Research on Wireless Sensor Networks Based on Open Source System

2014 ◽  
Vol 621 ◽  
pp. 712-718
Author(s):  
Guang You Yang ◽  
Si Jian Zhu ◽  
Rui Quan ◽  
Zhi Yan Ma

As the key technologies such as wireless communication, sensor continues to mature, wireless sensor networks has become a domestic and foreign focus of research in the field of wireless networks. The main work of the thesis is to implement ZigBee wireless sensor networking, using open source protocol FreakZ On the base of existing hardware. WSN hardware node consists of 32-bit microprocessor STM32F102CB based on ARM Cortex-M3 kernel and AT86RF212 radio transceiver; the software platform uses a lightweight multi-tasking operating system Contiki and open source protocol stack called FreakZ following ZigBee protocol specification, for networking wireless networks nodes. The paper presents the system architecture of WSN networking and its hardware components, software architecture and data transmission and reception processes of the networks. Using FreakZ protocol stack under the Contiki operating system on the base of the existing hardware platform, the network nodes information and topology displayed on the HyperTerminal indicates the success of WSN networking by using FreakZ protocol.

2017 ◽  
Vol 13 (07) ◽  
pp. 36
Author(s):  
Yuxia Shen

<p><span style="font-size: medium;"><span style="font-family: 宋体;">In wireless sensor networks, for improving the time synchronization perfromance of online monitoring and application of ZigBee protocol, a scheme is designed. For this objective, first of all, the ZigBee protocol specification is summarized, a profound analysis of the hardware abstraction architecture of TinyOS operating system is made; the advantages of the ZigBee protocol compared with the traditional radio technology are comparatively analyzed. At the same time, the node design block diagram based on CC2430 and related development system is provided. In the TinyOS2.x operating system, we analyze CC2430 application program abstract architecture, and on this basis, give the realization process of program design. The research results showed that we achieve an on-line monitoring system based on ZigBee protocol, which has realistic significance of applying ZigBee protocol in wireless sensor network of electrical equipment online monitoring. Based on the above research, it is concluded that the online monitoring system can collect the temperature parameters of the monitored object in real time that it can be widely applied in wireless sensor networks.</span></span></p>


2012 ◽  
pp. 226-238
Author(s):  
Sohail Anwar ◽  
Chongming Zhang

Wireless Sensor Networks (WSNs) have experienced an amazing evolution during the last decade. Compared with other wired or wireless networks, wireless sensor networks extend the range of data collection and make it possible for us to get information from every corner of the world. The chapter begins with an introduction to WSNs and their applications. The chapter recognizes event detection as a key component for WSN applications. The chapter provides a structured and comprehensive overview of various techniques used for event detection in WSNs. Existing event detection techniques have been grouped into threshold based and pattern based mechanisms. For each category of event detection mechanism, the chapter surveys some representative technical schemes. The chapter also provides some analyses on the relative strengths and weaknesses of these technical schemes. Towards the end, the trends in the research regarding the event detection in WSNs are described.


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


Author(s):  
João B. Borges Neto ◽  
Rossana M. C. Andrade ◽  
Pedro Fernandes Ribeiro Neto

Wireless Sensor Networks (WSN) have considerably evolved in recent years. Their main focus has been always restricted to the extraction of information from the environment, but only data collected by the network has been considered. All internal operations and challenges encountered in achieving the requirements assigned to the data have been ignored. However, the advances in the area of WSN, allowing their operation in scenarios under different conditions, make us believe that they are sufficiently mature and optimized to solve problems in other related areas. So, considering the WSN as an ideal laboratory to find solutions to several problems in wireless networks, this Chapter discusses how the advances of these networks may be useful to help the development and creation of smart environments, essential to make ubiquitous computing part of our everyday life.


2017 ◽  
Vol 2017 ◽  
pp. 1-16 ◽  
Author(s):  
Mariam Akbar ◽  
Nadeem Javaid ◽  
Wadood Abdul ◽  
Sanaa Ghouzali ◽  
Abid Khan ◽  
...  

Mobile Sink (MS) based routing strategies have been widely investigated to prolong the lifetime of Wireless Sensor Networks (WSNs). In this paper, we propose two schemes for data gathering in WSNs: (i) MS moves on random paths in the network (RMS) and (ii) the trajectory of MS is defined (DMS). In both the schemes, the network field is logically divided into small squares. The center point of each partitioned area is the sojourn location of the MS. We present three linear programming based models: (i) to maximize network lifetime, (ii) to minimize path loss, and (iii) to minimize end to end delay. Moreover, a geometric model is proposed to avoid redundancy while collecting information from the network nodes. Simulation results show that our proposed schemes perform better than the selected existing schemes in terms of the selected performance metrics.


Sign in / Sign up

Export Citation Format

Share Document