无线传感网络(英文)最新文献

筛选
英文 中文
Experimental Assessment of the Battery Lifetime in WSN Based on the Duty-Cycle Current Average Method 基于占空比电流平均法的WSN电池寿命实验评估
无线传感网络(英文) Pub Date : 2014-10-28 DOI: 10.4236/WSN.2014.610021
L. Barboni, M. Valle
{"title":"Experimental Assessment of the Battery Lifetime in WSN Based on the Duty-Cycle Current Average Method","authors":"L. Barboni, M. Valle","doi":"10.4236/WSN.2014.610021","DOIUrl":"https://doi.org/10.4236/WSN.2014.610021","url":null,"abstract":"A great amount of work addressed methods for predicting the battery lifetime in wireless sensor systems. In spite of these efforts, the reported experimental results demonstrate that the duty-cycle current average method, which is widely used to this aim, fails in accurately estimating the battery life time of most of the presented wireless sensor system applications. The aim of this paper is to experimentally assess the duty-cycle current average method in order to give more effective insight on the effectiveness of the method. An electronic metering system, based on a dedicated PCB, has been designed and developed to experimentally measure node current consumption profiles and charge extracted from the battery in two selected case studies. A battery lifetime measurement (during 30 days) has been carried out. Experimental results have been assessed and compared with estimations given by using the duty-cycle current average method. Based on the measurement results, we show that the assumptions on which the method is based do not hold in real operating cases. The rationality of the duty-cycle current average method needs reconsidering.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"06 1","pages":"212-220"},"PeriodicalIF":0.0,"publicationDate":"2014-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70899960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation Performance of Protocols LEACH, 802.15.4 and CBRP, Using Analysis of QoS in WSNs 基于无线传感器网络QoS分析的LEACH、802.15.4和CBRP协议性能评估
无线传感网络(英文) Pub Date : 2014-10-28 DOI: 10.4236/WSN.2014.610022
Syyed Javad Mohammadi Baygi, Mehran Mokhtari
{"title":"Evaluation Performance of Protocols LEACH, 802.15.4 and CBRP, Using Analysis of QoS in WSNs","authors":"Syyed Javad Mohammadi Baygi, Mehran Mokhtari","doi":"10.4236/WSN.2014.610022","DOIUrl":"https://doi.org/10.4236/WSN.2014.610022","url":null,"abstract":"Standards can define the performance and required protocols in different types of nodes in Wireless Sensor Networks (WSNs). In this article we discuss the Quality of Service (QoS) requirements in WSNs and present a survey of some of the QoS multi-parameters metrics in WSNs. Also, it gives the performance of 802.15.4, LEACH, and CBRP protocol considering parameters. The simulation tests were carried out by the simulator NS 2.29; it showed that the performance of 802.15.4 protocol is better than the LEACH. The results have shown that the 802.15.4 standard protocol provides better quality of outperformed service requirements than LEACH protocol. So its performance in WSNs is more effective than LEACH protocol. CBRP protocol simulators NS 2.34, reduce traffics and congestion packet. Finally, the algorithm CBRP offers optimal performance with reduced overhead and delay with respect to the other two protocols. Plus, the strengths and weaknesses of the protocols are specified in relation to the provision of quality of service. It should take effective action to address them.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"06 1","pages":"221-236"},"PeriodicalIF":0.0,"publicationDate":"2014-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70900086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Radio Coverage Mapping in Wireless Sensor Networks 无线传感器网络中的无线电覆盖映射
无线传感网络(英文) Pub Date : 2014-10-28 DOI: 10.4236/WSN.2014.610020
Yunfeng Nie, Chong-Jing Chen, C. Wang
{"title":"Radio Coverage Mapping in Wireless Sensor Networks","authors":"Yunfeng Nie, Chong-Jing Chen, C. Wang","doi":"10.4236/WSN.2014.610020","DOIUrl":"https://doi.org/10.4236/WSN.2014.610020","url":null,"abstract":"Radio coverage directly affects the network connectivity, which is the foundational issue to ensure the normal operation of the network. Many efforts have been made to estimate the radio coverage of sensor nodes. The existing approaches (often RSSI measurement-based), however, suffer from heavy measurement cost and are not well suitable for the large-scale densely deployed WSNs. NRC-Map, a novel algorithm is put forward for sensor nodes radio coverage mapping. The algorithm is based on the RSSI values collected by the neighbor nodes. According to the spatial relationship, neighbor nodes are mapping to several overlapped sectors. By use of the least squares fitting method, a log-distance path loss model is established for each sector. Then, the max radius of each sector is computed according to the path loss model and the given signal attenuation threshold. Finally, all the sectors are overlapped to estimate the node radio coverage. Experimental results show that the method is simple and effectively improve the prediction accuracy of the sensor node radio coverage.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"06 1","pages":"205-211"},"PeriodicalIF":0.0,"publicationDate":"2014-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4236/WSN.2014.610020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70900275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network 基于分布式信任的无线传感器网络安全通信框架
无线传感网络(英文) Pub Date : 2014-09-18 DOI: 10.4236/WSN.2014.69017
G. V., K. Chandrasekaran
{"title":"A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network","authors":"G. V., K. Chandrasekaran","doi":"10.4236/WSN.2014.69017","DOIUrl":"https://doi.org/10.4236/WSN.2014.69017","url":null,"abstract":"The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside attackers, attacks by compromised or malicious nodes, trust management system is suggested by many researchers in the area of wireless sensor network. Trust management system can be implemented in various applications for security management such as secure data aggregation, secure cluster head selection, trusted routing, access control, etc. Many researchers provide different kind of solutions for these secure applications based on trust management. However, to incorporate, all such applications on a single sensor node in the network, it is essential to design and develop a trust management system, which considers various aspects and applications of wireless sensor network. As a result, in this paper, we would like to propose a parameter and trust factor based secure communication framework and design a trust management system for wireless sensor networks. Our main contribution is to identify various parameters and trust factors which influences on trust in wireless sensor network and developing a framework for a trust management system based on various parameters and trust factors. The working of the proposed model is shown by simulation experiments conducted in MATLAB for the application of secure communication, data aggregation and intrusion detection in wireless sensor networks.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"06 1","pages":"173-183"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70901101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cars as a Diffuse Network of Road-Environment Monitoring Nodes 汽车作为道路环境监测节点的扩散网络
无线传感网络(英文) Pub Date : 2014-09-18 DOI: 10.4236/WSN.2014.69018
M. Allegretti, S. Bertoldo
{"title":"Cars as a Diffuse Network of Road-Environment Monitoring Nodes","authors":"M. Allegretti, S. Bertoldo","doi":"10.4236/WSN.2014.69018","DOIUrl":"https://doi.org/10.4236/WSN.2014.69018","url":null,"abstract":"The present paper aims to describe the conceptual idea to use cars as sensors to measure and acquire data related road environment. The parameters are collected using only standard equipment commonly installed and operative on commercial cars. Real sensors and car sub-systems (e.g. thermometers, accelerometers, ABS, ESP, and GPS) together with other “implicit” sensors (e.g. fog lights, windscreen wipers) acquire and contain information. They are shared inside an in-vehicle communication network using mainly the standard CAN bus and can be collected by a simple central node. This node can also be available on the market without too expensive costs thanks to some companies which business is devoted to car fleet monitoring. All the collected data are then geolocalized using a standard GPS receiver and sent to a remote elaboration unit, exploiting mobile network technologies such as GPRS or UMTS. A large number of cars, connected together in a diffuse Wireless Sensor Network, allow the elaboration unit to realize some info-layers put at the disposal of a car driver. Traffic, state of the road and other information about the weather can be received by car drivers using an ad hoc developed mobile application for smartphone which can give punctual information related to a specific route, previously set on the mobile phone navigator. The description of some experimental activities is presented, some technical points will be addressed and some examples of applications of the network of cars “as sensors” will be given.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"6 1","pages":"184-191"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70901375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home 基于IEEE 802.15.4的无线传感器网络自适应通信协议:在家庭老年人监控中的应用
无线传感网络(英文) Pub Date : 2014-09-18 DOI: 10.4236/WSN.2014.69019
Juan Lu, A. Bossche, E. Campo
{"title":"An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home","authors":"Juan Lu, A. Bossche, E. Campo","doi":"10.4236/WSN.2014.69019","DOIUrl":"https://doi.org/10.4236/WSN.2014.69019","url":null,"abstract":"Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are interested in the study and the proposal of a solution allowing distributed sensor nodes to communicate with each other in an optimal way adapted to the specific application constraints. More precisely, we want to build a wireless network that consists of several short range sensor nodes exchanging data between them according to a communication protocol at MAC (Medium Access Control) level. This protocol must be able to optimize energy consumption, transmission time and loss of information. To achieve this objective, we have analyzed the advantages and the limitations of WSN (Wireless Sensor Network) technologies and communication protocols currently used in relation to the requirements of our application. Then we proposed a deterministic, adaptive and energy saving medium access method based on the IEEE 802.15.4 physical layer and a mesh topology. It ensures the message delivery time with strongly limited collision risk due to the spatial reuse of medium in the two-hop neighbourhood. This proposal was characterized by modelling and simulation using OPNET network simulator. Finally we implemented the proposed mechanisms on hardware devices and deployed a sensors network in real situation to verify the accuracy of the model and evaluate the proposal according to different test configurations.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"102 1","pages":"192-204"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70901484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks 作为无线传感和识别短距离网络集成商的可调脉冲超宽带技术研究进展
无线传感网络(英文) Pub Date : 2014-08-11 DOI: 10.4236/WSN.2014.68015
M. S. Jawad, W. Ismail, Ayman Hajjawi, Othman Madya Abdul Rani, A. T. Hussain, A. Saleh
{"title":"Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks","authors":"M. S. Jawad, W. Ismail, Ayman Hajjawi, Othman Madya Abdul Rani, A. T. Hussain, A. Saleh","doi":"10.4236/WSN.2014.68015","DOIUrl":"https://doi.org/10.4236/WSN.2014.68015","url":null,"abstract":"Impulse based Ultra wideband technology has been the motivation of many recent researches with the potential of many applications to be researched. The uniqueness of the physical characteristics of the generated signal combined with the high flexibility of for different data rates at the physical layer design level have been addressed in considerable number of researches recently. This paper presents in depth reviews of the different concepts of tunable impulse based ultra wideband from the different researchers views. Research proposals of Cross layer architectures as PHY-MAC aware Impulse based ultra wideband solutions, link-budget communication design with performance evaluations in different test beds implementations are investigated in this paper. Such in-depth review can help researchers in this field to have better understanding of the different possibilities of designing new impulse-based ultra wideband solutions for future potential communication scenarios. Special focus on utilizing the advantage of impulse-based ultra wideband signal design flexibility as integrator for different short to medium wireless infrastructures mainly sharing common design constraints and requirements. Finding remarks from reviewing nearest-field literature combined with researches benchmarking to inspire researches proposal for this topic.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"6 1","pages":"137-156"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70900914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN 基于节点特征和相邻节点推荐的WSN信任评估
无线传感网络(英文) Pub Date : 2014-08-11 DOI: 10.4236/WSN.2014.68016
Shaik Sahil Babu, Arnab Raha, M. K. Naskar
{"title":"Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN","authors":"Shaik Sahil Babu, Arnab Raha, M. K. Naskar","doi":"10.4236/WSN.2014.68016","DOIUrl":"https://doi.org/10.4236/WSN.2014.68016","url":null,"abstract":"In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"6 1","pages":"157-172"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70901044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach 无线传感器网络的移动性意识介质访问控制方案:一种概念方法
无线传感网络(英文) Pub Date : 2014-07-21 DOI: 10.4236/WSN.2014.67014
A. Oluwaranti, Tayo Obasanya
{"title":"Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach","authors":"A. Oluwaranti, Tayo Obasanya","doi":"10.4236/WSN.2014.67014","DOIUrl":"https://doi.org/10.4236/WSN.2014.67014","url":null,"abstract":"Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"6 1","pages":"129-135"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70901135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Hops Length in Wireless Sensor Networks 无线传感器网络中跳数长度分析
无线传感网络(英文) Pub Date : 2014-06-23 DOI: 10.4236/WSN.2014.66012
Mekkaoui Kheireddine, Rahmoun Abdellatif
{"title":"Analysis of Hops Length in Wireless Sensor Networks","authors":"Mekkaoui Kheireddine, Rahmoun Abdellatif","doi":"10.4236/WSN.2014.66012","DOIUrl":"https://doi.org/10.4236/WSN.2014.66012","url":null,"abstract":"Wireless sensor networks are provided with a limited source of power. The lifetime of such networks is an overwhelming matter in most network applications. This lifetime depends strongly on how efficiently such energy is distributed over the nodes especially during transmitting and receiving data. Each node may route messages to destination nodes either through short hops or long hops. Optimizing the length of these hops may save energy, and therefore extend the lifetime of WSNs. In this paper, we propose a theorem to optimize the hop’s length so to make WSN power consumption minimal. The theorem establishes a simple condition on hop’s length range. Computer simulation when performing such condition on Mica2 sensors and Mica2dot sensors reveals good performance regarding WSNs energy consumption.","PeriodicalId":58712,"journal":{"name":"无线传感网络(英文)","volume":"06 1","pages":"109-117"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70900954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信