Current Issue : April - June Volume : 2019 Issue Number : 2 Articles : 5 Articles
In wireless sensor networks, nodes may adopt selfish behavior to save their energy\nresources, which causes energy imbalance among nodes, because of lacking a central controller with\nthe function of making nodes cooperate. Noncooperative game is an effective tool for portraying this\nkind of selfish behavior. In this paper, we address the problems of transmission power minimization\nand energy balance using a topology control game. Firstly, we establish a topology control game\nmodel and prove that the topology game model is an ordinal potential game with Pareto optimality.\nSecondly, based on this model, we propose an Energy Balance Topology control Game algorithm\n(EBTG), in which, by taking the energy efficiency and energy balance of the nodes into account,\nwe design an improved optimization-integrated utility function by introducing the Theil index.\nFinally, simulation results show that the EBTG algorithm can improve the energy balance and energy\nefficiency, and can prolong the network lifetime in comparison with other topology control algorithms\nbased on game theory....
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the\ndata traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail\nattachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect\ntarget systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack\nprograms (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted\nattacks, run always over the network. Security measures against such internal network attacks require a comprehensive\nmonitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security\nconcept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach\nfor preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for\ncentralizing the related network decisions in a central authorityâ??the SDN controllerâ??that manages all network connections and\nhence the associated data flows....
Although condition monitoring is very important for a reliable operation of tram powertrain\ncomponents, conventional wired sensor systems do not manage to find wide acceptance because of\ninstallation and security costs. To address those issues, we propose a novel condition monitoring\nsystem based on a wireless and energy self-sufficient sensor network, where the individual sensor\nnodes harvest energy from vibrations, occurring while the tram is in motion. First, we performed\nan experimental investigation to identify the most important boundary conditions for the system\ndesign. Second, we designed individual sensor nodes using parameters derived from the previous\ninvestigation. Finally, the sensor network was deployed and tested on the tram gearboxes.\nThe obtained measurement data were recorded at a sufficient sampling rate of 4.56 kHz and were\nsuccessfully transferred from the tram gearbox to the network base station within a radius of\n10 m inside the tram despite factors such as reflections, fading and electromagnetic compatibility.\nA piezoelectric vibration harvester is the power supply for the sensor nodes and it delivers up to\n21.22 mWfor relevant vibration frequency range between 10 Hz and 30 Hz, thus enabling deployment\nof autonomous sensor nodes.\nKeywords: condition monitoring;...
A reliable energy-efficient routing protocol plays a key role in underwater data transmission.\nIn the face of acoustic communication challenges in underwater wireless sensor networks (UWSNs),\nincluding long propagation delay, topology change, limited energy, and communication voids,\nwe propose RECRP, a Reliable Energy-efficient Cross-layer Routing Protocol to achieve high data\ndelivery rate. RECRP is a location-free single-copy protocol. The information of the physical layer\nsuch as Doppler scale shift measurement, Received Signal Strength Indication (RSSI), etc. are\nadopted to estimate the distance, thus no extra hardware is needed for localization. Moreover,\nthe overhead introduced by redundant packets is avoided with the single-copy mechanism.\nTo improve the two-hop packet delivery rate and balance energy consumption among adjacent nodes,\nan optimal maxâ??min method is proposed that dynamically controls transmission power and\nchannel frequency. Furthermore, a surface to bottom routing establishment method is also adopted\nto handle communication voids. Compared with depth-based routing (DBR) and hop-by-hop\nvector-based forwarding (HH-VBF) , RECRP is more energy-efficient with a higher delivery rate....
In mobile ad hoc networks (MANETs) there is no centralized supervision over the network operations. In such networks, it is\nimperative to have protocols that are implemented locally in a distributed manner. To achieve high network performance utilizing\nonly the wireless channels a distributed transmission-scheduling medium-access control (MAC) protocol is desirable. This type of\nprotocol can guarantee a certain level of quality of service (QOS) and works well in congested networks. However, the transmission\nschedules are often decided in advance and if a node does not have a packet to transmit in its assigned slot then the slot is unused.\nWe propose a protocol called recovering minislots transmission scheduling (RMTS) that salvages these unused transmission slots\nthat would have otherwise been wasted. We show that the proposed protocol produces significant improvements in network\nperformance over traditional transmission-scheduling approaches....
Loading....