Distributed Estimation (Wireless Sensor Network) Research Papers (original) (raw)

since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled... more

since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled communication with the help of the proper routing can save maximum energy. As per the data transmission as well as reception analysis most of the power wasted due to unnecessary route request flow. To minimize the route request, a new shortest path routing protocol introduced. In this paper, it has been analysed the various parameters such as network throughput, Mean Delay, mean jitter, packet delivery ratio based on the comparison of different routing protocols.

We analyze with extensive numerical simulations distributed sensor imaging algorithms for lo- calized damage in a structure. Given a configuration of ultrasonic transducers, we assume that a full response matrix for the healthy structure... more

We analyze with extensive numerical simulations distributed sensor imaging algorithms for lo- calized damage in a structure. Given a configuration of ultrasonic transducers, we assume that a full response matrix for the healthy structure is known. It is used as a basis for comparison with the response matrix that is recorded when there is damage. Our numerical simulations are

The establishment of the overall ob- jectives of a distributed sensor network is a dynamic task so that it may sufficiently well 'track' its environ- ment. Both resource allocation to each input data flow and congestion control at... more

The establishment of the overall ob- jectives of a distributed sensor network is a dynamic task so that it may sufficiently well 'track' its environ- ment. Both resource allocation to each input data flow and congestion control at each decision node of such a network must be performed in an integrated frame- work such that they are sensitive to this

The paper proposes a distributed sensor network based on a wireless BlueTooth communication system or Power Quality (PQ) assessment in power systems. The architecture of the sensor node is described and characterized, together with the... more

The paper proposes a distributed sensor network based on a wireless BlueTooth communication system or Power Quality (PQ) assessment in power systems. The architecture of the sensor node is described and characterized, together with the analysis of the measurement and communication procedure able to perform the PQ indices evaluation according the IEC 61000-4-30 norm. The necessity of online monitoring quantities spread on a wide geographical area have required the realization of intelligent measurement systems able to analyze and interpret large amounts of data into meaningful conclusions. The main element of these systems is a great quantity of low-cost, low-power,

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny... more

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible
deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also propose some countermeasures against these threats in Wireless Sensor Network.

Most critical sensor readings (Top-k Monitoring) in environment monitoring system are important to many wireless sensor applications. In such applications, sensor nodes transmit the data continuously for a specific time period to the... more

Most critical sensor readings (Top-k Monitoring) in environment monitoring system are important to many wireless sensor applications. In such applications, sensor nodes transmit the data continuously for a specific time period to the storage nodes. It is responsible for transferring the received results to the Authority on Top-k Query request from them. Dummy data's were added into the original text data to secure the data against adversary in case of hacking the sensor and storage nodes. If storage node gets hacked by adversary, false details will be sent to the authority. An effective technique named aggregate signature to validate the source of the message and also to protect the data against latest security attacks, cryptography technique combined with steganography has been introduced. Indexed based scheme for the database access has also been proposed, to validate the resources against availability before forwarding the data fetch request to storage nodes from Authority.

The tradeoff between performance and scalability is a fundamental issue in distributed sensor networks. In this paper, we propose a novel scheme to efficiently organize and utilize network resources for target localization. Motivated by... more

The tradeoff between performance and scalability is a fundamental issue in distributed sensor networks. In this paper, we propose a novel scheme to efficiently organize and utilize network resources for target localization. Motivated by the essential role of geographic proximity in sensing, sensors are organized into geographically local collaborative groups. In a target tracking context, we present a dynamic group management method to initiate and maintain multiple tracks in a distributed manner. Collaborative groups are formed, each responsible for tracking a single target. The sensor nodes within a group coordinate their behavior using geographically-limited message passing. Mechanisms such as these for managing local collaborations are essential building blocks for scalable sensor network applications.

This paper considers two problems which at first sight ap-pear to be quite distinct: localizing a robot in an unknown environment and calibrating an embedded sensor network. We show that both of these can be formulated as special cases of... more

This paper considers two problems which at first sight ap-pear to be quite distinct: localizing a robot in an unknown environment and calibrating an embedded sensor network. We show that both of these can be formulated as special cases of a generalized localization ...

Wireless sensor networks (WSNs) are composed of sensor nodes usually called as motes organized in a cooperative network. These networks are especially cooperative because motes collect data from environment and the data is passed through... more

Wireless sensor networks (WSNs) are composed of sensor nodes usually called as motes organized in a cooperative network. These networks are especially cooperative because motes collect data from
environment and the data is passed through network. Further data is collected at base station for processing. The networks are installed in rough environments and where traditional networks are not possible to function well. Such installation is called as deployment. Generally there are three issues of
research in wireless sensor networks like deployment, operation and security. WSNs got high popularity due to broad range of applications. These networks have attracted tremendous researchers due to their unique characteristics that differ them from traditional wired networks. WSNs are special networks having
great future ahead but at the same time suffer from many hazards due to their unique characteristics. They
are having large number of low cost sensor nodes with constraints like low power (usually operated by
battery), low processing ability, and communication and storage limitations. Due to deployment nature and radio links the nodes are easily targeted by attacker like physical attack of node capture. If we think of applying security to WSNs we have to face the resource limitations constraints. The resource limitations
don’t allow for applying traditional mechanisms having large overhead and computational powers. Out of many security solutions authentication seems to be one of the best solutions to secure the whole network.
The network can be made secure if we allow only true information to be inserted from true node. Authentication can be efficiently used to check valid, fake and modified communication. Such authentication techniques in wireless sensor networks are analyzed in this paper. Further this paper
describes the implementation of a secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes. The scheme never opens the secret keys during this process. The rekeying mechanism used also adds much security. The mitigation of some attacks is also explained with desired results.

Robust adaptive estimation of unknown parameter has been an important issue in recent years for reliable operation in the distributed networks. The conventional adaptive estimation algorithms that rely on mean square error (MSE)... more

Robust adaptive estimation of unknown parameter has been an important issue in recent years for reliable operation in the distributed networks. The conventional adaptive estimation algorithms that rely on mean square error (MSE) criterion exhibit good performance in the presence of Gaussian noise, but their performance drastically decreases under impulsive noise. In this paper, we propose a robust adaptive estimation algorithm for networks with cyclic cooperation. We model the impulsive noise as the realization of alpha-stable distribution. Here, we move beyond MSE criterion and define the estimation problem in terms of a modified cost function which exploits higher order moments of the error. To derive a distributed and adaptive solution, we first recast the problem as an equivalent form amenable to distributed implementation. Then, we resort to the steepest-descent and statistical approximation to obtain the proposed algorithm. We present some simulations results which reveal the superior performance of the proposed algorithm than the incremental least mean square (ILMS) algorithm in impulsive noise environments.