Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Optimal data compression for lifetime maximization in wireless sensor networks operating in stealth mode
Download
index.pdf
Date
2015-01-01
Author
Incebacak, Davut
Zilan, Ruken
TAVLI, BÜLENT
Barcelo-Ordinas, Jose M.
Garcia-Vidal, Jorge
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
228
views
0
downloads
Cite This
Contextual privacy in Wireless Sensor Networks (WSNs) is concerned with protecting contextual information such as whether, when, and where the data is collected. In this context, hiding the existence of a WSN from adversaries is a desirable feature. One way to mitigate the sensor nodes' detectability is by limiting the transmission power of the nodes (Le., the network is operating in the stealth mode) so that adversaries cannot detect the existence of the WSN unless they are within the sensing range of the WSN. Position dependent transmission power adjustment enables the network to maintain its level of stealth while allowing nodes farther from the network boundary to use higher transmission power levels. To mitigate the uneven energy dissipation characteristic, nodes that cannot dissipate their energies on communications reduce the amount of data they generate through computation so that the relay nodes convey less data. Dynamic data compression/decompression strategies reduce the amount of data to be communicated, thus, they achieve better energy savings when compared to static compression/decompression of data in which the data is always compressed independently of the power transmission strategy. In this study, we investigate various data compression strategies to maximize the lifetime of WSNs employing contextual privacy measures through a novel mathematical programming framework.
Subject Keywords
Wireless Sensor Networks
,
Contextual Privacy
,
Data Compression
,
Network Lifetime
URI
https://hdl.handle.net/11511/68047
Journal
AD HOC NETWORKS
DOI
https://doi.org/10.1016/j.adhoc.2014.07.019
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
An Adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
Deniz, Fatih; Yazıcı, Adnan; Bağcı, Hakkı; Department of Computer Engineering (2016)
Wireless sensor networks (WSNs) are being used in numerous fields, such as battlefield surveillance, environmental monitoring and traffic control. They are typically composed of large numbers of tiny sensor nodes with limited resources. Because of their limitations and because of the environments they are being used, there are problems unique to WSNs. Due to the error-prone nature of wireless communication, especially in harsh environments, fault-tolerance emerges as an important property in WSNs. Also, bec...
Wireless sensor networks for security: Issues and challenges
Onel, T; Onur, Ertan; Ersoy, C; Delic, H (2006-01-01)
In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying Neyman-Pearson detection and defining the breach probability on a grid-modeled field. Using a graph model for the perimeter, Dijkstra's shortest path algorithm is used to find the weakest breach path. The breach probability is linked to parameters such as the false alarm rate, size of the data record and the signal-to-noise ratio. Consequently, the required number...
Impacts of Routing Attacks on Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Yazıcı, Adnan; Coşar, Ahmet (2015-08-25)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Implementation of an Enhanced Target Localization and Identification Algorithm on a Magnetic WSN
Baghaee, Sajjad; GÜRBÜZ, SEVGİ ZÜBEYDE; Uysal, Elif (2015-10-01)
Wireless sensor networks (WSNs) are ubiquitous in a wide range of applications requiring the monitoring of physical and environmental variables, such as target localization and identification. One of these applications is the sensing of ferromagnetic objects. In typical applications, the area to be monitored is typically large compared to the sensing radius of each magnetic sensor. On the other hand, the RF communication radii of WSN nodes are invariably larger than the sensing radii. This makes it economic...
A Graph Based Big Data Model for Wireless Multimedia Sensor Networks
Küçükkeçeci, Cihan; Yazıcı, Adnan (2016-10-08)
Wireless multimedia sensor networks are of interest to researchers from different disciplines and many studies have been proposed in a wide variety of application domains, such as military surveillance systems, environmental monitoring, fault monitoring and distributed smart cameras in the last decade. In a wireless sensor network, a large number of sensors can be deployed to monitor target areas and autonomously collect sensor data. This produces a large amount of raw data that needs to be stored, processe...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
D. Incebacak, R. Zilan, B. TAVLI, J. M. Barcelo-Ordinas, and J. Garcia-Vidal, “Optimal data compression for lifetime maximization in wireless sensor networks operating in stealth mode,”
AD HOC NETWORKS
, pp. 134–147, 2015, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/68047.