Concept of Packet Transmission Delay Mechanism for Wireless Sensor Systems

2014 ◽  
Author(s):  
Hansol Ji ◽  
Namgi Kim
2019 ◽  
Vol 17 (9) ◽  
pp. 733-738
Author(s):  
Yong-Qiang Zhou ◽  
Lei Dai ◽  
Suo-Ping Li

In this paper, we research the performance of direct and non-direct multiple relays cooperative truncated automatic repeat request (D/ND-MRCT-ARQ) protocols in wireless sensor networks (WSNs). We propose a method that named discrete time Markov chain (DTMC) with N + 2 states, which could obtain the throughput formulas of D/ND-MRCT-ARQ protocols. Furthermore, we solve the mathematical expressions of the average transmission delay of both protocols by truncating the number of packet retransmission. In addition, we derive energy efficiency formulas of both protocols under considering the different power consumption of each node. Simulation results demonstrate that the proposed D-MRCT-ARQ protocol achieve higher throughput and energy efficiency while fewer average packet transmission delay, as compared with the ND-MRCT-ARQ protocol.


2018 ◽  
Vol 7 (4.4) ◽  
pp. 33
Author(s):  
Jin Young Lee ◽  
Seong Cheol Kim ◽  
Hye Yun Kim

In this paper, we present an energy and time constrained packet transmission MAC Protocol which we call ED-MAC for event-driven applications such as fire detection in wireless sensor networks (WSNs). In this kind of WSNs, sensor nodes send a burst data when there is an event in the measuring field. These events are usually critical, so the measured burst data should be transmitted in limited time to their final destination node, sink node. Therefore, the packet transmission delay is considered to be a crucial requirement in event-driven applications. The ED-MAC protocol reduces the packet transmission delay and average node energy consumption in comparison to existing related MAC protocols. 


Trust is critical in remote sensor systems to exchange the information from source to goal. The Dynamic Source Protocol computes the substitute way, if any hub neglects to exchange the information. The Dynamic Source Protocol does not have any worked in usefulness to figure a substitute way if the way has a vindictive hub. With the cost of an interloper recognition framework we can identify the vindictive hub and modify the information/parcel exchange way. Notwithstanding, gatecrasher location framework is extremely costly for remote sensor systems and there is no certification in identifying a malevolent hub. In the ebb and flow look into a trust-based approach is prescribed to limit the overheads of gatecrasher location framework and it likewise recognizes the anomalous conduct hubs. The proposed demonstrate utilizes the rehashed recreations to distinguish flawed hubs through the agreeable exertion in the sensor organize and additionally judges the trust of progressive hubs. Reenactments were exhibited for standardized result of parcel dropping, normal rebate result, and trust connection.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 3976
Author(s):  
Sun Jin Kim ◽  
Myeong-Lok Seol ◽  
Byun-Young Chung ◽  
Dae-Sic Jang ◽  
Jonghwan Kim ◽  
...  

Self-powered wireless sensor systems have emerged as an important topic for condition monitoring in nuclear power plants. However, commercial wireless sensor systems still cannot be fully self-sustainable due to the high power consumption caused by excessive signal processing in a mini-electronic computing system. In this sense, it is essential not only to integrate the sensor system with energy-harvesting devices but also to develop simple data processing methods for low power schemes. In this paper, we report a patch-type vibration visualization (PVV) sensor system based on the triboelectric effect and a visualization technique for self-sustainable operation. The PVV sensor system composed of a polyethylene terephthalate (PET)/Al/LCD screen directly converts the triboelectric signal into an informative black pattern on the LCD screen without excessive signal processing, enabling extremely low power operation. In addition, a proposed image processing method reconverts the black patterns to frequency and acceleration values through a remote-control camera. With these simple signal-to-pattern conversion and pattern-to-data reconversion techniques, a vibration visualization sensor network has successfully been demonstrated.


2018 ◽  
Vol 7 (2.23) ◽  
pp. 59 ◽  
Author(s):  
Surinder Singh ◽  
Hardeep Singh Saini

The wireless sensor network has group of sensors which can sense the data and route this data to base station. As there is no physical connection between sensor and base station the important data can be routed without wires. The broadcast nature of wireless sensor network makes it prone to security threat to the valuable data. The attacker node can detect the data by creating their own data aggregation and routing mechanism .The number of attacks can be possible on the network layer. Out of these attacks wormhole is one of the major attack which can change the routing method of the whole wireless sensor network. In this attack,the attacker node can control the packet transmission of whole network and route it to the tunnel of nodes. The major drawback of this attack is to increase the packet drop and disturbing the routing mechanism. A number of security techniques are developed by the researcher to reduce the packet drop ratio and secure the routing mechanism of the network. Out of all thesetechniquesfew related to packet drop ratio are discussed in this paper. TheLightweight countermeasure for the wormhole attack (LITEWORP) based on Dynamic Source routing (DSR) protocol security technique,Delay Per Hop Indication (Delphi) based on AODV(Avoidance Routing Protocol) Protocol security technique and MOBIWORP based on DSRprotocol security technique reduce the packet loss percentage 40%,43% and 35% respectively.   


2005 ◽  
Vol 1 (2) ◽  
pp. 245-252 ◽  
Author(s):  
P. Davis ◽  
A. Hasegawa ◽  
N. Kadowaki ◽  
S. Obana

We propose a method for managing the spontaneous organization of sensor activity in ad hoc wireless sensor systems. The wireless sensors exchange messages to coordinate responses to requests for sensing data, and to control the fraction of sensors which are active. This method can be used to manage a variety of sensor activities. In particular, it can be used for reducing the power consumption by battery operated devices when only low resolution sensing is required, thus increasing their operation lifetimes.


Sign in / Sign up

Export Citation Format

Share Document