scholarly journals Wireless sensor networks and structural health monitoring: Experiences with slab track infrastructures

2019 ◽  
Vol 15 (3) ◽  
pp. 155014771982600 ◽  
Author(s):  
Eduardo Cañete ◽  
Jaime Chen ◽  
Manuel Díaz ◽  
Luis Llopis ◽  
Bartolomé Rubio

Slab track systems have the potential to become a more sustainable option for high-speed railway infrastructures than traditional ballasted tracks. Traditionally, the systems that monitor these infrastructures have been costly, but advances in the last few decades have made the use of wireless sensor networks within these infrastructures a feasible solution that can be used to evaluate their degradation for failure detection and prediction. Since the cost of these systems is steadily decreasing, it is now possible to use permanent wireless sensor networks as an integral part of the overall system to pave the way for smart infrastructures that can get real-time information about the structural health of the infrastructure at a relatively low cost. In order to show the suitability of this kind of system to monitor the structural health, three demonstrators, developed in the context of the FASTRACK project, related to the design and construction of a monitoring system for slab track systems that measures vibrations and displacements in the track, are presented. FASTRACK uses an innovative approach where data read by sensors are sent to passing trains, which are used as data mules to upload the information to a remote server. On arrival at the station, the data are stored in a database, which is queried by an application to extract relevant information by means of analysis algorithms to detect and predict failures. The first real scenario tests the limits of the system under stress situations. The second one tests the system in an actual, installed slab track to analyze the suitability of the communication architecture and to study a transition zone between slab tracks to a ballast track. The last scenario deals with the data mule performance tests.

2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Kumudu Munasinghe ◽  
Mohammed Aseeri ◽  
Sultan Almorqi ◽  
Md. Farhad Hossain ◽  
Musbiha Binte Wali ◽  
...  

Underwater Wireless Sensor Networks (UWSNs) are considered as tangible, low cost solution for underwater surveillance and exploration. Existing acoustic wave-based UWSN systems fail to meet the growing demand for fast data rates required in military operations, oil/gas exploration, and oceanographic data collection. Electromagnetic (EM) wave-based communication systems, on the other hand, have great potential for providing high speed data rates in such scenarios. This paper will(1)discuss the challenges faced in the utilization of EM waves for the design of tactical underwater surveillance systems and(2)evaluate several EM wave-based three-dimensional (3D) UWSN architectures differing in topologies and/or operation principles on the performance of localization and target tracking. To the best of our knowledge, this is the first of its kind in the field of underwater communications where underwater surveillance techniques for EM wave-based high speed UWSNs have been investigated. Thus, this will be a major step towards achieving future high speed UWSNs.


2016 ◽  
Vol 16 (3) ◽  
pp. 137-153 ◽  
Author(s):  
K. Spoorthi ◽  
Saha Snehanshu ◽  
Mathur Archana

Abstract Exertion of wireless sensor networks has been increasing in recent years, and it imprints in almost all the technologies such as machine industry, medical, military and civil applications. Due to rapid growth in electronic fabrication technology, low cost, efficient, multifunctional and accurate sensors can be produced and thus engineers tend to incorporate many sensors in the area of deployment. As the number of sensors in the field increases, the probability of failure committed by these sensors also increases. Hence, efficient algorithms to detect and recover the failure of sensors are paramount. The current work concentrates mainly on mechanisms to detect sensor node failures on the basis of the delay incurred in propagation and also the energy associated with sensors in the field of deployment. The simulation shows that the algorithm plays in the best possible way to detect the failure in sensors. Finally, the Boolean sensing model is considered to calculate the network coverage of the wireless sensor network for various numbers of nodes in the network.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


Sign in / Sign up

Export Citation Format

Share Document