Policy controlled self-configuration in unattended wireless sensor networks

被引:35
作者
Misra, Sudip [1 ]
Jain, Ankur [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
Wireless sensor networks; Self-organization; Markov decision process; Unattended systems; SPRR; PAIRS SHORTEST PATHS; ALGORITHM; ORGANIZATION;
D O I
10.1016/j.jnca.2010.07.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the decreasing cost and size of sensors, their importance has grown rapidly in the field of unattended network systems, which have a significant and vital role in military and security applications where human access is difficult once the nodes are deployed. A major issue in wireless sensor networks (WSN) is the limited availability of energy supply. The nodes have to cooperate and self-organize to provide an active backbone, making optimal use of energy by putting off the radio of the nodes which are not required. We propose the Policy Controlled Self-Configuration for Unattended Wireless Sensor Networks (PCSSN) scheme for self-organization in WSN. The algorithm consists of two phases: topology discovery and topology maintenance. Based on the concepts of Markov Decision Processes (MDP) we design a policy to activate the optimum number of nodes such that the application fidelity is not affected. The policy is based on the distance between neighboring nodes, the residual energy, and the neighbor count, which are indicators of the hop count, the network lifetime, and the state of connectivity of the network, respectively. We also consider the case of node failures, since failures are quite common in harsh unattended environments. In this paper, we show that our proposed scheme increases the utility function ranging from about 7% to 50% as the number of nodes increases. Further, we show that despite the overhead involved in the proposed scheme, the energy spent is much less than the active case, in which all the nodes stay active forever, without going to sleep. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1530 / 1544
页数:15
相关论文
共 50 条
  • [21] Directional Controlled Fusion in Wireless Sensor Networks
    Min Chen
    Victor C. M. Leung
    Shiwen Mao
    Mobile Networks and Applications, 2009, 14 : 220 - 229
  • [22] Self-organizing Desynchronization and TDMA on Wireless Sensor Networks
    Degesys, Julius
    Rose, Ian
    Patel, Ankit
    Nagpal, Radhika
    BIO-INSPIRED COMPUTING AND COMMUNICATION, 2008, 5151 : 192 - 203
  • [23] A self-configuration framework for balancing services in the fog of things
    Mota, Edson
    Barbosa, Jurandir
    Figueiredo, Gustavo B.
    Peixoto, Maycon
    Prazeres, Cássio
    Internet of Things and Cyber-Physical Systems, 2024, 4 : 318 - 332
  • [24] Self organization algorithm for unattended acoustic sensor networks in ground target tracking
    Walpola, Malaka
    Zhu, Hao
    Zhang, Jinsong
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2352 - +
  • [25] Configuration and Data Processing over a Heterogeneous Wireless Sensor Networks
    Cecilio, Jose
    Furtado, Pedro
    2011 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS AND WORKSHOPS (DCOSS), 2011,
  • [26] Self-monitoring of wireless sensor networks
    Hsin, C
    Liu, MY
    COMPUTER COMMUNICATIONS, 2006, 29 (04) : 462 - 476
  • [27] Self-healing wireless sensor networks
    Miyaji, Atsuko
    Omote, Kazumasa
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10) : 2547 - 2568
  • [28] Implementing the Distributed Consensus-based Estimation of Environmental Variables in Unattended Wireless Sensor Networks
    Contreras, Rodrigo
    Restrepo, Silvia Elena
    Pezoa, Jorge E.
    UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS X, 2014, 9248
  • [29] Novel architecture of self-organized mobile wireless sensor networks
    Rizvi, Syed
    Karpinski, Kelsey
    Razaque, Abdul
    Journal of Computing Science and Engineering, 2015, 9 (04) : 163 - 176
  • [30] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6