scholarly journals Rancang Bangun WSN berbasis nRF24L01 dan SIM800l bertenaga Surya untuk Implementasi IoT secara Outdoor

2021 ◽  
Vol 5 (2) ◽  
pp. 296-305
Author(s):  
Wirarama Wedashwara ◽  
◽  
Budi Irmawati ◽  
Andy Hidayat Jatmika ◽  
Ariyan Zubaidi ◽  
...  

Internet of things (IoT) requires an internet network for data communication between machines. Wifi is not always available outdoors and requires more portable data communication. This study aims to design a prototype Wireless Sensor Network (WSN) based on nRF24L01 and solar-powered SIM800l for outdoor IoT implementation. The study used a total of five IoT devices with four nodes with nRF24L01 and one node with nRF24L01 and SIM800l. Each device uses an Arduino nano, TP4056, 6WP solar panel, and a 900mAh 18650 battery. The evaluation of the system includes a comparative QoS analysis, namely packet delivery ratio (PDR), throughput, and delay in star and bus topology through data collection of observation methods by sensors. The evaluation results show that for unidirectional data communication the star topology has better results with PDR 99,099%, throughput 99.393%, and delay 0.0095s. While the bus topology produces a slight difference in PDR 98.766%, throughput 98.461%, and delay 0.017s. Evaluation of energy availability shows that during the day with an average voltage of 3.703v and at night 2.976v, there is no significant difference. During the day it produces 99.301% PDR, 99.653% throughput, and 0.001s delay, while at night it produces 94.221% PDR, 99.881% throughput, and 0.027s delay.

2021 ◽  
Author(s):  
Jenice Prabu A ◽  
Hevin Rajesh D

Abstract In Wireless sensor network, the major issues are security and energy consumption. There may be several numbers of malicious nodes present in sensor networks. Several techniques have been proposed by the researchers to identify these malicious nodes. WSNs contain many sensor nodes that sense their environment and also transmit their data via multi-hop communication schemes to the base station. These sensor nodes provides power supply using battery and the energy consumption of these batteries must be low. Securing the data is to avoid attacks on these nodes and data communication. The aggregation of data helps to minimize the amount of messages transmitted within the network and thus reduces overall network energy consumption. Moreover, the base station may distinguish the encrypted and aggregated data based on the encryption keys during the decryption of the aggregated data. In this paper, two aspects of the problem is concerned, we investigate the efficiency of data aggregation: first, how to develop cluster-based routing algorithms to achieve the lowest energy consumption for aggregating data, and second, security issues in wsn. By using Network simulator2 (NS2) this scheme is simulated. In the proposed scheme, energy consumption, packet delivery ratio and throughput is analyzed. The proposed clustering, routing, and protection protocol based on the MCSDA algorithm shows significant improvement over the state-of - the-art protocol.


2021 ◽  
Vol 6 (9 (114)) ◽  
pp. 6-14
Author(s):  
Shaymaa Kadhim Mohsin ◽  
Maysoon A. Mohammed ◽  
Helaa Mohammed Yassien

Bluetooth uses 2.4 GHz in ISM (industrial, scientific, and medical) band, which it shares with other wireless operating system technologies like ZigBee and WLAN. The Bluetooth core design comprises a low-energy version of a low-rate wireless personal area network and supports point-to-point or point-to-multipoint connections. The aim of the study is to develop a Bluetooth mesh flooding and to estimate packet delivery ratio in wireless sensor networks to model asynchronous transmissions including a visual representation of a mesh network, node-related statistics, and a packet delivery ratio (PDR). This work provides a platform for Bluetooth networking by analyzing the flooding of the network layers and configuring the architecture of a multi-node Bluetooth mesh. Five simulation scenarios have been presented to evaluate the network flooding performance. These scenarios have been performed over an area of 200×200 meters including 81 randomly distributed nodes including different Relay/End node configurations and source-destination linking between nodes. The results indicate that the proposed approach can create a pathway between the source node and destination node within a mesh network of randomly distributed End and Relay nodes using MATLAB environment. The results include probability calculation of getting a linking between two nodes based on Monte Carlo method, which was 88.7428 %, while the Average-hop-count linking between these nodes was 8. Based on the conducted survey, this is the first study to examine and demonstrate Bluetooth mesh flooding and estimate packet delivery ratio in wireless sensor networks


This paper develops a method to detect the failures of wireless links between one sensor nodes to another sensor node in WSN environment. Every node in WSN has certain properties which may vary time to time based on its ability to transfer or receive the packets on it. This property or features are obtained from every node and they are classified using Neural Networks (NN) classifier with predetermined feature set which are belonging to both weak link and good link between nodes in wireless networks. The proposed system performance is analyzed by computing Packet Delivery Ratio (PDR), Link Failure Detection Rate (LFDR) and latency report.


Author(s):  
Zahoor Ahmed ◽  
Kamalrulnizam Abu Bakar

The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.


2018 ◽  
Vol 7 (3) ◽  
pp. 1956
Author(s):  
A Felix Arokya Jose ◽  
C Anand Deva Durai ◽  
S John Livingston

Wireless Sensor Network (WSN) has an enormous scope of utilizations in detecting different parameters such as temperature, pressure, sound, pollution, etc. The sensed data in each sensor node are a valuable one. To communicate the information to the base station for further processing, a lot of strategies are available. Each sensor senses the data in different sampling rate depending upon the sudden raise in the sensing parameters. Data communication to the base station is very critical due to the dynamicity of the environment during the stipulated time.The sensed data should reach the base station before the data becomes invalid due to the violation of the deadline. In order to avoid deadline violation so that the sensed data becomes useless, this paper proposing a novel data collection algorithm based on the popular Earliest Deadline First (EDF) scheduling algorithm. The various simulation parameters are taken into account to verify the performance of the proposed method and the result shows that it achieves high throughput, low delay, high Packet Delivery Ratio (PDR) and low energy consumption.  


2016 ◽  
Vol 26 (03) ◽  
pp. 1750043 ◽  
Author(s):  
Ching-Han Chen ◽  
Ming-Yi Lin ◽  
Wen-Hung Lin

Wireless sensor networks (WSNs) represent a promising solution in the fields of the Internet of Things (IoT) and machine-to-machine networks for smart home applications. However, to feasibly deploy wireless sensor devices in a smart home environment, four key requirements must be satisfied: stability, compatibility, reliability routing, and performance and power balance. In this study, we focus on the unreliability problem of the IEEE 802.15.4 WSN medium access control (MAC), which is caused by the contention-based MAC protocol used for channel access. This problem results in a low packet delivery ratio, particularly in a smart home network with only a few sensor nodes. In this paper, we first propose a lightweight WSN protocol for a smart home or an intelligent building, thus replacing the IEEE 802.15.4 protocol, which is highly complex and has a low packet delivery ratio. Subsequently, we describe the development of a discrete event system model for the WSN by using a GRAFCET and propose a development platform based on a reconfigurable FPGA for reducing fabrication cost and time. Finally, a prototype WSN controller ASIC chip without an extra CPU and with our proposed lightweight MAC was developed and tested. It enhanced the packet delivery ratio by up to 100%.


Repositor ◽  
2020 ◽  
Vol 2 (8) ◽  
Author(s):  
Hawwin Purnama Akbar ◽  
Diah Risqiwati ◽  
Diah Risqiwati

Perkembangan ilmu pengetahuan pada bidang teknologi jaringan terjadi sangat cepat karena mengikuti perkembangan kebutuhan manusia. Salah satu teknologi jaringan yang saat ini menarik perhatian masyarakat adalah teknologi Wireless Sensor Network(WSN). WSN adalah jaringan dari kumpulan sensor yang terhubung menggunakan teknologi wireless secara ad-hoc dan setiap sensor node digunakan untuk proses pengumpulan data dan menghubungkan dengan node yang lain melalui jaringan wireless.Karena pada kebanyakan kasus aplikasi WSN digunakan pada lingkungan yang ekstrem dan sensor node harus dapat beroperasi secara otomatis tanpa campur tangan manusia, jaringan ini menjadi rentan akan beberapa ancaman jaringan dan dapat mempengaruhi performa dari jaringannya. Terdapat berbagai macam jenis serangan yang dapat membahayakan jaringan wireless sensor network diantaranya yang paling umum adalah sybil attack dan hello flood attack.            Dalam penelitian ini, penulis meneliti performa WSN saat diserang oleh Sybil attack dan hello flood attack dengan cara mengukur throughput, PDR(packet delivery ratio), jitter dan delay dalam jaringan WSN. Penelitian ini juga menganalisa jumlah node yang bervariasi dari 10 node sampai 30 node dengan waktu simulasi dari 10 detik sampai 30 detik lalu dianalisa jaringan ketika jaringan normal dan diserang oleh node penyerang yang bervariasi dari 1 sampai 3 penyerang. Dengan melakukan analisa tersebut, diperoleh data berupa perbandingan dampak serangan dari Sybil attack dan hello flood attack. Dampak dari sybil attack lebih berpengaruh pada parameter throughput dan pdr yang mengalami penurunan nilai hingga 69,9% untuk pdr dan 56,4% untuk throughput. Sedangkan dampak dari hello flood attack lebih berpengaruh pada parameter delay dan jitter yang mengalami kenaikandari nilai semula 0,05 detik menjadi 0,576 detikuntuk delay dan 0,579 detik untuk jitter.AbstractThe development of science in the field of network technology occurs very quickly because it follows the development of human needs. One of the network technology that is currently attracting public attention is wireless sensor network technology (WSN). WSN is a network of connected sensors using ad-hoc wireless technology and each node sensor are used to process data collection and connect with other nodes over a wireless network. Because in most cases WSN applications are used in extreme environments and node sensors must operate automatically without human intervention, these networks become vulnerable to some network threats and may affect the performance of their networks. There are various types of attacks that can harm wireless sensor network network among the most common is sybil attack and hello flood attack.             In this study, authors examined the performance of WSN when attacked by Sybil attack and hello flood attack by measuring throughput, PDR (packet delivery ratio), jitter and delay in WSN network. This study also analyzed the number of nodes that varied from 10 nodes to 30 nodes with simulated time from 10 seconds to 30 seconds and then analyzed the network when the network was normal and attacked by the attacking nodes that varied from 1 to 3 attackers. By doing the analysis, the datacan be obtained in the form of comparison of the impact of attacks from Sybil attack and hello flood attack. The impact of the sybil attack is more influential on the parameters of throughput and pdr which has decreased the maximum value up to 69.9% for pdr and 56.4% for throughput. While the impact of hello flood attack ismore influential on the delay and jitter parameters that increased from the original value of 0.05 seconds to 0.576 seconds for delay and 0.579 seconds for jitter. 


Author(s):  
Kavitha Ganesh ◽  
P. Latchoumy ◽  
A. Sonya

<span>Heterogeneous Wireless Sensor Networks (HWSN) gathers information from a cooperative network. In HWSN, the sensor nodes are scattered and the major challenges are topology control, battery optimization, packet loss and link lifetime. The existing techniques do not concentrate on all the mentioned issues. The objective of this work is to provide congestion-free data transfer with higher throughput and increased packet delivery ratio. In the proposed methodology, three protocols are designed and developed, namely, Hop by Hop Rate Adjustment Protocol (HHRA), Energy Efficient Data Transfer Protocol (EEDT) and Alternative Routing Congestion Control Protocol (ARCC). The HHRA protocol senses the traffic in the channel and adjusts the transmission rate accordingly to avoid congestion. Secondly, the EEDT protocol is used to find specific nodes that are more efficient and transfer packets through those nodes to improve throughput. The ARCC protocol is used to redirect the path of transmission during the occurrence of congestion. Thus, the proposed traffic contention and control mechanisms ensures congestion free transmission and increases the packet delivery ratio by 23% and average throughput by 20% compared to the Dynamic Contention Window based Congestion Control (DCWCC) algorithm. </span>


2019 ◽  
Vol 8 (2) ◽  
pp. 1243-1248

In the real-time scenario involving wireless sensor networks, the data forwarding and data gathering procedures are taking place from the remote environment. With the involvement of heterogeneous architecture and multi-hop data transmission paths, there lies a serious threat for secured data communication. There may be chances of data attacks either from the inside intruder or from the external intruder. The problem of data flow attack by adding malicious information, viz. Data injection attack and outside arbitrary attack, viz. Byzantine attacks are found to be more dangerous and cause vulnerability for the wireless sensor network. So improving the reliability and security in multi-relay networks is very much essential. In this work, the practical approach of detecting data injection and Byzantine attacks using the proposed method of random network coding is performed. Then, as improvisation measure, the priority scheduling algorithm is implemented to effectively schedule the data transfer. Real-time packets with highest priority in the distribution queue are placed first in the processing mechanism. The remaining packets are arranged based on the position of the sensor nodes and are placed in separate queues. Least priority packets can obstruct the dispensation of their direct higher precedence packets after waitlisted for a certain number of time frames. Simulation results using the NS2 environment show that using the priority scheduling algorithm has good performance values in terms of the packet delivery ratio, throughput and delay. Also, the attack detection metrics such as false positive ratio and detection ratio are also improved when using the priority scheduling algorithm. Thus an improvised priority algorithm for an uplink scheduler in WSN is implemented to increase the performance and detection metrics.


Sign in / Sign up

Export Citation Format

Share Document