A Study on Family Medical Sensor Networks and ECG and Temperature Monitoring Node Based on 6LoWPAN

2012 ◽  
Vol 472-475 ◽  
pp. 3445-3449
Author(s):  
Wei Fu ◽  
Meng Ling Shui ◽  
Ping Wang

By using advanced IPv6 technology, This paper presents a design of family wireless medical sensor networks(WMSN) and a implementation of ECG and temperature monitoring sensor node. The 6LoWPAN medical sensor nodes can add into the WMSN rapidly and the biomedical data are routed into the Internet through the gateway, therefore, it can get the information of health record on the web expediently and simply. In addition, this paper proposes a scheme of telemedicine for convenient and secure medical service.

2019 ◽  
Vol 11 (21) ◽  
pp. 6171 ◽  
Author(s):  
Jangsik Bae ◽  
Meonghun Lee ◽  
Changsun Shin

With the expansion of smart agriculture, wireless sensor networks are being increasingly applied. These networks collect environmental information, such as temperature, humidity, and CO2 rates. However, if a faulty sensor node operates continuously in the network, unnecessary data transmission adversely impacts the network. Accordingly, a data-based fault-detection algorithm was implemented in this study to analyze data of sensor nodes and determine faults, to prevent the corresponding nodes from transmitting data; thus, minimizing damage to the network. A cloud-based “farm as a service” optimized for smart farms was implemented as an example, and resource management of sensors and actuators was provided using the oneM2M common platform. The effectiveness of the proposed fault-detection model was verified on an integrated management platform based on the Internet of Things by collecting and analyzing data. The results confirm that when a faulty sensor node is not separated from the network, unnecessary data transmission of other sensor nodes occurs due to continuous abnormal data transmission; thus, increasing energy consumption and reducing the network lifetime.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2568 ◽  
Author(s):  
Ruisong Wang ◽  
Gongliang Liu ◽  
Wenjing Kang ◽  
Bo Li ◽  
Ruofei Ma ◽  
...  

Information acquisition in underwater sensor networks is usually limited by energy and bandwidth. Fortunately, the received signal can be represented sparsely on some basis. Therefore, a compressed sensing method can be used to collect the information by selecting a subset of the total sensor nodes. The conventional compressed sensing scheme is to select some sensor nodes randomly. The network lifetime and the correlation of sensor nodes are not considered. Therefore, it is significant to adjust the sensor node selection scheme according to these factors for the superior performance. In this paper, an optimized sensor node selection scheme is given based on Bayesian estimation theory. The advantage of Bayesian estimation is to give the closed-form expression of posterior density function and error covariance matrix. The proposed optimization problem first aims at minimizing the mean square error (MSE) of Bayesian estimation based on a given error covariance matrix. Then, the non-convex optimization problem is transformed as a convex semidefinite programming problem by relaxing the constraints. Finally, the residual energy of each sensor node is taken into account as a constraint in the optimization problem. Simulation results demonstrate that the proposed scheme has better performance than a conventional compressed sensing scheme.


Sensor nodes are exceedingly energy compelled instrument, since it is battery operated instruments. In wsn network, every node is liable to the data transmission through the wireless mode [1]. Wireless sensor networks (WSN) is made of a huge no. of small nodes with confined functionality. The essential theme of the wireless sensor network is energy helpless and the WSN is collection of sensor. Every sensor terminal is liable to sensing, store and information clan and send it forwards into sink. The communication within the node is done via wireless network [3].Energy efficiency is the main concentration of a desining the better routing protocol. LEACH is a protocol. This is appropriate for short range network, since imagine that whole sensor node is capable of communication with inter alia and efficient to access sink node, which is not always correct for a big network. Hence, coverage is a problem which we attempt to resolve [6]. The main focus within wireless sensor networks is to increase the network life-time span as much as possible, so that resources can be utilizes efficiently and optimally. Various approaches which are based on the clustering are very much optimal in functionality. Life-time of the network is always connected with sensor node’s energy implemented at distant regions for stable and defect bearable observation [10].


Author(s):  
Ajay Kaushik ◽  
S. Indu ◽  
Daya Gupta

Wireless sensor networks (WSNs) are becoming increasingly popular due to their applications in a wide variety of areas. Sensor nodes in a WSN are battery operated which outlines the need of some novel protocols that allows the limited sensor node battery to be used in an efficient way. The authors propose the use of nature-inspired algorithms to achieve energy efficient and long-lasting WSN. Multiple nature-inspired techniques like BBO, EBBO, and PSO are proposed in this chapter to minimize the energy consumption in a WSN. A large amount of data is generated from WSNs in the form of sensed information which encourage the use of big data tools in WSN domain. WSN and big data are closely connected since the large amount of data emerging from sensors can only be handled using big data tools. The authors describe how the big data can be framed as an optimization problem and the optimization problem can be effectively solved using nature-inspired algorithms.


Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Mohammadjavad Abbasi ◽  
Muhammad Shafie Bin Abd Latiff ◽  
Hassan Chizari

Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. This paper organizes many scenarios for applying sensor node movement for improving network coverage based on bioinspired evolutionary algorithm and explains the concern and objective of controlling sensor node coverage. We discuss area coverage and target detection model by evolutionary algorithm.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1960
Author(s):  
Guanghua Zhang ◽  
Zonglin Gu ◽  
Qiannan Zhao ◽  
Jingqiu Ren ◽  
Shuai Han ◽  
...  

With the continuous progress of science and technology, intelligent wireless sensor network (IWSN) communication has become indispensable in its role in production and life because of its convenient network settings and flexible use. However, with the widespread availability of intelligent wireless sensor networks, the use of many wireless sensor nodes constitutes a multi-node wireless communication system, which turns the accuracy and low complexity of multi-node detection in sensor networks into a problem. Although the traditional algorithm has excellent performance, it cannot give consideration to both accuracy and complexity. Therefore, a maximum logarithm message passing algorithm based on serial and threshold (S-T-Max-log-MPA) for multi-mode detection in IWSN is proposed in this paper. In this algorithm, the threshold is used to determine the necessary conditions of sensor node stability first, and then the sensor node information updating is integrated into the resource node information updating, so that the system can maintain good accuracy, performance, and change the situation of poor system accuracy at low threshold. Compared with the traditional algorithm, the proposed algorithm significantly changes the algorithm complexity reduction rate of the system multi-node detection. Simulation results show that the algorithm has a good balance between accuracy and complexity reduction rate.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4625 ◽  
Author(s):  
Km Renuka ◽  
Sachin Kumar ◽  
Saru Kumari ◽  
Chien-Ming Chen

Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das’s protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das’s protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das’s protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das’s protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs


2018 ◽  
Vol 13 (10) ◽  
pp. 1499-1504 ◽  
Author(s):  
Jiaqi Wu ◽  
Huahu Xu

To discuss the divisible load scheduling in wireless photoelectric sensor networks, a load scheduling algorithm called EDDLT based on residual energy landscape is proposed. In the algorithm, the constant of the time needed for the induction and reporting unit data is adjusted to the variable parameters based on the residual energy. In addition, the ratio of the initial energy to the residual energy is used to carry out the effective load scheduling. By using this algorithm, when the load is allocated to each sensor node, the remaining energy of nodes is considered, and a lighter load is allocated to sensor nodes with less residual energy. EDDLT, compared to the standard divisible load scheduling method SDLT, the number of execution rounds is greatly increased when the first sensor node is dead. The experimental results showed that EDDLT had a certain effect on prolonging the lifetime of wireless photoelectric sensor networks. To sum up, the scheduling algorithm has good performance in exploring divisible load.


2011 ◽  
Vol 225-226 ◽  
pp. 531-535
Author(s):  
Jun Xiang Gao ◽  
Yan Tian

Localization of the sensor nodes is a major obstacle for practical applications of video sensor networks. This paper present a novel localization technique based on vision in wireless sensor networks. On the assumption that sensor nodes can be recognized in an image, a sensor node firstly direct its Field-of-View (FoV) to an anchor or localized node, then we can get the orientation of anchor node relate to the sensor node to be localized. If two or more anchors can be found in sensing area, a series of equations will be obtained. They can be solved using minimum mean square error rule, and the solution of the overdetermined equations mentioned above is the estimation of the node position. The experiments indicate that a promising performance can be achieved in determining the exact node location using a small number of anchors.


Sign in / Sign up

Export Citation Format

Share Document