Wireless sensor networks (WSNs) have proven to be an effective and dynamic paradigm for many applications, including structural health monitoring and tracking systems. However, the supply of energy ...to the sensors plays a key role in the success of these applications as well as the design and deployment of these networks. Currently, most WSNs are powered by batteries, which must be replaced frequently, increasing maintenance costs and operational complexity. In this paper, we propose a practical framework, called wirelessly energy-charged (WINCH), for battery maintenance; it involves recharging sensor batteries using mobile robots. This framework integrates a routing process in which the cluster heads are selected optimally, as in the low-energy adaptive clustering hierarchy-centralized protocol (LEACH-C), and the robots visit the sites frequently based on need and place themselves in the optimal positions with respect to the selected cluster heads. This approach considerably reduces overhead compared with existing methods. Moreover, we have developed an empirical model of the energy charging rate for sensor nodes. We use this model to compute the amount of energy harvested by each sensor in the proximity of the mobile charger. Simulation experiments for a wide range of design parameters and using several metrics, such as energy consumption, network throughput, and coverage, demonstrate the effectiveness of the proposed framework compared with an existing work.
Currently, IEEE 802.11 standard for ad-hoc wireless mode is inadequate for multi-hop network. Recent efforts for the advancement of 802.11 standards, such as 11e for QoS support and 11n for high data ...rates (> 100 Mbps), are still limited as they are dependent on the wired infrastructure backbone and single-hop wireless communication. One major challenge in quality-of-service (QoS) oriented routing in wireless ad-hoc networks is to find a route that satisfies multiple constraints including energy consumption minimization, delay, node failure and throughput maximization. In this paper, we propose a novel Dynamic Energy Efficient Routing (DEER) protocol that guarantees message delivery, maximum network lifetime and message flow. DEER uses those specific nodes on the fly which has maximum residual energy above a defined energy level for relaying message from a source to a destination. Our proposed approach has been evaluated using realistic channel model and it demonstrates improved session lifetime and efficient data flow compared to Probabilistic Energy Profile, Efficient Hop Count Routing, Dijkstra and Random/opportunistic algorithms. In addition, DEER can lend itself easily to battery-based sensor networks or energy-harvested based sensor networks.
COVID-19 surprised the whole world by its quick and sudden spread. Coronavirus pushes all community sectors: government, industry, academia, and nonprofit organizations to take forward steps to stop ...and control this pandemic. It is evident that IT-based solutions are urgent. This study is a small step in this direction, where health information is monitored and collected continuously. In this work, we build a network of smart nodes where each node comprises a Radio-Frequency Identification (RFID) tag, reduced function RFID reader (RFRR), and sensors. The smart nodes are grouped in clusters, which are constructed periodically. The RFRR reader of the clusterhead collects data from its members, and once it is close to the primary reader, it conveys its data and so on. This approach reduces the primary RFID reader’s burden by receiving data from the clusterheads only instead of reading every tag when they pass by its vicinity. Besides, this mechanism reduces the channel access congestion; thus, it reduces the interference significantly. Furthermore, to protect the exchanged data from potential attacks, two levels of security algorithms, including an AES 128 bit with hashing, have been implemented. The proposed scheme has been validated via mathematical modeling using Integer programming, simulation, and prototype experimentation. The proposed technique shows low data delivery losses and a significant drop in transmission delay compared to contemporary approaches.
Location Privacy Preservation (LPP) in Wireless Sensor Networks (WSNs) during the era of the Internet of things and smart systems is a critical element in the success of WSNs. LPP in WSN can be ...stated as: given a WSN with an adversary aiming to unravel the location of critical nodes of a WSN, the goal of the WSN manager is to enshroud the location of the critical nodes via routing and/or encryption mechanisms. Typical research in the LPP of WSN routing involves developing and/or estimating the performance of a fixed routing protocol under a given attack mechanism. Motivated by advancements in network softwarization, in this work, we propose an approach where the WSN manager as well as the WSN adversary can deploy multiple routing and attack mechanisms, respectively. Initially, the proposed approach is formulated as a repeated two-player zero-sum game. The formulation is further extended to handle multiple objectives and incomplete information in the game matrix. In this work, the multiple objectives are handled via the epsilon constraint method. The presence of incomplete information in the formulation is modeled as interval based uncertainty. To sum, the proposed formulation ultimately boils down to linear programming problems, which can be efficiently solved. Numerical case studies to showcase the applicability of the proposed approach are illustrated in this work. Finally, discussion on obtaining the required data from any given WSN, discussion and interpretation of the formulation’s results, and future research direction of the current work is presented.
Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These attacks can threaten the proper ...operations of such systems without any indication. This problem necessitates the design of a control system that is able to work under such attacks. In this paper, an improved observer-based stabilising controller is proposed for CPS including random measurements and actuation delays and it is coming under distributed denial of service (DDoS) and deception attacks. The occurrences of DDoS and deception attacks are modelled as Bernoulli distributed white sequences with variable conditional probabilities. The criterion is presented in terms of linear matrix inequalities. Detailed simulation experiments on representative systems are shown to prove the applicability of the proposed methodology.
Industry Revolution 4.0 pushes the industry to digitize all its operations. Cyberphysical Systems (CPSs), such as autonomous automobile systems and medical monitoring are examples of this revolution. ...However, as these systems are interconnected via the Internet, they become more vulnerable to cyber-attacks and in particular, stealthy attacks. Cyber attacks could affect the operations of CPS and cause physical damages before any indication. So, there is a need to design a secure control system to withstand in these circumstances. In this article, an event-triggering control scheme is designed for discrete time CPSs contain random delays in measurements and actuation signals and subject to simultaneous hybrid distributed denial of service (DDoS) and deception attacks. The cyber attacks are designed as Bernoulli distributed white sequences with conditional probabilities that are variable. Moreover, An event-triggering control scheme is proposed for decreasing the communication overhead in the system, such that the measurements’ signals are sent when a selected triggering condition is met. An observer based control is designed to maintain the stability of the CPS under all possible scenarios of single or hybrid simultaneous attacks in the forward and or backward communication. Linear matrix inequalities are used to represent the overall control scheme. At the end, two illustrative examples are presented and discussed to show the effectiveness of the presented scheme.
In wireless sensor-actor networks, sensors probe their surroundings and forward their data to actor nodes. Actors collaboratively respond to achieve predefined application mission. Since actors have ...to coordinate their operation, it is necessary to maintain a strongly connected network topology at all times. Moreover, the length of the inter-actor communication paths may be constrained to meet latency requirements. However, a failure of an actor may cause the network to partition into disjoint blocks and would, thus, violate such a connectivity goal. One of the effective recovery methodologies is to autonomously reposition a subset of the actor nodes to restore connectivity. Contemporary recovery schemes either impose high node relocation overhead or extend some of the inter-actor data paths. This paper overcomes these shortcomings and presents a Least-Disruptive topology Repair (LeDiR) algorithm. LeDiR relies on the local view of a node about the network to devise a recovery plan that relocates the least number of nodes and ensures that no path between any pair of nodes is extended. LeDiR is a localized and distributed algorithm that leverages existing route discovery activities in the network and imposes no additional prefailure communication overhead. The performance of LeDiR is analyzed mathematically and validated via extensive simulation experiments.
A Base Station (BS) is a gateway between a wireless sensor network (WSN) and the network administrator (NA). It is responsible for gathering information from the sensors and forwarding it to the NA ...while collecting instruction from him and communicating it to the WSN. Consequently, the BS has become the prime target of attackers. One form of attack on the BS is tempering. The attacker finds the physical location and destroys it. An adversary can easily find the BS since (in a typical WSN) it is the node with the highest traffic. In this paper, we hide the BS using proportional–integral–derivative (PID) controlled fake packet injection and data aggregation. The data aggregation strategy helps combine data from the sensor nodes into a super-packet, thus reducing the actual traffic. On the other hand, the PID-controlled fake packet injection technique compensates for the difference in traffic between the BS and other nodes in the network. The simulation results demonstrate that the proposed approach can protect the BS from packet-tracing and traffic analysis attacks.
The pipeline leakage problem is a very challenging and critical issue. Solving this problem will save the nation a lot of money, resources and more importantly, it will save the environment. This ...paper discusses the state of the art of leak detection systems (LDSs) and data fusion approaches that are applicable to pipeline monitoring. A comparison of LDSs is performed based on well-defined criteria. We have classified and critically reviewed these techniques. A thorough analysis and comparison of all the recent works have been provided.
A novel technique is proposed to optimize energy efficiency for wireless networks based on hierarchical mobile clustering. The new bi-level clustering technique minimizes mutual interference and ...energy consumption in large-scale tracking systems used in large public gatherings such as festivals and sports events. This technique tracks random movements of a large number of people in a bounded area by using a combination of smart-phone Bluetooth and Wi-Fi connections. It can be effectively used for monitoring health conditions of crowd members and providing their locations and movement directions. An integer linear programming (ILP) model of the problem is formulated to optimize the formation of clusters in a two-level hierarchical structure. In order to evaluate the proposed technique, it is compared to the optimum solutions obtained from the ILP model for both single-level and two-level clustering. Moreover, a Matlab/Simulink simulation model is developed and used to test the technique’s performance under realistic operating conditions. The results demonstrate a very good performance of the proposed technique.