Efficient infrastructure damage detection and localization using wireless sensor networks, with cluster generation for monitoring damage progression

Author(s):  
William Contreras ◽  
Sotirios Ziavras
Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2015 ◽  
Vol 2 (3) ◽  
pp. 237-252 ◽  
Author(s):  
Madhuka Jayawardhana ◽  
Xinqun Zhu ◽  
Ranjith Liyanapathirana ◽  
Upul Gunawardana

Author(s):  
Theodore G. van Kessel ◽  
Muralidhar Ramachandran ◽  
Levente J. Klein ◽  
Dhruv Nair ◽  
Nigel Hinds ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document