A Novel Approach for Establishing Connectivity in Partitioned Mobile Sensor Networks using Beamforming Techniques
Subject Areas : Wireless NetworkAbbas Mirzaei 1 , Shahram Zandian 2
1 - Department of Computer Engineering, Ardabil Branch, Islamic Azad University, Ardabil, Iran
2 - Department of Computer Engineering, Ardabil Branch, Islamic Azad University, Ardabil, Iran
Keywords: Mobile Sensor Networks (MSNs), Connectivity Restoration, Network Partitioning, Cooperative Beamforming, Fault Recovery,
Abstract :
Network connectivity is one of the major design issues in the context of mobile sensor networks. Due to diverse communication patterns, some nodes lying in high-traffic zones may consume more energy and eventually die out resulting in network partitioning. This phenomenon may deprive a large number of alive nodes of sending their important time critical data to the sink. The application of data caching in mobile sensor networks is exponentially increasing as a high-speed data storage layer. This paper presents a deep learning-based beamforming approach to find the optimal transmission strategies for cache-enabled backhaul networks. In the proposed scheme, the sensor nodes in isolated partitions work together to form a directional beam which significantly increases their overall communication range to reach out a distant relay node connected to the main part of the network. The proposed methodology of cooperative beamforming-based partition connectivity works efficiently if an isolated cluster gets partitioned with a favorably large number of nodes. We also present a new cross-layer method for link cost that makes a balance between the energy used by the relay. By directly adding the accessible auxiliary nodes to the set of routing links, the algorithm chooses paths which provide maximum dynamic beamforming usage for the intermediate nodes. The proposed approach is then evaluated through simulation results. The simulation results show that the proposed mechanism achieves up to 30% energy consumption reduction through beamforming as partition healing in addition to guarantee user throughput.
[1] O. Cheikhrouhou, A. Koubaa, M. Boujelben, M. Abid. “A lightweight user authentication scheme for wireless sensor networks.” InACS/IEEE International Conference on Computer Systems and Applications-AICCSA 2010 2010 May 16 (pp. 1-7). IEEE.
[2] Bhushan, Bharat, and Gadadhar Sahoo. "Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks." Wireless Personal Communications 98, no. 2 (2018): 2037-2077.
[3] AM Somarin, Y. Alaei, MR Tahernezhad, A. Mohajer, M. Barari. “An Efficient Routing Protocol for Discovering the Optimum Path in Mobile Ad Hoc Networks. Indian Journal of Science and Technology. 2015 Apr;8(S8):450-5.
[4] Radosavljević, Nemanja, and Đorđe Babić. "Overview of security threats, prevention and protection mechanisms in wireless sensor networks." J. Mechatron. Autom. Identif. Technol (2020): 1-6.
[5] L. Zhou, Y. Shan, X. Chen. “An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks”. In2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019 Mar 15 (pp. 262-265). IEEE.
[6] J. Yang, ME. Aydin, J. Zhang, C. Maple. “UMTS base station location planning: a mathematical model and heuristic optimisation algorithms”. IET communications. 2007 Oct 1;1(5):1007-14.
[7] R. Mudumbai, G Barriac, U. Madhow. “On the feasibility of distributed beamforming in wireless networks.” IEEE Transactions on Wireless communications. 2007 May 21;6(5):1754-63.
[8] R. Mudumbai, DR. Iii, U. Madhow, “Poor HV. Distributed transmit beamforming: challenges and recent progress.” IEEE Communications Magazine. 2009 Feb 18;47(2):102-10.
[9] Mohajer, Amin, F. Sorouri, A. Mirzaei, A. Ziaeddini, K. Jalali Rad, and Maryam Bavaghar. "Energy-aware hierarchical resource management and Backhaul traffic optimization in heterogeneous cellular networks." IEEE Systems Journal (2022).
[10] H. Fang, L. Xu, KK. Choo. “Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.” Applied Mathematics and Computation. 2017 Mar 1;296:153-67.
[11] AS. Abuzneid, T. Sobh, M. Faezipour, A. Mahmood, J. James. “Fortified anonymous communication protocol for location privacy in WSN: a modular approach.” Sensors. 2015 Mar;15(3):5820-64.
[12] Mohajer, Amin, Mohammad Hasan Hajimobini, Abbas Mirzaei, and Ehsan Noori. "Trusted-CDS based intrusion detection system in wireless sensor network (TC-IDS)." Open Access Library Journal 1, no. 7 (2014): 1-10.
[13] V. Kumar, A. Kumar. “A novel approach for boosting base station anonymity in a wsn”. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS. 2017 Sep 1;8(9):114-20.
[14] U. Acharya, M. Younis. “Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks”. 2010 Nov 1;8(8):791-809.
[15] YA. Bangash, LF. Zeng, D. Feng . “MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks”. Journal of Computer Science and Technology. 2017 Sep;32(5):991-1007.
[16] P. Gope, AK. Das, N. Kumar, Y. Cheng. “Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks”. IEEE transactions on industrial informatics. 2019 Jan 24;15(9):4957-68.
[17] D. Sharma, A. Goap, AK. Shukla, AP. Bhondekar. “Traffic heterogeneity analysis in an energy heterogeneous WSN routing algorithm”. InProceedings of 2nd International Conference on Communication, Computing and Networking 2019 (pp. 335-343). Springer, Singapore.
[18] AA. Mugheri, MA. Siddiqui, M. Khoso. “Analysis on Security Methods of Wireless Sensor Network (WSN)”. Sukkur IBA Journal of Computing and Mathematical Sciences. 2018 Jun 26;2(1):52-60.
[19] Z. Sun, M. Wei, Z. Zhang, G. Qu. “Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks”. Applied Soft Computing. 2019 Apr 1;77:366-75.
[20] H. Fakhrey, M. Johnston, F. Angelini, R. Tiwari. “The optimum design of location-dependent key management protocol for a multiple sink WSN using a random selected cell reporter. IEEE Sensors Journal”. 2018 Sep 24;18(24):10163-73.
[21] O. Oladayo, A. Ashraf. “A secure and energy-aware routing protocol for optimal routing in mobile wireless sensor networks (MWSNs)”. International Journal of Sensors Wireless Communications and Control. 2019 Dec 1;9(4):507-20.
[22] K. Indira, U. Sakthi. “An efficient anonymous authentication scheme to improve security and privacy in SDN based wireless sensor networks”. Indian Journal of Computer Science and Engineering. 2020.
[23] Mohajer, Amin, Mahya Sam Daliri, A. Mirzaei, A. Ziaeddini, M. Nabipour, and Maryam Bavaghar. "Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems." IEEE Transactions on Services Computing (2022).
[24] Lee, Jae Seang, Yoon-Sik Yoo, Hyungseok Choi, Taejoon Kim, and Jun Kyun Choi. "Group connectivity-based UAV positioning and data slot allocation for tactical MANET." IEEE Access 8 (2020): 220570-220584.
[25] Zhang, De-gan, Hao Wu, Peng-zhen Zhao, Xiao-huan Liu, Yu-ya Cui, Lu Chen, and Ting Zhang. "New approach of multi-path reliable transmission for marginal wireless sensor network." Wireless Networks 26, no. 2 (2020): 1503-1517.
[26] Jaber, Ghada, Rahim Kacimi, and Thierry Gayraud. "Efficient Interest Satisfaction in Content Centric Wireless Sensor Networks." In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1-5. IEEE, 2019.
[27] M. Bavaghar, A. Mohajer, S. Taghavi Motlagh. “Energy Efficient Clustering Algorithm for Wireless Sensor Networks”. Journal of Information Systems and Telecommunication (JIST). 2020 Jun;4(28):238.
[28] Liu, Hao, Rongbo Zhu, Jun Wang, and Wengang Xu. "Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking." Security and Communication Networks 2021 (2021).
[29] Gai, Keke, Kim-Kwang Raymond Choo, Meikang Qiu, and Liehuang Zhu. "Privacy-preserving content-oriented wireless communication in internet-of-things." IEEE Internet of Things Journal 5, no. 4 (2018): 3059-3067.
[30] A. Mohajer, M. Barari, H. Zarrabi. “Big Data-based Self Optimization Networking in Multi Carrier Mobile Networks”. Bulletin de la Société Royale des Sciences de Liège. 2016 Jan 1;85:392-408.
[31] M. Dibaei, A. Ghaffari. “Full-duplex medium access control protocols in wireless networks: a survey”. Wireless Networks. 2020 May;26(4):2825-43.
[32] H. Jung, IH. Lee. “Secrecy performance analysis of analog cooperative beamforming in three-dimensional Gaussian distributed wireless sensor networks”. IEEE Transactions on Wireless Communications. 2019 Feb 12;18(3):1860-73.
[33] W. Ge, Z. Zhu, W. Hao, Y. Wang, Z. Wang, Q. Wu, Z. Chu. “AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks”. Electronics. 2019 Apr;8(4):459.
[34] A. Angappan, TP. Saravanabava, P. Sakthivel, KS. Vishvaksenan. “Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN”. Journal of Ambient Intelligence and Humanized Computing. 2020 Jul 7:1-2.
[35] S. Kumar, H. Kim. “Energy efficient scheduling in wireless sensor networks for periodic data gathering”. IEEE access. 2019 Jan 10;7:11410-26.
[36] I. Tomić, JA. McCann. “A survey of potential security issues in existing wireless sensor network protocols”. IEEE Internet of Things Journal. 2017 Sep 7;4(6):1910-23.
[37] Y. Yuan, L. Huo, Z. Wang, D. Hogrefe. “Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks”. IEEE Access. 2018 May 15;6:27629-36.
[38] Y. Liu, Z. Ding, M. Elkashlan, “Poor HV. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer”. IEEE Journal on Selected Areas in Communications. 2016 Mar 31;34(4):938-53.