scholarly journals Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks

2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
De Gu ◽  
Jishuai Wang ◽  
Ji Li

Wireless sensor networks (WSN) are becoming increasingly promising in practice. As the predeployment design and optimization are usually unpractical in random deployment scenarios, the global optimum of the WSN’s performance is achievable only if the topology dependent self-organizing process acquires the overview of the WSN, in which the boundary is the most important. The idea of this paper comes from the fact that contours only break on the geometrical boundary and the WSN are discrete sampling systems of real environments. By simulating a diffusion process in discrete form, the end point of semi-contours suggests the boundary nodes of a WSN. The simulation cases show the algorithm is well worked in WSN with average degree higher than 10. The boundary recognition could be very valuable for other algorithms dedicated to optimize the overall performance of WSN.

2011 ◽  
pp. 358-366
Author(s):  
Alexander S. Galov ◽  
Alex P. Moschevikin ◽  
Alexei V. Soloviev

In wireless sensor networks based on nanoLOCTM standard and using server-centric control, the overall performance of radio segment and location accuracy depends amongst other on the efficiency of the location engine. The efficiency may be increased by selecting an appropriate subset of base stations for ranging. This paper describes the experiments dealing with this problem, and discusses the ways of saving radio bandwidth.


Author(s):  
Sachin Lalar ◽  
. Monika ◽  
Arun Kumar Yadav

Wireless sensor networks (WSNs) establish a new popular of ambient supervision with many latent packages. The environment of wireless sensor networks prone to different forms of attacks as networks are prepared in open and unsecured surroundings. This paper analyses the overall performance of AODV whilst attacked by black hole, through varying the mobility of the nodes within the community. The overall performance metrics which can be used to do the analysis are LPR, packet delivery ratio & Packet loss. The simulation consequences display that the overall performance of each AODV degrades in the presence of black hole attack.


Sign in / Sign up

Export Citation Format

Share Document