scholarly journals Data Transmission Reduction in Wireless Sensor Network for Spatial Event Detection

Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7256
Author(s):  
Marcin Lewandowski ◽  
Bartłomiej Płaczek

Wireless sensor networks have found many applications in detecting events such as security threats, natural hazards, or technical malfunctions. An essential requirement for event detection systems is the long lifetime of battery-powered sensor nodes. This paper introduces a new method for prolonging the wireless sensor network’s lifetime by reducing data transmissions between neighboring sensor nodes that cooperate in event detection. The proposed method allows sensor nodes to decide whether they need to exchange sensor readings for correctly detecting events. The sensor node takes into account the detection algorithm and verifies whether its current sensor readings can impact the event detection performed by another node. The data are transmitted only when they are found to be necessary for event detection. The proposed method was implemented in a wireless sensor network to detect the instability of cargo boxes during transportation. Experimental evaluation confirmed that the proposed method significantly extends the network lifetime and ensures the accurate detection of events. It was also shown that the introduced method is more effective in reducing data transmissions than the state-of-the-art event-triggered transmission and dual prediction algorithms.

2019 ◽  
Author(s):  
Mohamed A Bayoumi ◽  
Tarek M Salem ◽  
Samir M Koriem

Abstract Area detection and measuring is one of the most important problems in wireless sensor network because it mainly relates to the continuity and functionality of most routing protocols applied to the region of interest (ROI). Electronics failure, random deployment of nodes, software errors or some phenomena such as fire spreading or water flood could lead to wide death of sensor nodes. The damage on ROI can be controlled by detecting and calculating the area of the holes, resulting from the damaged sensor networks. In this paper, a new mathematical algorithm, wireless sensor hole detection algorithm (WHD), is developed to detect and calculate the holes area in ROI where the sensor nodes are spread randomly. WHD is developed for achieving quality of service in terms of power consumption and average hole detection time. The dynamic behavior of the proposed WHD depends on executing the following steps. Firstly, WHD algorithm divides down the ROI into many cells using the advantage of the grid construction to physically partition the ROI into many small individual cells. Secondly, WHD algorithm works on each cell individually by allocating the nearest three sensor nodes to each of the cell’s coordinates by comparing their positions, WHD connects each cell’s coordinate points with the selected sensor nodes by lines that construct a group of triangles, then WHD calculates the area of upcoming triangles. Repeating the previous step on all the cells, WHD can calculate and locate each hole in the ROI. The performance evaluation depends on the NS-2 simulator as a simulation technique to study and analyze the performance of WHD algorithm. Results show that WHD outperforms, in terms of average energy consumption and average hole discovery time, path density algorithm, novel coverage hole discovery algorithm and distriputed coverage hole Detection.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 405
Author(s):  
T Karthik Krishnan ◽  
S Sridevi ◽  
G Bindu ◽  
R Anandan

Wireless sensor network is emanating technology in the field of telecommunications. WSNs can be applied in many fields like machine surveillance, precision agriculture, home automation and intelligent building environments. However the major aspect of WSN is the security as the sensor nodes are limited because of these facing several security threats such as black hole attack, worm hole attack, flooding etc. which is finally affecting the functioning of the whole network. These attacks are maximizing the consumption of power in the node and also it decreases life of the battery. In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes in the WSN. And also we discuss about the different intrusion detection methods with the help of machine learning algorithms. In future these techniques can be helpful to create a safe and sophisticated network.  


Author(s):  
Chao Wang

Background: It is important to improve the quality of service by using congestion detection technology to find the potential congestion as early as possible in wireless sensor network. Methods: So an improved congestion control scheme based on traffic assignment and reassignment algorithm is proposed for congestion avoidance, detection and mitigation. The congestion area of the network is detected by predicting and setting threshold. When the congestion occurs, sensor nodes can be recovery quickly from congestion by adopting reasonable method of traffic reassignment. And the method can ensure the data in the congestion areas can be transferred to noncongestion areas as soon as possible. Results: The simulation results indicate that the proposed scheme can reduce the number of loss packets, improve the throughput, stabilize the average transmission rate of source node and reduce the end-to-end delay. Conclusion: : So the proposed scheme can enhance the overall performance of the network. Keywords: wireless sensor network; congestion control; congestion detection; congestion mitigation; traffic assignment; traffic reassignment.


2018 ◽  
Vol 14 (01) ◽  
pp. 4
Author(s):  
Wang Weidong

To improve the efficiency of the remote monitoring system for logistics transportation, we proposed a remote monitoring system based on wireless sensor network and GPRS communication. The system can collect information from the wireless sensor network and transmit the information to the ZigBee interpreter. The monitoring system mainly includes the following parts: Car terminal, GPRS transmission network and monitoring center. Car terminal mainly consists by the Zigbee microcontroller and peripherals, wireless sensor nodes, RFID reader, GPRS wireless communication module composed of a micro-wireless monitoring network. The information collected by the sensor communicates through the GPRS and the monitoring center on the network coordinator, sends the collected information to the monitoring center, and the monitoring center realizes the information of the logistics vehicle in real time. The system has high applicability, meets the design requirements in the real-time acquisition and information transmission of the information of the logistics transport vehicles and goods, and realizes the function of remote monitoring.


Author(s):  
Edison Pignaton de Freitas ◽  
Tales Heimfarth ◽  
Ivayr Farah Netto ◽  
Carlos Eduardo Pereira ◽  
Armando Morado Ferreira ◽  
...  

2014 ◽  
Vol 701-702 ◽  
pp. 1025-1028
Author(s):  
Yu Zhu Liang ◽  
Meng Jiao Wang ◽  
Yong Zhen Li

Clustering the sensor nodes and choosing the way for routing the data are two key elements that would affect the performance of a wireless sensor network (WSN). In this paper, a novel clustering method is proposed and a simple two-hop routing model is adopted for optimizing the network layer of the WSN. New protocol is characterized by simplicity and efficiency (SE). During the clustering stage, no information needs to be shared among the nodes and the position information is not required. Through adjustment of two parameters in SE, the network on any scale (varies from the area and the number of nodes) could obtain decent performance. This work also puts forward a new standard for the evaluation of the network performance—the uniformity of the nodes' death—which is a complement to merely taking the system lifetime into consideration. The combination of these two aspects provides a more comprehensive guideline for designing the clustering or routing protocols in WSN.


2011 ◽  
Vol 57 (3) ◽  
pp. 341-346 ◽  
Author(s):  
Safdar Khan ◽  
Boubaker Daachi ◽  
Karim Djouani

Overcoming Localization Errors due to Node Power Drooping in a Wireless Sensor NetworkReceived Signal Strength Indication (RSSI) plays a vital role in the range-free localization of sensor nodes in a wireless sensor network and a good amount of research has been made in this regard. One important factor is the battery voltage of the nodes (i.e., the MICAz sensors) which is not taken into account in the existing literature. As battery voltage level performs an indispensable role for the position estimation of sensor nodes through anchor nodes therefore, in this paper, we take into a account this crucial factor and propose an algorithm that overcomes the problem of decaying battery. We show the results, in terms of more precise localization of sensor nodes through simulation. This work is an extension to [1] and now we also use neural network to overcome the localization errors generated due to gradual battery voltage drooping.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879584 ◽  
Author(s):  
Danyang Qin ◽  
Yan Zhang ◽  
Jingya Ma ◽  
Ping Ji ◽  
Pan Feng

Due to the advantages of large-scale, data-centric and wide application, wireless sensor networks have been widely used in nowadays society. From the physical layer to the application layer, the multiply increasing information makes the data aggregation technology particularly important for wireless sensor network. Data aggregation technology can extract useful information from the network and reduce the network load, but will increase the network delay. The non-exchangeable feature of the battery of sensor nodes makes the researches on the battery power saving and lifetime extension be carried out extensively. Aiming at the delay problem caused by sleeping mechanism used for energy saving, a Distributed Collision-Free Data Aggregation Scheme is proposed in this article to make the network aggregate data without conflicts during the working states periodically changing so as to save the limited energy and reduce the network delay at the same time. Simulation results verify the better aggregating performance of Distributed Collision-Free Data Aggregation Scheme than other traditional data aggregation mechanisms.


A Wireless Sensor Network (WSN) is a component with sensor nodes that continuously observes environmental circumstances. Sensor nodes accomplish different key operations like sensing temperature and distance. It has been used in many applications like computing, signal processing, and network selfconfiguration to expand network coverage and build up its scalability. The Unit of all these sensors that exhibit sensing and transmitting information will offer more information than those offered by autonomously operating sensors. Usually, the transmitting task is somewhat critical as there is a huge amount of data and sensors devices are restricted. Being the limited number of sensor devices the network is exposed to different types of attacks. The Traditional security mechanisms are not suitable for WSN as they are generally heavy and having limited number of nodes and also these mechanisms will not eliminate the risk of other attacks. WSN are most useful in different crucial domains such as health care, environment, industry, and security, military. For example, in a military operation, a wireless sensor network monitors various activities. If an event is detected, these sensor nodes sense that and report the data to the primary (base) station (called sink) by making communication with other nodes. To collect data from WSN base Stations are commonly used. Base stations have more resources (e.g. computation power and energy) compared to normal sensor nodes which include more or less such limitations. Aggregation points will gather the data from neighboring sensor nodes to combine the data and forward to master (base) stations, where the data will be further forwarded or processed to a processing center. In this manner, the energy can be preserved in WSN and the lifetime of network is expanded.


Sign in / Sign up

Export Citation Format

Share Document