Study on Application of Wireless Sensor Networking in Environmental Monitoring

2012 ◽  
Vol 157-158 ◽  
pp. 1297-1300
Author(s):  
Yan Ju Liu ◽  
Xin Hua Li

A novel wireless sensor networks is designed with integrating sensors, embedded operating systems and wireless networking technology. The temperature, humidity, light strength and pressure around the sensor could be measured accurately. The collected data by sensor networks are analysed and treated in PC computer via USB interface. LEACH communication protocol was introduced to ZigBee networks in this paper. The node programs were exploited based on IAR System platform to accomplish data collection.

Author(s):  
Sumita Mishra

Wireless sensor networking technology has been used extensively by both commercial and military applications for sensing and data collection purposes. The self-configuring, self-healing nature and the ease of deployment of these networks make them an attractive option to other centralized approaches. Most of the existing networking solutions for sensor networks focus on the communication aspects and do not address the data security concerns of these networks. Since sensor networks are being deployed for emerging applications involving sensitive data and are envisioned to be integrated with the cyber space, it is essential to address the security needs of wireless sensor networks. Designing security solutions for Wireless Sensor Networks is an extremely challenging task due to the resource constraints of sensor nodes and the distributed nature of network design. This chapter provides an overview of emerging sensor networks involving sensitive data and a discussion of some of the proposed security solutions.


2021 ◽  
Vol 10 (1) ◽  
pp. 20
Author(s):  
Walter Tiberti ◽  
Dajana Cassioli ◽  
Antinisca Di Marco ◽  
Luigi Pomante ◽  
Marco Santic

Advances in technology call for a parallel evolution in the software. New techniques are needed to support this dynamism, to track and guide its evolution process. This applies especially in the field of embedded systems, and certainly in Wireless Sensor Networks (WSNs), where hardware platforms and software environments change very quickly. Commonly, operating systems play a key role in the development process of any application. The most used operating system in WSNs is TinyOS, currently at its TinyOS 2.1.2 version. The evolution from TinyOS 1.x and TinyOS 2.x made the applications developed on TinyOS 1.x obsolete. In other words, these applications are not compatible out-of-the-box with TinyOS 2.x and require a porting action. In this paper, we discuss on the porting of embedded system (i.e., Wireless Sensor Networks) applications in response to operating systems’ evolution. In particular, using a model-based approach, we report the porting we did of Agilla, a Mobile-Agent Middleware (MAMW) for WSNs, on TinyOS 2.x, which we refer to as Agilla 2. We also provide a comparative analysis about the characteristics of Agilla 2 versus Agilla. The proposed Agilla 2 is compatible with TinyOS 2.x, has full capabilities and provides new features, as shown by the maintainability and performance measurement presented in this paper. An additional valuable result is the architectural modeling of Agilla and Agilla 2, missing before, which extends its documentation and improves its maintainability.


2013 ◽  
Vol 427-429 ◽  
pp. 1268-1271
Author(s):  
Xue Wen He ◽  
Ying Fei Sheng ◽  
Kuan Gang Fan ◽  
Le Ping Zheng ◽  
Qing Mei Cao

In view of the existing flaws of traditional manual observations, a new type of tailing reservoir safety monitoring and warning system based on ZigBee and LabVIEW was designed. The system chose SoC chip CC2530 as the RF transceiver and designed the low-power wireless sensor networks nodes to collect and process the data of tailing reservoir. It chose ZigBee 2007 as the network communication protocol, and uploaded the data to PC by RS232 serial port. The monitoring and warning interface of PC was completed with LabVIEW. The testing results show that the data transmission of the network is stable and the system is suitable for real-time monitoring and warning of the tungsten tailing reservoir.


Author(s):  
Murat Al ◽  
Kenji Yoshigoe

Understanding data security is crucial to the daily operation of Wireless Sensor Networks (WSNs) as well as to the further advancement of security solutions in the research community. Unlike many surveys in literature that handle the topic in close relationship to a particular communication protocol, we provide a general view of vulnerabilities, attacks, and countermeasures in WSNs, enabling a broader audience to benefit from the presented material. We compare salient characteristics and applications of common wireless technologies to those of WSNs. As the main focus of the chapter, we thoroughly describe the characteristics of attacks and their countermeasures in WSNs. In addition, we qualitatively illustrate the multi-dimensional relationship among various properties including the effectiveness of these attacks (i.e., caused damage), the resources needed by adversaries to accomplish their intended attacks (i.e., consumed energy and time), and the resources required to defend against these attacks (i.e., energy overhead).


Author(s):  
Ahmed Ali Saihood ◽  
Laith Alzubaidi

The wireless sensor networks have been developed and extended to more expanded environments, and the underwater environment needs to develop more applications in different fields, such as sea animals monitoring, predict the natural disasters, and data exchanging between underwater and ground environments. The underwater environment has almost the same infrastructure and functions with ground environment with some limitations, such as processing, communications, and battery limits. In terms of battery limits, many techniques have been proposed; in this chapter, the authors will focus in deep reinforcement learning techniques.


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


Sign in / Sign up

Export Citation Format

Share Document