Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 10
items per page: 25 50 75
Sort by:
Keywords WSN routing security
Download PDF Download RIS Download Bibtex

Abstract

With the continuous advances in mobile wireless sensor networks (MWSNs), the research community has responded to the challenges and constraints in the design of these networks by proposing efficient routing protocols that focus on particular performance metrics such as residual energy utilization, mobility, topology, scalability, localization, data collection routing, Quality of Service (QoS), etc. In addition, the introduction of mobility in WSN has brought new challenges for the routing, stability, security, and reliability of WSNs. Therefore, in this article, we present a comprehensive and meticulous investigation in the routing protocols and security challenges in the theory of MWSNs which was developed in recent years.
Go to article

Bibliography

[1] A. Forster, Introduction to wireless sensor networks, John Wiley & Sons, 2016.
[2] A. Dahane and N.-E. Berrached, Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, Apple Academic Press, 2019.
[3] E. C. Whitman, "Sosus: The “secret weapon” of undersea surveillance," Undersea Warfare, vol. 7, no. 2, p. 256, 2005.
[4] V. Jindal, "History and architecture of Wireless sensor networks for ubiquitous computing," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 7, no. 2, pp. 214-217, February 2018.
[5] R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, "Mobility in WSNs for critical applications," in 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.
[6] D. Stevanovic and N. Vlajic, "Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies," in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.
[7] V. Ramasamy, "Mobile Wireless Sensor Networks: An Overview," in Wireless Sensor Networks - Insights and Innovations, P. Sallis, Ed., IntechOpen, 2017.
[8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, 2002.
[9] T. P. Lambrou and C. G. Panayiotou, "A survey on routing techniques supporting mobility in sensor networks," in 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
[10] U. Burgos, U. Amozarrain, C. Gómez-Calzado and A. Lafuente, "Routing in mobile wireless sensor networks: A leader-based approach," Sensors, vol. 17, no. 7, p. 1587, 2017.
[11] M. Fonoage, M. Cardei and A. Ambrose, "A QoS based routing protocol for wireless sensor networks," in International Performance Computing and Communications Conference, 2010.
[12] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE wireless communications, vol. 11, no. 6, pp. 6-28, 2004.
[13] J. Sen, "Routing security issues in wireless sensor networks: attacks and defenses," in Sustainable Wireless Sensor Networks, InTech, 2010, pp. 279-309.
[14] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, "Multipath routing in wireless sensor networks: survey and research challenges," Sensors, vol. 12, no. 1, pp. 650-685, 2012.
[15] S. Varshney and R. Kuma, "Variants of LEACH routing protocol in WSN: A comparative analysis," in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (confluence), 2018.
[16] D.-S. Kim and Y.-J. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), 2006.
[17] G. Renugadevi and M. Sumithra, "An analysis on LEACH-mobile protocol for mobile wireless sensor networks," International Journal of Computer Applications, vol. 65, no. 21, pp. 38-42, 2013.
[18] N. Sabor, S. Sasaki, M. Abo-Zahhad and S. M. Ahmed, "A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: review, taxonomy, and future directions," Wireless Communications and Mobile Computing, vol. 2017, 2017
[19] G. S. Kumar, M. V. Paul, G. Athithan and K. P. Jacob, "Routing protocol enhancement for handling node mobility in wireless sensor networks," in TENCON 2008-2008 IEEE Region 10 Conference, 2008.
[20] Z. Qi and Y. Min, "A routing protocol for mobile sensor network based on leach," in 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2014), 2014.
[21] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes," AEU-International Journal of Electronics and Communications, vol. 69, no. 2, pp. 507-514, 2015.
[22] B. Nazir and H. Hasbullah, "Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network," in 2010 International Conference on Computer Applications and Industrial Electronics, 2010.
[23] C. E. Perkins, Ad hoc networking, vol. 1, Addison-wesley Reading, 2001. [24] techopedia.com, "Definition - What does Ad Hoc On-Demand Distance Vector (AODV) mean?," 2019. [Online]. Available: https://www.techopedia.com/definition/2922/ad-hoc-on-demand-distance-vector-aodv. [Accessed November 2019].
[25] H. I. Sigiuk and A. A. Ihbeel, "Performance evaluation of dynamic source routing protocol (DSR) on WSN," International Journal of Computing and Digital Systems, vol. 1, no. 1, pp. 19-24, 2012.
[26] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, no. 3, pp. 459-471, 2007.
[27] Y. Yue, J. Li, H. Fan and Q. Qin, "Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks," Journal of Sensors, vol. 2016, 2016.
[28] S. Cakici, I. Erturk, S. Atmaca and A. Karahan, "A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks," Wireless personal communications, vol. 77, no. 3, pp. 2235-2254, 2014.
[29] S. A. Awwad, C. K. Ng, N. K. Noordin and M. F. A. Rasid, "Cluster based routing protocol for mobile nodes in wireless sensor network," in 2009 International Symposium on Collaborative Technologies and Systems, 2009.
[30] J. Shi, X. Wei and W. Zhu, "An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks," International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.
[31] S. Deng, J. Li and L. Shen, "Mobility-based clustering protocol for wireless sensor networks with mobile nodes," IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47, 2011.
[32] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Proceedings, IEEE Aerospace Conference, 2002.
[33] M. R. Jafri, N. Javaid, A. Javaid and Z. A. Khan, "Maximizing the lifetime of multi-chain pegasis using sink mobility," arXiv preprint arXiv:1303.4347, 2013.
[34] R. Velmani and B. Kaarthick, "An efficient cluster-tree based data collection scheme for large mobile wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 4, pp. 2377-2390, 2014.
[35] R. Velmani and B. Kaarthick, "An energy efficient data gathering in dense mobile wireless sensor networks," ISRN Sensor Networks, vol. 2014, 2014.
[36] R. Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor network," in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
[37] T. Hayes and F. H. Ali, "Proactive Highly Ambulatory Sensor Routing (PHASeR) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, vol. 21, pp. 47-61, 2015.
[38] C. Tunca, S. Isik, M. Y. Donmez and C. Ersoy, "Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink," IEEE Transactions on Mobile Computing, vol. 14, no. 9, pp. 1947-1960, 2014.
[39] A. E. Kostin, Y. Fanaeian and H. Al-Wattar, "Anycast tree-based routing in mobile wireless sensor networks with multiple sinks," Wireless Networks, vol. 22, no. 2, pp. 579-598, 2016.
[40] S. Sarangi and S. Kar, "Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks," in 2011 17th IEEE International Conference on Networks, 2011.
[41] J. Wang, Y.-Q. Cao, B. Li, S.-Y. Lee and J.-U. Kim, "A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks," Journal of Internet Technology , vol. 16, no. 5, pp. 825-832, 2015.
[42] D. W. Carman, P. S. Kruus and B. J. Matt, "Constraints and approaches for distributed sensor network security," 2000. [43] I. Kamel and H. Juma, "A lightweight data integrity scheme for sensor networks," Sensors, vol. 11, no. 4, pp. 4118-4136, 2011.
[44] C.-M. Chen, Y.-H. Lin, Y.-H. Chen and H.-M. Sun, "Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57-72, 2013.
[45] I. Silva, L. A. Guedes, P. Portugal and F. Vasques, "Reliability and availability evaluation of wireless sensor networks for industrial applications," Sensors, vol. 12, no. 1, pp. 806-838, 2012.
[46] R. Riaz, T.-S. Chung, S. S. Rizvi and N. Yaqub, "BAS: The Biphase Authentication Scheme for Wireless Sensor Networks," Security and Communication Networks, vol. 2017, 2017.
[47] S. A. Ch, Z. Mehmood, D. Rashid Amin, M. Alghobiri and T. A. Malik, "Ensuring Reliability & Freshness in Wireless Sensor Networks," in 2010 International Conference on Intelligent Network and Computing (ICINC 2010) , 2010.
[48] L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 1, no. 1, pp. 73-100, 2005.
[49] A. Srinivasan and J. Wu, "A survey on secure localization in wireless sensor networks," Encyclopedia of Wireless and Mobile communications, pp. 1-26, 2007.
[50] J. Hwang and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.
[51] A.-S. K. Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET, CRC press, 2016.
[52] J. He, J. Chen, P. Cheng and X. Cao, "Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 1055-1065, 2014.
[53] S. Ganeriwal, S. Čapkun, C.-C. Han and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proceedings of the 4th ACM workshop on Wireless security, 2005.
[54] G. Yang, L. Dai and Z. Wei, "Challenges, threats, security issues and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, 2018.
[55] M. Riaz, A. Buriro and A. Mahboob, "Classification of Attacks on Wireless Sensor Networks : A Survey," International Journal of Wireless and Microwave Technologies, vol. 8, pp. 15-39, 11 2018.
[56] S. Sudheendran, O. Bouachir, S. Moussa and A. O. Dahmane, "Review — Challenges of mobility aware MAC protocols in WSN," in 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018.
[57] H. Gong, X. Zhang, L. Yu, X. Wang and F. Yi, "A study on MAC protocols for wireless sensor networks," in 2009 Fourth International Conference on Frontier of Computer Science and Technology, 2009.
[58] K. Chelli, "Security issues in wireless sensor networks: Attacks and countermeasures," in Proceedings of the World Congress on Engineering, 2015.
[59] P. M. Jawandhiya, M. M. Ghonge, M. Ali and J. Deshpande, "A survey of mobile ad hoc network attacks," International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063-4071, 2010.
[60] D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, pp. 74-81, 2008.
[61] A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," computer, vol. 35, no. 10, pp. 54-62, 2002.
[62] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi, "Security Issues and Attacks in Wireless Sensor Network," World Applied Sciences Journal, vol. 30, no. 10, pp. 1224-1227, 2014.
[63] T. H. Hadi, "MANET and WSN: WHAT MAKES THEM DIFFERENT?," IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), vol. 7, no. 6, pp. 23-28, Nov-Dec 2017.
[64] M. L. Messai, "Classification of attacks in wireless sensor networks," in International Congress on Telecommunication and Application 2014 arXiv preprint arXiv:1406.4516, 2014.
Go to article

Authors and Affiliations

Ahmed Al-Nasser
1
Reham Almesaeed
1
Hessa Al-Junaid
1

  1. University of Bahrain College of Information Technology, Bahrain
Download PDF Download RIS Download Bibtex

Abstract

Over the past two decades, numerous research projects have concentrated on cognitive radio wireless sensor networks (CR-WSNs) and their benefits. To tackle the problem of energy and spectrum shortfall in CR-WSNs, this research proposes an underpinning decode-&-forward (DF) relaying technique. Using the suggested time-slot architecture (TSA), this technique harvests energy from a multi-antenna power beam (PB) and delivers source information to the target utilizing energy-constrained secondary source and relay nodes. The study considers three proposed relay selection schemes: enhanced hybrid partial relay selection (E-HPRS), conventional opportunistic relay selection (C-ORS), and leading opportunistic relay selection (L-ORS). We present evidence for the sustainability of the suggested methods by examining the outage probability (OP) and throughput (TPT) under multiple primary users (PUs). These systems leverage time switching (TS) receiver design to increase end-to-end performance while taking into account the maximum interference constraint and transceiver hardware inadequacies. In order to assess the efficacy of the proposed methods, we derive the exact and asymptotic closed-form equations for OP and TPT & develop an understanding to learn how they affect the overall performance all across the Rayleigh fading channel. The results show that OP of the L-ORS protocol is 16% better than C-ORS and 75% better than E-HPRS in terms of transmitting SNR. The OP of L-ORS is 30% better than C-ORS and 55% better than E-HPRS in terms of hardware inadequacies at the destination. The L-ORS technique outperforms C-ORS and E-HPRS in terms of TPT by 4% and 11%, respectively.
Go to article

Authors and Affiliations

Mushtaq Muhammad Umer
1 2
ORCID: ORCID
Hong Jiang
1
Qiuyun Zhang
1
ORCID: ORCID
Liu ManLu
1
ORCID: ORCID
Muhammad Owais
1
ORCID: ORCID

  1. School of Information Engineering, Southwest University of Science & Technology (SWUST) Mianyang, 621010, P.R. China
  2. Department of Software Engineering, Mirpur University of Science & Technology (MUST), Mirpur, Azad Jammu & Kashmir, Pakistan
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) plays a crucial role in many industrial, commercial, and social applications. However, increasing the number of nodes in a WSN increases network complexity, making it harder to acquire all relevant data in a timely way. By assuming the end node as a base station, we devised an Artificial Ant Routing (AAR) method that overcomes such network difficulties and finds an ideal routing that gives an easy way to reach the destination node in our situation. The goal of our research is to establish WSN parameters that are based on the biologically inspired Ant Colony Optimization (ACO) method. The proposed AAR provides the alternating path in case of congestion and high traffic requirement. In the event of node failures in a wireless network, the same algorithm enhances the efficiency of the routing path and acts as a multipath data transmission approach. We simulated network factors including Packet Delivery Ratio (PDR), Throughput, and Energy Consumption to achieve this. The major objective is to extend the network lifespan while data is being transferred by avoiding crowded areas and conserving energy by using a small number of nodes. The result shows that AAR is having improved performance parameters as compared to LEACH, LEACH-C, and FCM-DS-ACO.
Go to article

Authors and Affiliations

Shankar D. Chavan
1
Amruta S. Thorat
1
Monica S. Gunjal
1
Anup S. Vibhute
1
Kamalakar R. Desai
2

  1. Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, (M.S.), India
  2. Bharati Vidyapeeth College of Engineering, Kolhapur (M.S.), India
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) is assortment of sensor nodes proficient in environmental information sensing, refining it and transmitting it to base station in sovereign manner. The minute sensors communicate themselves to sense and monitor the environment. The main challenges are limited power, short communication range, low bandwidth and limited processing. The power source of these sensor nodes are the main hurdle in design of energy efficient network. The main objective of the proposed clustering and data transmission algorithm is to augment network performance by using swarm intelligence approach. This technique is based on K-mean based clustering, data rate optimization using firefly optimization algorithm and Ant colony optimization based data forwarding. The KFOA is divided in three parts: (1) Clustering of sensor nodes using K-mean technique and (2) data rate optimization for controlling congestion and (3) using shortest path for data transmission based on Ant colony optimization (ACO) technique. The performance is analyzed based on two scenarios as with rate optimization and without rate optimization. The first scenario consists of two operations as kmean clustering and ACO based routing. The second scenario consists of three operations as mentioned in KFOA. The performance is evaluated in terms of throughput, packet delivery ratio, energy dissipation and residual energy analysis. The simulation results show improvement in performance by using with rate optimization technique.
Go to article

Authors and Affiliations

Savita Sandeep Jadhav
1
Sangeeta Jadhav
2

  1. Dr. D.Y. Patil Institute of Technology, Pimpri, Pune, India
  2. Army Institute of Technology, Dighi Hills, Pune, India
Download PDF Download RIS Download Bibtex

Abstract

This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.
Go to article

Authors and Affiliations

Ahmed Alnaser
1
Hessa Al-Junaid
1
Reham Almesaeed
1

  1. University of Bahrain, College of Information Technology, Kingdom of Bahrain
Download PDF Download RIS Download Bibtex

Abstract

In nuclear facilities, the reading of the sensors is very important in the assessments of the system state. The existence of an abnormal state could be caused by a failure in the sensor itself instead of a failure in the system. So, being unable to identify the main cause of the “abnormal state” and take proper actions may end in unnecessary shutdown for the nuclear facility that may have expensive economic consequences. That is why, it is extremely important for a supervision and control system to identify the case where the failure in the sensor is the main cause for the existence of an abnormal state. In this paper, a system based on a wireless sensor network is proposed to monitor the radiation levels around and inside a nuclear facility. A new approach for validating the sensor readings is proposed and investigated using the Castalia simulator.
Go to article

Authors and Affiliations

Mohamed Yehia Habash
1
Nabil Mohamed Abd Elfatah Ayad
1
Abd Elhady Abd Elazim Ammar
2

  1. Nuclear Research Center, Egyptian Atomic Energy Authority, Egypt
  2. Electrical Engineering Dept., Faculty of Engineering, Al azhar University, Egypt
Download PDF Download RIS Download Bibtex

Abstract

Localization is one of the oldest mathematical and technical problems that have been at the forefront of research and development for decades. In a wireless sensor network (WSN), nodes are not able to recognize their position. To solve this problem, studies have been done on algorithms to achieve accurate estimation of nodes in WSNs. In this paper, we present an improvement of a localization algorithm namely Gaussian mixture semi-definite programming (GM-SDP-2). GMSDP is based on the received signal strength (RSS) to achieve a maximum likelihood location estimator. The improvement lies in the placement of anchors through the Fuzzy C-Means clustering method where the cluster centers represent the anchors’ positions. The simulation of the algorithm is done in Matlab and is based on two evaluation metrics, namely normalized root-mean-squared error (RMSE) and cumulative distribution function (CDF). Simulation results show that our improved algorithm achieves better performance compared to those using a predetermined placement of anchors.
Go to article

Authors and Affiliations

Sidi Mohammed Hadj Irid
1
Mourad Hadjila
1
Mohammed Hicham Hachemi
2
Sihem Souiki
3
Reda Mosteghanemi
1
Chaima Mostefai
1

  1. Dept. of Telecommunications, Faculty of Technology, University of Abou Bekr Belkaid, Tlemcen, Algeria
  2. Dept. of Electronics, Faculty of Electrical Engineering, University of Science and Technology of Oran - Mohamed Boudiaf (USTO-MB), Oran, Algeria
  3. Dept. of Telecom, Faculty of Technology, University of Belhadj Bouchaib, Ain Temouchent, Algeria
Download PDF Download RIS Download Bibtex

Abstract

One of the ways to improve calculations related to determining the position of a node in the IoT measurement system is to use artificial neural networks (ANN) to calculate coordinates. The method described in the article is based on the measurement of the RSSI (Received Signal Strength Indicator), which value is then processed by the neural network. Hence, the proposed system works in two stages. In the first stage, RSSI coefficient samples are taken, and then the node location is determined on an ongoing basis. Coordinates anchor nodes (i.e. sensors with fixed and previously known positions) and the matrix of RSSI coefficients are used in the learning process of the neural network. Then the RSSI matrix determined for the system in which the nodes with unknown positions are located is fed into the neural network inputs. The result of the work is a system and algorithm that allows determining the location of the object without processing data separately in nodes with low computational performance.

Go to article

Authors and Affiliations

Beata Krupanek
Ryszard Bogacz
Download PDF Download RIS Download Bibtex

Abstract

Nowadays, the technological innovations affect all human activities; also the agriculture field heavily benefits of technologies as informatics, electronic, telecommunication, allowing huge improvements of productivity and resources exploitation. This manuscript presents an innovative low cost fertigation system for assisting the cultures by using dataprocessing electronic boards and wireless sensors network (WSN) connected to a remote software platform. The proposed system receives information related to air and soil parameters, by a custom solar-powered WSN. A control unit elaborates the acquired data by using dynamic agronomic models implemented on a cloud platform, for optimizing the amount and typology of fertilizers as well as the irrigations frequency, as function also of weather forecasts got by on-line weather service.

Go to article

Authors and Affiliations

P. Visconti
R. de Fazio
P. Primiceri
D. Cafagna
S. Strazzella
N.I. Giannoccaro
Download PDF Download RIS Download Bibtex

Abstract

Due to the severe damages of nuclear accidents, there is still an urgent need to develop efficient radiation detection wireless sensor networks (RDWSNs) that precisely monitor irregular radioactivity. It should take actions that mitigate the severe costs of accidental radiation leakage, especially around nuclear sites that are the primary sources of electric power and many health and industrial applications. Recently, leveraging machine learning (ML) algorithms to RDWSNs is a promising solution due to its several pros, such as online learning and self-decision making. This paper addresses novel and efficient ML-based RDWSNs that utilize millimeter waves (mmWaves) to meet future network requirements. Specifically, we leverage an online learning multi-armed bandit (MAB) algorithm called Thomson sampling (TS) to a 5G enabled RDWSN to efficiently forward the measured radiation levels of the distributed radiation sensors within the monitoring area. The utilized sensor nodes are lightweight smart radiation sensors that are mounted on mobile devices and measure radiation levels using software applications installed in these mobiles. Moreover, a battery aware TS (BATS) algorithm is proposed to efficiently forward the sensed radiation levels to the fusion decision center. BA-TS reflects the remaining battery of each mobile device to prolong the network lifetime. Simulation results ensure the proposed BA-TS algorithm’s efficiency regards throughput and network lifetime over TS and exhaustive search method.
Go to article

Bibliography

[1] R. Elhabyan, W. Shi and M. St-Hilaire, ”Coverage protocols for wireless sensor networks: Review and future directions,” Journal of Communications and Networks, 21, (1), 45-60, Feb. 2019, DOI: 10.1109/JCN.2019.000005.
[2] X. Ge, Q. Han, X. Zhang, L. Ding and F. Yang, ”Distributed Event-Triggered Estimation Over Sensor Networks: A Survey,” IEEE Transactions on Cybernetics, 50 (3), 1306-1320, March 2020, DOI: 10.1109/TCYB.2019.2917179.
[3] International ATomic Energy Authority (IAEA) accident reports available online, https://www.iaea.org/topics/accident-reports.
[4] R. R. Kumar, L. Macwin and R. Rathna, ”Nuclear radiation detection using Wireless Sensor Network,” 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015, pp. 1-4, DOI: 10.1109/ICIIECS. 2015.7192790.
[5] R. Dersch,Primary and secondary measurements of 222Rn, Journal of Applied Radiation and Isotopes, 60, Issues 2–4, 2004, Pages 387-39, 2004, DOI: 10.1016/j.apradiso.2003.11.046.
[6] Drew, Christina Grace, Deirdre Silbernagel, Susan Hemmings, Erin Smith, Alan Griffith, William Takaro, Tim Faustman, Elaine, ”Nuclear Waste Transportation: Case Studies of Identifying Stakeholder Risk Information Needs”. Environmental Health Perspectives, 111, 263- 72, DOI: 10.1289/ehp.5203.
[7] Manar, M.K., Mohamed, S., Hashima, S., Imbaby, I.M., Amal-Eldin, M., Nesreen, I. “Hardware Implementation for Pileup Correction Algorithms in Gamma Ray Spectroscopy. International Journal of Computer Applications, 176, 43-48, 2017. DOI: 10.5120/ijca2017915634
[8] Bensaleh, Mohammed Saida, Raoudha Hadj kacem, Yessine Abid, Mohamed. ”Wireless Sensor Network Design Methodologies: A Survey”. Journal of Sensors, pp.1-13, 2020. DOI: 10.1155/2020/9592836.
[9] B. Xing, R. Ding and J. Wang, ”Design of Wireless Sensor Network for Protection of X-Ray Detection,” 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), Shenyang, 2013, pp. 282-285, DOI: 10.1109/ICINIS.2013.79.
[10] M. Altayeb, M. Mekki, O. Abdallah, A. B. Mustafa and S. Abdalla, ”Automobile and fixed wireless sensor network for radiation detection,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2015, pp. 199-202, DOI: 10.1109/ICCNEEE.2015.7381361.
[11] C. Liu, P. -. Drouin, G. St-Jean, M. D´eziel and D. Waller, ”Wireless Radiation Sensor Network with directional radiation detectors,” IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC), Seattle, WA, pp. 1-6, 2014. DOI: 10.1109/NSSMIC.2014.7431111.
[12] Jianxin Sun, ”Radiation detection using mobile sensor networks”, PhD thesis, University of Delaware, Spring 2016.
[13] Ding, Fei Zhang, Deng-yin Wang, Wanping Lei, Zhenzhong. (2018). ”A Low Complexity Active Sensing and Inspection System for Monitoring of Moveable Radiation Environments”. Journal of Sensors, 2018, 1-9. 10.1155/2018/8096012.
[14] M. S. Muktadir, S. Islam and A. R. Alam Chowdhury, ”Development of a Wireless Safety System Based on Multiple Radiation Detector for Nuclear Facilities,” International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, pp. 539- 542, 2019. DOI: 10.1109/ICREST.2019.8644312.
[15] Vasile Buruian˘a, Mihaela Oprea. A Microcontroller-Based Radiation Monitoring and Warning System. 8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, DOI: 10.1007/978-3-642-33412-2 39.
[16] Barbar´an, Javier D´ıaz, a Esteve, I˜naki Rubio, Bartolom´e. RadMote: a mobile framework for radiation monitoring in nuclear power plants, 2007.
[17] S. Duraisamy, G. K. Pugalendhi and P. Balaji, ”Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm,” The Journal of Engineering, vol. 2019, no. 9, pp. 5443-5448, 2019, DOI: 10.1049/joe.2018.5288.
[18] Thompson, William R. ”On the Likelihood That One Unknown Probability Exceeds Another in View of the Evidence of Two Samples.” Biometrika 25, no. 3/4, 1933. DOI: 10.2307/2332286.
[19] F. Wilhelmi, C. Cano, G. Neu, B. Bellalta, A. Jonsson, and S. Barrachina-Mu˜noz, “Collaborative spatial reuse in wireless networks via selfish multi-armed bandits,” Ad Hoc Networks, vol. 88, pp. 129–141, 10 2017. DOI: 10.1016/j.adhoc.2019.01.006.

Go to article

Authors and Affiliations

Sherief Hashima
1
Imbaby Mahmoud
2

  1. Engineering Dept., Nuclear Research Center, Egyptian Atomic Energy Authority, Cairo 13759, Egypt
  2. Radiation Engineering Dept., National Center of Radiation Research and Technology (NCRRT) Egyptian Atomic Energy Authority, Cairo, Egypt

This page uses 'cookies'. Learn more