Improving the Implementation of Sensor Nodes for Illegal Logging Detection

Author(s):  
Jen-Ting Chen ◽  
Chuan-Bi Lin ◽  
Jiun-Jian Liaw ◽  
Yu-Yan Chen
Keyword(s):  
2020 ◽  
Vol 39 (6) ◽  
pp. 8139-8147
Author(s):  
Ranganathan Arun ◽  
Rangaswamy Balamurugan

In Wireless Sensor Networks (WSN) the energy of Sensor nodes is not certainly sufficient. In order to optimize the endurance of WSN, it is essential to minimize the utilization of energy. Head of group or Cluster Head (CH) is an eminent method to develop the endurance of WSN that aggregates the WSN with higher energy. CH for intra-cluster and inter-cluster communication becomes dependent. For complete, in WSN, the Energy level of CH extends its life of cluster. While evolving cluster algorithms, the complicated job is to identify the energy utilization amount of heterogeneous WSNs. Based on Chaotic Firefly Algorithm CH (CFACH) selection, the formulated work is named “Novel Distributed Entropy Energy-Efficient Clustering Algorithm”, in short, DEEEC for HWSNs. The formulated DEEEC Algorithm, which is a CH, has two main stages. In the first stage, the identification of temporary CHs along with its entropy value is found using the correlative measure of residual and original energy. Along with this, in the clustering algorithm, the rotating epoch and its entropy value must be predicted automatically by its sensor nodes. In the second stage, if any member in the cluster having larger residual energy, shall modify the temporary CHs in the direction of the deciding set. The target of the nodes with large energy has the probability to be CHs which is determined by the above two stages meant for CH selection. The MATLAB is required to simulate the DEEEC Algorithm. The simulated results of the formulated DEEEC Algorithm produce good results with respect to the energy and increased lifetime when it is correlated with the current traditional clustering protocols being used in the Heterogeneous WSNs.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Author(s):  
A. Radhika ◽  
D. Haritha

Wireless Sensor Networks, have witnessed significant amount of improvement in research across various areas like Routing, Security, Localization, Deployment and above all Energy Efficiency. Congestion is a problem of  importance in resource constrained Wireless Sensor Networks, especially for large networks, where the traffic loads exceed the available capacity of the resources . Sensor nodes are prone to failure and the misbehaviour of these faulty nodes creates further congestion. The resulting effect is a degradation in network performance, additional computation and increased energy consumption, which in turn decreases network lifetime. Hence, the data packet routing algorithm should consider congestion as one of the parameters, in addition to the role of the faulty nodes and not merely energy efficient protocols .Nowadays, the main central point of attraction is the concept of Swarm Intelligence based techniques integration in WSN.  Swarm Intelligence based Computational Swarm Intelligence Techniques have improvised WSN in terms of efficiency, Performance, robustness and scalability. The main objective of this research paper is to propose congestion aware , energy efficient, routing approach that utilizes Ant Colony Optimization, in which faulty nodes are isolated by means of the concept of trust further we compare the performance of various existing routing protocols like AODV, DSDV and DSR routing protocols, ACO Based Routing Protocol  with Trust Based Congestion aware ACO Based Routing in terms of End to End Delay, Packet Delivery Rate, Routing Overhead, Throughput and Energy Efficiency. Simulation based results and data analysis shows that overall TBC-ACO is 150% more efficient in terms of overall performance as compared to other existing routing protocols for Wireless Sensor Networks.


Author(s):  
Silya Putri Pratiwi ◽  
◽  
Dian Kagungan ◽  
Eko Budi Sulistio ◽  
◽  
...  

Forest management in terms of its production function is directed towards management that is oriented towards all potential forestry resources and is based on community empowerment. The Wana Tekat Mandiri Farmer Group Association manages community forests, namely state forests whose main use is aimed at empowering the community. The rampant illegal logging is carried out by irresponsible parties outside of the farmer group association. So that community groups that carry out illegal logging do not support the Regional Government in providing guidance to the Association of Farmer groups in the Sendang Agung District area. The type of research used in this research is descriptive type with a qualitative approach, data collection techniques, observation, interviews, documentation. The results of this study indicate that the strategy of community development and empowerment in community forest utilization has been running well and the implementation of the strategy has been deemed successful in implementation. The coaching strategy has a main objective in the framework of developing a coaching plan in carrying out activities or programs of Gapoktan Wana Tekad Mandiri, namely by how to develop skills, develop knowledge and develop attitudes. The existence of this coaching strategy is expected to have a good empowering impact on the community.


2016 ◽  
Vol 13 (1) ◽  
pp. 116
Author(s):  
Wan Isni Sofiah Wan Din ◽  
Saadiah Yahya ◽  
Mohd Nasir Taib ◽  
Ahmad Ihsan Mohd Yassin ◽  
Razulaimi Razali

Clustering in Wireless Sensor Network (WSN) is one of the methods to minimize the energy usage of sensor network. The design of sensor network itself can prolong the lifetime of network. Cluster head in each cluster is an important part in clustering to ensure the lifetime of each sensor node can be preserved as it acts as an intermediary node between the other sensors. Sensor nodes have the limitation of its battery where the battery is impossible to be replaced once it has been deployed. Thus, this paper presents an improvement of clustering algorithm for two-tier network as we named it as Multi-Tier Algorithm (MAP). For the cluster head selection, fuzzy logic approach has been used which it can minimize the energy usage of sensor nodes hence maximize the network lifetime. MAP clustering approach used in this paper covers the average of 100Mx100M network and involves three parameters that worked together in order to select the cluster head which are residual energy, communication cost and centrality. It is concluded that, MAP dominant the lifetime of WSN compared to LEACH and SEP protocols. For the future work, the stability of this algorithm can be verified in detailed via different data and energy. 


2015 ◽  
Vol 2 (1) ◽  
pp. 53-67
Author(s):  
Tutiek Retnowati ◽  
Markum Markum

Fidusia merupakan pengalihan hak kepemilikan suatu benda atas dasar kepercayaan dengan ketentuan bahwa benda yang hak kepemilikannya dialihkan tersebut tetap dalam penguasaan pemilik benda. Objek jaminan fidusia dapat disita oleh negara jika digunakan untuk melakukan perbuatan melawan hukum. Seperti kasus yang menimpa PT Astra Sedaya Finance, sebagai perusahaan pembiayaan yang merasa telah dirugikan akibat benda jaminan fidusia yang disita negara dari tangan pemberi fidusia selaku debitur karena yang bersangkutan melakukan perbuatan hukun kejahatan llegal logging.yang mengakibatkan benda objek jaminan dirampas oleh negara. Perampasan yang dilakukan oleh negara terhadap objek jaminan dalam kasus illegal logging ini tidak bertentangan dengan droit de suite yang dimiliki penerima fidusia. Hal ini dikarenakan dengan adanya sifat droit de suite tersebut perusahaan pembiayaan sebagai penerima fidusia tidak kehilangan haknya untuk menuntut pelunasan utang pemberi fidusia apabila pemberi fidusia wanprestasi. Perlindungan hukum bagi kreditur dalam hal benda jaminan dirampas oleh negara, dapat diuraikan sebagai berikut bahwa, (1) debitur wajib menyediakan jaminan pengganti yang setara nilainya dengan barang yang dirampas oleh negara; (2) mewajibkan kepada debitur (pemberi jaminan fidusia) supaya melunasi utangnya.


2017 ◽  
Vol 11 (1) ◽  
pp. 14-24
Author(s):  
Е. М. Abbasov

The problems of integration of the various wireless technologies, for-consists in the provision of required transmission speed and the transmission of information over a considerable distance at low power sensor nodes transmitters wireless Internet-water network for remote monitoring. Analyzed the integration of wireless LAN standard IEEE 802.11n/g and Bluetooth. Determined Graphic analytical dependence-dence, the defining characteristics of the data rate for wireless IEEE 802.11n / g networks. It analyzes the main shortcomings of BSS associated with ef cient use of batteries; the basic Metody reduce energy consumption for WSN based on the ZigBee technology, based on the planning schemes of awakening and data collection schemes. The possibilities MeshLogic technology solutions for the monitoring and control tasks that are critical to BPE-autonomous work Meni sensors.


2020 ◽  
Vol 14 ◽  
Author(s):  
M. Sivaram ◽  
V. Porkodi ◽  
Amin Salih Mohammed ◽  
S. Anbu Karuppusamy

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.


Sign in / Sign up

Export Citation Format

Share Document