Design of Embedded Greenhouse Controller Baced on ARM and Wireless Sensor Networks

2013 ◽  
Vol 303-306 ◽  
pp. 1470-1474
Author(s):  
Shu Jiang Li ◽  
Nan Xue ◽  
Xiang Dong Wang

An embedded controller in green house is designed and analyzed in this paper, which is consisted of embedded terminal and wireless sensor node. The captured data by sensor nodes will be sent to the base station, after which, certain information will be sent to controller by the base station through RS232 protocol. The controller is used for receiving, displaying, storing the temperature information and controlling the temperature according to some related settings, which is implemented with ARM 9 micro processor and embedded Linux OS. The system is confirmed to be stable and reliable in field practice, which fulfills the design specification

Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Mohammadjavad Abbasi ◽  
Muhammad Shafie Bin Abd Latiff ◽  
Hassan Chizari

Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. This paper organizes many scenarios for applying sensor node movement for improving network coverage based on bioinspired evolutionary algorithm and explains the concern and objective of controlling sensor node coverage. We discuss area coverage and target detection model by evolutionary algorithm.


Author(s):  
Sonam ◽  
Manju Khari

This chapter describes how as world is switching from wired communication to wireless communication, the need of a wireless sensor network (WSN) is increasing. WSNs became very popular due to its wide applications. A WSN is a network of small-in-size sensor nodes which are densely deployed for monitoring a chosen environment. In WSNs, each sensor node detects data and sends it to the base station. These sensor nodes have four basic duties, consisting of sensing, computation, transmission and power. Due to the small size, these sensor nodes are more constrained in terms of computational energy and storage resources. Energy awareness is also an essential design issue for routing protocols in WSNs. The focus of this chapter is to provide an overview of WSNs. In addition, this chapter describes the components of WSNs, its challenges and the classifications of WSNs. This chapter compares the results of LEACH, SEP and TEEN protocols.


Author(s):  
S. JERUSHA ◽  
K. KULOTHUNGAN ◽  
A Kannan

Wireless sensor nodes are usually embedded in the physical environment and report sensed data to a central base station. Clustering is one of the most challenging issues in wireless sensor networks. This paper proposes a new cluster scheme for wireless sensor network by modified the K means clustering algorithm. Sensor nodes are deployed in a harsh environment and randomly scattered in the region of interest and are deployed in a flat architecture. The transmission of packet will reduce the network lifetime. Thus, clustering scheme is required to avoid network traffic and increase overall network lifetime. In order to cluster the sensor nodes that are deployed in the sensor network, the location information of each sensor node should be known. By knowing the location of the each sensor node in the wireless sensor network, clustering is formed based on the highest residual energy and minimum distance from the base station. Among the group of nodes, one node is elected as a cluster head using centroid method. The minimum distance between the cluster node’s and the centroid point is elected as a cluster head. Clustering of nodes can minimize the residual energy and maximize the network performance. This improves the overall network lifetime and reduces network traffic.


Wireless sensor networks can be used to deliver status information to users in real time. The sensor nodes used in wireless sensor networks are arranged by attaching sensors to acquire necessary information, such as vibration, sound, light, and temperature. Since a sensor node is small in size and inexpensive, it is advantageous for monitoring large areas. When a sensor node senses a change in a situation, this event information is wirelessly communicated with other sensor nodes and transmitted to a base station. However, since the sensor nodes used in wireless sensor networks are small and inexpensive, there are restrictions in terms of their battery life, memory, and computing power. An attacker can easily compromise a sensor node and use a compromised node to attempt message tampering and energy consumption attacks. EDDK is a scheme that detects attacks from compromised nodes through key management. EDDK uses a pairwise key and a local cluster key to defend against various attacks in the network. In addition, EDDK protects against replay attacks by using sequence numbers and guarantees message integrity. However, since the sequence number and sensor node ID are not encrypted, they can be used as an attack element. An attacker can attempt a replay attack by manipulating the sequence number through sniffing. A replay attack that occurs in a wireless sensor network consumes sensor node energy and confuses the user. In order to defend against such an attack, we propose a sequence number encryption scheme. The proposed scheme detects new types of replay attacks and shows about 7% energy improvement.


2014 ◽  
Vol 556-562 ◽  
pp. 6311-6315
Author(s):  
Yong Qing Wang ◽  
Jing Tian Tang ◽  
Xing Po Ma

We study data aggregation for region-based top-k queries in wireless sensor networks, which is one kind of internet of things. Because the energy of sensor nodes is limited and a sensor node will die if it has no energy left, one of the important targets for all protocols in wireless sensor networks is to decrease the energy consumption of the sensor nodes. For a sensor node, communication cost is much more than other kinds of energy cost such as energy cost on computation and data storage. Thus, a very efficient way to decrease the energy cost of the sensor nodes is to decrease the quality of the sensing data that will be transmitted to the base station. In this paper, we use the technique of data aggregation to achieve this goal, and propose an algorithm to construct a novel Data Aggregation Tree (DAT) in the query region. To check the efficiency of DAT, we have made a simulation on OMNET, and the results show that DAT can shrink large quality of data when they are transmitted to the base station, and the life time of the sensor networks can thus be prolonged..


2018 ◽  
Vol 210 ◽  
pp. 03011
Author(s):  
Masahiro Okuri ◽  
Hiroaki Higaki

In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes themselves forward the data messages. Each intermediate wireless sensor node broadcast data messages in its wireless transmission range to forward them to its next-hop intermediate wireless sensor node. Hence, eavesdropper wireless nodes within the wireless transmission range easily overhear the data messages. In order to interfere with the eavesdropper wireless nodes illegally overhearing the data messages in transmission, wireless sensor nodes whose wireless transmission ranges overlap and their next-hop intermediate wireless sensor nodes are out of the wireless transmission ranges each other forward data messages in transmission concurrently and cause collisions between these two data messages at any possible eavesdropper wireless nodes intentionally. To enhance regions where concurrently forwarded data messages intentionally collide to prevent their overhearing and to realize concurrent forwarding of data messages, this paper designes an algorithm for TDMA transmission slot assignments for more opportunities to interfere the eavesdropper wireless nodes.


2021 ◽  
Vol 11 (4) ◽  
pp. 2836-2849
Author(s):  
K. Raghava Rao ◽  
D. Sateesh Kumar ◽  
Mohiddin Shaw ◽  
V. Sitamahalakshmi

Now a days IoT technologies are emerging technology with wide range of applications. Wireless sensor networks (WSNs) are plays vital role in IoT technologies. Construction of wireless sensor node with low-power radio link and high-speed processors is an interesting contribution for wireless sensor networks and IoT applications. Most of WSNs are furnished with battery source that has limited lifetime. The maximum operations of these networks require more power utility. Nevertheless, improving network efficiency and lifetime is a curtail issue in WSNs. Designing a low powered wireless sensor networks is a major challenges in recent years, it is essential to model its efficiency and power consumption for different applications. This paper describes power consumption model based on LoRa and Zigbee protocols, allows wireless sensor nodes to monitor and measure power consumption in a cyclic sleeping scenario. Experiential results reveals that the designed LoRa wireless sensor nodes have the potential for real-world IoT application with due consideration of communicating distance, data packets, transmitting speed, and consumes low power as compared with Zigbee sensor nodes. The measured sleep intervals achieved lower power consumption in LoRa as compared with Zigbee. The uniqueness of this research work lies in the review of wireless sensor node optimization and power consumption of these two wireless sensor networks for IoT applications.


2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Zhaozhuo Xu ◽  
Fangling Pu ◽  
Xin Fang ◽  
Jing Fu

Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.


A wireless sensor network holds a large amount of nodes. These nodes will contact themselves by utilizing some of the radio signals. wireless sensor networks (WSNs) has develop some applications during a huge selection areas, in the time of which external side users ought to straightly attach with sensors to get a perceived information. But, WSNs (wireless sensor node) are open to numerous attacks for wireless links, like eavesdropping and meddling. Two-factor authentication combining password and ID utterly like this demand due to password and ID usefulness. Then, a bucket of two-factor authentication protocol was advised in present research works. Because of the difficult assignment of adjustable potency and privacy requirements, still it’s difficult to introduce a privacyaware two-factor protocol that's potential of giving different safety features whereas take care of proper potency. in this paper the proposed work tend to suggests a privacy aware two-factor authentication protocol depend on ECC for wireless sensor nodes(WSNs). In this another convention performs distinctive wellbeing highlights need fully for the application situations, all things considered, though deal with appropriate power. So in this we will in general demonstrate that the presented convention accomplishes intelligent in the Burrows–Abadi– Needham judgment to boot, through manner of unofficial security statistics, the work show the introduced protocol will face up to a range of attacks and supply fascinating safety features.


Sign in / Sign up

Export Citation Format

Share Document