sensors-logo

Journal Browser

Journal Browser

Dependability of Wireless Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (31 July 2021) | Viewed by 10589

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, The University of Warwick, Coventry CV4 7AL, UK
Interests: dependability; wireless sensor networks; distributed systems

E-Mail Website
Guest Editor
Department of Computer Science, University of Warwick, Gibbett Hill Road, Coventry CV4 7AL, UK
Interests: security; context privacy and trust in resource-constrained and distributed IoT systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless Sensor Networks (WSNs) are used in a range of monitoring, tracking, and control applications. They facilitate the easy deployment of applications in scenarios where there is limitedto no access to infrastructure such as communications and power. Even when this infrastructure is available, WSNs are an alternative that can be cheaper and easier to deploy than their physically connected counterparts. Applications and services running atop these WSNs will have reliability, security, and availability requirements that have to be met. However, several factors can impact the dependability of the services such as the harsh environment in which they are deployed, their reliance on wireless communication, and the limited energy supply (via batteries or energy harvesting) they have access to. To improve the dependability of the services, applications and protocols need to be made resilient, and the final solution will typically be congnisant of the performance and energy requirements of the system.

This Special Issue aims to bring together research efforts and development in the area of WSNs. It will provide a platform for academic researchers and industry to present new techniques or evaluations of existing techniques for the provision of dependable services in WSNs. Submissions that include practical results demonstrating real-world efficacy will be preferred. Topics of interest in this Special Issue include but are not limited to the following:

  • Applications for domains where dependability is critical (e.g., nuclear, energy, space, and health);
  • Threat modelling in WSNs;
  • Reliability modelling in WSNs;
  • Security and privacy issues in WSNs;
  • Reliable protocols;
  • Cross-layer design and optimization;
  • Fault detection and recovery;
  • Timeliness and real-time aspects in WSNs;
  • Intermittent computing in WSNs;
  • Reliability of heterogenous WSNs;
  • Testing and validation of WSNs;
  • Experiences from real-world deployments

Prof. Dr. Arshad Jhumka
Dr. Matthew Bradbury
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 910 KiB  
Communication
Highly Reliable Fuzzy-Logic-Assisted AODV Routing Algorithm for Mobile Ad Hoc Networks
by Jiamin Li, Mengling Wang, Pengcheng Zhu, Dongming Wang and Xiaohu You
Sensors 2021, 21(17), 5965; https://0-doi-org.brum.beds.ac.uk/10.3390/s21175965 - 06 Sep 2021
Cited by 9 | Viewed by 3173
Abstract
Due to the noncentered, self-organizing, and self-healing characteristics, mobile ad hoc networks (MANET) have been more and more widely used as an alternative access technology for regions having no fixed infrastructure. On-demand routing protocols (e.g., ad hoc on-demand distance vector (AODV)) are used [...] Read more.
Due to the noncentered, self-organizing, and self-healing characteristics, mobile ad hoc networks (MANET) have been more and more widely used as an alternative access technology for regions having no fixed infrastructure. On-demand routing protocols (e.g., ad hoc on-demand distance vector (AODV)) are used to cope with the rapidly changing topology of MANET and reduce the network overhead. Taking delay, stability, and remaining energy of nodes into consideration, a fuzzy-logic-assisted AODV (FL-AODV) routing algorithm is proposed in this paper to further improve the reliability of the route in MANET. In the route discovery phase, the node with the highest reliability is selected as the relay node, and the route with the highest accumulated reliability is reserved for data transmission. Simulation results show that, compared with the traditional AODV protocol and the fuzzy logic routing algorithm (FLRA), the proposed routing protocol has higher reliability without increasing delay, i.e., better link connectivity and longer route life. The average routing reliability is about 18% higher than AODV while the average delay is the same low when the number of node greater than 70. Full article
(This article belongs to the Special Issue Dependability of Wireless Sensor Networks)
Show Figures

Figure 1

25 pages, 12283 KiB  
Article
A Variable-Length Chromosome Genetic Algorithm for Time-Based Sensor Network Schedule Optimization
by Van-Phuong Ha, Trung-Kien Dao, Ngoc-Yen Pham and Minh-Hoang Le
Sensors 2021, 21(12), 3990; https://0-doi-org.brum.beds.ac.uk/10.3390/s21123990 - 09 Jun 2021
Cited by 10 | Viewed by 2806
Abstract
Scheduling sensor nodes has an important role in real monitoring applications using sensor networks, lowering the power consumption and maximizing the network lifetime, while maintaining the satisfaction to application requirements. Nevertheless, this problem is usually very complex and not easily resolved by analytical [...] Read more.
Scheduling sensor nodes has an important role in real monitoring applications using sensor networks, lowering the power consumption and maximizing the network lifetime, while maintaining the satisfaction to application requirements. Nevertheless, this problem is usually very complex and not easily resolved by analytical methods. In a different manner, genetic algorithms (GAs) are heuristic search strategies that help to find the exact or approximate global optimal solution efficiently with a stochastic approach. Genetic algorithms are advantageous for their robustness to discrete and noisy objective functions, as they are only evaluated at independent points without requirements of continuity or differentiability. However, as explained in this paper, a time-based sensor network schedule cannot be represented by a chromosome with fixed length that is required in traditional genetic algorithms. Therefore, an extended genetic algorithm is introduced with variable-length chromosome (VLC) along with mutation and crossover operations in order to address this problem. Simulation results show that, with help of carefully defined fitness functions, the proposed scheme is able to evolve the individuals in the population effectively and consistently from generation to generation towards optimal ones, and the obtained network schedules are better optimized in comparison with the result of algorithms employing a fixed-length chromosome. Full article
(This article belongs to the Special Issue Dependability of Wireless Sensor Networks)
Show Figures

Figure 1

24 pages, 816 KiB  
Article
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
by Sabina Szymoniak, Olga Siedlecka-Lamch, Agnieszka M. Zbrzezny, Andrzej Zbrzezny and Miroslaw Kurkowski
Sensors 2021, 21(9), 3055; https://0-doi-org.brum.beds.ac.uk/10.3390/s21093055 - 27 Apr 2021
Cited by 6 | Viewed by 1945
Abstract
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee [...] Read more.
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their correctness. Now SP uses often time primitives due to the necessity of security dependence on the passing of time. In this work, we propose and investigate the SAT-and SMT-based formal verification methods of SP used in communication between devices equipped with sensors. For this, we use a formal model based on networks of communicating timed automata. Using this, we show how the security property of SP dedicated to the sensors world can be verified. In our work, we investigate such timed properties as delays in the network and lifetimes. The delay in the network is the lower time constraint related to sending the message. Lifetime is an upper constraint related to the validity of the timestamps generated for the transmitted messages. Full article
(This article belongs to the Special Issue Dependability of Wireless Sensor Networks)
Show Figures

Figure 1

22 pages, 6267 KiB  
Article
A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios
by Thiago C. Jesus, Paulo Portugal, Daniel G. Costa and Francisco Vasques
Sensors 2020, 20(22), 6542; https://0-doi-org.brum.beds.ac.uk/10.3390/s20226542 - 16 Nov 2020
Cited by 6 | Viewed by 1808
Abstract
In critical industrial monitoring and control applications, dependability evaluation will be usually required. For wireless sensor networks deployed in industrial plants, dependability evaluation can provide valuable information, enabling proper preventive or contingency measures to assure their correct and safe operation. However, when employing [...] Read more.
In critical industrial monitoring and control applications, dependability evaluation will be usually required. For wireless sensor networks deployed in industrial plants, dependability evaluation can provide valuable information, enabling proper preventive or contingency measures to assure their correct and safe operation. However, when employing sensor nodes equipped with cameras, visual coverage failures may have a deep impact on the perceived quality of industrial applications, besides the already expected impacts of hardware and connectivity failures. This article proposes a comprehensive mathematical model for dependability evaluation centered on the concept of Quality of Monitoring (QoM), processing availability, reliability and effective coverage parameters in a combined way. Practical evaluation issues are discussed and simulation results are presented to demonstrate how the proposed model can be applied in wireless industrial sensor networks when assessing and enhancing their dependability. Full article
(This article belongs to the Special Issue Dependability of Wireless Sensor Networks)
Show Figures

Figure 1

Back to TopTop