RESUMO
The main limitation of wireless sensor networks (WSNs) lies in their reliance on battery power. Therefore, the primary focus of the current research is to determine how to transmit data in a rational and efficient way while simultaneously extending the network's lifespan. In this paper, a hybrid of a fuzzy logic system and a quantum annealing algorithm-based clustering and routing protocol (FQA) is proposed to improve the stability of the network and minimize energy consumption. The protocol uses a fuzzy inference system (FIS) to select appropriate cluster heads (CHs). In the routing phase, we used the quantum annealing algorithm to select the optimal route from the CHs and the base station (BS). Furthermore, we defined an energy threshold to filter candidate CHs in order to save computation time. Unlike with periodic clustering, we adopted an on-demand re-clustering mechanism to perform global maintenance of the network, thereby effectively reducing the computation and overhead. The FQA was compared with FRNSEER, BOA-ACO, OAFS-IMFO, and FC-RBAT in different scenarios from the perspective of energy consumption, alive nodes, network lifetime, and throughput. According to the simulation results, the FQA outperformed all the other methods in all scenarios.
RESUMO
Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system, to identify and isolate malicious or faulty sensor nodes. This information can be leveraged by neighboring nodes, to prevent collaboration in tasks like data aggregation and forwarding. While numerous trust frameworks have been suggested in the literature to assess trust scores and examine the reliability of sensors through direct and indirect communications, implementing these trust evaluation criteria is challenging due to the intricate nature of the trust evaluation process and the limited availability of datasets. This research conducts a novel comparative analysis of three trust management models: "Lightweight Trust Management based on Bayesian and Entropy (LTMBE)", "Beta-based Trust and Reputation Evaluation System (BTRES)", and "Lightweight and Dependable Trust System (LDTS)". To assess the practicality of these trust management models, we compare and examine their performance in multiple scenarios. Additionally, we assess and compare how well the trust management approaches perform in response to two significant cyber-attacks. Based on the experimental comparative analysis, it can be inferred that the LTMBE model is optimal for WSN applications emphasizing high energy efficiency, while the BTRES model is most suitable for WSN applications prioritizing critical security measures. The conducted empirical comparative analysis can act as a benchmark for upcoming research on trust evaluation frameworks for WSNs.
RESUMO
This study provides a thorough examination of the important intersection of Wireless Sensor Networks (WSNs) with machine learning (ML) for improving security. WSNs play critical roles in a wide range of applications, but their inherent constraints create unique security challenges. To address these problems, numerous ML algorithms have been used to improve WSN security, with a special emphasis on their advantages and disadvantages. Notable difficulties include localisation, coverage, anomaly detection, congestion control, and Quality of Service (QoS), emphasising the need for innovation. This study provides insights into the beneficial potential of ML in bolstering WSN security through a comprehensive review of existing experiments. This study emphasises the need to use ML's potential while expertly resolving subtle nuances to preserve the integrity and dependability of WSNs in the increasingly interconnected environment.
RESUMO
Energy efficiency and security issues are the main concerns in wireless sensor networks (WSNs) because of limited energy resources and the broadcast nature of wireless communication. Therefore, how to improve the energy efficiency of WSNs while enhancing security performance has attracted widespread attention. In order to solve this problem, this paper proposes a new deep reinforcement learning (DRL)-based strategy, i.e., DeepNR strategy, to enhance the energy efficiency and security performance of WSN. Specifically, the proposed DeepNR strategy approximates the Q-value by designing a deep neural network (DNN) to adaptively learn the state information. It also designs DRL-based multi-level decision-making to learn and optimize the data transmission paths in real time, which eventually achieves accurate prediction and decision-making of the network. To further enhance security performance, the DeepNR strategy includes a defense mechanism that responds to detected attacks in real time to ensure the normal operation of the network. In addition, DeepNR adaptively adjusts its strategy to cope with changing network environments and attack patterns through deep learning models. Experimental results show that the proposed DeepNR outperforms the conventional methods, demonstrating a remarkable 30% improvement in network lifespan, a 25% increase in network data throughput, and a 20% enhancement in security measures.
RESUMO
Structural health monitoring (SHM) is critical for ensuring the safety of infrastructure such as bridges. This article presents a digital twin solution for the SHM of railway bridges using low-cost wireless accelerometers and machine learning (ML). The system architecture combines on-premises edge computing and cloud analytics to enable efficient real-time monitoring and complete storage of relevant time-history datasets. After train crossings, the accelerometers stream raw vibration data, which are processed in the frequency domain and analyzed using machine learning to detect anomalies that indicate potential structural issues. The digital twin approach is demonstrated on an in-service railway bridge for which vibration data were collected over two years under normal operating conditions. By learning allowable ranges for vibration patterns, the digital twin model identifies abnormal spectral peaks that indicate potential changes in structural integrity. The long-term pilot proves that this affordable SHM system can provide automated and real-time warnings of bridge damage and also supports the use of in-house-designed sensors with lower cost and edge computing capabilities such as those used in the demonstration. The successful on-premises-cloud hybrid implementation provides a cost effective and scalable model for expanding monitoring to thousands of railway bridges, democratizing SHM to improve safety by avoiding catastrophic failures.
RESUMO
To establish ubiquitous and energy-efficient wireless sensor networks (WSNs), short-range Internet of Things (IoT) devices require Bluetooth low energy (BLE) technology, which functions at 2.4 GHz. This study presents a novel approach as follows: a fully integrated all-digital phase-locked loop (ADPLL)-based Gaussian frequency shift keying (GFSK) modulator incorporating two-point modulation (TPM). The modulator aims to enhance the efficiency of BLE communication in these networks. The design includes a time-to-digital converter (TDC) with the following three key features to improve linearity and time resolution: fast settling time, low dropout regulators (LDOs) that adapt to process, voltage, and temperature (PVT) variations, and interpolation assisted by an analog-to-digital converter (ADC). It features a digital controlled oscillator (DCO) with two key enhancements as follows: ΔΣ modulator dithering and hierarchical capacitive banks, which expand the frequency tuning range and improve linearity, and an integrated, fast-converging least-mean-square (LMS) algorithm for DCO gain calibration, which ensures compliance with BLE 5.0 stable modulation index (SMI) requirements. Implemented in a 28 nm CMOS process, occupying an active area of 0.33 mm2, the modulator demonstrates a wide frequency tuning range of from 2.21 to 2.58 GHz, in-band phase noise of -102.1 dBc/Hz, and FSK error of 1.42% while consuming 1.6 mW.
RESUMO
This article outlines the design and implementation of an internet-of-things (IoT) platform for the monitoring of soil carbon dioxide (CO2) concentrations. As atmospheric CO2 continues to rise, accurate accounting of major carbon sources, such as soil, is essential to inform land management and government policy. Thus, a batch of IoT-connected CO2 sensor probes were developed for soil measurement. These sensors were designed to capture spatial distribution of CO2 concentrations across a site and communicate to a central gateway using LoRa. CO2 concentration and other environmental parameters, including temperature, humidity and volatile organic compound concentration, were logged locally and communicated to the user through a mobile (GSM) connection to a hosted website. Following three field deployments in summer and autumn, we observed clear depth and diurnal variation of soil CO2 concentration within woodland systems. We determined that the unit had the capacity to log data continuously for a maximum of 14 days. These low-cost systems have great potential for better accounting of soil CO2 sources over temporal and spatial gradients and possibly flux estimations. Future testing will focus on divergent landscapes and soil conditions.
RESUMO
Multipath routing protocol, which is one of the typical schemes to improve end-to-end transmission success ratio in Wireless Sensor Networks (WSNs), exploits two or more paths. However, collisions and interference might occur when each path is adjacent. To prevent this problem, they construct node- or link-disjointed paths. Although the paths could prevent the above-mentioned problem, it still has an issue in the area of time delay. To exploit the disjointed paths, pre-path construction is required. In addition, a lot of time is incurred to recover the whole path when the part of the path is damaged. This phenomenon adversely affects the end-to-end transmission success ratio and transmission time. To alleviate this problem, we propose a cluster-disjoint multipath routing protocol. The proposed scheme divides the whole network into grid clusters of a certain size in the network initialization phase. Each sensor could transmit packets through the pre-constructed cluster structure without the path construction phase. Also, even if any node fails, it could be easily replaced by other nodes within the cluster region. The simulation results show that the proposed scheme has an advantage in terms of transmission delay and end-to-end transmission success ratio compared to existing multipath routing protocols.
RESUMO
Accurate state-of-charge (SOC) estimation is essential for maximizing the lifetime of battery-powered wireless sensor networks (WSNs). Lightweight estimation methods are widely used in WSNs due to their low measurement and computation requirements. However, accuracy of existing lightweight methods is not high, and their adaptability to different batteries and working conditions is relatively poor. This paper proposes a lightweight SOC estimation method, which applies Peukert's Law to estimate the effective capacity of the battery and then calculates the SOC by subtracting the cumulative current consumption from the estimated capacity. In order to evaluate the proposed method comprehensively, different primary batteries and working conditions (constant current, constant resistance, and emulated duty-cycle loads) are employed. Experimental results show that the proposed method is superior to existing methods for different batteries and working conditions, which mainly benefits from the ability of Peukert's Law to better model the rate-capacity effect of the batteries.
Assuntos
Fontes de Energia Elétrica , Eletricidade , Registros , Condições de TrabalhoRESUMO
The minimum vertex cover (MVC) problem is a canonical NP-hard combinatorial optimization problem aiming to find the smallest set of vertices such that every edge has at least one endpoint in the set. This problem has extensive applications in cybersecurity, scheduling, and monitoring link failures in wireless sensor networks (WSNs). Numerous local search algorithms have been proposed to obtain "good" vertex coverage. However, due to the NP-hard nature, it is challenging to efficiently solve the MVC problem, especially on large graphs. In this paper, we propose an efficient local search algorithm for MVC called TIVC, which is based on two main ideas: a 3-improvements (TI) framework with a tiny perturbation and edge selection strategy. We conducted experiments on real-world large instances of a massive graph benchmark. Compared with three state-of-the-art MVC algorithms, TIVC shows superior performance in accuracy and possesses a remarkable ability to identify significantly smaller vertex covers on many graphs.
RESUMO
Recently, unmanned aerial vehicles (UAVs) have emerged as a viable solution for data collection from remote Internet of Things (IoT) applications. However, the successful implementation in this regard necessitates the development of a reliable and energy-efficient routing protocol. This paper proposes a reliable and an energy-efficient UAV-assisted clustering hierarchical (EEUCH) protocol designed for remote wireless sensor networks (WSNs) based IoT applications. The proposed EEUCH routing protocol facilitates UAVs to collect data from ground sensor nodes (SNs) that are equipped with wake-up radios (WuRs) and deployed remotely from the base station (BS) in the field of interest (FoI). During each round of the EEUCH protocol, the UAVs arrive at the predefined hovering positions at the FoI, perform clear channel assignment, and broadcast wake-up calls (WuCs) to the SNs. Upon receiving the WuCs by the SNs' wake-up receivers, the SNs perform carrier sense multiple access/collision avoidance before sending joining requests to ensure reliability and cluster-memberships with the particular UAV whose WuC is received. The cluster-member SNs turn on their main radios (MRs) for data packet transmission. The UAV assigns time division multiple access (TDMA) slots to each of its cluster-member SNs whose joining request is received. Each SN must send the data packets in its assigned TDMA slot. When data packets are successfully received by the UAV, it sends acknowledgments to the SNs, after which the SNs turn off their MRs, completing a single round of the protocol. The proposed EEUCH routing protocol with WuR eliminates the issue of cluster overlapping, improves the overall performance, and increases network stability time by a factor of 8.7. It also improves energy efficiency by a factor of 12.55, resulting in a longer network lifespan compared to Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. Moreover, EEUCH collects 5.05 times more data from the FoI than LEACH. These results are based on simulations in which the EEUCH protocol outperformed the existing six benchmark routing protocols proposed for homogeneous, two-tier, and three-tier heterogeneous WSNs.
Assuntos
Internet das Coisas , Reprodutibilidade dos Testes , Coleta de Dados , Benchmarking , Cafeína , Análise por ConglomeradosRESUMO
The Internet of Things (IoT) and Flying Ad Hoc Networks (FANETs) have become hot topics among researchers because of the increased availability of Unmanned Aerial Vehicles (UAVs) and the electronic components required to control and connect them (e.g., microcontrollers, single board computers, and radios). LoRa is a wireless technology, intended for the IoT, that requires low power and provides long-range communications, which can be useful for ground and aerial applications. This paper explores the role that LoRa plays in FANET design by presenting a technical overview of both, and by performing a systematic literature review based on a breakdown of the communications, mobility and energy topics involved in a FANET implementation. Furthermore, open issues in protocol design are discussed, as well as other challenges associated with the use of LoRa in the deployment of FANETs.
RESUMO
The problems of developing intelligent service provision systems face difficulties in the representation of dynamic aspects of cargo transportation processes and integration of different and heterogeneous ICT components to support the systems' necessary functionality. This research aims to develop the architecture of the e-service provision system that can help in traffic management, coordination of works at trans-shipment terminals, and provide intellectual service support during intermodal transportation cycles. The objectives concern the secure application of the Internet of Things (IoT) technology and wireless sensor networks (WSNs) to monitor transport objects and context data recognition. The means for safety recognition of moving objects by integrating them with the infrastructure of IoT and WSNs are proposed. The architecture of the construction of the e-service provision system is proposed. The algorithms of identification, authentication, and safety connection of moving objects into an IoT platform are developed. The solution of application of blockchain mechanisms for the identification of stages of identification of moving objects is described by analysing ground transport. The methodology combines a multi-layered analysis of intermodal transportation with extensional mechanisms of identification of objects and methods of synchronization of interactions between various components. Adaptable e-service provision system architecture properties are validated during the experiments with NetSIM network modelling laboratory equipment and show their usability.
RESUMO
In the evolving landscape of Industry 4.0, the convergence of peer-to-peer (P2P) systems, LoRa-enabled wireless sensor networks (WSNs), and distributed hash tables (DHTs) represents a major advancement that enhances sustainability in the modern agriculture framework and its applications. In this study, we propose a P2P Chord-based ecosystem for sustainable and smart agriculture applications, inspired by the inner workings of the Chord protocol. The node-centric approach of WiCHORD+ is a standout feature, streamlining operations in WSNs and leading to more energy-efficient and straightforward system interactions. Instead of traditional key-centric methods, WiCHORD+ is a node-centric protocol that is compatible with the inherent characteristics of WSNs. This unique design integrates seamlessly with distributed hash tables (DHTs), providing an efficient mechanism to locate nodes and ensure robust data retrieval while reducing energy consumption. Additionally, by utilizing the MAC address of each node in data routing, WiCHORD+ offers a more direct and efficient data lookup mechanism, essential for the timely and energy-efficient operation of WSNs. While the increasing dependence of smart agriculture on cloud computing environments for data storage and machine learning techniques for real-time prediction and analytics continues, frameworks like the proposed WiCHORD+ appear promising for future IoT applications due to their compatibility with modern devices and peripherals. Ultimately, the proposed approach aims to effectively incorporate LoRa, WSNs, DHTs, cloud computing, and machine learning, by providing practical solutions to the ongoing challenges in the current smart agriculture landscape and IoT applications.
RESUMO
The Industrial Revolution 4.0 (IR 4.0) has drastically impacted how the world operates. The Internet of Things (IoT), encompassed significantly by the Wireless Sensor Networks (WSNs), is an important subsection component of the IR 4.0. WSNs are a good demonstration of an ambient intelligence vision, in which the environment becomes intelligent and aware of its surroundings. WSN has unique features which create its own distinct network attributes and is deployed widely for critical real-time applications that require stringent prerequisites when dealing with faults to ensure the avoidance and tolerance management of catastrophic outcomes. Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. Fault tolerance structures contain three fundamental stages: error detection, error diagnosis, and error recovery. The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. This survey provides an elaborate classification and analysis of fault tolerance structures and their essential components and categorizes errors from several perspectives. Subsequently, an extensive analysis of existing fault tolerance techniques based on eight constraints is presented. Many prior studies have provided classifications for fault tolerance systems. However, this research has enhanced these reviews by proposing an extensively enhanced categorization that depends on the new and additional metrics which include the number of sensor nodes engaged, the overall fault-tolerant approach performance, and the placement of the principal algorithm responsible for eliminating network errors. A new taxonomy of comparison that also extensively reviews previous surveys and state-of-the-art scientific articles based on different factors is discussed and provides the basis for the proposed open issues.
RESUMO
In wireless sensor networks, tree-based routing can achieve a low control overhead and high responsiveness by eliminating the path search and avoiding the use of extensive broadcast messages. However, existing approaches face difficulty in finding an optimal parent node, owing to conflicting performance metrics such as reliability, latency, and energy efficiency. To strike a balance between these multiple objectives, in this paper, we revisit a classic problem of finding an optimal parent node in a tree topology. Our key idea is to find the best parent node by utilizing empirical data about the network obtained through Q-learning. Specifically, we define a state space, action set, and reward function using multiple cognitive metrics, and then find the best parent node through trial and error. Simulation results demonstrate that the proposed solution can achieve better performance regarding end-to-end delay, packet delivery ratio, and energy consumption compared with existing approaches.
Assuntos
Algoritmos , Tecnologia sem Fio , Reprodutibilidade dos Testes , Simulação por ComputadorRESUMO
In wireless sensor networks, due to the significance of the location information of mobile nodes for many applications, location services are the basis of many application scenarios. However, node state and communication uncertainty affect the distance estimation and position calculation of the range-based localization method, which makes it difficult to guarantee the localization accuracy and the system robustness of the distributed localization system. In this paper, we propose a distributed localization method based on anchor nodes selection and particle filter optimization. In this method, we first analyze the uncertainty of error propagation to the least-squares localization method. According to the proportional relation between localization error and uncertainty propagation, anchor nodes are selected optimally in real-time during the movement of mobile nodes. Then we use the ranging and position of the optimally selected anchor nodes to obtain the location information of the mobile nodes. Finally, the particle filter (PF) algorithm is utilized to gain the optimal estimation of the localization results. The experimental evaluation results verified that the proposed method effectively improves the localization accuracy and the robustness of the distributed system.
RESUMO
Target-barrier coverage is a newly proposed coverage problem in wireless sensor networks (WSNs). The target-barrier is a closed barrier with a distance constraint from the target, which can detect intrusions from outside. In some applications, detecting intrusions from outside and monitoring the targets inside the barrier is necessary. However, due to the distance constraint, the target-barrier fails to monitor and detect the target breaching from inside in a timely manner. In this paper, we propose a convex hull attraction (CHA) algorithm to construct the target-barrier and a UAV-enhanced coverage (QUEC) algorithm based on reinforcement learning to cover targets. The CHA algorithm first divides the targets into clusters, then constructs the target-barrier for the outermost targets of the clusters, and the redundant sensors replace the failed sensors. Finally, the UAV's path is planned based on QUEC. The UAV always covers the target, which is most likely to breach. The simulation results show that, compared with the target-barrier construction algorithm (TBC) and the virtual force algorithm (VFA), CHA can reduce the number of sensors required to construct the target-barrier and extend the target-barrier lifetime. Compared with the traveling salesman problem (TSP), QUEC can reduce the UAV's coverage completion time, improve the energy efficiency of UAV and the efficiency of detecting targets breaching from inside.
RESUMO
In a wireless sensor network (WSN), reducing the energy consumption of battery-powered sensor nodes is key to extending their operating duration before battery replacement is required. Message bundling can save on the energy consumption of sensor nodes by reducing the number of message transmissions. However, bundling a large number of messages could increase not only the end-to-end delays and message transmission intervals, but also the packet error rate (PER). End-to-end delays are critical in delay-sensitive applications, such as factory monitoring and disaster prevention. Message transmission intervals affect time synchronization accuracy when bundling includes synchronization messages, while an increased PER results in more message retransmissions and, thereby, consumes more energy. To address these issues, this paper proposes an optimal message bundling scheme based on an objective function for the total energy consumption of a WSN, which also takes into account the effects of packet retransmissions and, thereby, strikes the optimal balance between the number of bundled messages and the number of retransmissions given a link quality. The proposed optimal bundling is formulated as an integer nonlinear programming problem and solved using a self-adaptive global-best harmony search (SGHS) algorithm. The experimental results, based on the Cooja emulator of Contiki-NG, demonstrate that the proposed optimal bundling scheme saves up to 51.8% and 8.8% of the total energy consumption with respect to the baseline of no bundling and the state-of-the-art integer linear programming model, respectively.
Assuntos
Redes de Comunicação de Computadores , Tecnologia sem Fio , Algoritmos , Fontes de Energia Elétrica , Fenômenos FísicosRESUMO
Fighting Earth's degradation and safeguarding the environment are subjects of topical interest and sources of hot debate in today's society. According to the United Nations, there is a compelling need to take immediate actions worldwide and to implement large-scale monitoring policies aimed at counteracting the unprecedented levels of air, land, and water pollution. This requires going beyond the legacy technologies currently employed by government authorities and adopting more advanced systems that guarantee a continuous and pervasive monitoring of the environment in all its different aspects. In this paper, we take the research on integrated and large-scale environmental monitoring a step further by providing a comprehensive review that covers transversally all the main applications of wireless sensor networks (WSNs), unmanned aerial vehicles (UAVs), and crowdsensing monitoring technologies. By outlining the available solutions and current limitations, we identify in the cooperation among terrestrial (WSN/crowdsensing) and aerial (UAVs) sensing, coupled with the adoption of advanced signal processing techniques, the major pillars at the basis of future integrated (air, land, and water) and large-scale environmental monitoring systems. This review not only consolidates the progresses achieved in the field of environmental monitoring, but also sheds new lights on potential future research directions and synergies among different research areas.