Efficient Data Collection Over Multiple Access Wireless Sensors Network

Data collection in Wireless Sensor Networks (WSN) draws significant attention, due to emerging interest in technologies ranging from Internet of Things (IoT) networks to simple “Presence” applications, which identify the status of the devices (active or inactive). Numerous Medium Access Control (MAC) protocols for WSN, which can address the challenge of data collection in dense networks, were suggested over the years. Most of these protocols utilize the traditional layering approach, in which the MAC layer is unaware of the encapsulated packet payload, and therefore there is no connection between the data collected, the physical layer and the signaling mechanisms. Nonetheless, in many of the applications that intend to utilize such protocols, nodes may need to exchange very little information, and do so only sporadically, that is, while the number of devices in the network can be very large, only a subset wishes to transmit at any given time. Thus, a tailored protocol, which matches the signaling, physical layer and access control to traffic patterns is required. In this work, we design and analyze a data collection protocol based on information theoretic principles. In the suggested protocol, the sink collects messages from up to $K$ sensors simultaneously, out of a large population of sensors, without knowing in advance which sensors will transmit, and without requiring any synchronization, coordination or management overhead. In other words, neither the sink nor the other sensors need to know who are the actively transmitting sensors, and this data is decoded directly from the channel output. We provide a simple codebook construction with very simple encoding and decoding procedures. We further design a secure version of the protocol, in which an eavesdropper observing only partial information sent on the channel cannot gain significant information on the messages transmitted or even which are the sources that sent these messages.

[1]  Matthew Malloy,et al.  Near-Optimal Adaptive Compressed Sensing , 2012, IEEE Transactions on Information Theory.

[2]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[3]  Venkatesh Saligrama,et al.  Non-adaptive group testing: Explicit bounds and novel algorithms , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[4]  Arvind Kakria,et al.  Survey of synchronous MAC protocols for Wireless Sensor Networks , 2014, 2014 Recent Advances in Engineering and Computational Sciences (RAECS).

[5]  Min-Te Sun,et al.  Distributed Compressive Data Aggregation in Large-Scale Wireless Sensor Networks , 2014 .

[6]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[7]  Shuangqing Wei,et al.  Partition Information and its Transmission Over Boolean Multi-Access Channels , 2014, IEEE Transactions on Information Theory.

[8]  D. Du,et al.  Combinatorial Group Testing and Its Applications , 1993 .

[9]  George Atia,et al.  Boolean Compressed Sensing and Noisy Group Testing , 2009, IEEE Transactions on Information Theory.

[10]  Raphael Rom,et al.  Multiple Access Protocols: Performance and Analysis , 1990, SIGMETRICS Perform. Evaluation Rev..

[11]  Xiqin Wang,et al.  Detection of graph structures via communications over a multiaccess Boolean channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[12]  Cem Aksoylar,et al.  Sparse Signal Processing With Linear and Nonlinear Observations: A Unified Shannon-Theoretic Approach , 2017, IEEE Trans. Inf. Theory.

[13]  A. Sterrett On the Detection of Defective Members of Large Populations , 1957 .

[14]  Lei Tang,et al.  EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks , 2011, MobiHoc '11.

[15]  Lei Tang,et al.  PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Sayyada Hajera Begum,et al.  A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks , 2015 .

[17]  Omer Gurewitz,et al.  Secure Group Testing , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[18]  Li Xiao,et al.  TAS-MAC: A traffic-adaptive synchronous MAC protocol for wireless sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[19]  Thach V. Bui,et al.  Efficient (nonrandom) construction and decoding of non-adaptive group testing , 2019, J. Inf. Process..

[20]  Geetika Dhand,et al.  Data Aggregation Techniques in WSN:Survey , 2016 .

[21]  Li Xiao,et al.  The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[22]  Eric Anderson,et al.  X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.

[23]  M. Sudan,et al.  Coding theory: tutorial & survey , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[24]  Mary Ann Ingram,et al.  SCT-MAC: A scheduling duty cycle MAC protocol for cooperative wireless sensor network , 2012, 2012 IEEE International Conference on Communications (ICC).

[25]  Christopher Cox,et al.  An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications , 2012 .

[26]  Omer Gurewitz,et al.  RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks , 2008, SenSys '08.

[27]  Azeddine Bilami,et al.  Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks , 2018, IEEE Access.

[28]  Dino Sejdinovic,et al.  Note on noisy group testing: Asymptotic bounds and belief propagation reconstruction , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[29]  A. Macula Probabilistic nonadaptive group testing in the presence of errors and DNA library screening , 1999 .

[30]  Volkan Cevher,et al.  Converse bounds for noisy group testing with arbitrary measurement matrices , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[31]  George Atia,et al.  Strong Impossibility Results for Sparse Signal Processing , 2014, IEEE Signal Processing Letters.

[32]  Ugo Vaccaro,et al.  $\epsilon $ -Almost Selectors and Their Applications to Multiple-Access Communication , 2017, IEEE Transactions on Information Theory.

[33]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[34]  Amre El-Hoiydi,et al.  WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks , 2004, ALGOSENSORS.

[35]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[36]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.