Conference Paper

MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs.

DOI: 10.1007/978-3-642-02085-8_19 Conference: Distributed Computing in Sensor Systems, 5th IEEE International Conference, DCOSS 2009, Marina del Rey, CA, USA, June 8-10, 2009. Proceedings
Source: DBLP

ABSTRACT In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor net- works that can support multiple applications. While MA-WSNs have many advantages over traditional WSNs, they tend to require frequent code movements in the network, and thus here new challenges for de- signing energy efficient code dissemination protocols. We propose MCP, a stateful Multicast based Code redistribution Proto- col for achieving energy efficiency. Each node in MCP maintains a small table to record the interesting information of known applications. The ta- ble enables sending out multicast-based code dissemination requests such that only a subset of neighboring sensors contribute to code dissemina- tion. Compared to broadcasting based schemes, MCP greatly reduces signal collision and saves both the dissemination time and reduces the number of dissemination messages. Our experiments results show that MCP can reduce dissemination time by 25% and message overhead by 20% under various network settings.

0 Followers
 · 
65 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: As the applications of Wireless Sensor Networks increase rapidly, the number of deployed sensor devices proliferates, which prompts the research community to work towards their integration in the so-called "Internet of Things" to gather real time information and make the maximum out of their use towards enhancing the user experience. The capability to reconfigure/reprogram them remotely not only enables easy maintenance and code updates, which is mandatory in large sensor network deployments, but also provides an unprecedented flexibility regarding the use of all available resources of different types. However, the design of a reliable dissemination protocol is a real challenge and the reason is threefold: the desired reprogramming requirements differ from use case to use case (e.g. tolerated reprogramming time, affordable overhead), the wireless medium is characterized by low reliability, and the devices are severely resource constrained. For this reason, in this paper we first explore the reprogramming requirements and the intricacies of WSNs and then review the already proposed network protocols for reprogramming wireless sensor networks placing emphasis on the their features to guide both prospect users and designers efforts.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: An energy-efficient online reprogramming protocol called EEORP is proposed. Based on Deluge framework, EEORP introduces two methods to reduce the consumption of energy during the dissemination of an image. Firstly EEORP separates the reprogramming protocol as an alone program image and implements the application as another program image equipped with the ability to listen to new code updates. During program image dissemination, only the application program image needs to be disseminated. In addition EEORP improves the dynamic adjustment algorithm of transmit rate of advertisement to reserve the energy. Our algorithm is based on Deluge. Hence it can easily be integrated into Deluge and has good prospects.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Online code dissemination in wireless sensor networks is an important means of remote task reallocation, software update of nodes and network function reconfiguration after a wireless sensor network is deployed. This paper firstly summarizes the researches on the online code dissemination and classifies them into three types: the transmitted object optimization algorithm with the purpose of reducing the data traffic and improving the energy effectiveness, the security authentication algorithms based on public key cryptograph and the security authentication algorithms based on the symmetric key cryptograph. Based on the in-depth analysis of various algorithms, we point out their advantages and disadvantages. At last, the shortcomings and challenges of the existing online code dissemination algorithms are drawn and some suggestions are given to the future research on them.
    01/2011; 2011(1). DOI:10.5813/www.ieit-web.org/IJADC/2011.1.4

Preview

Download
0 Downloads