivery rate. In this paper, we extend RMA by adding two distributed algorithms to be used in the presence of a primary user. Sensor nodes operating on the same frequency as the primary user will reassign their radio-mode such that he resulting topology does not interfere with the primary user. We analyse the performance of our distributed algorithms using the ns-3 simulator.
    Keywords: WSN; wireless sensor network; cognitive radio; RMA; radio-mode assignment; multi-radio sink; distributed algorithm; primary user; robust topology.
    DOI: 10.1504/IJSNET.2016.10001264