Presentation is loading. Please wait.

Presentation is loading. Please wait.

General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-

Similar presentations


Presentation on theme: "General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-"— Presentation transcript:

1

2 General Description

3 Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route- selection algorithm Achieve the best sensing performance and lifetime LEACH based, virtual grid based and multi-hop based routing protocols Implemented on Mica Mote platform Source Destination Sensing Range Less impact on sensing coverage More impact on sensing coverage Source Destination Sensing Range Less impact on sensing coverage More impact on sensing coverage

4 Link Stability Prediction for Mobile Ad Hoc Networks in Shadowed Environments A new link stability prediction method for shadowed environments A more realistic user mobility model and propagation model are considered Can be applied to the applications, such as link performance prediction, system performance analysis, service quality prediction and route search

5 Lifetime-Based Random-Deployment for WSNs Determine a random-deployment strategy to optimize the lifetime of the whole WSN – Based on the expected power consumption of each sub-area in WSNs – Non-uniform node density through the sensing area Consider WSNs with following protocols – Cluster-based routing protocols – Multihop-based routing protocols Server Line Server Multihop Routing Cluster-based routing (LEACH)

6 Breakthroughs and Major Achievements

7 TechnologyState-of-the-ArtBreakthrough Link Stability Prediction for Mobile Ad Hoc Networks in Shadowed Environments The link stability is obtained based on a modified random way- point model, and no shadowing effect is considered. (Shengming Jiang, Networking Department, Institute for Infocomm Research) A new link-stability prediction method based on current link- related or user-related information in shadowed environments is proposed. A more realistic user mobility model and a realistic propagation model are considered.  Wireless Ad Hoc Networks

8 Breakthroughs and Major Achievements TechnologyState-of-the-ArtBreakthrough Sensing Coverage for Randomly Distributed Wireless Sensor Networks in Shadowed Environments In previous works, the sensing ability of a node is generally assumed to be a deterministic value in all directions. In other words, the sensing radius is assumed to depend only on the propagation distance. Our work is the first work that considers the shadowing impact on a WSN. This work examines the impact of the shadowing effects, as well as that of the asymmetric property in the sensing ability, on the sensing coverage. Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks The design of a routing protocol is generally independent of the sensing coverage issue. We propose coverage- preserving routing protocols for randomly distributed WSNs. The proposed protocols can substantially improve the performance of network sensing coverage.  Wireless Sensor Networks

9 Breakthroughs and Major Achievements TechnologyState-of-the-ArtBreakthrough Lifetime-Based Random-Deployment for Wireless Sensor Networks In WSNs, nodes that near the server/data-gatherer generally bear more traffic and run down more quickly. A non-uniform sensor deployment strategy can fundamentally overcome this crucial problem. Our work is a prior work that investigates the non-uniform sensor deployment to extend the lifetime of a WSN. This work provides a unified method to determine the optimum node distributions for both multihop-based and cluster-based routing protocols.  Wireless Sensor Networks

10 Breakthroughs and Major Achievements Wireless Sensor Networks Link Stability Prediction for Mobile Ad Hoc Networks in Shadowed Environments (100%, Tsai) Sensing Coverage for Randomly Distributed Wireless Sensor Networks in Shadowed Environments (100%, Tsai) Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks (100%, Tsai) Lifetime-Based Random-Deployment for Wireless Sensor Networks (100%, Tsai)

11 Categorized Summary

12 Publications Journal papers : (2006/4/1 ~ 2007/03/31) Y.-R. Tsai and C.-J. Chang, “SIM-based Subscriber Authentication Mechanism for Wireless Local Area Networks,” Computer Communications, vol. 29, issue 10, pp. 1744-1753, June 2006. (SCI, EI) Y.-R. Tsai, “Spatial Correlation Models for Total Co-channel Interference and Carrier-to-Interference Ratio in Mobile Cellular Systems,” IEEE Transactions on Wireless Communications, vol. 5, pp. 2752-2759, October 2006. (SCI, EI) Y.-R. Tsai and S.-J. Wang, “Two-tier Authentication for Cluster and Individual Sets in Mobile Ad Hoc Networks,” Computer Networks, vol. 51, issue 3, pp. 883-900, February 2007. (SCI, EI) Y.-R. Tsai, “Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks,” IEEE Transactions on Wireless Communications (to appear). (SCI, EI)

13 Publications Conferences Papers : (2006/4/1 ~ 2007/03/31) Y.-R. Tsai, T.-Y. Lin and K.-J. Yang, “Sensing Coverage for Randomly Distributed Wireless Sensor Networks in Shadowed Environments,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. Y.-R. Tsai, S.-Y. Yeh and K.-J. Yang, “Path Metric-based Navigation Protocol for Wireless Sensor Networks,” Workshop on Wireless, Ad Hoc, and Sensor Networks (WASN), Tao-Yuan, Taiwan, Aug. 2006. Y.-R. Tsai, “Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks,” IEEE Global Telecommunications Conference (Globecom), San Francisco, USA, Nov.-Dec. 2006. K.-J. Yang and Y.-R. Tsai, “Link Stability Prediction for Mobile Ad Hoc Networks in Shadowed Environments,” IEEE Global Telecommunications Conference (Globecom), San Francisco, USA, Nov.-Dec. 2006. S.-J. Wang, Y.-R. Tsai, and J.-W. Chan, “A Countermeasure against Frequent Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks,” IEEE International Symposium on Wireless Pervasive Computing (ISWPC), Puerto Rico, Feb. 2007. Y.-R. Tsai, Y.-W. Hong, Y.-Y. Liao and K.-J. Yang, “The Efficiency and Delay of Distributed Source Coding in Random Access Sensor Networks,” IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, Mar. 2007.

14 A Summary of the Post-Project Plan

15 Technology2000-20042005-20062007-2008 Wireless Sensor Networks Efficiency and Delay of Distributed Source Coding in Random Access WSNs Mobile Ad Hoc Networks Cooperative communications A Summary of the Post-Project Plan


Download ppt "General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-"

Similar presentations


Ads by Google