Analysis and classification of traffic in wireless sensor networks
Download
Author
Wang, Beng Wei
Date
2007-03Advisor
McEachen, John
Second Reader
Tummala, Murali
Metadata
Show full item recordAbstract
Wireless sensor networks have been widely researched for use in both military and commercial applications. They are especially of interest to the military planners as they can be deployed in hostile environments to collect vital information safely and cheaply. In view of this interest, there is a need to capture and categorize the data effectively under different operational conditions. This thesis captured traffic and data from sensor motes to analyze and present characteristics of the traffic in a meaningful manner. Specifically, this thesis studied the traffic generated by wireless sensor networks by setting up two different commonly used network topologies, namely a direct connection to the base and a daisy-chain connection to base. A total of six experiments were conducted, three for each topology. The data traffic between the nodes was captured over an extended duration of time. Using the captured information, analysis was performed to categorize and identify the information through anomalies and variations of traffic patterns. Data were also analyzed to study self-similarity and statistical distribution. The experimental results have shown that it is possible to differentiate the two different topologies by numbering the traffic distribution or by analyzing the types of messages sent. The status of the nodes can also be determined with the traffic collected. Examples include new nodes joining the network and operational status of the nodes. Statistical analysis has also been done and found that wireless sensor network traffic is not self-similar except for the interarrival time of the direct connection mode.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Traffic profiling of wireless sensor networks
Kirykos, Georgios (Monterey, California. Naval Postgraduate School, 2006-12);Network security is vital in wireless networks that are widely used today. We desire wireless networks that maintain a high degree of confidentiality, integrity, and availability. Wireless sensor networks pose unique ... -
Optimal jammer placement to interdict wireless network services
Shankar, Arun (Monterey, California. Naval Postgraduate School, 2008-06);The demand for wireless networks continues to grow as the need for portable, low-cost telecommunications systems increases around the world. Wireless networks are particularly complex because their topologies can change ... -
Digital Signal Processing Research Program
Therrien, Charles; Oppenheim, Alan V.; Baggeroer, Arthur B.; Chandrakasan, Anantha P.; Wornell, Gregory W.; Aliberti, Giovanni; Gold, Bernard; Isabelle, Steven H.; Kschischang, Frank; Nawab, Hamid S.; Preisig, James C.; Weinstein, Ehud; Amirtharajah, Rajeevan; Barron, Richard J.; Beheshti, Soosan; Chan, Albert; Chen, Brian; Draper, Stark; Hadjicostis, Christoforos N.; Laneman, Nicholas J.; Lee, Li; Lopez, Michael J.; Ooi, James M.; Papadopoulos, Haralabos C.; Secor, Matthew J.; Seefeldt, Alan J.; Verbout, Shawn M.; Wage, Kathleen E.; Wang, Alex Che-Wei; Said, Maya R.; Chupp, Darla J.; Zaganjori, Janice M.; Eggen, Trym H.; Ludwig, Jeffrey T.; Sestok, Charles K.; Torres, Wade P. (Monterey, California. Naval Postgraduate School, 1997);The field of digital signal processing grew out of the flexibility afforded by the use of digital computers in implementing signal processing algorithms and systems. It has since broadened into the use of a variety of ...