scholarly journals Energy efficient multi-hop routing protocol for smart vehicle monitoring using intelligent sensor networks

2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110391
Author(s):  
Yuvaraja Teekaraman ◽  
Hariprasath Manoharan ◽  
Ramya Kuppusamy ◽  
Shabana Urooj ◽  
Fadwa Alrowais

This article focuses on intensifying in-vehicle biological wireless sensor networks for the persistence of monitoring the information on a precise vehicle. The wireless sensor networks will have enormous amount of nodules which are interrelated with each other. Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. In addition, the projected work focuses on reliable communiqué which is defined in terms of network reliability with discrepancy in reporting rate at each base station. To validate the efficiency of the proposed scheme, the simulation has been abetted using network simulator (NS2) and the outcomes indicate that when the sensors are installed, a robust system can be obtained with improved data transfer between the base stations. Moreover, a fortified in-vehicular sensor can be fixed in each vehicle with minimized path loss.

2013 ◽  
Vol 347-350 ◽  
pp. 975-979
Author(s):  
Rong Zhao ◽  
Cai Hong Li ◽  
Yun Jian Tan ◽  
Jun Shi ◽  
Fu Qiang Mu ◽  
...  

This paper presents a Debris Flow Disaster Faster-than-early Forecast System (DFS) with wireless sensor networks. Debris flows carrying saturated solid materials in water flowing downslope often cause severe damage to the lives and properties in their path. Faster-than-early or faster-than-real-time forecasts are imperative to save lives and reduce damage. This paper presents a novel multi-sensor networks for monitoring debris flows. The main idea is to let these sensors drift with the debris flow, to collect flow information as they move along, and to transmit the collected data to base stations in real time. The Raw data are sent to the cloud processing center from the base station. And the processed data and the video of the debris flow are display on the remote PC. The design of the system address many challenging issues, including cost, deployment efforts, and fast reaction.


Author(s):  
Kailash Subramanian

Wireless Sensor Networks motes have a small size, which leads to severe power supply restrictions. Much of the work on conserving power has been undertaken in the domain of routing protocols which deals with sending data in an efficient manner. In this paper a new scalar based protocol is proposed with a combination of multiple sub-base stations, that seeks to enhance the efficiency of protocol in terms of consumption of power and node failure tolerance. All the nodes are divided into regions, with each region having a sub- base station(sBS) and an arbitrary scalar value. Each sBS has lesser power supply and computation power compared to main station, but more of the mentioned metrics with respect to the sensor motes. Previous studies have described various paradigms and metrics for routing protocols and the placement of base stations. In this paper, the said algorithm is proposed, and its efficiency is analysed.


Author(s):  
Дмитро Дмитрович Соколов ◽  
Вікторія Юріївна Мерлак ◽  
Олександр Олександрович Орєхов ◽  
Анатолій Павлович Плахтеев

The article is devoted to the development of a monitoring system based on wireless sensor networks. The purpose of the article is to implement a system for environmental monitoring using wireless sensor networks, as well as its application in an apiary. Wireless sensor networks and their participation in environmental monitoring were investigated, and the interaction of a wireless network and data transfer protocols were described. The monitoring system was reviewed and analyzed, as well as systems in which monitoring is already applied. An experiment was conducted in which it was checked at what maximum distance the temperature and humidity parameters can be transmitted, the experiment was conducted with obstacles and without obstruction. Routing algorithms were examined how they work and how parameters (temperature and humidity) are transferred from sensors to the server. A prototype of a ground-based monitoring system for environmental monitoring was developed based on the wireless technology of building Zigbee sensor networks, taking into account the fact that new nodes can be added to this network or completely replaced. It was also found a solution to how to apply a wireless network in such an area as beekeeping. A mesh topology was selected and the physical devices that are the nodes of the network are separated. Nodes were also designed using as the base station for Arduino sensors and as ZigBee database modules from Digi called XBee. A study of these nodes on the noise immunity and stability of data transmission using sensors of flame, smoke, and temperature with humidity. The study revealed that XBee nodes are very unstable working next to Wi-Fi routers and in case of interference in the form of a forest. A statement of the problem was formed, which showed the relevance of the given system, why it is needed, who will be able to apply it, and also what the system contains and how it works. The functions that the program performs are listed. The conclusion is formulated on the result of the experiment, as well as how the system can be further upgraded, what can be added and what parameters can still be observed.


Wireless sensor networks are used today in numerous applications. Due to the limited battery, storage and processing power, the sensor node absorbs the environment and sends data to the base station. Wireless sensor networks are vulnerable to various attacks due to their limited functionality. Clone node is the attack where adversary physically grabs the node from its location & generates various nodes by using secret information and reflects them on the network. Due to node cloning, various attacks can easily occur in WSN. In this paper, we describe the layer by layer attacks generated by the clone node in WSN. We compare the network scenarios in Network Simulator 2 in which first scenario are normal network & second scenario has the clone nodes which produce the attack inside network. We estimate the impact of clone node in form of packet loss and also compare packet loss rate in normal network and clone node containing network in 8 different scenarios.


2012 ◽  
Vol 562-564 ◽  
pp. 1304-1308 ◽  
Author(s):  
Qing Hui Wang ◽  
Hong Yan Guo ◽  
Yong Huan Ji

The data transfer of wireless sensor network (WSN) can not be separated with routing protocol, Energy efficiency is one of the most important factors in wireless sensor networks. In this paper based on the uneven distribution of the LEACH cluster head and the different lengths and base station communications, we present a improved LEACH algorithm which refers to remaining energy and optimal cluster heads. Computer simulation using NS2 reveals that the proposed protocol reduces the energy consumption compared with the existing LEACH protocol.


Wireless Sensor Networks consist of independent sensor nodes attached to one base station. In wireless sensor networks, nodes are connected to sensing environment and communicate the data to the base station. As WSNs continues to grow, they become vulnerable to attacks and hence the need for operative security techniques. Applications of wireless sensor networks demands for the well-organized and secure communication. For the solution of well-organized and reliable security, we need cryptography algorithms which provide good solutions. For providing reliable security techniques mainly data confidentiality, key management is used. Identification of suitable cryptographic techniques for WSNs is an important challenge due to limitation of energy, computation capability and memory of the sensor nodes. Symmetric cryptography techniques do not act well when the number of sensor nodes increases. Hence asymmetric key cryptographic techniques are widely used. Here we propose an electronic logic gate based symmetric Cryptographic technique which is more suitable for small and medium WSNs.


2010 ◽  
Vol 6 (1) ◽  
pp. 679205 ◽  
Author(s):  
Levente Buttyán ◽  
Péter Schaffer

We introduce PANEL a position-based aggregator node election protocol for wireless sensor networks. The novelty of PANEL with respect to other aggregator node election protocols is that it supports asynchronous sensor network applications where the sensor readings are fetched by the base stations after some delay. In particular, the motivation for the design of PANEL was to support reliable and persistent data storage applications, such as TinyPEDS; see the study by Girao et al. (2007). PANEL ensures load balancing, and it supports intra and intercluster routing allowing sensor-to-aggregator, aggregator-to-aggregator, base station-to-aggregator, and aggregator to-base station communications. We also compare PANEL with HEED; see the study by Younis and Fahmy (2004) in the simulation environment provided by TOSSIM, and show that, on one hand, PANEL creates more cohesive clusters than HEED, and, on the other hand, that PANEL is more energy efficient than HEED.


Author(s):  
Mahendra Sharma ◽  
Santhosh Kumar Singh

Wireless Sensor Networks (WSNs) assume a crucial part in the field of mechanization and control where detecting of data is the initial step before any automated job could be performed. So as to encourage such perpetual assignments with less vitality utilization proportion, clustering is consolidated everywhere to upgrade the system lifetime. Unequal Cluster-based Routing (UCR) [7] is a standout amongst the most productive answers for draw out the system lifetime and to take care of the hotspot issue that is generally found in equivalent clustering method. In this paper, we propose Tentative Route (TRS) Selection approach for irregular Clustered Wireless Sensor Networks that facilitates in decision an efficient next relay to send the data cumulative by Cluster Heads to the Base Station. Simulation analysis is achieved using the network simulator to demonstrate the effectiveness of the TRS method.


Sign in / Sign up

Export Citation Format

Share Document