Recent and Future Node Deployment Strategies in the Underwater Sensor Network (UWSN)

Author(s):  
Krishna Pandey ◽  
Manish Kumar

The chapter focuses on the recent development in the field of the sensor node deployment in the UWSN (under water wireless sensor network). In the chapter, the technical challenges during the node deployment of the sensor nodes in the UWSN (under water wireless sensor network) are represented with prefacing the background. The chapter focuses on the different methods of node deployment and presents a generalized model for ensure the reliability. A view of analyzing the deployment of sensor nodes is also shown in the example by following the recent researches in the domain. Finally, the future scope and conclusion is represented with the idea of new paradigms in the deployment of sensor nodes in the UWSN.

2013 ◽  
Vol 347-350 ◽  
pp. 1920-1923
Author(s):  
Yu Jia Sun ◽  
Xiao Ming Wang ◽  
Fang Xiu Jia ◽  
Ji Yan Yu

The characteristics and the design factors of wireless sensor network node are talked in this article. According to the design factors of wireless sensor network, this article will mainly point out the design of wireless sensor nodes based a Cortex-M3 Microcontroller STM32F103RE chip. And the wireless communication module is designed with a CC2430 chip. Our wireless sensor node has good performance in our test.


2012 ◽  
Vol 503-504 ◽  
pp. 1514-1517
Author(s):  
Hai Shen Peng

In view of static wireless sensor node deployment efficiency low and dynamic wireless sensor node deployment non-uniform question, proposed based on a sensation environment object minute bunch with the motion proxy node gathering data method, effectively solves wireless sensor node deployment energy management and data collection and so on crucial the technical difficult problems, thus enhances the wireless sensor network the application value


Author(s):  
Monjul Saikia

The wireless sensor network is a collection of sensor nodes that operate collectively to gather sensitive data from a target area. In the process of data collection the location of sensor nodes from where data is originated matters for taking any decision at the base station. Location i.e. the coordinates of a sensor node need to be shared among other nodes in many circumstances such as in key distribution phase, during routing of packets and many more. Secrecy of the location of every sensor node is important in any such cases. Therefore, there must be a location sharing scheme that facilitates the sharing of location among sensor nodes securely. In this paper, we have proposed a novel secure and robust mechanism for location sharing scheme using 2-threshold secret sharing scheme. The implementation process of the proposed model is shown here along with results and analysis.


2019 ◽  
Vol 16 (9) ◽  
pp. 3925-3931
Author(s):  
Bhupesh Gupta ◽  
Sanjeev Rana

For resource constraint network, one uses wireless sensor network in which limited resources are there for sensor nodes. Basic aim of sensor node is to sense something, monitor it and explain it. The issue arises for sensor node is its battery endurance. The battery endurance of sensor node is consuming in communication instead of sensing. In this regard clustering is using now a day’s which reduces endurance consumption. This paper comes with a new clustering protocol MESAEED (Mutual Exclusive Sleep Awake Energy Efficient Distributed clustering), which helps in saving endurance of sensor nodes so that network lifetime will prolong. It is an extension work of previous work MESADC. In previous work cluster head is chooses on the basis of sleep awake mode in mutual exclusive way under communication range and the results were obtained with the help of comparison graph between HEED and MESADC. The proposed MESAEED protocol provides benefit of A* algorithm of heuristic search, HEED and MESADC. MATLAB 8.3 is use for simulation purpose. The comparison graph between HEED, MESADC and proposed MESAEED were shown. Parameters for comparison include alive nodes versus number of rounds taken and number of nodes dead versus number of rounds taken. The graph shows improvement in performance over HEED and MESADC, which results in enhancing lifetime of WSN.


2013 ◽  
Vol 321-324 ◽  
pp. 515-522 ◽  
Author(s):  
Kou Lin Yuan ◽  
Lin Qiao ◽  
Lei Han

This paper proposes a level and cluster based routing approach for a wireless sensor network. Nodes in the network are divided into several levels according to their hops to sink node. Every sensor node has a level number. Using level information, a sensor node can send messages to a sink node in a more efficient way, and a sink node can easily locate other sensor nodes. To make network more balanced, the paper introduces a cluster method, which splits nodes in the same level into different clusters, and chooses a cluster head for every cluster, to switch nodes in the cluster to work in turn. Unlike all other cluster routing methods, a cluster head node takes schedule jobs of sensor nodes in the cluster according to their energy left, instead of sensing. The paper also presents several algorithms for constructing a wireless sensor network, querying and scheduling. The simulation experiment shows that the scalability of our method is approximately linear.


2019 ◽  
Vol 8 (4) ◽  
pp. 2440-2448

Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.


Repositor ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 79
Author(s):  
Rino Nugroho ◽  
Mahar Faiqurahman ◽  
Zamah Sari

Wireless Sensor Network (WSN) is a wireless network consisting of one or more nodes even numbering thousands. The nodes in the wireless sensor network (WSN) consist of sensor nodes and sink nodes. The use of wireless sensors on the network can form a node that can communicate with each other. The communication process generally uses a pull mechanism that precedes the data query process from the node to node sensor that provides sensing data. In some wireless sensor node architecture, this pull mechanism is considered less effective because the node sink must first request data to the sensor node. Alternative, a push message mechanism can be used to transmit sensed data within specified or determined time intervals.In this research is implemented push message mechanism by using restful web service in wireless sensor communications. Test results on the delivery of data by push data transmission obtained to sink nodes alternately in accordance with the order of destination address listed or stored in memory sensor node. And in doing data delivery to be efficient in the absence of data requests at any time.


Author(s):  
P. J. Sousa ◽  
R. Tavares ◽  
P. Abreu ◽  
M. Teresa Restivo

<p class="0abstract">This paper reports the development and integration of a wireless sensor network for environmental monitoring. The main goals of this system include modularity, low power consumption and ease of expansion. The system includes three main elements: sensor nodes, gateways and a server. Each sensor node can only connect to a gateway, resulting in a star network layout.  Data collected from the different sensor nodes is stored in a database within the server. A web-based user interface for this system was developed and made available online.</p>


Sign in / Sign up

Export Citation Format

Share Document