A Centre Clustering Mechanism of Wireless Sensor Network

2013 ◽  
Vol 479-480 ◽  
pp. 763-767
Author(s):  
Kuo Qin Yan ◽  
Shu Ching Wang ◽  
Chin Shan Peng ◽  
Shun Sheng Wang

A Wireless Sensor Network (WSN) consists of spatially distributed autonomous devices which use sensor nodes (SNs) to monitor physical or environmental conditions cooperatively. However, the SN is limited by the energy resource, the memory, the computation, the communication capability, etc. Therefore, the hierarchical clustering topology has been proposed to prolong the lifetime of WSNs by decreasing the energy consumption of SNs. Unfortunately, the network topology is still unstable due to the workload of the cluster managers is overloading. However, in this study, a Centre Clustering Mechanism (CCM) underlying the center-based WSN is proposed to improve the stability of network topology, assists SN within the working area, and takes advantage of message exchange.

2018 ◽  
Vol 7 (S1) ◽  
pp. 50-53
Author(s):  
K. Madhumathi . ◽  
T. Suresh .

Wireless Sensor Network consists of large number of autonomous, small, low cost sensor nodes that are spatially distributed in areas of investigation like disaster management, Military, environmental monitoring etc. The main purpose of using those nodes is to collect information from source and process it in destination. But the data received in the destination are useless unless the exact location of source is not known. The task of finding physical coordinates of these sensor nodes in WSNs area is known as localization. One solution for the above problem is manual configuration of sensor but it is unfeasible if the area of deployment is large or inaccessible. Therefore, we use localization techniques which help to capture the location of nodes in wireless sensor network. This study analyses localization algorithms with their pros and cons.


Author(s):  
P. PRASUNA ◽  
DR. R. HEMALATHA

Wireless sensor network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks, the sink node sends broadcast information to all other sensor nodes. Broadcast authentication is an important security mechanism in WSN, as it allows mobile users to broadcast messages to multiple sensor nodes in a secured way. While variety of multiuser broadcast authentication approaches are being developed, a lot of research is going on in the security field at rapid pace. However this field lacks a common integrated platform to provide a comprehensive comparison of seemingly unconnected but linked issues .In this article a pilot survey is performed to classify the, already proposed multiuser broadcast authentication approaches. This comparative survey is based on the objective, design principles and the performance of multiuser broadcast authentication approaches.


Author(s):  
Monika Choudhary ◽  
Nitin Goyal

An underwater wireless sensor network (UWSN) is a group of spatially distributed sensors for monitoring the physical changes of underwater environment and organize the measured data at a base station. Out of many big challenges in this field, network protocol design is of great concern due to the idiosyncratic nature of underwater environment. As underwater sensor networks are very much distinct in nature from terrestrial network so as the challenges, some of the major issues of concern in underwater environment are long propagation delay, available bandwidth, error rate, restricted battery power, movement of sensor nodes, etc. Because of all these issues and challenges, the routing protocols for terrestrial network can't be implemented in UWSNs. Hence, there is demand for new and different routing protocols for UWSNs. In this chapter, an overall survey of various routing protocols along with pros and cons are explained with challenges for designing new routing protocols for vast and enormous UWSNs.


Malware (worm, virus, malicious signals, etc.) propagation in Wireless Sensor Network (WSN) is one of the important concern. The WSN becomes unstable due to presence of malicious signals. Vulnerability of WSN is very high because of the structural constraint of sensor nodes. The attackers target a sensor node of WSN for malware attack. A single infected node starts to spread the malware in the entire network through neighbouring nodes. Therefore, for controlling of malware propagation in WSN a mathematical model is developed. The developed model is based on epidemic theory. The developed model consist of five states such as Susceptible-Infectious-Quarantine-Vaccination-Dead (SIQVD). The quarantine is a method through which to cease the infection spread in WSN. And through vaccination eliminate the malware from the network. The combination of quarantine and vaccination technique improves the network stability. This technique prevents malware propagation in WSN. The basic reproduction number ( ) of the model is deduced. The stability of the network depends on the value of basic reproduction number. It is found that if the value of is less than one the network system exist in malware-fee state, otherwise in endemic state. The equilibrium points of the system is obtained. The effects of quarantine and vaccination has been analyzed on system performance. The theoretical findings are verified by simulation results. Attack Epidemic model Equilibrium point Malware propagation Security Wireless Sensor Network


2013 ◽  
Vol 380-384 ◽  
pp. 3908-3911 ◽  
Author(s):  
Bo Xu ◽  
Shou Zhi Xu ◽  
Qing Wang ◽  
Ze Hua Chen

Wireless sensor network (WSN) is widely applied to I-home, I-office, greenhouse agriculture, environment monitoring and many other industry areas. Signal attenuation and barriers make WSN hard to get high quality and reliability of network communication, which are very import to monitoring systems. This paper focus on the signal attenuation performance in WSN, analyzes the model of signal attenuation, and researches its performance with different signal transmitting distance and different barriers. According to test results, this paper gives the model of signal attenuation with the effect of barriers on transmitting. The results can apply to the distribution of wireless sensor nodes and the optimization of network topology.


Wireless sensor network (WSN) consists of autonomous sensor devices that are spatially distributed in a wide area. Wireless sensor network is built up from a large number of sensor nodes that are assigned to a specific tasks and most probably is monitoring and reporting tasks. However, since the network might be expanded to hundreds, thousands or even millions of sensor nodes, there will be a high chance for the data from different wireless sensor nodes to collide with one another. Therefore, a proper node addressing scheme is needed to synchronize the data packages transmissions to the sink station. In this paper, a seven bytes addressing string scheme is proposed to encapsulate the node data and assist the sink station in identifying the data packages sources. The addressing string will be created in the wireless sensor node which it contains the node ID, package ID and the node data as well. The package ID is included to detect collided packages within the network. The data packages collision is avoided by allowing the sensor node to access the RF channel and transmit the data at a random time. The experimental results reviled that the proposed scheme was successfully addressed the wireless sensor node and make node identification at the sink station easy.


Author(s):  
Chao Wang

Background: It is important to improve the quality of service by using congestion detection technology to find the potential congestion as early as possible in wireless sensor network. Methods: So an improved congestion control scheme based on traffic assignment and reassignment algorithm is proposed for congestion avoidance, detection and mitigation. The congestion area of the network is detected by predicting and setting threshold. When the congestion occurs, sensor nodes can be recovery quickly from congestion by adopting reasonable method of traffic reassignment. And the method can ensure the data in the congestion areas can be transferred to noncongestion areas as soon as possible. Results: The simulation results indicate that the proposed scheme can reduce the number of loss packets, improve the throughput, stabilize the average transmission rate of source node and reduce the end-to-end delay. Conclusion: : So the proposed scheme can enhance the overall performance of the network. Keywords: wireless sensor network; congestion control; congestion detection; congestion mitigation; traffic assignment; traffic reassignment.


2018 ◽  
Vol 14 (01) ◽  
pp. 4
Author(s):  
Wang Weidong

To improve the efficiency of the remote monitoring system for logistics transportation, we proposed a remote monitoring system based on wireless sensor network and GPRS communication. The system can collect information from the wireless sensor network and transmit the information to the ZigBee interpreter. The monitoring system mainly includes the following parts: Car terminal, GPRS transmission network and monitoring center. Car terminal mainly consists by the Zigbee microcontroller and peripherals, wireless sensor nodes, RFID reader, GPRS wireless communication module composed of a micro-wireless monitoring network. The information collected by the sensor communicates through the GPRS and the monitoring center on the network coordinator, sends the collected information to the monitoring center, and the monitoring center realizes the information of the logistics vehicle in real time. The system has high applicability, meets the design requirements in the real-time acquisition and information transmission of the information of the logistics transport vehicles and goods, and realizes the function of remote monitoring.


Author(s):  
Edison Pignaton de Freitas ◽  
Tales Heimfarth ◽  
Ivayr Farah Netto ◽  
Carlos Eduardo Pereira ◽  
Armando Morado Ferreira ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document