A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks

2014 ◽  
Author(s):  
Li Ma ◽  
◽  
Jingzhou Yan ◽  
Kuo Liao ◽  
Shuangshuang Yan ◽  
...  
2011 ◽  
Vol 128-129 ◽  
pp. 727-730
Author(s):  
Xu Guang Sun ◽  
Jing Sha He ◽  
Xiao Ling Sun ◽  
Qiu Ge Yang

The post-disaster road monitoring system provides an interesting application area for wireless sensor networks. After the earthquake, roads are subject to be blocked by landslides. The people require a scalable and low-cost technology for getting real-time dynamic data about road available because aftershocks occur continuously. Wireless sensor networks are a promising candidate to fulfill these requirements. Then the post-disaster road monitoring system solution is put forward. In this system, the ordered arrangement of node number greatly reduces the complexity of node location and provides the premise and guarantee for designing efficient route algorithm for the system. The algorithms of route established and route forwarding are designed for the arrangement and transmission characteristics of nodes, then are more efficient than general-purpose route protocol.


2014 ◽  
Vol 27 (5) ◽  
pp. 436-442 ◽  
Author(s):  
Shangbin Jiao ◽  
Dan Song ◽  
Qing Zhang ◽  
Jinwei Tang

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


Sign in / Sign up

Export Citation Format

Share Document