(FREE PDF Sample) Wireless Sensor Networks 1st Edition Liam I. Farrugia Ebooks
(FREE PDF Sample) Wireless Sensor Networks 1st Edition Liam I. Farrugia Ebooks
(FREE PDF Sample) Wireless Sensor Networks 1st Edition Liam I. Farrugia Ebooks
com
https://ebookgate.com/product/wireless-sensor-
networks-1st-edition-liam-i-farrugia/
https://ebookgate.com/product/protocols-and-architectures-for-
wireless-sensor-networks-1st-edition-holger-karl/
https://ebookgate.com/product/cooperating-embedded-systems-and-
wireless-sensor-networks-1st-edition-michel-banatre/
https://ebookgate.com/product/security-for-wireless-sensor-
networks-using-identity-based-cryptography-patil/
https://ebookgate.com/product/mobile-wireless-and-sensor-
networks-technology-applications-and-future-directions-1st-
edition-rajeev-shorey/
RFID and Sensor Networks Architectures Protocols
Security and Integrations Wireless Networks and Mobile
Communications 1st Edition Yan Zhang
https://ebookgate.com/product/rfid-and-sensor-networks-
architectures-protocols-security-and-integrations-wireless-
networks-and-mobile-communications-1st-edition-yan-zhang/
https://ebookgate.com/product/synchronization-in-wireless-sensor-
networks-parameter-estimation-peformance-benchmarks-and-
protocols-1st-edition-erchin-serpedin/
https://ebookgate.com/product/co-operative-and-energy-efficient-
body-area-and-wireless-sensor-networks-for-healthcare-
applications-1st-edition-akram-alomainy/
https://ebookgate.com/product/deploying-wireless-networks-
wilton-a/
https://ebookgate.com/product/technological-breakthroughs-in-
modern-wireless-sensor-applications-1st-edition-hamid-sharif/
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
COMPUTER SCIENCE, TECHNOLOGY AND APPLICATIONS
No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or
by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no
expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No
liability is assumed for incidental or consequential damages in connection with or arising out of information
contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in
rendering legal, medical or any other professional services.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
COMPUTER SCIENCE, TECHNOLOGY
AND APPLICATIONS
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
COMPUTER SCIENCE, TECHNOLOGY AND APPLICATIONS
LIAM I. FARRUGIA
EDITOR
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Copyright © 2011 by Nova Science Publishers, Inc.
All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted in
any form or by any means: electronic, electrostatic, magnetic, tape, mechanical photocopying, recording or
otherwise without the written permission of the Publisher.
For permission to use material from this book please contact us:
Telephone 631-231-7269; Fax 631-231-8175
Web Site: http://www.novapublishers.com
Independent verification should be sought for any data, advice or recommendations contained in this book. In
addition, no responsibility is assumed by the publisher for any injury and/or damage to persons or property
arising from any methods, products, instructions, ideas or otherwise contained in this publication.
This publication is designed to provide accurate and authoritative information with regard to the subject
matter covered herein. It is sold with the clear understanding that the Publisher is not engaged in rendering
legal or any other professional services. If legal or any other expert assistance is required, the services of a
competent person should be sought. FROM A DECLARATION OF PARTICIPANTS JOINTLY ADOPTED
BY A COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND A COMMITTEE OF
PUBLISHERS.
Additional color graphics may be available in the e-book version of this book.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
CONTENTS
Preface vii
Chapter 1 Improvement in Lifetime of Wireless Sensor Networks Using
Perfect Difference Set-Networks 1
G. Sudhir Akojwar and M. Rajendra Patrikar
Chapter 2 Key Management Protocol for Heterogeneous Sensor Networks 27
Ma Chun-Guang, Wang Jiu-Ru, Geng Gui-Ning, Shang Zhi-Guo
and Zhang Bing-Zheng
Chapter 3 Data Aggregation in WSNs: State of the Art and a Multi-Criteria
Proposal 43
Ahmad Sardouk, Leïla Merghem-Boulahia, Rana Rahim-Amoud
and Dominique Gaïti
Chapter 4 Detection of Malicious Code Injection Attacks in Sensor Networks
Using Sequential Analysis 89
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Jun-Won Ho
Chapter 5 The Simulation on Wireless Sensor Networks 95
Bai Li, Longxiang Gao and Binbin Zhou
Chapter 6 Continuous Data Collection In Wireless Sensor Networks 113
Dan Wang, Qian Zhang and Jiangchuan Liu
Chapter 7 On Load-Balanced Data Gathering for Lifetime Maximization in
Wireless Sensor Networks 133
Punyasha Chatterjee and Nabanita Das
Commentary Future Direction of Network Operators: Wireless Machine-to-
Machine Communications Network Infrastructure 157
Hiroshi Saito
Index 163
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
PREFACE
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
viii Liam I. Farrugia
Another key management protocol, the authors propose a Location-aware and secret share
based dynamic key management protocol to effectively replace the compromised central node
and enhance the security level of the network.
At the last of this chapter, the authors will summarize this chapter, and predict the future
development of key management.
Chapter 3 – The basic role of Wireless Sensor Network (WSN) is to collect data from the
environment by many sensor nodes. The WSN could be constituted by hundreds or thousands
of sensor nodes; hence, it could generate a huge amount of data. The communication of all
the sensed data causes high power consumption limiting, as a result, the lifetime of the sensor
nodes and consequently the WSN lifetime. Whereas, processing data locally within the sensor
node consumes much less than its communication. Thus, it is possible to reduce the power
consumption of the sensor nodes and, hence, to extend the network lifetime, by reducing the
number and size of the communicated data. This reduction of communicated data is possible,
if the sensor nodes' data are aggregated instead of being sent directly to the sink (the base
station in WSNs).
This chapter studies several methods of data aggregation in WSNs. It classifies them into
three categories. The first category represents structure-free mechanisms which abstract the
organization of the nodes within the network. It allows the end-user of the network to query
each sensor node, if needed. In the second category, the authors find the structure-based
mechanisms that solve the structure-free problems in terms of scalability. It organizes the
sensor nodes into a well structured form, such as a tree, or a set of groups. It defines
aggregator nodes to aggregate other nodes data. This aggregator node may be one head-node
per group or one parent for several children in a tree. Then, the end-user of the network has
the aggregated data through the aggregator nodes. The third one is a Multi-criteria Data
aggregation (McDa) mechanism. It combines characteristics from the structure-free and the
structure-based categories. It does not suppose any network structure. However,
spontaneously during the same data aggregation session, it is possible to have cooperation
between single nodes and groups of nodes. It eliminates the overhead and signaling needed in
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Preface ix
small-scale motes, each only capable of limited processing performance, short-range radio
transmission, and low power sensing capacities. As such, there has been an increasing need to
define and develop simulation frameworks for carrying out highfidelity WSN simulation,
which should be easily chosen and employed by researchers as well. This book chapter
surveys the recent simulation work on WSN and presents the available up-to-date simulators.
Each simulation tool is described based on some certain criteria and compared under the
appropriate evaluation standards in terms of different task requirements. This also provides
the readers with a better understanding of the latest development of WSN simulation and
helps them to incorporate their own WSN research work into the suitable simulation
development environment in the future.
Chapter 6 - Wireless sensor networks have been widely used for surveillance in harsh
environ-ments. In many such applications, the environmental data are continuously sensed,
and data collection by a server is only performed occasionally. Hence, the sensor nodes have
to temporarily store the data, and provide easy and on-hand access for most updated data
when the server approaches. Given the expensive server-to-sensor communications, the large
amount of sensors, and the limited storage space at each tiny sensor, continuous data
collection becomes a challenging problem.
In this paper, the authors present partial network coding (PNC) as a generic tool for the
above applications. PNC generalizes the existing network coding (NC) paradigm, an elegant
solution for ubiquitous data distribution and collection. Yet, PNC enables ef-fiand collectio
replacement for continuous data, which is a major deficiency of the conventional NC. The
authors prove that the performance of PNC is quite close to NC, ex-cept for a sub-linear
overhead on storage and communications. The authors then address a set of practical concerns
toward PNC-based continuous data collection and replacement in sensor networks. Its
feasibility and superiority are further demonstrated through simulation results.
Chapter 7 - A wireless sensor network (WSN) is an autonomous self-organizing system
of sensor nodes, distributed over an area to sense data from its surroundings and gather it to a
sink node for further processing. Sensor nodes are typically battery-operated and therefore
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
severely energy constrained. Besides limited computation and data sensing, each sensor node
dissipates most of its energy in transmitting and receiving data packets en route the sink node.
The shortest path routing is good for overall energy efficiency since energy needed to
transmit a packet is correlated to the path length. However this may load some nodes heavily,
causing earlier deaths and creating holes in the network, which in the worst case may leave
the network disconnected. Hence, load balanced data routing, considering load in terms of
power consumption at individual nodes, emerges as an important issue in WSN’s to enhance
the network lifetime. Unfortunately, the problem to compute the most balanced routes for
data gathering is NP-hard even in a very simple network. Extensive research has been done so
far to solve the problem under various scenarios of traffic patterns, data aggregation
techniques and node distribution policies. This chapter aims to present a comprehensive study
of several load-balancing schemes for wireless sensor networks, proposed in recent research
literatures, with special emphasis on the distributed ones that may lead the researchers to
explore newer avenues for load balanced data gathering in WSN’s to enhance network
lifetime.
Commentary - Due to the saturation of the telecommunication markets in technologically
advanced countries, network operators need to create a new market. One promising market is
for mobile wireless machine-to-machine (M2M) communications. Current networks do not
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
x Liam I. Farrugia
work well with many M2M applications; therefore, a new network is needed. To differentiate
this new network from others, it should have the following features: 1) low power
consumption, 2) be low-end-terminal friendly, 3) low cost, and 4) ubiquitous coverage.
Current networks do not satisfy these features. Standardization bodies and forums may also
be interested in the mobile wireless M2M communications market, but their main target at
present seems to be the current network infrastructure with short range radio equipment
purchased by customers. To implement the new network as a network infrastructure
satisfying the above-mentioned features, R&D efforts are essential for developing a large cell
with wireless terminals of low transmission power and a simplified security protocol
implementable in a low-end wireless terminal. A Wide Area Ubiquitous Network has been
proposed as one solution, and application experiments on this network have been conducted
in Tokyo, Japan.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
In: Wireless Sensor Networks ISBN: 978-1-61728-125-9
Editor: Liam I. Farrugia © 2011 Nova Science Publishers, Inc.
Chapter 1
Wireless Sensor Networks (WSN) are becoming more popular data gathering networks
for monitoring a wide range of parameters. WSN are being used for monitoring various
parameters such as environmental, industrial, in-house domestic parameters, medical and
health parameters etc. WSN populates a huge number of sensor nodes. A typical architecture
of sensor node is shown in Figure 1. Sensor nodes are tiny devices, which consist of three
functional units: Sensing Unit, Computational Unit and Communication Unit. Sensing unit is
composed of an array of sensors, which may include temperature, light, sound, humidity,
seismic, and position sensors. Computational unit is usually a microcontroller which
processes the sensor data. Communication unit is a radio device used for communicating the
data to the neighboring sensor node. WSN populates a huge number of sensor nodes. These
nodes form a self-organized network. These nodes coordinate and communicate to perform a
common task of data gathering. For this purpose, different routing algorithms are used.
Wireless sensor networks have become more popular because advances in sensor
technology, low-power electronics, low-power radio frequency design, and VLSI & MEMS
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
2 G. Sudhir Akojwar and M. Rajendra Patrikar
technology, have enabled the development of small, relatively inexpensive and low-power
sensors, called microsensors. These wireless microsensor networks represent a new paradigm
for extracting data from the environment and enabling the reliable monitoring of a variety of
environments for applications that include surveillance, machine failure diagnosis,
chemical/biological detection, habitat monitoring, environmental monitoring etc. WSN are
effective ubiquitous computing systems used for medical and health care applications.
The sensor network is composed of a large number of sensor nodes which are densely
deployed either inside the phenomenon or in its proximity. The sensor nodes may be
randomly deployed in inaccessible terrain or disaster relief operations. Hence, sensor network
protocols and algorithms must possess self-organizing capabilities. Wireless sensor nodes are
battery powered and thus face energy constraint. Every node has limited power which decides
the life span of the node and, in turn, the entire network. Many times, WSN include redundant
nodes to provide fault tolerant capability. A few sensor nodes may die because of power
exhaustion or any other failure. Even if few nodes die, the sensor network continues to
function because of its fault-tolerant capability. One of the constraints on sensor nodes is the
low power consumption. Hence, sensor network protocols focus on power conservation.
Since the sensor nodes are often inaccessible, the lifetime of a sensor node must be assured.
Sensor node lifetime depends on the lifetime of power resources; hence, power scarcity must
be effectively managed. Figure 1 shows architecture of a typical sensor node. It basically
consists of: sensing unit, computation or data processing unit and communication or radio
unit. Daniele et al. [1] has discussed many hardware specifications/features of sensor
node/mote for radio, microcontroller and the platform used.
Mem
Sensors
Battery
DC - DC
RADIO
ADC
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
MC
Algorithms and
Real time
Typical sensor node block diagram is shown in Figure 1. It basically consists of: Sensing
unit (sensors), computation or data processing unit (MCU: micro controller unit) and
communication unit (RADIO). Sensor data is converted to digital streams using ADC.
Microcomputer units (MCU) process data streams by executing algorithms, such as
classification algorithm. Then the processed data is communicated over the network by radio
unit. The entire sensor node works under a typical real time operating system such as TINY
OS. The MCU also includes a protocol stack for efficiently routing the data over the sensor
network.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 3
Power consumption can be divided into three domains: sensing, communication and data
processing. Sensing power varies with the nature of applications. Sporadic sensing might
consume less power than constant event monitoring. Of the three domains, a sensor node
expends maximum energy in data communication by radio unit. This involves both data
transmission and reception. Sensor node architecture, wireless sensor network protocols, its
applications, and wireless-networking issues are very well described in Akyildiz et al. [2].
Many categories of applications of WSN- such as industrial applications, domestic
applications, military, public utilities, agriculture etc. are discussed by Carlos et al. [3]. Lewis
[4] has described many topologies for WSN and has discussed network structures and
hierarchical networks. Chong et al. [5] has elaborated on the history of research on sensor
network research. He has discussed the prospects of sensor network research in 21st century.
The main functional blocks in sensor nodes that consume power are: sensing unit,
computation unit and communication unit. An important challenge in the design of these
networks is that two key resources - communication bandwidth and energy - are significantly
more limited than in a tethered network environment. These constraints require innovative
design techniques to use the available bandwidth and energy efficiently. The communication
consumes the major part of the energy budget, thus attempts must be made to implement
techniques to save energy on communications. Every aspect of WSN is designed with energy
constraints. There are three basic units in sensor nodes which consume power:
communication, computation and sensing unit. Hence, all the attempts are being made to
reduce the energy consumption at each unit. Many energy aware protocols are developed for
reduced energy consumption and thereby improve the life span of the WSN. Wireless sensor
network bears very specific characteristics that are described in following section.
1. Low bit rates: Sensor networks have low bit rates (~1kbps). The low bit rate is due
to the fact that the sensor parameter varies at very low rates. This is a very important
feature of WSN which needs to be fully explored at each design step. This feature
makes it possible to keep the WSN in deep sleep mode.
2. Low duty cycle : The sensor nodes are kept in sleep mode for most of the time. The
duty cycle for sleep and wake up mode is typically around 1%. Thus, the node is kept
on only when it is sensing data with its sensor or transmitting/receiving data from
other nodes. The strategy is to keep the sensor node in sleep mode for most of the
time to reduce energy consumption.
3. Size constraints: In order to deploy the sensor nodes unobtrusively for environment
monitoring, the sensor nodes need to have miniature size. The current focus of the
research community is to achieve dust-sized sensor nodes. Advances in VLSI and
MEMS are leading to smaller sensor nodes. Further advances in nanotechnology and
organic sensors are likely to help in reduction in the size of the nodes. Currently, the
power supply (battery or energy scavenging technique) is leading to larger sensor
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
4 G. Sudhir Akojwar and M. Rajendra Patrikar
4. Low cost: Sensor nodes should be cheap. Since this network will have hundreds or
thousands of sensor nodes, these devices should be low cost. Even the research
community is expecting and striving for sensor nodes with negligible cost as
compared to network infrastructure cost.
5. Energy constraints: Energy constraint is the most important factor influencing the
design of the sensor nodes and the choice of algorithms for the sensor networks. Due
to energy constraints, sensor nodes need to have ultra-low power circuitry. The
algorithms for sensor networks need to be energy-efficient.
6. Data-centric: WSN are data-centric in nature, meaning that the emphasis is on data
to be routed. This can be contrasted with traditional wireless networks which are
essentially node-centric. WSN are basically data gathering networks.
7. Multi hop: The signal from a wireless sensor node may not reach the base station
straight. The solution is to communicate through multi-hop. Another advantage is
that radio signal power is proportional to r4, where r is the distance of
communication. Thus, depending on radio parameters, it can be more energy
economic to transmit many short-distance messages than one-long distance message.
8. Localization: The data from a sensor node is meaningless if it is not associated with
the position of the sensor node. Localization is important for wireless sensor
networks and the data from a node is sent along with the co-ordinates of the sensor
node.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
10. Distributed Network and Distributed Processing: WSN consists of large numbers
of nodes that are distributed over a region of interest. Each sensor node should be
able to process local data, using filtering, data fusion and aggregation algorithms to
collect data from the environment and aggregate this data, transforming it to
information.
11. Dynamic Networks: Sensor nodes are mobile so that during deployment they can be
placed as per needs of the application. Due to node mobility, environmental
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 5
obstructions, restricted resources etc., the sensor networks exhibit a highly dynamic
network topology.
12. Redundancy in data: There is inherent redundancy in the readings from the sensors.
This redundancy can be further characterized as spatial redundancy and temporal
redundancy. Spatial redundancy arises from the fact that sensor nodes, which are
physically placed close to each other, will give similar value of the measured
quantity. In addition, the value of measured physical quantity will not change
abruptly in short span of time, and, therefore, the data measured over a short time
span is likely to remain same. This gives rise to temporal redundancy. Hence, WSN
must have efficient data processing and management algorithms.
From the literature review, we identified that the communication unit consumes major
part of the energy available in the sensor node, as discussed by Raghunathan et al. [6]. This
research work discusses classification technique using ART1 (Adaptive Resonance Theory)
and Fuzzy ART (FA) neural networks model. ART1/FA has a specific feature that allows it to
classify real time data, hence being called real time classifier. Real time classifier classifies
the sensor readings and then the classified sensor data is communicated further. This saves a
sufficient amount of energy.
The next sections describe the issue of fixed deployment of sensor nodes, introduce the
research approach, and briefly describe UbiSens: Project at VLSI Lab VNIT.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Deployment of sensor nodes includes many possibilities. Traditionally, sensor nodes are
randomly deployed over a geographical area. This includes routing protocols which use
random deployment principle. Random deployment needs a location finding system in the
node, which could find the neighboring nodes and decide whether to connect and transmit
data. In such protocols, a large part of the energy is consumed in executing long programs by
the computation unit. We pondered over the idea of reducing energy consumption on
executing routing protocols. Today, WSN are also becoming popular in applications such as
smart houses, intelligent offices, mines, nuclear installations, large buildings, government
installations, etc. Hence, for such applications, fixed geometrical deployment could be
employed. Sensor nodes while deployment adheres to some geometrical form. We chose to
implement the concept of Perfect difference set networks for wireless sensor nodes. In PDS
networks, any node can communicate with other node within a hop count of one or two. This
makes it possible to use simplest possible routing technique. This routing technique can be
effectively implemented in VLSI while designing the node. This routing technique reduces
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
6 G. Sudhir Akojwar and M. Rajendra Patrikar
the computation time of the processor and hence in turn saves power consumed by the
computation unit.
We propose to use ANN (artificial neural network) based ART1 neural network model
for classification of sensor data. By classification, huge sensor data traffic can be reduced and
hence it lowers the energy consumption on the communication unit and also improves the
bandwidth of the network. This classifier is supposed to be a part of the (ubiquitous sensing)
UbiSens: Low power sensor node. When this node is deployed in WSN, the life span of the
network is improved by about 40%. Many classification and clustering algorithms are
available and are being developed for data management in sensor networks.
Most of the energy-aware routing algorithms are designed for the random deployment of
sensor networks, which are suitable for large geographical deployment. Fixed geometrical
deployment strategy can be more efficient and economical for deploying sensor network in
smart houses, offices, hospitals, mines, nuclear installations, and many other domestic
applications.
We propose to use Perfect Difference Set (PDS) network for the fixed geometrical
deployment of sensor networks. In this research work, we propose to reduce the energy
consumption by computation unit by using PDS-Networks for deploying WSN. By using
classification techniques, a large amount of sensor data traffic can be reduced and, thereby,
energy spent on communication unit is saved. The lifetime of WSN with popular cooperative
routing is compared with PDS-WSN. The ART1 neural network model is used for the
classification of sensor data. The lifetime of WSN with and without classification in both the
cases – with PDS-WSN and with cooperative routing is also presented.
In this research work we attempt to reduce the power consumption on communication
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
unit by using classification techniques and by deploying the sensor nodes as per PDS –
network power consumption by computation unit can be reduced. PDS-WSN takes care of
geometrical deployment of the nodes.
Many research efforts are being carried out for designing low power sensor nodes. One
such sensor node architecture – UBISENS – is proposed and undertaken at VLSI Lab, VNIT,
Nagpur. The proposed classifier in this work is to be used in this sensor node. With
classification technique, it is proposed that a Low power sensor node with an improved
lifetime can be designed.
The low power sensor node was achieved using the classification technique. Then we
thought of deploying the sensor node with effective and least power consumption. Why we
should not have a network strategy where we have minimum hops and simpler routing? We
ponder over the concept and we used the concept of perfect difference set networks to be used
for WSN.
PDS-WSN strategy is explored and experimented for its fixed (non mobile) geometrical
deployment. PDS-WSN facilitates minimum hop counts (one or two) to reach cluster head.
This feature provides low power consumption by the network and simplest routing technique,
which leads to improvement in the lifetime of WSN. Thus, the low power sensor network can
be realized. Hence, it can be called a low power network. A further advantage of PDS-WSN
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 7
is that the routing technique is simple and can be realized as VLSI implementation. We had
VLSI framework in mind while proceeding on this research work. ART1/ Fuzzy ART
classifier algorithms are proposed which provides features for its easy VLSI implementation.
This ART1 classifier can be effectively used in noisy industrial environments by using DWT
input layer filter. Many possible VLSI implementations of DWT are available. Thus, the
research output provides a framework for VLSI implementation of Low power Sensor node
with Low power Sensor network.
We have implemented cooperative routing techniques for data dissemination in the
network, which give the advantage of equitable distribution of energy over the network and
thereby improving the average lifespan of the network. We have deployed two separate
radios; a low bit rate (1Kbps) MAC Radio with 100% duty cycle and a high bit rate (10Kbps)
data transmission Radio with low duty cycle (1%). The MAC radio is always ON for
maintaining the network while the data transmission radio is under sleep or wake up mode. It
wakes up only during data transmission. This strategy also contributes to the saving of energy
consumption by the communication unit. This technique is suggested in Berkeley Motes and
discussed by Miller et al. [7].
The lifetime comparison for cooperative routing and PDS-WSN with and without
classification techniques is presented in this chapter. The WSN is modeled [8] in Ptolemy-II:
Visualsense [9,10]. The ART1 neural network model is implemented in MATLAB. ART1
classifier implemented in MATLAB is interfaced with WSN model implemented in Ptolemy-
II.
The UbiSens (Ubiquitous Sensing) project [11] at VNIT is targeted towards exploring
novel architecture for ultra-low power sensor nodes. Typically, a sensor node consists of a
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
8 G. Sudhir Akojwar and M. Rajendra Patrikar
In addition to the above mentioned strategies, various software techniques and efficient
scheduling can help to reduce the power consumption. The classifier developed under this
research work is supposed to be embedded with the sensor node as shown in Figure 3.
The classifier functional block may be VLSI implemented hardware. If the node
processor and memory permits, the classifier may be a software module. However, to gain
speed, reduce memory requirement and save power, we could have VLSI implementation of
classifier. The sensor data is classified at classifier and then the data is communicated through
transceiver to the neighbouring sensor nodes. Under this architecture, the data compression
engine becomes optional.
Networking Module
Power Storage
Power Source
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 9
The role of Projective Geometry in WSN is discussed in this chapter. The mathematical
notion of Perfect Difference set is derived from Projective Geometry which simplifies node
deployment and routing technique. The concept of Perfect Difference set-Network for
Wireless Sensor Networks is introduced in this chapter. A cluster of 12 sensor nodes is
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
formed and sensor network with 4 such clusters is implemented. A similar sensor network
with two tires of PDS-WSN with 6 clusters is also implemented. Lifetime computation is
carried out for both cases with and without classification.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
10 G. Sudhir Akojwar and M. Rajendra Patrikar
messages. Thus, it does not require supports of backbone networks. These characteristics
make it superior to those schemes requiring infrastructure supports and are especially useful
in battlefield, disaster relief, and scientific exploration. Unfortunately, since the locations of
nodes are random and time varying, it is more difficult to analyze the performance of ad-hoc
networks. In general, wireless ad-hoc networks can be modeled in the framework of a random
graph, where network nodes and links can be thought of as vertices and edges of a random
graph.
A Distributed Geometric Routing Algorithm for Ad Hoc Wireless Networks is presented
by Rashid et al [14]. This paper presents a fully distributed algorithm to compute a planar
subgraph of the underlying wireless connectivity graph. It considers the idealized unit disk
graph model in which nodes are assumed to be connected if and only if nodes are within their
transmission range. The main contribution of this paper is a fully distributed algorithm to
extract the connected, planar graph for routing in the wireless networks. The communication
cost of the proposed algorithm is O(d log d) bits, where d is the degree of a node. This paper
presents a geometric routing algorithm. The algorithm is fully distributed and nodes know
only the position of other nodes and can communicate with neighboring nodes in their
transmission range.
This review confirms that projective geometry concepts can be explored which facilitates
node deployment strategies and can provide possibly simple routing techniques. We choose to
explore and use Perfect Difference set – Networks for WSN.
In Wireless Sensor Networks, nodes are randomly deployed. Most of the protocols in
WSN are designed for its random deployment. Projective Geometry can be used for the fixed-
geometrical deployment of wireless sensor nodes. This strategy can be used for deploying
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
nodes in smart houses, hotels, offices, underground mines, etc. For environmental monitoring
on large geographical areas, random deployment is used. In random deployment, many
redundant sensors are used which increases the cost. In fixed geometrical deployment, exact
number of nodes with their specific location can be deployed. This reduces the cost and
optimization of the network can be achieved. We propose the use of Perfect Difference Set in
the paradigm of WSN. Wireless Sensor Nodes are battery powered and their life span
depends on how energy consumption can be effectively managed for lower consumption at all
functional blocks. Amongst the three units of Wireless Sensor Node: sensing, computation
and communication, communication unit consumes the largest energy budget, hence all
research efforts are being made to reduce the energy consumption on communication. Many
energy aware routing protocols are designed on this line.
We propose the strategy to use PDS- networks in the paradigm of WSN. In PDS–
Network, nodes are interconnected to allow a minimum number of hops during
communication. Any node can send data to a cluster head node within a hop count of one or
two. Because of simplicity of connection amongst nodes, the routing algorithm becomes very
simple. In such cases, the relative position of nodes is always known. Hence the routing
algorithm will become very short, occupy less memory space and will be executed faster by
the node’s processor. This reduces the energy consumed by the computation unit.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 11
Wireless sensor nodes also consist of a location finding system to know the location of
neighboring node. If the WSN are deployed using PDS-Networks, then all the nodes in the
network know their relative as well as absolute position. This removes the need of Location
finding system in the WSN which otherwise could consume additional energy. The fixed
deployment strategy could use PDS- Network for deployment of sensor nodes.
Theorem 1. - A sufficient condition that there exist +1 integers s0,s1 ,……., s, having
the property that their 2+ difference si – sj, ij, 0i, j, are congruent, modulo 2+ +1, to
the integers 1,2,….., 2+ in some order is that be a power of a prime.
Definition 1. - Perfect Difference Set (PDS) – A set {s0,s1 ,……., s } of δ+1 integers
having the property that their 2+ differences si – sj, 0ij, are congruent, modulo 2+ +1,
to the integers 1,2,….., 2+ in some order is a perfect difference set of order δ. Perfect
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
difference sets are sometimes called simple difference sets, given that they correspond to the
special λ=1 case of different sets for which each of the possible difference is formed in
exactly λ ways.
PDS need not contain an integer outside the interval [0, 2+ ] because any integer outside
the interval can be replaced by another integer in the interval without affecting the defining
property of the PDS.
Theorem 2. Given a PDS {s0, s1, . . . . ,sδ} of order δ, the set {as0 + b, as1 + b, . . . . , asδ +
b}, where a is relatively prime to δ2 + δ+1, also forms a perfect difference set
By definition, any perfect difference set contains a pair of integers su and sv such that sv -
su ≡ 1 mod δ2 + δ+1. By Theorem 2 and the observation that preceded it, subtracting su from
all integers in such a PDS yields another PDS that contains 0 and 1.
Definition 2. Normal PDS: A PDS {s0, s1, . . . . ,sδ} is reduced if it contains the integers 0
and 1. A reduced PDS is in normal form if it satisfies si < si+1 ≤ δ2 + δ, 0 ≤ i < δ.
Definition 3. Equivalent PDSs: two different PDSs are equivalent if they have the same
normal form {s0, s1, . . . . ,sδ}.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
12 G. Sudhir Akojwar and M. Rajendra Patrikar
Henceforth, we deal only with PDSs in normal form, some examples of which appear in
Table 2.1. Here the values of δ shown are powers of prime numbers and n = δ2 + δ+1. The
following section depicts the properties of PDS.
Property 1. Existence: Theorem 1 guarantees that a PDS exists for any number n that is
of the form δ2 + δ+1, where δ = ph and p is a prime number. It is suspected, though not yet
proven for arbitrarily large values of n that PDSs do not exist for other values of n. However,
practically speaking, this is not alarming, given that primes and their powers are quite
abundant, both in the range of practical interest for interconnection network size and
asymptotically. For example, there are 197 primes and powers of primes under 1,000.
Property 2. Multiplicity: For some values of δ, there exist more than one PDS. For
example, we have the following PDSs of order δ = 3:
0, 1, 3, 9 and 0, 1, 4, 6.
It is easily verified that all numbers in the interval [1, 12] can be formed as the mod 13
difference of numbers in each of the two sets above:
8 ≡ 9–1 ≡ 1–6
9 ≡ 9–0 ≡ 0–4
10 ≡ 0–3 ≡ 1–4
11 ≡ 1–3 ≡ 4–6
12 ≡ 0–1 ≡ 0–1
Property 4. Relationship with perfect partitions: PDSs are closely related to perfect
partitions, which have an even longer history. Take any PDS in normal form and find the
mod-n differences si+ 1 - si between consecutive numbers in it, including the difference s0 -sδ.
For example:
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 13
PDS (δ = 3, n = 13): 0, 1, 3, 9
Viewing this last sequence of integers as a circular one and adding subsequences of
length 1, 2, and 3 beginning with each term, yields each of the sums in the interval [1, 12]
exactly once as given below -
1 = 1
2 = 2
3 = 1+2
4 = 4
5 = 4+1
6 = 6
7 = 4+1+2
8 = 2+6
9 = 1+2+6
10 = 6+4
11 = 6+4+1
12 = 2+6+4
Such a mod-n sequence, which is also known as a perfect partition, ideal code, or ideal
ring proportions, can be used in synthesizing PDN type structures. However, PDSs provide a
more straightforward and efficient tool in this regard. Note that a PDS is transformed to a
corresponding perfect partition via modular subtraction of consecutive terms, while the
reverse transformation involves computing modular prefix sums.
A PDS allows us to express a large set of integers via a set of much smaller size, in a
simple and highly regular fashion. When used in the design of interconnection networks, this
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
property translates to a reduced number of links and switching elements or to more efficient
use of bandwidth.
Consider the normal form PDS {0,1, s2 ,……., s } of order δ. We can construct a direct
interconnection network with n=2+ +1 nodes based on this PDS as follows
Definition 4. – Perfect difference network (PDN) based on the PDS {0,1, s2 ,……., s }-
There are n=2+ +1 nodes, numbered 0 to n-1. Node i is connected via directed links to nodes
i±1 and i± sj (mod n), for 2≤ j≤δ. The preceding connectivity leads to a chordal ring of in and
out-degree d = 2δ and diameter D=2. Because, for each link from node i to j, the reverse link
from j to node I also exists, the network can be drawn as an undirected graph.
An example PDN for n = 7, based on the PDS {0, 1, 3}, is depicted in Figure-4. Every
normal-form PDS contains 1 as a member. Therefore, PDNs based on normal-form PDSs are
special types of chordal rings. In the terminology of chordal rings, the links connecting
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
14 G. Sudhir Akojwar and M. Rajendra Patrikar
consecutive nodes i and i+1 are ring links, while those that connect nonconsecutive nodes i
and i + sj, 2 ≤ j ≤ δ, are skip links or chords. The link connecting nodes i and i + sj is a
forward skip link of node i and a backward skip link of node i + sj. Similarly, the ring link
connecting nodes i and i + 1 is a forward ring link for i and backward ring link for i + 1.
As seen in Figure 4, any two nodes in a PDN are either connected by a link directly or via
a path of length 2 through an intermediate node. This property is elaborated upon in Figure 5,
where a shortest path from node 0 to each of the other nodes is highlighted and labeled with
the associated difference si – sj. Given the node symmetry of the network, shortest paths
between other pairs of nodes are obtained by simply adding the index of the source node to all
path labels as seen in Figure 5.
0
6
1
5 2
4 3
Figure 4. Chordal Ring Structure of the PDN with 7 nodes on the Perfect Difference Set {0, 1, 3}.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Figure 5. PDN with n=7, =2, depicting shortest paths from node 0 and labeled with corresponding
differences.
Table 1 shows the formation of various PDS with as power of prime numbers and n=2+
+1. Thus, there can be a minimum of 7 nodes with δ=2 or with δ=16 a network of 273 nodes
can be possible. PDS–Networks are better suited with small number of nodes in a wireless
environment.
Table 2 summarizes various parameter for PDS-Network. Network diameter D, defined
as the longest of the internodes distances, is an important figure of merit for networks. The
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 15
diameter D indicates the worst-case number of hops in sending a message from one node to
another. Network diameter plays a key role in communication latency, albeit in an indirect
way. This is best understood by considering the case of short and long messages separately.
For short worms, the travel time of the head, which is proportional to the hop distance,
dominates the overall message latency. For long messages, a significant number of links,
perhaps the entire source-to-destination path, is occupied by the worm carrying the message.
In networks with large diameters, the worms tend to be longer and, thus, occupy a greater
portion of the aggregate network bandwidth. This either increases the possibility of deadlock
or else forces us to use less aggressive routing algorithms.
Average internodes distance ∆ is defined as the average of the lengths of the distances
between all n(n-1) pairs of nodes, or perhaps between all n2 pairs of nodes when the distance
of each node to itself is also included in the averaging. The average internodes distance ∆ is
representative of average or expected communication latencies, whereas D represents the
worst case. For such networks, the average internodes distance ∆ generally grows in
proportion to D, even though the relationship between the two parameters is not strictly
linear. Put in another way, if the diameter of the network is quadrupled, the average
internodes distance at least doubles.
The bisection width B of a network is the minimum number of links whose removal cuts
the network in two parts, with n=2c nodes on one side of the partition and dn=2e nodes on the
other. Bisection bandwidth is defined in terms of link bandwidths, rather than multiplicity, for
networks in which the links have varying communication capacities. A large bisection (band)
width is an indicator of large aggregate network capacity for routing random traffic patterns
between arbitrary network nodes. For example, the hypercube with a bisection width of n=2
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
16 G. Sudhir Akojwar and M. Rajendra Patrikar
can achieve a higher communication performance for random traffic than a 2D mesh with
bisection width n1/2. The mesh is, in turn better than constant-bisection networks such as rings
and trees.
These parameters for the interconnection networks are elaborated in [16] and these
parameters need to be analyzed for WSN.
6
1
5 2
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
4 3
6
1
5 2
4 3
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 17
0
6
1
5 2
4 3
Figure 8. All to one PDS-WSN with 7 nodes on the Perfect Difference Set {0, 1, 3}.
0123456 0123456
3456012 2345601
n -message 2n Message
Cluster Head or
6 Gateway Node
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
5 1
0
2
4
Figure 10. Cluster of PDS-WSN with 7 nodes on the Perfect Difference Set {0, 1, 3} with circular
deployment.
In all to one broadcasting, all nodes can broadcast to the selected central node as shown
in Figure 8. This particular topology is of use in WSN. Routing in PDS-Network is very
simple and efficient, one called shift permutation routing. In shift permutation routing,
messages can be routed amongst nodes through one hop or two hop connectivity i.e. n or 2n
messages as depicted in Figure 9.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
18 G. Sudhir Akojwar and M. Rajendra Patrikar
Figure 11. Cluster of 12 nodes with one cluster head implemented in Ptolemy-II- Visual Sense.
Figure 12. WSN (48) with 4 clusters, each with 12 nodes as shown in Figure -11.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 19
Perfect Difference Set can be used for WSN [18] for fixed geometrical deployment,
where any node can send data to cluster head with one or two hop counts. WSN with 48
nodes scattered in four clusters is implemented in visual sense of Ptolemy-II. There are four
clusters each of 12 nodes and one cluster head as shown in Figure 12. From the cluster head,
data is collected at base station. In another implementation PDS – WSN with δ=3, n=13,
PDS= {0, 1, 3, 9} is implemented for each cluster; the node interconnections are shown in
Figure 2.10. During routing, each node knows the path towards cluster head. Shift
Permutation Routing is used, wherein either n or 2n messages are communicated to the
cluster head. In a shift permutation, each node x sends a message to node x + c, where c is a
constant. When c = ±si for some i, shift permutation can be performed in one step with no
conflict. In all other cases two steps are needed, with all intermediate nodes x + si and thus the
links used are distinct. Actually, a more general form of shift permutation in which the shift
amount is +c for some nodes and -c for some others can be performed in the same number of
steps, given that the forward moving and backward-moving messages do not interfere with
each other.
then connected with second tire of PDS- network. Thus, it is possible to deploy huge
population of senor nodes under the PDS-WSN.
The architecture of ART1[19] classifiers also supports PDS-WSN. The two tire classifier
architecture can be effectively implemented with PDS-WSN. At the ground layer, clusters
there can be ART1[20] classifier in each nodes so that classified data can be send to its cluster
head. At the second tire of PDS-network, we can implement second tire of classifier. Here,
ART1[21] classifier is implemented in each cluster head so that sensor data classified at each
ground layer node is further classified at second layer. This can greatly reduce the data traffic
communicated to base station. This peculiar architecture can be used for a huge population of
sensor nodes specifically for monitoring environmental parameters over large geographical
area. The second tire of classifier at cluster head is optional.
The experimental results of counting lifetime of WSN with different formulations of
PDS-WSN are presented in the next section.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
20 G. Sudhir Akojwar and M. Rajendra Patrikar
0
12 1
2
11
3
10
4
9
5
8
7 6
Figure 13. PDS Network with =3, n=13, PDS= {0, 1, 3, 9}.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Figure 14. WSN (72) with 6 clusters, each with 12 nodes as shown in Figure 2.8.
The experimental results are presented in the forms of charts. Chart 2.1 presents the
network lifetime of the proposed algorithm in comparison with the Cooperative Routing
algorithm[19,20]. The difference in all the sets of simulation is the seed used for
randomisation. The seeds for randomisation determine the network topology. The update
cycles in the Gateway node that measures the time right from setup phase until the first node
dies, calculates the lifetime. It is evident from the above table that there is an appreciable
improvement in the network lifetime. The improvement varies according to the network
topology. In Chart 2.1, the improvement in lifetime is consistently around 5%. The maximum
network lifetime improvement is found to be 6.21%.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 21
200
195 Lifetime with
190
Life Time
Cooperative
185 routing
180
175 Lifetime with
170 PDS-WSN(48)
165
160
155
150
145
Iterations of 1 2
Randomisation
3 4 5 6
Chart 2.2 describes the Lifetime of Network for PDS-WSN with and without
Classification. Here with classification the network lifetime is improved by around 41.08%
with maximum improvement of 42.52% and minimum 39.56% with different seeds of
randomisation of the nodes.
Chart 2.3. Describes the lifetime of PDS-WSN with 72 nodes. When clusters are
increased to 7, the lifetime of the overall network falls a little bit as compared to that of PDS-
WSN with 48 nodes. Still, it is showing the increase as compared to cooperative routing with
50 nodes.
Chart 2.4 describes the lifetime improvement in PDS-WSN (72) with classification
techniques, which is about 40.82% on average.
Classification
300
250 PDS-WSN(48)
Without
200
Lifetime
Classification
150
PDS-WSN(48)
100 With
Classification
50
0
Iterations of
Randomisation 1 2 3 4 5 6
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
22 G. Sudhir Akojwar and M. Rajendra Patrikar
200
190 Lifetime with
Lifetime
Cooperative
180
routing
170
Lifetime with
160 PDS-WSN(72)
150
140
1 2 3 4 5 6
Iterations of Randomisation
300 Lifetime
PDS-WSN(72) with
250 out
classification
200
Lifetime
150 Lifetime
Life Time PDS-WSN(72) with
100 classification
50
0
1 2 3 4 5 6
Iterations of Randomisation
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
200 Lifetime
Cooperative
190 routing
180 Lifetime
PDS-
Lifetime
170 WSN(48)
160 Lifetime
PDS-
150 WSN(72)
140
1 2 3 4 5 6
Iterations of Randomisation
The above chart presents the comparison of lifetime in case of cooperative routing with
PDS-WSN (48) and PDS-WSN (72) without using classification techniques.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 23
2.11. Conclusion
PDS-WSN uses the mathematical notion of Prefect Difference Set for the network
interconnections in a peculiar geometrical form. Hence, PDS-WSN can be effectively used
for fixed (non mobile) deployment of wireless sensor nodes.
PDS–Networks provide the simplest possible interconnections amongst nodes, which
simplify the routing technique. All the nodes in the cluster know their relative as well
absolute location in the network. Hence, such sensor nodes do not require a location-finding
system, which is usually the part of commercially available nodes. The absence of a location
finding system also contributed to the low power consumption. The simple shift permutation
routing has been used in PDS-WSN, which can be efficiently used for VLSI implementation
of low power – low cost sensor node. The use of two radios - normal data transmission radio
and MAC radio, also contribute to the reduction of energy consumption during
communication.
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Two cases of PDS-WSN are implemented. In the first case, four clusters, each of 12
nodes, and in another case, six clusters each of 12 nodes, were implemented. Improvement in
the lifetime of WSN as shown in Chart 2.1 is achieved because of the simplest routing
technique and reduced number of hop counts. Improvement in the lifetime of WSN is about
5% with WSN (48), and with WSN (72) the life time of the WSN is improved by about 4.5%.
This is achieved because of the simple routing technique and reduced number of hop counts.
Thus, this implementation reduces the consumption of energy by computational unit. Many
energy-aware protocol designs are striving for reducing the energy consumption on
communication. The combination of PDS-WSN cluster and energy aware routing for a large
population of sensor nodes can effectively reduce the energy consumption of the whole
network and thereby add to the lifespan of WSN. Cooperative routing is normally popular for
equitable energy consumption over the network and thereby improving average life of the
network.
Classification techniques using ART1 neural network model provides dynamic
classification of sensor data, which reduces the data traffic to be handled by communication
radio. This reduces the energy spent on the radio unit and improves the lifespan of the
network. With WSN (48), the lifetime is improved by about 41.08%, and for WSN, (72) the
lifetime improvement is about 40.82% as mentioned in the comparative charts 2.1 – 2.5.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
24 G. Sudhir Akojwar and M. Rajendra Patrikar
PDS-WSN facilitates clustering architecture for WSN. Two tire PDS networks can be
implemented with ART1 classifiers at each tire, which adds to great dimensionality reduction
in data traffic of communication of the whole sensor network and achieves improvement in
the lifetime of WSN.
REFERENCES
[1] Daniele Puccinelli and Martin Haenggi,”Wireless Sensor Networks: Applications and
Challenges of Ubiquitous Sensing”, IEEE circuits and systems magazine, third quarter,
2005, 19-29.
[2] Akyildiz, IF; Su, W; Sankarasubramaniam, Y; Cayirci, E. ”Wireless sensor networks: a
survey”, Computer Networks, 2002, 38, 393-422.
[3] Carlos, F; García-Hernández†, Pablo, H. Ibargüengoytia-González†, Joaquín García-
Hernández†, and Jesús A. Pérez-Díaz.,”Wireless Sensor Networks and Applications: a
Survey”, IJCSNS International Journal of Computer Science and Network Security,
2007, VOL.7 No.3, March 264-273.
[4] Lewis, FL. “Wireless Sensor Networks, Smart Environments: Technologies, Protocols,
and Applications”, DJ; Cook, SK. Das, John Wiley, New York, 2004.
[5] Chee-Yee Chong, and Srikanta P. Kumar, ”Sensor Networks: Evolution, Opportunities,
and Challenges”, Proceedings of the IEEE, VOL. 91, NO. 8, AUGUST 2003, pages:
1247-1256.
[6] Vijay Raghunathan, Curt Schurgers, Sung Park, and Mani B. Srivastava, “Energy-
Aware Wireless Microsensor Networks”, page(s): 40-50, IEEE signal processing
magazine, March 2002.
[7] Matthew, J; Miller, Nitin, Vaidya, H. “A MAC Protocol to Reduce Sensor Network
Energy Consumption Using a Wakeup Radio”, IEEE Transactions On Mobile
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Improvement in Lifetime of Wireless Sensor Networks Using Perfect … 25
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
In: Wireless Sensor Networks ISBN: 978-1-61728-125-9
Editor: Liam I. Farrugia © 2011 Nova Science Publishers, Inc.
Chapter 2
1.1 INTRODUCTION
In this chapter, we will talk about Heterogeneous Sensor Networks key Management
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Protocol.
At the first of this part, we will talk about what is Heterogeneous Sensor Networks
(HSN), and how to divide key management protocol by different method.
The second part of this chapter, based on different network threats and assumptions, we
will introduce one key pre-distributed protocol, two key management protocols. About the
key pre-distributed protocol, the key ring of nodes is based on divisible core pair-wise
balanced design. We design two key pre-distributed protocol, Divisible Core Pair-wise
Balanced Design Scheme shorted by DCPBD, and variant DCPBD shorted by VDCPBD.
One of the key management protocols, we propose a key management protocol for
heterogeneous sensor networks to improve the random key pre-distribution scheme using
deployment knowledge of nodes and the prior area deployment information. Another key
management protocol, we propose a Location-aware and secret share based dynamic key
management protocol to effectively replace the compromised central node and enhance the
security level of the network.
At the last of this chapter, we will summarize this chapter, and predict the future
development of key management.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
28 Ma Chun-Guang, Wang Jiu-Ru, Geng Gui-Ning et al.
Base Station
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
Cluster Head
Key Generation Node
Sensor Node
According to the different key distribution methods, the key management protocol can be
divided into random key management scheme and deterministic key management scheme. In
random key management scheme, the key ring of node is obtained randomly. In the
deterministic key management scheme, the key ring is obtained in deterministic manner,
avoiding the blindness of random key management scheme, and gaining higher key
connectivity rate and take full advantage of the node storage space.
According if the network can dynamically add or evict nodes and refreshing the key(s) of
its nodes periodically or requested, the key management can be divided into static key
management and dynamic key management. Static key management schemes perform key
management functions statically prior to or shortly after the deployment of the network
deployment. Accordingly, lost keys due to node capture and/or failure are not compensated.
The main feature of dynamic key management schemes is repeating the key management
process either periodically or on demand to respond to node capture.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Key Management Protocol for Heterogeneous Sensor Networks 29
How to construct the key ring is the most important issue in the deterministic key
distribution schemes. There is a problem in DCPBD scheme that sub-key-ring used in the
secure communication among cluster head nodes is fixed, which can not change according to
the scale of nets and has a low anti-captured ability. Then, through the construction of the
basic set of core in two-dimensional SBIBD and the extension of the special block design
method of DCPBD, we propose a variant protocol Variant Divisible Core Pair-wise Balanced
Design Scheme (VDCPBD), which is more conformed to the application of HSN. VDCPBD
could be better applied to large-scale HSN, and improved the safety performance of cluster
head nodes and common nodes connectivity significantly.
Then the block design is (b, v, r , k , ) - BIBD, (b, v, r , k , ) -design for short,
which is required to satisfy (v 1) r (k 1) , bk vr ,in particular, it is called SBIBD
when b v .
Definition 2[3]: It is supposed that {B1 , B2 , Bb } is a block design based on v -
set S {s1 , s 2 , s v } and K {k1 , k 2 , k m } .If meets the following conditions:
(1) (1) B j K 1 j b ;
(2) For any binary subset of S , the number of blocks in including it is a concrete
constant with independent of the binary subset.
Then is a pair-wise balanced design (PBD) of set S . If the constant in (2) is , then
the PBD is defined as PBD( K ; ; v) or PBD({k1 , k2 , km }; ; v) .The PBD is defined as
PBD(k ; ; v) when K {k} .
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
30 Ma Chun-Guang, Wang Jiu-Ru, Geng Gui-Ning et al.
Table 1. the mapping between Key Pre-distribution Scheme and PBD parameters
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
PBD
Key Pre-Distribution
Element Comment
S Base set Key pool
v Size of base set Number of keys
Block Key chain
B Particular block Cluster key chain
k Size of block Size of key chain
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Key Management Protocol for Heterogeneous Sensor Networks 31
(1) (1) B j K 1 j b ;
(2) For any binary subset of S , the number of blocks with the same length in
including it is a concrete constant with independent of the binary subset.
Then is called a variant pair-wise balanced design of set S . If the order of the
constants in (2) is {1 , 2 k } according to K , then the variant pair-wise balanced design
is defined as VPBD({k1 , k2 , ki };{1 , 2 , i }; v) -design.
Algorithm 2: VDCPBD Algorithm
InputⅠ: The number of common nodes N c , the storage space of common nodes K c .
InputⅡ: The number of cluster head nodes K h , the storage space of cluster head nodes
K h .(The number of actual cluster head is taken directly if it is a prime, or we take the
smallest prime which is bigger than it).
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
K1 K2 K3 K4 K5 K6 K7 K8 K9 K0
B1 1 0 0 1 0 0 1 0 0 0
B2 1 0 0 0 1 0 0 1 0 0
B3 1 0 0 0 0 1 0 0 1 0
B4 0 1 0 1 0 0 0 1 0 0
B5 0 1 0 0 1 0 0 0 1 0
B6 0 1 0 0 0 1 1 0 0 0
B7 0 0 1 1 0 0 0 0 1 0
B8 0 0 1 0 1 0 1 0 0 0
B9 0 0 1 0 0 1 0 1 0 0
B10 1 1 1 0 0 0 0 0 0 1
B11 0 0 0 1 1 1 0 0 0 1
B12 0 0 0 0 0 0 1 1 1 1
Key Management Protocol for Heterogeneous Sensor Networks 33
capture. An example of the network model is shown in Fig 2, where suppose the number of
network deployment sub regions is 9.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
1.4.1 Assumption
Our scheme consists of three phases: key pre-distribution, shared-key discovery, and
path-key establishment. Because we adopt the pre-deployment knowledge, prior area
information and some powerful nodes, all phases are considerably different from the random
key pre-distribution protocol [6].
Step 1: key pre-distribution phase.
This phase is performed offline and before the deployment of sensor nodes. First we need
to divide the network sensing area D into u v sub regions Di j , 1 i u , 1 j v with
Di j corresponding to the key pools S i j and deployment group Gi j . After completion of key
pools setup, for each D-sensor and H-sensor in Gi j , we randomly select m and M keys from
its corresponding key pool S i j , and load these keys and its identifiers into the memory of the
node.
Step 2: shared-key discovery phase.
After deployment, HSN is divided into multiple clusters according to the clustering
algorithm.[7] After completion of clusters forming, each node needs to discover whether it
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
shares any keys with its neighbors. To do this, each D-sensor could broadcast message:
a, K i j ( , ID ),1 i m , where a is a random number. The decryption of a, K i j ( , ID )
with the proper key by a recipient would reveal , ID and establish a shared key with the
broadcasting node.
After the above step, most D-sensor and H-sensor can establish direct shared-key. These
D-sensors are referred to as several 1 hop neighbor nodes of H-sensors, which is defined as
follows:
Definition 5 . A D-sensor that shares at least one key with H-sensor and its
communication range covers the H-sensor is referred to as a 1-hop neighbor node of the H-
sensor [8].
Step 3: the path-key establishment
After shared-key discovery phase, there is a direct shared-key graph in the cluster and
between clusters. This graph consists of the nodes that establish the direct shared-key and
their security link. The rest of nodes that can not establish the direct shared-key could find the
path key through this graph.
After this phase, D-sensors that haven’t established the direct shared-key with H-sensor
need to find (k+1)-hops path-key (for k=1, 2,…). These D-sensors are referred to as several
(k+1)-hops neighbor nodes of H-sensors, which is defined as follows:
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
36 Ma Chun-Guang, Wang Jiu-Ru, Geng Gui-Ning et al.
Definition 6. A D-sensor that hasn’t established k-hops path-key with H-sensor, but
shares at least one key with some k-hops neighbor nodes and its communication range covers
the k-hops neighbor nodes is referred to as a (k+1)-hops neighbor node of the H-sensor [8].
In this subsection, we show how to assign keys to each key pools S i j , such that S i j and
neighbors of S i j have a certain number of common keys. Based on Du et al.’s protocol [9],
we adopt a new method of setting up key pools and determining | SG | in our scheme, it is
different from Du et al.’s scheme. In our protocol, we have:
(1) Two horizontally, vertically and diagonally neighboring key pools share exactly
a | SG | keys, where 1/ 8 a 1/ 4 . This property is illustrated in Fig.3 (a).
(2) To the group Gi j and its corresponding the key pool S i j , a | Si1, j1 | and a | Si1, j | ,
a | Si1, j1 | and a | Si, j1 | , a | Si1, j1 | and a | Si1, j | , a | Si1, j1 | and a | Si1, j1 | , share
exactly b | SG | keys, where a | Si1, j1 | Si, j ,…, a | Si1, j | Si, j 0 a 1/ 4 , 8a 4b 1.
This property is illustrated in Fig.3 (b).
Given the global key pool S and the overlapping factor a and b, we now describe how we
can select keys for each key pool S i j for i=1,…,u and j=1,…,v. The following procedure
describes how we choose keys for each key pool:
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
(a)
(b)
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Key Management Protocol for Heterogeneous Sensor Networks 37
(1) For group S1,1 , select | SG | keys from S, then remove these | SG | keys from S.
(2) For group S1, j , for j=2, 3, ... , v, select a | SG | keys from S1, j 1 , then select
(1 a)| SG | keys from S, and remove σ keys from S.
(3) (3)For group S i j , for i=2, 3,…u, and j=1,2,…v, select a | SG | keys from each of
Si1, j and Si, j1 , Si1, j 1 and Si1, j 1 , if they exist; then select σ keys from S ,and
remove σ keys from S. According to the difference between the deployment sub
regions of nodes in each group, and the difference between neighboring key pools, σ
may have the following several values:
Now we can calculate the size of the key pool | SG | for each group. Since keys selected
from the other groups are all distinct, the sum of all the numbers of keys should be equal to
| S | .Therefore, we have the following equation:
|S|
| SG | (2)
uv (4uv 3u 3v 2)a 2(uv u v 1)b
This protocol, which uses deployment knowledge and prior region information, shows
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
many advantages in improving the random key management. The probability that two nodes
share common key rises with the increasing number of deployment sub regions, which can
efficiently reduce communication overhead for finding path-keys. Furthermore, connectivity
of neighboring regions could rise with increment of overlapping factor. Simulation results
show that the scheme has great scalability, high connectivity, low memory requirement and a
stronger resilience toward node capture.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
38 Ma Chun-Guang, Wang Jiu-Ru, Geng Gui-Ning et al.
Key generate Node: Every cluster choose two cluster heads which have larger energy and
share communication keys with it in order to generate the administrative keys for it.
Gateway nodes: All cluster heads also can be act as Key Generating Node or Key Storage
Node, we called all the cluster heads the gateway nodes.
Original cluster head: When parts the keys of a cluster head are kept in the other clusters,
the former cluster head is called original cluster head.
Key storage nodes: The cluster head node chooses two or more gateway nodes to store its
own part keys, with the principle of nearby physical location and larger energy from all
gateway nodes of communication nearby. We call these two or more gateways as key storage
nodes.
Each sensor node stores: K sg , KSCH , KS Key , administrative keys, and one way hash
function. Each cluster head stores: K gc , K sg , inter-gateway keys, EBS table and key storage
table, KSCH . The base station stores: All the valid IDs, EBS table, one way hash function, all
the preloaded keys to sensors: K sg , KSCH , KS Key .
Notation Description
CN Base station
Cj Cluster j
GWi Gateway i
Copyright © 2010. Nova Science Publishers, Incorporated. All rights reserved.
1.5.2 Assumption
All the keys’ IDs and locations are known; and secretly stored the central node’s
keys into two H-Sensors, so that the keys can be effectively protect from the
adversary.
The adversary can not launch a coordinated attack.
Wireless Sensor Networks, Nova Science Publishers, Incorporated, 2010. ProQuest Ebook Central,
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Kantopään
lukuhuoneella
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: Finnish
Kirj.
VÄINÖ KATAJA
Henkilöt:
Ensimäinen näytös.
Näyttämö: Kantopään kookas pirtti tavallisine talonpoikaisine
huonekaluineen. Perällä ja vasemmalla ovi. Oikealla pitkä penkki,
jonka luona pöytä, jossa on sanomalehtiä sikin sokin. Seinällä näkyy
koukuissaan lehtiä riippumassa. Lähellä vasemmalla olevaa ovea
uuni, jossa pystytuli palaa. Heikki tekee pärekoppaa takkatulen
valossa. Sanna kutoo sukkaa. Iikka selailee sanomalehtiä pöydällä.
—
Heikki: Jos lie Eno-Matti ottanut, kun päivällä kävi. Hän niitä näkyi
siinä selailevan.
Iikka: Eno-Matti sen sitten on ottanutkin.
Iikka: Enempi hän tietää kuin muut etelästä tulleet jätkät, mutta
hänhän onkin käynyt kansanopistossa.
Heikki: Koetin tässä. Ensimäinen tämä toki on, vaan sievä tämä
malli on.
Heikki: Taitaa olla. Iikka hänet oli tavannut. Miksi sitä kysyt?
Saara: Lupasit noita lehtiä tähän kantaa. Eivät nyt muuta jouda
tekemään kuin niitä kaiket illat lukemaan.
Heikki: Jos Matti viekin, niin Matti tuopi takaisin. Luulen hänen
pian tulevan, koska tietää postipäivän olevan. (Saara kävelee
laattialla, huomaa Ollin laukun penkillä.) Kenenkä tuo laukku on
tuossa penkillä?
Heikki: Eikö lie sen sinun vieraasi, joka kuuluu kamarissa olevan.
Saara: No Salkko nyt ei noin kelottonutta laukkua viitsi kantaa.
(Tarkastelee laukkua) Mitä tuossa lieneekään, ei se vaan kovin
pullollaankaan ole. Ketä täällä on käynyt? Vastaa.
Heikki: Mistä minä tiedän ketä on käynyt sillä aikaa, kun tallissa
olen ollut.
Heikki: Arvelen, että paras kun annat asian olla sinänsä. Nuorihan
tuo on Sannakin vielä.
Saara: Minun tässä valta on. Luuletko, että se olisi ollut sinun
luvattavasi tämä lukuhomma? Elä uskokaan. Se oli juoni, jolla
tahdoin saada Salkon meillä käymään, kun kuulin hänen Amerikasta
palanneen. Ja jahka tässä on kihlat annettu ja asiasta sovittu, niin
ulos pihalle joka lehti. Tässä joka päivä kärsimään kyläläisiä niinkuin
markkina paikalla.
Saara: Tyhjä säkki ja alaston mies. Ei muuta tee kuin lukee loruja
ja tyhjää remmaa. Anna, että se alkaisi hyväilemään Sannaa, niin jo
tästä saisi kuumat tuhkat niskaansa. Niin kaksinenkin kosija!
(Eno-Matti tulee).
Eno-Matti: Vai niin. Mutta sinä yksin. Tiedätkö mille oma kiitos
haisee, nokikolari.
Salkko (Mennen Matin nokan alle): Tiedätkö sinä ukko, että voin
tämmöisen talon ostaa milloin hyvänsä. Jos tämä olisikin minun
taloni nyt, niin kumpikohan tästä ulos lähtisi minä vai sinä,
nokkaviisas ukonkännyri.
(Matti katoaa).
(Eno-Matti tulee.)
(Saara on hämillään).
(Olli tulee).
Olli: En. Hiihdin apteekkiin sillä aikaa kun toiset menivät postiin.
(Hakee laukkuaan penkiltä ja penkin alta).
Toinen näytös.
(Menee ulos).
Heikki: Kyllä tästä asiasta selvä tulee. Kumma mies kun kehtaakin
varastaa toisen juustot. Kai hänellä oli tarkoitus ne sinulle lahjoittaa,
kun tietää, että olet perso poronjuustolle. Antoiko Salkko ne sinulle?
(Menee kamariin).
(Olli tulee).