scholarly journals Method of Wireless Sensor Network Node Deployment for the Emergency Environment

2017 ◽  
Vol 13 (08) ◽  
pp. 163 ◽  
Author(s):  
Liang Ge ◽  
Qin Wang ◽  
Pan Hu ◽  
Ze Hu ◽  
JunBi Liao

<p class="0abstract"><span lang="EN-US">Incidents could not always be avoided, resulting in significant losses for the state property and people's safety. Effective monitoring of incidents is becoming more and more important. Wireless sensor networks (WSNs) are widely used in environmental monitoring. On the basis of the existing wireless sensor network node deployment model, a network node deployment model was proposed, which was used in the monitoring of unexpected accidents. The model area was divided into the core area and the evacuation area, and different monitoring nodes deployment plans were applied in different areas. The simulation experiment is carried out by MATLAB, and the simulation results of the node coverage are obtained. Results show that the model for the practical application of the node deployment provides an effective deployment plan, as well as offers a strong basis for real-time monitoring and post-accident emergency evacuation.</span></p>

2017 ◽  
Vol 13 (03) ◽  
pp. 174
Author(s):  
Haishan Zhang ◽  
Xinchun Wang ◽  
Chenghui Jia

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">The injection attack of false data is a common attack form in wireless sensor network. This attack form achieves the purpose of consuming limited network resources and severely threatens the safety of wireless sensor network through consistent sending false data. This paper proposes a type of false data filtering strategy based on neighbor node monitoring. The idea of this strategy is to enable each node to store the neighbor node's information within the two-hop range. In the meantime, the data package determines whether the upstream node is original node or data forwarding intermediate node through whether ACK package is remitted by the upstream node to avoid the impersonation of wireless sensor network node by malicious node. The false data package of malicious node will be filtered within one hop. The simulation experiment verifies the filtering performance and anti-capture performance of this strategy, thus guaranteeing the safety of wireless sensor network.</span>


2015 ◽  
Vol 9 (3) ◽  
pp. 210-215 ◽  
Author(s):  
Hengchang Jing ◽  

With the aim of solving the coverage problem of a wireless sensor network, a node deployment algorithm for the wireless sensor network, one based on a perception model, is designed in this work. The simulation results show that this algorithm can effectively deploy the wireless sensor network node, improve the network’s coverage, reduce the energy consumption of the network node, and help the network to function longer.


Sign in / Sign up

Export Citation Format

Share Document