Bandit Learning with Concurrent Transmissions for Energy-Efficient Flooding in Sensor Networks
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 13
Abstract
Concurrent transmissions, a novel communication paradigm, has been shown to eectively accomplish a reliable and energy-eÿcient flooding in low-power wireless networks. With multiple nodes exploiting a receive-and-forward scheme in the network, this technique inevitably introduces communication redundancy and consequently raises the energy consumption of the nodes. In this article, we propose Less is More (LiM), an energy-eÿcient flooding protocol for wireless sensor networks. LiM builds on concurrent transmissions, exploiting constructive interference and the capture eect to achieve high reliability and low latency. Moreover, LiM is equipped with a machine learning capability to progressively reduce redundancy while maintaining high reliability. As a result, LiM is able to significantly reduce the radio-on time and therefore the energy consumption. We compare LiM with our baseline protocol Glossy by extensive experiments in the 30-node testbed FlockLab. Experimental results show that LiM highly reduces the broadcast redundancy in flooding. It outperforms the baseline protocol in terms of radio-on time, while attaining a high reliability of over 99.50% and an average end-to-end latency around 2 milliseconds in all experimental scenarios.
Authors and Affiliations
Peilin Zhang, Alex Yuan Gao, Oliver Theel
A Survey of System Level Power Management Schemes in the Dark-Silicon Era for Many-Core Architectures
Power consumption in Complementary Metal Oxide Semiconductor (CMOS) technology has escalated to a point that only a fractional part of many-core chips can be powered-on at a time. Fortunately, this fraction can be increa...
Outage Performance of a Two-branch Cooperative Energy-constrained Relaying Network with Selection Combining at Destination
In this paper, we investigate two-branch cooperative DF relaying networks with selection combining at the destination. Two intermediate relay-clusters (a conventional relay cluster and an energy-constrained relay cluster...
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by u...
Wireless Broadband Opportunities through TVWS for Networking in Rural areas of Africa
In this paper, we propose a new approach based on Cognitive Radio technology to address the challenges for ensuring connectivity in remote areas of Africa. Indeed, the current network coverage is concentrated around the...
An Application of SMC to continuous validation of heterogeneous systems.
This paper considers the rigorous design of Systems of Systems (SoS), i.e. systems composed of a set of heterogeneous components whose number evolves with time. Such components cooperate to accomplish functions that they...