Redundant Node Management in Wireless Sensor Networks with Multiple Sensor Types

Author(s):  
M.W.P Maduranga ◽  
P. Saengudomlert ◽  
H.M.N Dilum Bandara
Author(s):  
Manoshri A. Ghawade ◽  
Dr. Sheetal S. Dhande

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.


2009 ◽  
Vol 5 (5) ◽  
pp. 596-618
Author(s):  
Shung Han Cho ◽  
Jinseok Lee ◽  
Sangjin Hong ◽  
WeDuke Cho

This article presents a method for dynamic data association in wireless sensor networks and addresses the issue of multiple objects tracking. The sensor node used in this article incorporates RFID reader and an acoustic sensor so that two different signals are cooperating for tracking and associating multiple objects. The RFID tag is used for object identification and an acoustic sensor is used for estimating object movements. In the heterogeneous sensor networks, our proposed association method is analyzed with association success, failure, and recovery cases. In addition, 2-dimensional (2D) particle filtering is used for estimating a objects state such as position and velocity. The performance is compared between a single sensor node and multiple sensor nodes in our proposed algorithm. In addition, the association performance with multiple sensor nodes is evaluated as a function of sampling time and object movement behavior. Finally, the effect of the two heterogeneous sensors range difference is analyzed and discussed.


2015 ◽  
Vol 60 ◽  
pp. 121-137 ◽  
Author(s):  
Francesco Carrabs ◽  
Raffaele Cerulli ◽  
Ciriaco D׳Ambrosio ◽  
Monica Gentili ◽  
Andrea Raiconi

2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Adnan Anwar Awan ◽  
Muhammad Amir Khan ◽  
Aqdas Naveed Malik ◽  
Syed Ayaz Ali Shah ◽  
Aamir Shahzad ◽  
...  

Wireless sensor networks (WSNs) deployed in harsh and unfavorable environments become inoperable because of the failure of multiple sensor nodes. This results into the division of WSNs into small disjoint networks and causes stoppage of the transmission to the sink node. Furthermore, the internodal collaboration among sensor nodes also gets disturbed. Internodal connectivity is essential for the usefulness of WSNs. The arrangement of this connectivity could be setup at the time of network startup. If multiple sensor nodes fail, the tasks assigned to those nodes cannot be performed; hence, the objective of such WSNs will be compromised. Recently, different techniques for repositioning of sensor nodes to recover the connectivity have been proposed. Although capable to restore connectivity, these techniques do not focus on the coverage loss. The objective of this research is to provide a solution for both coverage and connectivity via an integrated approach. A novel technique to reposition neighbouring nodes for multinode failure is introduced. In this technique, neighbouring nodes of the failed nodes relocate themselves one by one and come back to their original location after some allocated time. Hence, it restores both prefailure connectivity and coverage. The simulations show our proposed technique outperforms other baseline techniques.


2007 ◽  
Vol 3 (3) ◽  
pp. 289-310 ◽  
Author(s):  
Liang Song ◽  
Dimitrios Hatzinakos

We propose to develop Wireless Sensor Networks with Mobile Sinks (MSSN), under high sensor node density, where multiple sensor nodes need to share one single communication channel in the node-to-sink transmission. By exploiting the tradeoff between the successful information retrieval probability and the nodes energy consumption, a number of multiple nodes transmission scheduling algorithms are proposed. Both optimal and suboptimal algorithms, which exhibit exponential and linear complexity respectively, are discussed under the desired application. Computer simulations show that suboptimal algorithms perform nearly as good as the optimal one. The study leads to the cross-layer Wireless Link layer design for MSSN.


Sign in / Sign up

Export Citation Format

Share Document