Self-Managed System for Distributed Wireless Sensor Networks

Author(s):  
Sneh Garg ◽  
Ram Bahadur Patel

With the advancements in technology, wireless sensor networks (WSNs) are used almost in all applications. These sensor network systems are sometimes used to monitor hostile environments where human intervention is not possible. When sensing is required to be done in areas that are hostile, there is need for autonomous/self-managing systems as it is very difficult for the human to intervene within such hostile environmental conditions. Therefore, in such systems, each node is required to do all functionalities and act like autonomous decision taking node that performs both data forwarding and network control. Therefore, introducing a self-management for large-scale distributed wireless system is a highly tedious task due to resource constrained nature of these nodes. It is very difficult to achieve required quality of service by large systems as a huge amount of energy is dissipated by systems in radio communication. Owing to resource constraint as well as vulnerable nature, developing a self-managing system for distributed WSN is a very challenging and demanding task.

Author(s):  
Corinna Schmitt ◽  
Georg Carle

Today the researchers want to collect as much data as possible from different locations for monitoring reasons. In this context large-scale wireless sensor networks are becoming an active topic of research (Kahn1999). Because of the different locations and environments in which these sensor networks can be used, specific requirements for the hardware apply. The hardware of the sensor nodes must be robust, provide sufficient storage and communication capabilities, and get along with limited power resources. Sensor nodes such as the Berkeley-Mote Family (Polastre2006, Schmitt2006) are capable of meeting these requirements. These sensor nodes are small and light devices with radio communication and the capability for collecting sensor data. In this chapter the authors review the key elements for sensor networks and give an overview on possible applications in the field of monitoring.


2012 ◽  
Vol 8 (1) ◽  
pp. 829253 ◽  
Author(s):  
Yu Liu ◽  
Xiao Yi ◽  
You He

Self-localization of sensor nodes is one of the key issues in wireless sensor networks. Based on the analysis of traditional range-free algorithms such as centroid and APIT (approximate perfect point in triangulation test) schemes, the effect of random deployment of all nodes on node localization is researched. And then, an improved centroid localization algorithm (ICLA) based on APIT and the quality of perpendicular bisector is proposed. In ICLA, nodes are categorized into several kinds and localized, respectively. Extensive simulation results indicate that ICLA obtains a better localization result in random topology networks without any additional hardware. Therefore, ICLA can be an alternate solution for the node self-localization problem in large-scale wireless sensor networks.


Author(s):  
V. Balaji ◽  
A. Ravi Kumar

In recent years, there has been a winged generation of research relating to wireless sensor networks (WSN), due to large-scale range of potential utilization there can be used for several applications such as, surveillance, hostile monitoring, target tracking, and security management. Sensor nodes can be defined as typically powered by batteries so it is having a limited amount of lifetime, and another problem can be considering is batteries cannot be recharged. The energy problem is extreme difficulty in wireless sensor networks. So we proposed advanced routing protocol PDORP, reduced the energy consumption as well as improving the quality of service (QoS), and better throughput which compared to another routing such as, LEACH, PEGASIS, DSR, and OLSR.


10.29007/xs1j ◽  
2018 ◽  
Author(s):  
Su Man Nam ◽  
Tae Ho Cho

In large-scale wireless sensor networks, sensors are vulnerable to false report and false vote injection attacks since they are deployed in hostile environments. These attacks drain their limited energy resources of forwarding nodes and drops important data. Probabilistic voting-based filtering scheme simultaneously detects both the attacks through vote verification. To effectively detect them, it is important to define the vote length of the reports since the vote length is fixed at the initial phase. We find the effective vote length using a simulation model since it is nearly impossible to evaluate the security protocol performance on the real nodes. We demonstrate that the security protocol, in which the vote length is five, achieves better detection ratio against the two attacks.


2011 ◽  
Vol 4 (3) ◽  
pp. 188-202 ◽  
Author(s):  
Josip Balen ◽  
Drago Zagar ◽  
Cesar Viho ◽  
Goran Martinovic

Author(s):  
Abdelhady M. Naguib ◽  
Shahzad Ali

Background: Many applications of Wireless Sensor Networks (WSNs) require awareness of sensor node’s location but not every sensor node can be equipped with a GPS receiver for localization, due to cost and energy constraints especially for large-scale networks. For localization, many algorithms have been proposed to enable a sensor node to be able to determine its location by utilizing a small number of special nodes called anchors that are equipped with GPS receivers. In recent years a promising method that significantly reduces the cost is to replace the set of statically deployed GPS anchors with one mobile anchor node equipped with a GPS unit that moves to cover the entire network. Objectives: This paper proposes a novel static path planning mechanism that enables a single anchor node to follow a predefined static path while periodically broadcasting its current location coordinates to the nearby sensors. This new path type is called SQUARE_SPIRAL and it is specifically designed to reduce the collinearity during localization. Results: Simulation results show that the performance of SQUARE_SPIRAL mechanism is better than other static path planning methods with respect to multiple performance metrics. Conclusion: This work includes an extensive comparative study of the existing static path planning methods then presents a comparison of the proposed mechanism with existing solutions by doing extensive simulations in NS-2.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 218
Author(s):  
Ala’ Khalifeh ◽  
Khalid A. Darabkh ◽  
Ahmad M. Khasawneh ◽  
Issa Alqaisieh ◽  
Mohammad Salameh ◽  
...  

The advent of various wireless technologies has paved the way for the realization of new infrastructures and applications for smart cities. Wireless Sensor Networks (WSNs) are one of the most important among these technologies. WSNs are widely used in various applications in our daily lives. Due to their cost effectiveness and rapid deployment, WSNs can be used for securing smart cities by providing remote monitoring and sensing for many critical scenarios including hostile environments, battlefields, or areas subject to natural disasters such as earthquakes, volcano eruptions, and floods or to large-scale accidents such as nuclear plants explosions or chemical plumes. The purpose of this paper is to propose a new framework where WSNs are adopted for remote sensing and monitoring in smart city applications. We propose using Unmanned Aerial Vehicles to act as a data mule to offload the sensor nodes and transfer the monitoring data securely to the remote control center for further analysis and decision making. Furthermore, the paper provides insight about implementation challenges in the realization of the proposed framework. In addition, the paper provides an experimental evaluation of the proposed design in outdoor environments, in the presence of different types of obstacles, common to typical outdoor fields. The experimental evaluation revealed several inconsistencies between the performance metrics advertised in the hardware-specific data-sheets. In particular, we found mismatches between the advertised coverage distance and signal strength with our experimental measurements. Therefore, it is crucial that network designers and developers conduct field tests and device performance assessment before designing and implementing the WSN for application in a real field setting.


Sign in / Sign up

Export Citation Format

Share Document