Redundancy-Based Semi-Reliable Packet Transmission in Wireless Visual Sensor Networks Exploiting the Sensing Relevancies of Source Nodes

نویسندگان

  • DANIEL G. COSTA
  • LUIZ AFFONSO GUEDES
  • FRANCISCO VASQUES
چکیده

Visual data monitoring in wireless sensor networks can significantly enrich a large set of surveillance and general purpose monitoring applications. However, transmission of image snapshots or video streams can rapidly deplete the energy resources of the deployed nodes, turning energy efficiency into a major optimization issue. During wireless transmissions, packets can be corrupted directly affecting the monitoring quality of the applications. One reasonable way to reduce quality loss is the transmission of redundant packets for higher error resilience, but additional packet transmissions may incur in undesirable energy consumption. Frequently, some monitoring quality loss may be tolerated since visual information retrieved from source nodes may have different relevance for the applications, according to the monitoring requirements and the current sensors’ poses and fields of view. In such way, we propose that only high-relevant source nodes will transmit redundant packets, assuring error resilience only for the most relevant visual data for the monitoring application. Doing so, energy is saved over the network when fewer packets are transmitted in average, potentially enlarging the network lifetime with reduced impact to the overall monitoring quality. Key-Words: packet-level redundancy; wireless visual sensor networks; semi-reliable transmission; sensing relevance of source nodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy-Efficient Packet Relaying in Wireless Image Sensor Networks Exploiting the Sensing Relevancies of Source Nodes and DWT Coding

When camera-enabled sensors are deployed for visual monitoring, a new set of innovative applications is allowed, enriching the use of wireless sensor network technologies. In these networks, energy-efficiency is a highly desired optimization issue, mainly because transmission of images and video streams over resource-constrained sensor networks is more stringent than transmission of conventiona...

متن کامل

A Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)

Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013