Research Reports

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/34

Browse

Search Results

Now showing 1 - 10 of 12
  • Thumbnail Image
    Item
    Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition
    (CERIST, 2016-08-31) Djenouri, Djamel; Bagaa, Miloud; Ali, Chelli; Balasingham, Ilangko
    Survivable wireless sensor networks that take advantage of green energy resources from the environment is considered in this paper. The particular problem of constrained relay nodes (RNs) placement to ensure communication coverage in the single-tiered topology while taking advantage of the energy harvesting potentials of sensor nodes (SNs) is dealt with. The contribution is to consider a realistic energy harvesting model where harvesting potentials may vary from one node to another. Without loss of generality, the energy model used in this paper is appropriate to wireless charging, but the proposed solution can be extended to the use of any energy harvesting technology. Based on this model, we propose a heuristic based on spanning tree calculation in an edge weighted graph model where the traffic routed at every node is proportional to its effective energy. RNs are added to help non-leaf nodes in the tree that cannot meet the defined survivability condition. A lower-bound of the proposed model is derived using integer linear programming. The proposed solution is compared by simulation to the single solution from the literature that treats the problem of RNs placement while considering energy harvesting capacity of SNs. A simplified model is used in the simulation to allow comparison. The performance results show that the proposed solution ensures survivability by adding a lower number of RNs.
  • Thumbnail Image
    Item
    A Variant of Connected Dominating Set for Application in Communication Networks
    (CERIST, 2015-03-30) Djenouri, Djamel; Bagaa, Miloud
    This paper considers a variant of the connected dominating set (CDS) problem in a graph G = (V;E). The considered problem consists in minimizing the number of CDS vertices that belong to a subset V ′ in V . As far as we know, this problem has not been treated in the literature. Nevertheless, its resolution would be useful in many communication network applications, such as the selection of relay nodes in heterogenous wireless ad hoc networks where only a subset of powerful nodes (e.g., energy or memory rich nodes) may form the network backbone act as relays, or where it is preferable to select relays from these nodes and minimize the number of non-powerful nodes that act as relays. Replacement of non-powerful nodes might be necessary either at the initialization (after deployment), or during the network lifetime, which justifies the need to minimize their number. The problem is first modeled and reduced to the minimum weighted connected dominating set (WCDS) problem in a vertex weighted graph, and then it is resolved by taking advantage of the simple form of the weight function using integer linear programming (ILP). A heuristic is also proposed for large scale resolution. Simulation results confirms closeness of the proposed heuristic to the optimal solution obtained by the ILP, and scalability of the heuristic.
  • Thumbnail Image
    Item
    SMART: Secure Multi-pAths Routing for wireless sensor neTworks
    (CERIST, 2014-06-22) Lasla, Noureddine; Derhab, Abdelouahid; Ouadjaout, Abdelraouf; Bagaa, Miloud; Challal, Yacine
    Abstract. In this paper, we propose a novel secure routing protocol named Secure two-hop disjoint Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Two-hop Keys Establishment (ETKE). The proposed framework keeps consistent routing topology by protecting the hop count information from being forged. The two-hop scheme ensures immediate verification and fast detection of inconsistent routing information with- out referring to the sink node. We prove that it is sufficient to keep only two-hop disjoint paths to ensure full-resilience against node capture attacks. We have demonstrated through simulations that our solution outperforms a comparative solution in literature. In addition, ETKE is more resilient to node capture attacks than the probabilistic key man- agement schemes.
  • Thumbnail Image
    Item
    Energy Harvesting Aware Relay Node Addition for Power-Efficient Coverage in Wireless Sensor Networks
    (CERIST, 2015-01-11) Djenouri, Djamel; Bagaa, Miloud
    This paper deals with power-efficient coverage in wireless sensor networks (WSN) by taking advantage of energyharvesting capabilities. A general scenario is considered for deployed networks with two types of sensor nodes, harvesting enabled nodes (HNs), and none-harvesting nodes (NHNs). The aim is to use only the HNs for relaying packets, while NHNs use will be limited to sensing and transmitting their own readings. The problem is modeled using graph theory and reduced to finding the minimum weighted connected dominating set in a vertex weighted graph. A limited number of relay nodes is added at the positions close to the NHNs in the resulted set. The weight function ensures minimizing the number of NHNs in the set, and thus reducing the relay nodes to be added. Our contribution is to consider relay node placement (addition) in energy harvesting WSN, where only HNs are used to forward packets. This is to preserve the limited energy of NHNs. Extensive simulation results show that the proposed relay node addition strategy prolongs the network lifetime, from the double, to factors of several tens of times. This is at a reasonable cost in terms of the number of relay nodes added, which is compared to a lower-bound derived in the paper.
  • Thumbnail Image
    Item
    DZ50: Energy-Efficient Wireless Sensor Mote Platform for Low Data Rate Applications
    (CERIST, 2014-07-07) Ouadjaout, Abdelraouf; Lasla, Noureddine; Bagaa, Miloud; Doudou, Messaoud; Zizoua, Cherif; Kafi, Mohamed Amine; Derhab, Abdelouahid; Djenouri, Djamel; Badache, Nadjib
    A low cost and energy efficient wireless sensor mote platform for low data rate monitoring applications is presented. The new platform, named DZ50, is based on the ATmega328P micro-controller and the RFM12b transceiver, which consume very low energy in low-power mode. Considerable energy saving can be achieved by reducing the power consumption during inactive (sleep) mode, notably in low data rate applications featured by long inactive periods. Without loss of generality, spot monitoring in a Smart Parking System (SPS) and soil moisture in a Precision Irrigation System (PIS) are selected as typical representative of low data rate applications. The performance of the new platform is investigated for typical scenarios of the selected applications and compared with that of MicaZ and TelosB. Energy measurement has been carried out for different network operation states and settings, where the results reveal that the proposed platform allows to multiply the battery lifetime up to 7 times compared to MicaZ and TelosB motes in 10s sampling period scenarios.
  • Thumbnail Image
    Item
    Interference-Aware Congestion Control Protocol for Wireless Sensor Networks
    (CERIST, 2014-07-07) Kafi, Mohamed Amine; Djenouri, Djamel; Ben Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud; Lasla, Noureddine; Badache, Nadjib
    This paper deals with congestion and interference control in wireless sensor networks (WSN), which is essential for improving the throughput and saving the scarce energy in networks where nodes have di erent capacities and tra c patterns. A scheme called IACC (Interference-Aware Congestion Control ) is proposed. It allows maximizing link capacity utilization for each node by controlling congestion and interference. This is achieved through fair maximum rate control of interfering nodes in inter and intra paths of hot spots. The proposed protocol has been evaluated by simulation, where the results rival the e ectiveness of our scheme in terms of energy saving and throughput. In particular, the results demonstrate the protocol scalability and considerable reduction of packet loss that allows to achieve as high packet delivery ratio as 80% for large networks.
  • Thumbnail Image
    Item
    Implementation of High Precision Synchronization Protocols in Wireless Sensor Networks
    (CERIST, 2014-03-17) Djenouri, Djamel; Bagaa, Miloud
    Microsecond-level time synchronization is needed in realtime applications of wireless sensor networks. While several synchronization protocols have been proposed, most performance evaluations have been limited to theoretical analysis and simulation, with a high level of abstraction by ignoring several practical aspects, e.g. packet handling jitters, clock drifting, packet loss, etc. Effective implementation in real motes faces several challenges due to motes' limitations and the unreliable lossy channels. These issues affect the protocol performance and precision. Authors of some pragmatic solutions followed empirical approaches for the evaluation, where the proposed solutions have been implemented on real motes and evaluated in testbed experiments. While there are several survey articles presenting the protocols from the conception perspectives, and others dealing with mathematical and signal processing issues of the estimators, a survey on aspects related to the practical implementation is missing. This article throws light on issues related to the implementation of synchronization protocols in WSN. The challenges related to WSN environment are presented, the importance of real implementation and the testbed evaluation are motivated by some experiments that we conducted. Finally, some relevant implementations of the literature that meet microsecond-level precision are discussed.
  • Thumbnail Image
    Item
    Static Analysis of Device Drivers in TinyOS
    (CERIST, 2014-02-05) Ouadjaout, Abdelraouf; Lasla, Noureddine; Bagaa, Miloud; Badache, Nadjib
    In this paper, we present SADA, a static analysis tool to verify device drivers for TinyOS applications. Its broad goal is to certify that the execution paths of the application complies with a given hardware specification. SADA can handle a broad spectrum of hardware specifications, ranging from simple assertions about the values of configuration registers, to complex behaviors of possibly several connected hardware components. The hardware specification is expressed in BIP, a language for describing easily complex interacting discrete components. The analysis of the joint behavior of the application and the hardware specification is then performed using the theory of Abstract Interpretation. We have done a set of experiments on some TinyOS applications. Encouraging results are obtained that confirm the effectiveness of our approach.
  • Thumbnail Image
    Item
    Intertwined Medium Access Scheduling of Upstream and Downstream Traffic in Wireless Sensor Networks
    (CERIST, 2013-12-25) Bagaa, Miloud; Younis, Mohamed; Djenouri, Djamel; Badache, Nadjib
    In wireless sensor networks, the sensor data are often aggregated en-route to the base-station in order to eliminate redundancy and conserve the network resources. The base-station not only acts as a destination for the upstream data traffic, but it also configures the network by transmit- ting commands downstream to nodes. The data delivery latency is a critical performance metric in time-sensitive applications and is considered by a number of data aggregation schemes in the literature. However, to the best of our knowledge, no solution has considered the scheduling of downstream packets, originated from the base-station, in conjunction with upstream traffic. This paper fills such a gap and proposes MASAUD, which intertwines the medium access schedule of upstream and downstream traffic in order to reuse time slots in a non-conflicting manner and reduce delay. MASAUD can be integrated with any scheme for data aggregation scheduling. The simulation confirms the effectiveness of MASAUD.
  • Thumbnail Image
    Item
    Semi-Structured and Unstructured Data Aggregation Scheduling in Wireless Sensor Networks
    (CERIST, 2011-09) Bagaa, Miloud; Derhab, Abdelouahid; Badache, Nadjib; Lasla, Noureddine; Ouadjaout, Abdelraouf
    This paper focuses on data aggregation scheduling problem in wireless sensor networks (WSNs), to minimize time latency. Prior works on this problem have adopted a structured approach, in which a tree-based structure is used as an input for the scheduling algorithm. As the scheduling performance mainly depends on the supplied aggregation tree, such an approach cannot guarantee optimal performance. To address this problem, we propose approaches based on Semi-structured Topology (DAS-ST) and Unstructured Topology (DAS-UT). The approaches are based on two key design features, which are : (1) simultaneous execution of aggregation tree construction and scheduling, and (2) parent selection criteria that maximize the choices of parents for each node and maximize time slot reuse. We prove that the latency of DAS-ST is upper-bounded by (b 2 arccos( 1 1+ ) c+4)R+