Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies

In a typical Wireless Sensor Network (WSN) application, the basic communication service is the transportation of the data collected from sensors to the base station. For prolonging the network lifetime, energy efficiency should be one of the primary attributes of such a service. The amount of data transmitted by a node usually depends on how much local processing is performed. As an example, in visual sensor networks the amount of image processing on the nodes affects the amount of data transmitted to the base station (i.e., the higher the computation, the lower the communication and vice versa). Hence in order to improve energy efficiency and prolong the network lifetime this communication/computation energy trade-off must be analyzed. This analysis may be performed at the network-level (i.e., all nodes in the network use the same strategy) or at a node level (i.e., sensor nodes do not necessarily have identical strategies). The latter is more fine-grained allowing different nodes to implement different solutions. To guide designers in effectively using these trade-offs to prolong network lifetime, we develop a novel Mixed Integer Programming (MIP) framework. We show that the optimal node level strategy can extend network lifetime more than 20% as compared to a network-level optimal strategy. We also develop a computationally efficient heuristic to overcome the very high computational requirements of the proposed MIP model.

[1]  Leandros Tassiulas,et al.  Maximum lifetime routing in wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[2]  G. Manimaran,et al.  Joint Scheduling of Tasks and Messages for Energy Minimization in Interference-Aware Real-Time Sensor Networks , 2015, IEEE Transactions on Mobile Computing.

[3]  Bülent Tavli,et al.  A survey of visual sensor network platforms , 2012, Multimedia Tools and Applications.

[4]  Bruce L. Golden,et al.  Heuristic Search for Network Design , 2005 .

[5]  Bülent Tavli,et al.  Energy and Spatial Reuse Efficient Network-Wide Real-Time Data Broadcasting in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[6]  Anantha Chandrakasan,et al.  Bounding the lifetime of sensor networks via optimal role assignments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[7]  Yuan Xue,et al.  Optimal Wireless Network Restoration under Jamming Attack , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[8]  Marimuthu Palaniswami,et al.  Comparative study of multicast authentication schemes with application to wide-area measurement system , 2013, ASIA CCS '13.

[9]  Mehul Motani,et al.  Collaborative broadcasting and compression in cluster-based wireless sensor networks , 2005, EWSN.

[10]  Bülent Tavli,et al.  The impact of one-time energy costs on network lifetime in wireless sensor networks , 2009, IEEE Communications Letters.

[11]  Wendi B. Heinzelman,et al.  General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies , 2008, IEEE Transactions on Mobile Computing.

[12]  Takahiro Hara,et al.  A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..

[13]  Mehmet Kayaalp,et al.  Data processing and communication strategies for lifetime optimization in wireless sensor networks , 2010 .

[14]  Lin Cai,et al.  Cross-Layer Schemes for Reducing Delay in Multihop Wireless Networks , 2013, IEEE Transactions on Wireless Communications.

[15]  Aamir Saeed Malik,et al.  Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview , 2011, Eur. Trans. Telecommun..

[16]  Victor C. M. Leung,et al.  Optimum power and rate allocation in video sensor networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[17]  Kemal Bicakci,et al.  Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies , 2014, 2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet).

[18]  Fatiha Bendali,et al.  Heuristics for Designing Energy-efficient Wireless Sensor Network Topologies , 2009, J. Networks.

[19]  J. Kiefer,et al.  Sequential minimax search for a maximum , 1953 .

[20]  Leslie Lamport,et al.  Constructing Digital Signatures from a One Way Function , 2016 .

[21]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Pravin Varaiya,et al.  On multi-hop routing for energy efficiency , 2005, IEEE Communications Letters.

[24]  Nirvana Meratnia,et al.  Review of Optimization Problems in Wireless Sensor Networks , 2012 .

[25]  Andrea Bianco,et al.  Maximizing system lifetime in wireless sensor networks , 2007, Eur. J. Oper. Res..

[26]  Milind Dawande,et al.  Energy efficient schemes for wireless sensor networks with multiple mobile base stations , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[27]  Huei-Wen Ferng,et al.  Design of Novel Node Distribution Strategies in Corona-Based Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[28]  Enrico Magli,et al.  Energy consumption and image quality in wireless video-surveillance networks , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[29]  Robert E. Bixby,et al.  Progress in computational mixed integer programming—A look back from the other side of the tipping point , 2007, Ann. Oper. Res..

[30]  Qunfeng Dong,et al.  Maximizing system lifetime in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[31]  Georg Carle,et al.  Poster: Securing the internet of things with DTLS , 2011, SenSys.

[32]  Djamal Zeghlache,et al.  Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.

[33]  Michael Scott,et al.  On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.

[34]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[35]  Bülent Tavli,et al.  Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures , 2012, Inf. Sci..

[36]  Miao Pan,et al.  Joint sleep scheduling and routing for lifetime optimization in delay-sensitive sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[37]  E. A. Silver,et al.  An overview of heuristic solution methods , 2004, J. Oper. Res. Soc..

[38]  Richard Bellman,et al.  ON A ROUTING PROBLEM , 1958 .

[39]  Bülent Tavli,et al.  Optimal data compression and forwarding in wireless sensor networks , 2010, IEEE Communications Letters.

[40]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[41]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[42]  Bart Preneel,et al.  Power consumption evaluation of efficient digital signature schemes for low power devices , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[43]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.