scholarly journals Review and performance evaluation of FIFO, PQ, CQ, FQ, and WFQ algorithms in multimedia wireless sensor networks

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772091323
Author(s):  
Hani Attar ◽  
Mohammad R Khosravi ◽  
Shmatkov Sergiy Igorovich ◽  
Kuchuk Nina Georgievan ◽  
Mohammad Alhihi

The best service mechanism in multimedia wireless sensor networks can be achieved based on the multimedia traffic flow by developing a proper simulation algorithm process model, to be a trustable indication for real implementations, which is proposed in this article, together with the algorithm model outcome analysis. The quality estimation of the proposed mechanism is investigated by simulating real data transmission and obtaining the integral criterion of the processed mechanism, to determine the queue formation and loading control. Accordingly, it was proved that the first-in first-out algorithm is not useful as a flow algorithm; however, it is regarded as suitable to be considered as the benchmark algorithm when compared with the other algorithms such as priority queue, custom queue, fair queuing, and weighted fair queuing algorithms. Finally, each algorithm’s advantages and disadvantages were verified and the best usage conditions according to certain parameters, such as packet loss probability, average time delay, and jitter, were declared.

2021 ◽  
Vol 10 (1) ◽  
pp. 20
Author(s):  
Walter Tiberti ◽  
Dajana Cassioli ◽  
Antinisca Di Marco ◽  
Luigi Pomante ◽  
Marco Santic

Advances in technology call for a parallel evolution in the software. New techniques are needed to support this dynamism, to track and guide its evolution process. This applies especially in the field of embedded systems, and certainly in Wireless Sensor Networks (WSNs), where hardware platforms and software environments change very quickly. Commonly, operating systems play a key role in the development process of any application. The most used operating system in WSNs is TinyOS, currently at its TinyOS 2.1.2 version. The evolution from TinyOS 1.x and TinyOS 2.x made the applications developed on TinyOS 1.x obsolete. In other words, these applications are not compatible out-of-the-box with TinyOS 2.x and require a porting action. In this paper, we discuss on the porting of embedded system (i.e., Wireless Sensor Networks) applications in response to operating systems’ evolution. In particular, using a model-based approach, we report the porting we did of Agilla, a Mobile-Agent Middleware (MAMW) for WSNs, on TinyOS 2.x, which we refer to as Agilla 2. We also provide a comparative analysis about the characteristics of Agilla 2 versus Agilla. The proposed Agilla 2 is compatible with TinyOS 2.x, has full capabilities and provides new features, as shown by the maintainability and performance measurement presented in this paper. An additional valuable result is the architectural modeling of Agilla and Agilla 2, missing before, which extends its documentation and improves its maintainability.


2018 ◽  
Vol 2 (4) ◽  
pp. 1-4
Author(s):  
Victor Barrera-Figueroa ◽  
Mario E. Rivero-Angeles ◽  
Rolando Menchaca-Mendez ◽  
Edgar Romo-Montiel ◽  
Ricardo Menchaca-Mendez

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


2014 ◽  
Vol 977 ◽  
pp. 484-490
Author(s):  
Run Zeng

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.


2011 ◽  
Vol 403-408 ◽  
pp. 1397-1400
Author(s):  
Ping Wang ◽  
Shi Wu Xu

Time synchronization is important for many applications in Wireless Sensor Networks, how to improve synchronization precision and reduce energy consumption are the two important aspects in Wireless Sensor Networks. In this paper, first, we introduce the TPSN and DMTS algorithms, after analyzing the advantages and disadvantages of both. Make use of two algorithms have been integrated. We proposed a DMSN time synchronization algorithm. Experiments show that ,comparing with the TPSN algorithm, DMSN algorithm has lower complexity and energy consumption.It can be easily applied in Wireless Sensor Networks.


Sign in / Sign up

Export Citation Format

Share Document