Wireless sensor networks have profound effects on many application fields like security management which need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a major issue in chemical industry field. This paper describes the design of chemical warehouse security system using the concept of active products and wireless sensor networks. A security application layer is developed to supervise and exchange messages between nodes and the control center to prevent industrial accident. Different security rules are proposed on this layer to monitor the internal state and incompatible products distance. If a critical event is detected, the application generates alert message which need a short end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
This document provides a comprehensive review of research in the field of wireless sensor networks (WSNs). It begins with an introduction to WSNs and discusses sensor nodes, network architectures, communication protocols, applications, and open research issues. It then reviews several related surveys that focus on specific aspects of WSNs such as applications, energy consumption techniques, security protocols, and testbeds. The document aims to provide an overview of all aspects of WSN research and identify promising directions like bio-inspired solutions. It discusses sensors and network types, architectures and services, and challenges like fault tolerance.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
This document discusses network architectures and protocols in wireless sensor networks. It covers several key points:
1) Wireless sensor networks require specialized network protocols to implement functions like synchronization, routing, and security. Energy efficiency is also important since communication is very energy intensive.
2) Sensor networks typically have many sensor nodes collecting data and sending it via single-hop or multihop routing to one or more base stations.
3) To improve energy efficiency, hierarchical and clustering-based network architectures are often used, where nodes relay data through cluster heads to reach the base station. Various clustering algorithms have been proposed and analyzed.
4) The document also outlines the typical layered protocol stack used in wireless sensor networks, covering physical
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
This document presents a new model for securing key distribution in wireless sensor networks (WSNs) using intuitionistic fuzzy sets. The model determines the appropriate length of an intermediate encryption key based on network parameters like node count, node authentication history, trusted neighbor count, key change frequency, and desired key length. An intuitionistic fuzzy sets implementation assigns membership and non-membership values to each parameter. Based on the combinations of parameter values, intuitionistic rules output a session key scale and corresponding key length ranging from very low to very high security. The model was experimentally shown to efficiently create and distribute keys compared to other models.
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
This document provides a comprehensive review of research in the field of wireless sensor networks (WSNs). It begins with an introduction to WSNs and discusses sensor nodes, network architectures, communication protocols, applications, and open research issues. It then reviews several related surveys that focus on specific aspects of WSNs such as applications, energy consumption techniques, security protocols, and testbeds. The document aims to provide an overview of all aspects of WSN research and identify promising directions like bio-inspired solutions. It discusses sensors and network types, architectures and services, and challenges like fault tolerance.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
This document discusses network architectures and protocols in wireless sensor networks. It covers several key points:
1) Wireless sensor networks require specialized network protocols to implement functions like synchronization, routing, and security. Energy efficiency is also important since communication is very energy intensive.
2) Sensor networks typically have many sensor nodes collecting data and sending it via single-hop or multihop routing to one or more base stations.
3) To improve energy efficiency, hierarchical and clustering-based network architectures are often used, where nodes relay data through cluster heads to reach the base station. Various clustering algorithms have been proposed and analyzed.
4) The document also outlines the typical layered protocol stack used in wireless sensor networks, covering physical
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
This document presents a new model for securing key distribution in wireless sensor networks (WSNs) using intuitionistic fuzzy sets. The model determines the appropriate length of an intermediate encryption key based on network parameters like node count, node authentication history, trusted neighbor count, key change frequency, and desired key length. An intuitionistic fuzzy sets implementation assigns membership and non-membership values to each parameter. Based on the combinations of parameter values, intuitionistic rules output a session key scale and corresponding key length ranging from very low to very high security. The model was experimentally shown to efficiently create and distribute keys compared to other models.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
This document contains two papers. The first paper summarizes a study that designed a prototype smoke detection device for a student dormitory at Klabat University using a microcontroller, MQ-7 and UV-Tron sensors, buzzer, and SMS gateway to detect cigarette smoke and notify users. The second paper proposes a wireless sensor network design for environmental monitoring applications to measure temperature, humidity, CO2, and other factors.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
This document summarizes research on energy efficient multipath routing techniques in wireless sensor networks. It reviews 24 related works that propose and evaluate various multipath routing protocols to increase network lifetime and balance energy consumption. The routing protocols are categorized based on path establishment, network structure, and protocol operation. Key goals of multipath routing include minimizing total energy consumption, extending network lifetime, improving load balancing, and providing reliable and efficient data transmission.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
1) The document discusses various design issues and challenges in distributed sensor networks, including limited resources of sensor nodes, scalability, frequent topology changes, and data aggregation.
2) Data aggregation aims to reduce redundant data by having sensor nodes combine and summarize correlated sensor readings. This helps reduce transmission costs and bandwidth usage.
3) Time synchronization is also an important challenge as many sensor network applications require correlating sensor readings with physical times, but achieving precise synchronization is difficult given the networks' constraints.
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Impact of the temperature and humidity variations on link quality of xm1000 m...ijasuc
The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
This document contains two papers. The first paper summarizes a study that designed a prototype smoke detection device for a student dormitory at Klabat University using a microcontroller, MQ-7 and UV-Tron sensors, buzzer, and SMS gateway to detect cigarette smoke and notify users. The second paper proposes a wireless sensor network design for environmental monitoring applications to measure temperature, humidity, CO2, and other factors.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
This document summarizes research on energy efficient multipath routing techniques in wireless sensor networks. It reviews 24 related works that propose and evaluate various multipath routing protocols to increase network lifetime and balance energy consumption. The routing protocols are categorized based on path establishment, network structure, and protocol operation. Key goals of multipath routing include minimizing total energy consumption, extending network lifetime, improving load balancing, and providing reliable and efficient data transmission.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
1) The document discusses various design issues and challenges in distributed sensor networks, including limited resources of sensor nodes, scalability, frequent topology changes, and data aggregation.
2) Data aggregation aims to reduce redundant data by having sensor nodes combine and summarize correlated sensor readings. This helps reduce transmission costs and bandwidth usage.
3) Time synchronization is also an important challenge as many sensor network applications require correlating sensor readings with physical times, but achieving precise synchronization is difficult given the networks' constraints.
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Impact of the temperature and humidity variations on link quality of xm1000 m...ijasuc
The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
EXPERIMENTAL STUDY TO MAINTAIN STABILITY IN THE CASE OF INDUSTRIAL CLOUDLETS ...ijccsa
Cloud usage has increased rapidly, except when it comes to the notable integration of IOT with Industry
4.0.This study seeks to challenge the limits of Cloud uses. As a result, the integration of Cloudlet
(middleware) in some critical applications is growing rapidly with the expansion of Cloud applications.
The Cloudlet is being deployed as a necessary component in the industrial network to ensure data
synchronization, security, and stability. Based on our recent studies, this work will focus on how to
maintain stability in a Cloudlets network. In other words, the goal is to ensure that all nodes remain stable,
meaning that all the Cloudlets are connected to the Cloud and able to transmit data independently,
regardless of the constraints imposed by the industrial environment. The first part of this work is to define
the problem, discuss how Cloudlet can resolve some Cloud limits. Then, we define the stability and its
models. In effect, the experiments in a real industrial environment are presented. Finally, the results are
analysed.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Cloud computing and the low power wide area network (LPWAN) network represent the key infrastructures for developing intelligent solutions based on the internet of things (IoT). However, the diversity of use cases and deployment scenarios of IoT in the different domains makes optimizing IoT-based cloud solutions a major challenge. The cloud solution’s cost increases with the increase in central processing unit (CPU) resources and energy consumption. The optimal use of edge material resources in industrial solutions will reduce the consumption of resources and thus optimize cloud infrastructure costs in terms of resources and energy consumption. The article presents the network and application architecture of an IoT monitoring solution based on cloud services. Then, we study the integration of IoT services based on application placement strategies on the fog cloud compared to the traditional centralized cloud strategy. Simulations evaluate the scenarios with the iFogSim simulator and the analyzed results compare the traditional strategy with the cloud-fog. The results show that cost and energy consumption in the cloud can be significantly reduced by processing the application at the end devices level with respect to the possible limit of CPU processing power for each IoT end device. Latency and network usage respect quality of service constraints in cloud-fog placement for this type of monitoring-oriented IoT application.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021ijwmn
This document summarizes the top 20 most cited articles from 2021 in the field of wireless and mobile networks research published in the International Journal of Wireless & Mobile Networks. The first article proposes a wireless sensor network system to monitor air pollution in Mauritius using wireless sensors deployed across the island. The second article discusses using wireless sensor networks to automatically monitor and control greenhouse parameters for precision agriculture. The third article performs a performance comparison of different routing protocols in mobile ad hoc networks.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
This document describes a proposed LoRa-based data acquisition system for monitoring vehicles. Key points:
- The system would use LoRa technology and sensors to monitor various parameters in a vehicle and report the data to users via an IoT dashboard.
- LoRa allows long-range and low-power wireless connectivity for IoT applications. The system aims to leverage these capabilities of LoRa for vehicle monitoring.
- The goals of the data acquisition system are to monitor operations, provide effective communication to identify issues, collect and store diagnostic data, and analyze performance metrics in real-time to ensure reliable operation.
This summary provides the key details from the document in 3 sentences:
The document reviews various MAC protocols developed for wireless body area networks. It discusses the applications and requirements of WBANs, including health monitoring and military uses. The document also analyzes sources of energy wastage in WBANs and classifies common MAC protocols as contention-based, schedule-based, and low power listening protocols.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
This document discusses using autonomous sensor nodes and wireless sensor networks for structural health monitoring of bridges. It aims to detect damage in structures early through continuous monitoring. Sensor nodes containing microcontrollers, temperature, vibration and pressure sensors would be attached to bridges and transmit data wirelessly. This would make inspections more efficient and improve safety by identifying issues early. The document reviews related work using similar wireless sensor network systems for structural monitoring. It discusses the need for such monitoring in India given the increasing construction of large buildings and infrastructure. The objectives are outlined as detecting, locating, identifying and quantifying any damage. Hardware and software components are listed including ESP32 microcontrollers and sensors to measure temperature, vibration and pressure.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
Improving multimedia data transmission quality in wireless multimedia sensor...IJECEIAES
Wireless multimedia sensor networks (WMSNs) are special kinds of wireless sensor networks (WSN) that can send multimedia data such as audio and video streams. Sensors used in WMSNs are smart, tiny, and resource constraint sensor nodes (SNs) distributed in a large area. Typically, multimedia data are large in comparison to other data types. As a result, WMSNs have to deal with high volumes of packet transmission, leading to a high rate of packet loss and network congestion. Network congestion can significantly affect the quality of service and usually lead to high energy consumption. Thus, to improve the quality of service (QoS) and transmission performance, it is necessary to deal with network congestion. In the past, different packet prioritizing methods were proposed to deal with this issue. However, improving QoS usually requires high energy to function correctly. Consequently, using rechargeable sensor nodes to reduce energy consumption is an acute solution. In this research, priority-based data collection is considered to cut down on data distortion and improve the QoS of the multimedia sensor network. Additionally, energy harvesting sensor nodes were used to reduce energy consumption due to the high transmission rate. The simulation result shows a noticeable improvement in the performance of our proposed method in comparison to previous methods.
Wide area protection-research_in_the_smart_gridAlaa Eladl
This document discusses wide-area protection research in the context of the smart grid. It describes how technologies enabled by the smart grid like synchronized phasor measurement, improved communication networks, and standard protocols allow for the development of wide-area protection systems. These systems provide monitoring, control, and backup protection across large geographical areas. The document outlines some key technologies that wide-area protection relies on like wide-area measurement systems and communication networks. It also discusses trends like adaptive protection schemes that utilize system-wide information in real-time and agent-based control architectures.
Similar to Application and Network Layers Design for Wireless Sensor Network to Supervise Chemical Active Product Warehouse (20)
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Application and Network Layers Design for Wireless Sensor Network to Supervise Chemical Active Product Warehouse
1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
DOI : 10.5121/ijcsea.2014.4605 53
APPLICATION AND NETWORK LAYERS DESIGN FOR
WIRELESS SENSOR NETWORK TO SUPERVISE
CHEMICAL ACTIVE PRODUCT WAREHOUSE
Ahmed Zouinkhi, Kais Mekki, Mohamed Naceur Abdelkrim
Research unit of Modeling, Analysis and Control of Systems (MACS)
National Engineering School of Gabes, rue Omar Ibn Elkhattab, 6029 Gabes, Tunisia.
ABSTRACT
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++
simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS
constraints of alert message.
KEYWORDS
Security System, Active Product, Wireless Sensor Networks, Routing protocol, Quality of Service, Castalia
Simulation
1. INTRODUCTION
In recent years, the rapid technological advances in low power and highly integrated digital
electronics, small scale energy supplies, and low power radio technologies have created low cost
and multifunctional intelligent devices. These devices are equipped with small battery, a tiny
microprocessor, a radio transceiver and a set of sensor modules that used to acquire information
of their surrounding environment. These technological advances lead to different new research
field such as Internet of Things [1] and Active Product [2].
The active intelligent product had large expansion on the industry. Through this concept, the
industrial product is not simply a physics entity but it is an active object which is able to
communicate and exchange information with the systems. These capacities were made with the
RFID identification technology (Radio Frequency Identification) [3] and the Wireless Sensors
Networks (WSN). However unlike RFID, WSN allows going beyond the information exchange to
the sensing of ambient environment parameters (e.g. temperature, pressure, humidity…) [4].
2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
54
This concept attracted the interest of several research projects. As example, COBIS project
(Collaborative Business Items) [5,6] has developed a new approach for business processes
involving physical entities such as goods and tools in enterprise. COBIS improved the networked
systems to create cooperative products named particles, used for various applications particularly
for monitoring the industrial products. TecOlab from Karlsruhe University and MIT [7] has
announces the concept of active physical documents for the integrity management of written files
to restrict accesses and keep the track of the document changes. It introduces the DigiClip system
that provides a solution to convert passive paper documents to active physical entities. Moreover,
CHAOS project [8] also employs the intelligent object approach to secure the exchange of
information in distributed systems.
The security of industrial chemical products is an important issue. So, the using of active product
technology may facilitate its supervising process. The security of such product involves the
internal reaction against the ambient values changes (e.g. temperature) and the incompatibility of
chemical substances during the storage and transport phases.
This paper proposes a security system of chemicals products warehouse. Such storage products
may cause critical danger if security rules are not respected. The container of chemical substances
is transformed into a communicating entity (i.e. active product) by embedding a wireless sensor
node. Thus, the container could supervise its internal state and the external changes of its
environment (e.g. temperature, brightness, and humidity). Moreover, the containers could control
the distance between them by periodic message exchange (RSSI method [9]) to prevent the
closeness of the incompatible chemical substance. If there are critical and alert events (e.g. high
temperature, incompatible products are very close), the node is able to make decisions and sends
alert messages to the control center (sink node).
The developed system uses a centralized approach and point-to-point connection for the control
center to communicate with nodes using a specific security application layer of WSN (i.e. the sink
communicates directly with the nodes in the warehouse). However, the supervised nodes use a
multi-hops connection to communicate and send messages to the control center (i.e. the messages
passes from one node to another until it reaches the sink). This last case requires a routing
protocol development in the network layer of sensor nodes. Indeed, the security application layer
generates two classes of message: alert message and routine message (i.e. daily exchanged
message). An alert message should be encapsulated in high priority packet in the network layer
and routed across the WSN toward the sink node. Such packet requires strict constraints on both
delay and loss ratio in order to report the message to the control center within certain time limits
without loss. These performance metrics (delay and loss ratio) are usually referred to as Quality
of Service (QoS) requirements [10]. Thus, enabling high priority packet in the network layer
requires QoS based routing protocol. Many QoS based routing protocols specifically designed for
WSN have been proposed in the literature, for example, SPEED [11], AODV [12], RPAR [13],
THVR [14], RRR [15], EQSR [16], and MARP [17]. For our chemical security system, we had
developed routing strategies for each classe of messages. Disjoint multi-paths routing is proposed
for alert message. However, the routing algorithm employs neighborhood gathering information
and next node selection phase for routine message.
These developed application and network layers have been implemented and simulated using
Castalia/OMNeT++ tools. The security system is then evaluated by studying the message delivery
ratio, end to end delay, and alert detection validation.
The rest of paper is organized as follows. In the next section, the communication topology of the
security system is presented. In section 3, the security rules are detailed. And, section 4 and 5
3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
55
present the application and network layers design, respectively. Then in section 6, the
performance of the proposed solution is analyzed. Finally, section 7 concludes the paper.
2. COMMUNICATION TOPOLOGY OF THE ACTIVE CHEMICAL
PRODUCT SECURITY SYSTEM
2.1. The active chemical product
The concept of active product consists in endowing a product with the capacities of
communicating, informing, acquiring, deciding, and reacting to the changes of its ambient
environment [18,19]. This concept is used in our security system by integrating wireless sensor
node in every chemical container as shown in figure 1. Thus, each container is upgraded with
sensing, computation, interaction, and communication capacities.
Figure 1. Transformation of the chemical container into active product
2.2. The network communication topology
Our active security system adopts a point to point approach for the control center to send message
to the supervised nodes through the sink. The sink is a powerful node with more sophisticated
resources. It has improved processing, storage, energy, and communication power. So, the sink
sends messages directly to the supervised node without multipath connection as shown in figure 2
where S and D are the source node and the destination node of a message, respectively.
Figure 2. Communication topology for the sink
As for the container, it uses resource constrained nodes and much less expensive than the sink.
Such nodes have limited energy resource (battery) which requires low transmission powers to
increase its life time. Thus, it uses short transmission range for message exchange (i.e. wireless
transmission consumes more energy than any other communication activity [20,21]). For this, a
multi-hops connection is used for container nodes to send message to the sink. The messages
passes from one node to another using routing protocol until it reaches the control center as
shown in figure 3.
4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
56
Figure 3. Communication topology for the container
3. SYSTEM SECURITY RULES
The system security rules define the chemical substance state of each supervised container. The
variation of certain ambient environment such as the temperature could lead to critical industrial
accident. Moreover, different chemical substances are stored in the same warehouse and some
substances could be incompatible with others. For this reasons, the following critical chemical
factors are considered:
- The ambient temperature: some chemical substances could lead to dangerous explosion
or flame. So through temperature thresholds (min and max), the internal state of the
container could be supervised.
- The product incompatibility: the distance between containers is supervised to prevent all
possible dangerous reaction of the incompatible chemical substances.
To control these factors, the following security rules are developed: static, dynamics, community,
and global rules.
3.1. Static rules
The container node employs temperature sensor. In order to avoid critical reactions, the static rule
requires that the ambient temperature value didn’t exceed a threshold values (min and max). This
threshold is defined according to the chemical substance characteristics.
So, each sensed temperature value Vsr is characterized by two critical values Vsrmin and Vsrmax
associated with a safety margin ΔVsr. For each node i, the security level Ssr of the static rules is
evaluated as follow:
- G: if the value of the sensor i defines a good state.
- B: if the value announces a bad state.
- D: if the value indicates a dangerous state.
The statics rules Ssr are presented by the equation 1.
(1)
5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
57
3.2. Dynamic rules
The purpose of these rules is to supervise the temporal variation of the static rules. If a bad state
persists for period of time, a dangerous state is announced. Moreover, a counter is implemented to
gather the switch between good and bad states. If the counter exceeds a threshold value nc, a
danger state is announced. The dynamic rules Sdr are presented by the equation 2.
With:
- Tcr: is a critical period of time. It is fixed according to the chemical product that not
overcomes when a bad state is reached.
- nc: is the number of authorized Ssr switch between states G and B.
- Occur(x): is a function initialized to zero and incremented when Ssr switch from state G to
B.
3.3. Community rules
Some products could have incompatibility constraints according to their chemical characteristics.
Such constraint is proportional to the distance between chemical products (container). For
example, the chemical symbols H2SO4 and HF are incompatible and represent a danger if the
distance between them is under a predefined threshold value [19]. The community rules Scr could
lead to one of the three states as described in equations 3, 4, and 5.
With:
- Fcomp(x,y): is a function which studies the compatibility between the chemical symbols of
two products Pi and Pj.
- D(x, y): is the distance between two products Pi and Pj..
- Dmin: is a critical distance (threshold) that must be respected between incompatible
products.
- ∆D: is a distance margin fixed according to the chemical characteristic of the product.
(2)
(3)
(4)
(5)
6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
58
3.4. Global rules
After calculate the state of each rule (static, dynamic, and community), it is necessary to get the
global security state Sgr. Sgr describes the global state of the product as described in equations 6.
Sgr= f (Ssr, Sdr, Scr)
With: α={sr, dr, cr}
4. APPLICATION LAYER PROTOCOL
This section describes the active product behavior. And, it presents the control_center/product
and product/product messages exchange to achieve permanent supervising of the warehouse. The
chemical product is active using the following parts: registration, configuration, internal
surveillance, and alert announcement.
4.1. Registration part
This part is developed to register the new products in the security system. The product announces
them self in the warehouse by sending a discovery message to the control center (the sink node)
as shown in figure 4. To achieve this action, we used two types of messages:
- CTR: it announces the product in the network, it is sent continuously until the sink
responds.
- ACKCTR: acknowledgement of the CTR reception by the sink.
Figure 4. Sequence diagram of the registration part
4.2. Configuration part
Each product communicates and interacts within its neighborhood using the different security
information. The active product gets this information through the configuration part by sending
specific messages to the control center. In fact, the necessary information depends on the initial
state of the product. The product can have a configuration already preinstalled in its memory. It
can contain information about the symbols of the chemical substance, security rules, or both.
According to this configuration, we used three types of messages NCF (No ConFiguration):
(6)
7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
59
- NCF0: if the product has neither the security symbol nor its security rules.
- NCF1: if the product has only the security symbols.
- NCF2: if the product has only the configuration of its security rules.
These previous messages are sent continuously until the sink responds as shown in figure 5. In the
other side, the control center responds with the following messages:
- CMD1: it contains the configuration of the product security symbols.
- CMD3: it contains the configuration of the different security rules.
-
Figure 5. Sequence diagram of the configuration part
4.3. Internal supervising part
Once the product is correctly configured, it becomes able to supervise its internal state and
neighborhood. Any change of its environment or approximation of incompatible neighbor product
must be detected using the safety rules. This supervising process is developed using the following
messages:
- GRE: it is a greeting message periodically exchanged between neighbor products in the
warehouse. It carries the product information (name, security symbols) and its current
security level. It is used also to calculate the distance between two active products.
- RSI: it contains the received signal strength indicator (RSSI). This information is used to
estimate the distance between neighbor products, and calculate the community rules. In
fact, we used an equivalence-based solution between the received RSSI and the real
distance value that separating two products. This equivalence is presented in figure 6.
When the active product receives RSI message, the node calculates the RSSI value. Then,
it determines the equivalent distance and verifies if this distance exceeded the threshold
Dmin.
Figure 6. Distance between products versus RSSI values
8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
60
To achieve the internal supervising of chemical product, we used the following messages as
shown in figure 7:
- CMD2: it is a request of the control center which requires the configuration of an active
product.
- CMD4: it is a request of the control center to get the security rules of an active product.
- CMD5: it is a request of the control center to get specific ambient information of an
active product.
- CFG: it contains the configuration of the product. It is sent after CMD2 reception.
- SER: it contains the product security rules. It is sent after CMD4 reception.
- INA: it carries the ambient sensed values of the product. It is sent after CMD5 reception.
Figure 7. Sequence diagram of the internal supervising part
4.4. Alert announcement part
This part employs an alert message named ALE (ALErt) which announces a dangerous state to the
control center and requires an immediate intervention as shown in figure 8.
- ALE: it announces the security alert to the control center. It contains the measurements
that caused the alert. It is sent when the calculated security rules is considered dangerous
(D) or Bad (B).
- ACKALE: acknowledgement of the ALE reception by the control center.
-
Figure 8. Sequence diagram of the alert announcement part
9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
61
5. NETWORK LAYER PROTOCOL
GRE and RSI are broadcast messages (i.e. neighborhood exchanged messages) which don’t need
routing function toward the sink (control center). However, the product_node/sink
communication needs routing protocol to deliver message and allow communication between
them. In the following, the routing protocol is presented.
5.1. Gradient setup phase
The network layer protocol employs a gradient setup phase to construct the necessary information
for routing path selection: neighborhood table and hop count. This phase is executed periodically
since the control center begins supervising the warehouse. It works as follow: the sink broadcasts
a HELLO packet only to its neighbors using low transmission range (the same transmission range
of the supervised nodes), the HELLO packet contains: the hop count HC (initial value = 0) and
the sender address SA. HC is used to setup the gradient to the sink (i.e. HC is the distance
between a supervised node and the sink), and SA is used to build the neighborhood table of each
node. After broadcasting HELLO by the sink, all its neighbors nodes receive this packet and each
one executes the following steps:
If the node doesn’t have a gradient:
1) Saves SA and HC of the sender node in its neighbors table.
2) Increments HC by 1.
3) Registers HC in its memory.
4) The HC field is then replaced in the HELLO packet with the new one.
5) Broadcasts HELLO to farther nodes (neighbors nodes).
If the node has a gradient:
1) Gets SA and HC of the sender node. If SA doesn’t exist in its neighbors table, SA and
HC information are saved to the table. Else, the corresponding HC is replaced with
the new one.
2) Increments HC by 1.
3) Compares its gradient to HC. If the latter is smaller, the node replaces its gradient
with HC, puts HC in the HELLO packet and broadcasts it. However, if its gradient is
smaller than or equal to the HC, the node discards the packet. As a result, the
gradient will memorize the short path toward the sink.
This process will continue until all the supervised nodes receive the HELLO packet. At that time,
the gradient setup phase will be completed. As result, each node knows its distance HC (number
of hops) to the sink, its entire neighbours and their gradient (neighbors table). Then, the nodes can
starts routing packets to the control center (sink node) through the routing phase.
5.2. Routing phase
Our security application layer has two types of product/control_center exchanged messages: alert
message (ALE) which requires high quality of service (e.g. short delay, low packet loss, fault
tolerance), and routine messages (CTR, NCF, CMD,…). Thus, we had to use different strategy for
the routing of such information. Moreover, in industrial environments, several faults could lead to
failures of nodes in WSN. So, our routing solution has to be fault-tolerant to resist to failed nodes.
The routing protocol of our security system has to take in consideration all this constraint, keeps a
10. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
62
low communication overhead, and reduces the energy consumption as much as possible. In the
following, the different strategies for routing alert message and routine message are presented.
5.2.1. Routing of alert message
For ALE message, the multi-paths routing is chosen to enhance the reliability and the fault
tolerance of our security system. The ALE source node starts multi-paths routing and creates a set
of neighbors that able to forward the message towards the sink. The constructed multi-paths are
node-disjoint (i.e. the multi-paths have no common nodes except the ALE source and the sink).
Node-disjoint are usually preferred in multi-paths routing because they utilize the most available
WSN resources, and hence are the most fault-tolerant [16]. If an intermediate node in a set of
node-disjoint paths fails, only the path containing that node is affected. In the following, our
multi-paths construction is detailed:
- Primary path routing: Through the neighbor table, the source selects the node which has the
lowest gradient HC to the sink as next hop, and sends the ALE packet to this selected node.
Similarly through its neighbor table, the next hop node of the source choose the closest node
as next hop in the direction of the sink and sends out the ALE packet. The operation
continues until sink node receives the packet as shown in figure 9.
- Alternative path routing: For the second alternate path, the source node sends ALE packet to
its next most preferred neighbor (the second closest neighbor to the sink). To avoid having
paths with shared nodes, each node is limited to accept only one ALE packet. For those
nodes that receive more than one ALE packet, only accept the first one and reject the others.
In the example of figure 9, node 9 computes it’s next preferred neighbor and finds it node 7.
Node 9 forwards the packet to node 7, but node 7 has been included in the primary path,
then node 7 simply responds to node 9 with an INUSE packet [16] indicating that node 7 is
already selected in a routing path. Immediately node 9 searches its neighboring table and
selects the next preferred neighbor which will be node 5, and sends out the packet to it.
Node 5 accepts the packet and continues the procedure in the direction of the sink.
-
Figure 9. Node-disjoint paths routing
5.2.2. Routing of routine message
For routine message (CTR, NCF, CMD…), another routing strategy is developed which allows
also a continuous neighbor table updating. The protocol consists of two steps for sending the
message to the sink, first information gathering and then routing.
- Information gathering: When node needs to send routine packet to the sink, it broadcasts a
request to acquire the information from the neighboring nodes in its transmission range. The
11. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
63
nodes that received the request packet send their information to the source, the response
contains the residual energy of the neighboring node. Indeed, this step is used to update the
neighbor table of nodes which are involved in the route toward the sink. The source node
gets the ID of all current neighboring nodes from the received response packets, and
compare between the old neighbor table and the new one. The node from the old table
which is absent in the new one, are removed and the new detected nodes are added to the
table.
- Routing: After the information gathering finishes, the routing starts. The source chooses
from its neighbor table two nodes that have the lowest gradient HC towards the sink as
shown in figure 10(a). Then, the source compare between these two nodes according to the
residual energy, the nodes that had the highest residual energy level will be the next hop as
shown in figure 10(b). If two nodes have the same residual energy level, the nodes that have
a lower HC to the sink will be taken. After that, the source node sends the packet to the
selected node. Upon receiving the packet, the node as next hop repeats the information
gathering and routing steps to transmit the packet to another node as shown in figure 10(c).
The process continues until the packet reaches the sink (control center).
-
Figure 10. Routing of routine packet
6. SIMULATION AND PERFORMANCE EVALUATION
In the following, the performance of the proposed security system is evaluated and discussed. The
simulation settings are firstly detailed. Second, the performance results of the network layer
protocol are presented and discussed. Then, different cases of application layer message exchange
are studied.
6.1. Simulation setup
The security application and network layers were implemented with Castalia/OMNeT++ Tools.
Currently, many wireless sensor network simulators are available as NS2 and SENSE but Castalia
provides realistic wireless channel and radio models, and realistic node behavior especially
relating to access of the radio [22].
The Crossbow’s TelosB sensor node [23] is simulated which is one of the most used nodes in the
industry and research. Table 1 and figure 11 show the characteristic of TelosB node.
12. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
64
Table 1. TelosB node characteristics
Chipcon wireless
transceiver
Data rate 250 kbps
Frequency
bands
2.4 to 2.4835 GHZ
Protocol IEEE 802.15.4/ZigBee
Microprocessor MSP430
Flash 48 Kb
RAM 10 Kb
EEPROM 1 Mb
ADC 12 bit
Serial Com UART
Current
draw
Active 1.8 mA
Sleep 5.1 µA
RF power -24 dBm to 0 dBm
Outdoor Range 75 m to 100 m
Indoor Range 20 m to 30 m
Battery 2 X AA batteries
Size 65 X 31 X 6 mm
Weight 23 Grams
Figure 11. TelosB node
The node positions of the simulated networks (warehouse) are all uniformly distributed within a
300mx300m square (m=meters). All the nodes are stationary and the sink is located at the bottom
of the square as shown in figure 12. IEEE 802.15.4 [24], a contention-based medium access
control, is used as MAC protocol. The wireless radio channel characteristics such as the signal
noise, interference ratio, and average path loss, are chosen to simulate the realistic modeled radio
wireless channel in Castalia based on the lognormal shadowing and the additive interference
models. The parameters used in this simulation study are summarized in table 2.
Table 2. Simulation parameters
Warehouse area 300m X 300m
Nodes distribution Uniform random
Location of Sink (control center) Bottom of the warehouse
MAC layer IEEE 802.15.4
Radio CC2420
Sigma channel parameter 4
Real radio wireless
channel in Castalia
Bidirectional Sigma channel parameter 1
Radio Collision Model
2 (additive interference
model)
Initial energy 18720 J
Simulation time 1000 s
Number of trials 60
13. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
65
Figure 12. Nodes (active products) deployment
6.2. Studying the network layer performances
To study the routing protocol performances, we simulate the network under two state of traffic:
- Not congested traffic: the routine data packet rate is 0.2 pkt/s for each node, while the alert
traffic rate is 1 pkt/s at 2 nodes.
- Congested traffic: the routine data packet rate is 1 pkt/s for each node, while the alert traffic
rate is 5 pkt/s at 4 nodes. The network load becomes higher now as there are more sources
of alert packet with higher rate.
To evaluate the performance of our routing solution, we compared its performance with Random
Re-Routing protocol (RRR) [15,25] which uses also different strategy for routing of alert data and
routine data. High priority packets of unusual events are routed along the preferred path (i.e. the
shortest path), while the routine data packets are randomly shunted to slower and possibly longer
secondary paths. In RRR, the sensor nodes change their routing policy adaptively according to the
current traffic level. When the overall total traffic level is low, the preferred path will be shared
by all packets. However, when the total traffic exceeds a given threshold (3 pkt/s of alert packets),
the preferred path will be reserved for forwarding only the alert packets and secondary paths will
be used for the routine data packets. This mechanism provides significantly better QoS (i.e. low
delay and high packet delivery ratio) to alert data.
In the following, the developed QoS-based routing protocol and RRR are compared in term of:
average end to end delay and the packet loss ratio.
6.2.1. Average end to end delay
End to end delay is an important metric in evaluating the routing protocols [10]. Figures 13, 14,
15, and 16 show the average end to end delay for each protocol and each type of packet for four
levels of network density (200, 400, 600, and 800 nodes).
14. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
66
Before analyzing the performance of our routing solution, we present the result of RRR protocol.
In congested traffic, the alert traffic rate at the intermediate nodes exceeds the threshold of RRR
and then the alert packets are routed along the shortest path whereas the routine data packets are
forwarded via random alternative paths. So as shown in figures 13 and 14, the alert data achieves
lower packet delay than the routine data. Figures 15 and 16 show that the delay made for both
types of data for RRR are close, because this protocol does not differentiate between types of
packets in not congested traffic (similar treatment for both packets).
For our network layer, the developed protocol successfully differentiates routing services as RRR
protocol. It is able to meet the time constraints for alert packets in both congested and not
congested traffic as shown in figures 13 and 15, the alert packet delay is the lowest even with the
increasing of the network density. RRR outperforms our protocol in the case of routing of routine
data packet as presented in figures 14 and 16. Furthermore, the average delay of routine data is
higher when density increases for our protocol because it suffers from a lost time on information
gathering phase. In this phase and for each received routine packet, the protocol broadcasts a
request and waits for responses from all the neighboring nodes to determine the next hop. So,
when the number of neighboring nodes increases, the source node have to wait more time which
causes more queuing and treatment delay for routine data packets despite it always chooses the
paths that have the minimum number of hops to the sink. Despite this, the information gathering
phase is necessary for our network layer to enhance security and fault tolerance.
In conclusion, our network layer performs better than RRR protocol in the end to end delay of
alert packets but not for routine data packets.
6.2.2. Packet Loss Ratio
Another important metric in evaluating routing protocols is the packet loss ratio [10]. Figures 17,
18, 19, and 20 show the packet loss ratio for each protocol and each type of packet for four levels
of network density (200, 400, 600, and 800 nodes).
Figure 13. End to end delay in congested traffic, alert packet Figure 14. End to end delay in congested traffic, routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in congested traffic / routine packet
Figure 15. End to end delay in not congested traffic, alert packet Figure 16. End to end delay in not congested traffic, routine packet
15. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
67
As expected, figures 17 and 19 show that our network layer guarantees a very low packet loss rate
for the ALE message in the two classes of traffic due to multipath routing. Discovering and
maintaining multiple paths between the source and the sink node improves the routing
performance by providing alternative paths. Primary and alternative paths are used
simultaneously for data routing by sending multiple copies of alert packet across each path.
Simultaneous multipath routing improves reliability. As long as, one of the multiple paths does
not fail, the sink node will receive the alert packet.
RRR outperforms our protocol in the case of routine data packet because of the information
gathering phase as delay performance. In not congested traffic, the routine data have an average
packet loss rate as shown in figure 20. Lost packets increase in the case of congested traffic as
shown in figure 18, the analysis of trace files of Castalia simulator showed that the majority of
packets are lost due to:
- Overloading of nodes causing saturation of the queues.
- Interference because we have many transfers, so there is more concurrent access to the
radio channel.
Reasoning according to the density of the network, figures 17 and 19 show that our network layer
was able to maintain a low packet loss rate for alert packets due to multipath routing. For routine
data, the number of lost packets increases because this protocol uses broadcast in the information
gathering phase which causes many interference in case of high density.
In conclusion, our network layer is more efficient than RRR protocol because it ensures a very
low packet loss rate for alert packets in both congested and not congested traffic but not for
routine data packets.
Figure 17. Loss ratio in congested traffic, alert packet
Figure 19. Loss ratio in not congested traffic, alert packet
Figure 18. Loss ratio in congested traffic, routine packet
Figure 20. Loss ratio in not congested traffic, routine packet
16. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
68
6.3. Studying cases of application layer message exchange
6.3.1. Registration and configuration scenarios
Each node should be configured before starting supervising its internal state and environment.
First, node sends the CTR message to the control center and waits to be acquitted. After receiving
the ACKCTR message, it requests the control center to be configured by sending the NCF
message and waits until it receives the CMD1 or the CMD3 messages (it depends on the type of
NCF message NFC0, NFC1, or NFC2). Then, the node is considered as configured and begins
supervising its internal state and its environment.
Figure 21 shows that node1 exchanges message with node0 (the sink) to be configured. Node1
started at 0.050996s when it has received the APP_NODE_STARTUP message of Castalia
simulator, then it is configured at 0.414901s after receiving the NCF2 message from the control
center.
Figure 21. Castalia trace file of registration and configuration scenarios
6.3.2. Supervising scenarios
After registration and configuration, the node is able to supervise and react to possible
environment and internal chemical changes. And, it starts periodically broadcasting the GRE
message within its neighborhood. In the following, the system behavior and messages exchange
in case of alert are presented.
• Supervising scenario of high temperature alert:
Figure 22 shows the simulation scenario when the internal temperature of some nodes exceeds a
threshold called VMax. VMax is fixed to 14 and the node3 is configured in order to exceed this
value.
17. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
69
The sensed temperature Value of node3 is initialized to 7 and then increased by 2 every
APP_SAMPLE_INTERVAL time (i.e. the sampling period time of Castalia simulator). At
41.637175s, Value reaches the threshold VMax, and then node3 sent ALE message to node0 (the
sink). The ALE reception is acquitted by the sink after 0.050915s.
Figure 22. Castalia trace file of high temperature alert scenario
• Scenario of incompatible products alert:
In this section, the simulation scenario of the incompatible chemical products in the warehouse is
studied. For this purpose, node3 and node6 are configured to be incompatible where node3 is
static and node6 is mobile. Three cases may appear:
- Case 1: the distance between the two products is safe as shown in figure 23 (i.e. node3 is
far from node6). In this case, the network does not generate an ALE message.
Figure 23. Safe distance between incompatible products
- Case 2: the distance between the two products is bad as shown in figure 24. Figure 24
shows that product3 (node3) is bound by two circles. The red circle presents its danger
zone, where the blue one presents its bad zone. In this case, the product6 is in the bad
zone (B state) of the product3, so an ALE message will be sent to the control center.
18. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
70
Figure 24. Bad distance between incompatible products
- Case 3: the distance between the two products exceeds the threshold Dmin as shown in figure
25.
Figure 25. Dangerous distance between incompatible products
Product3 and product6 are very close (the red circle is the dangerous zone of the product3), their
distance exceeds the threshold Dmin. Thus, ALE message is sent by node3 to the control center
(node0). The message exchange for this case is presented in figure 26.
Figure 26. Castalia trace file of incompatible distance alert scenario
Upon receiving the GRE message of node3 at 38.853704s, node6 verifies the incompatibility
security level and sends RSI message to node3. Node3 detect danger incompatible state in the
19. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
71
instant t1=38.858001s. Thus, ALE message is sent to node0 (the sink). Node0 received ALE at
38.89755 within a delay of 0.043846s.
7. CONCLUSIONS
In this paper, an application and network layers for wireless sensor networks are developed to
supervise dangerous chemical products warehouse using the concept of active product. Two
critical factors are considered, the ambient temperature of chemical product and their
incompatibility. The distance between the incompatible products is supervised to prevent all
possible dangerous reaction. Four security rules are proposed to monitor these factors: static,
dynamics, community, and global rules. Then, a supervising application layer is developed to
exchange messages between the active product and the control center using different
communications step: registration, configuration, internal surveillance, and alert announcement.
Finally, network layer is developed for routing the different application message. Different
routing strategies are proposed for each message class. Node-disjoint multipath routing is used for
alert message to provide fault-tolerant and high quality of service. And, information gathering-
based routing is used to route the routine messages. Through computer simulation using
Castalia/OMNeT++ tools, the performance of our solution is evaluated and studied. Simulation
results showed that the network layer can achieve short average end to end delay and very low
packet loss rate for alert messages. In addition, the application layer reacted perfectly for critical
event (high temperature, incompatible products very close).
REFERENCES
[1] N. Bari, G. Mani, S. Berkovich, (2013) "Internet of Things as a Methodological Concept", 4th IEEE
International Conference on Computing for Geospatial Research and Application, San Jose CA USA,
pp. 48-55.
[2] C. Seitz, T. Runkler, J. Neidig, (2011) "Autonomous product memories for industrial applications",
9th IEEE International Conference on Industrial Informatics, Caparica Lisbon Portugal, pp. 175-180.
[3] E. Bajic, (2009) “A Service-Based Methodology for RFID-Smart Objects Interactions in Supply
Chain”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 4, No. 3, pp. 37-56.
[4] K. Mekki, W. Derigent, A. Zouinkhi, E. Rondeau, M. N. Abdelkrim, (2013) “Multi-hop Counter
Based Data Dissemination Protocol for Communicating Materials”, 9th IEEE International
Conference on Wireless and Mobile Computing, Networking, and Communications, Lyon France, pp.
45-52.
[5] M. Strohbach, G. Kortuem, and H. Gellersen, (2005) “Cooperative artefacts - A framework for
embedding knowledge in real world objects”, International Workshop on Smart Object Systems,
Tokyo Japan, pp. 91-99.
[6] M. Strohbach, G. Kortuem, H. Gellersen, C. Kray, (2004) “Cooperative artefacts - Assessing real
world situations with embedded technology”, 6th International Conference on Ubiquitous Computing,
Nottingham, pp. 250-267.
[7] C. Decker, M. Beigl, A. Eames, U. Kubach, (2004) “Digiclip : Activating physical documents”, 24th
International Conference on Distributed Computing Systems, Tokyo Japan, pp. 388-393.
[8] D. Liu, K. Law, G. Wiederhold, (2000) “Chaos : An active security mediation system”, International
Conference on Advanced Information Systems Engineering, Stockholm.
[9] M.S. Hossen, M.K.B. Kamal, M.S. Rahman, (2012) "Consistency analysis of RSSI measurement for
distance estimation of Wireless Sensor nodes", 15th International Conference on Computer and
Information Technology, Chittagong Bangladesh, pp. 290-294.
[10] J. Chen, M. Diaz, L. Llopis, B. Rubio, J.M. Troya, (2011) “A survey on quality of service support in
wireless sensor and actor networks: Requirements and challenges in the context of critical
infrastructure protection”, Journal of Network and Computer Applications, Vol. 34, No. 4, pp. 1225-
1239.
20. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, December 2014
72
[11] T. He, J. Stankovic, C. Lu, T. Abdelzaher, (2003) “SPEED: A stateless protocol for real-time
communication in sensor networks", 23rd International Conference on Distributed Computing
Systems, pp. 46-55.
[12] Z. Che-aron, W. Al-Khateeb, F. Anwar, (2010) “An Enhancement of AODV routing protocol for
more robust wireless sensor network”. International Journal of Computer and Network Security, Vol.
2, No. 7, pp. 18-26.
[13] O. Chipara, Z. He, G. Xing, Q. Chen, X. Wang, C. Lu, J. Stankovic, T. Abdelzaher, (2006) “Real-
time power-aware routing in sensor network”, 14th IEEE International Workshop on Quality of
Service, pp. 83-92.
[14] Y. Li, C.S. Chen, Y. Song, Z. Wang, Y. Sun, (2009) “Enhancing Real-Time Delivery in Wireless
Sensor Networks with Two-Hop Information”, IEEE Transactions on Industrial Informatics, Vol. 5,
No. 2, pp. 113-122.
[15] E. Gelenbe, E. Ngai, (2008) “Adaptive QoS Routing for Significant Events in Wireless Sensor
Networks”, 5th IEEE International Conference on Mobile AdHoc and Sensor Systems, pp. 410-415.
[16] J. B. Othman, B. Yahya, (2010) “Energy efficient and QoS based routing protocol for wireless sensor
networks”, Journal of Parallel and Distributed Computing, Vol. 70, No. 8, pp. 849-857.
[17] J. Sen, A. Ukil, (2009) “An Adaptable and QoS-Aware Routing Protocol for Wireless Sensor
Networks”, 1st International Conference on Wireless Communication, Vehicular Technology,
Information Theory and Aerospace & Electronic Systems Technology, Aalborg Denmark, pp. 767-
771.
[18] D. Dobre, E. Bajic, (2007) “Smart object design for active security management of hazardous
products”, 1st International Workshop on Design and Integration Principles for Smart Objects,
Innsbruck Austria.
[19] D. Dobre, E. Bajic, (2008) “Active product modeling for chemical security management based on
smart object concept”, 7th International Conference on Modeling and Simulation, Paris France.
[20] K. Mekki, W. Derigent, A. Zouinkhi, E. Rondeau, M.N. Abdelkrim, (2014) “Data Dissemination
Algorithms for Communicating Materials using Wireless Sensor Networks”, The 2nd IEEE
International Conference on Future Internet of Things and Cloud, Barcelona Spain, pp. 230-237.
[21] A. Nechibvute, A. Chawanda, P. Luhanga, (2012) “Piezoelectric Energy Harvesting Devices: An
Alternative Energy Source for Wireless Sensors”, Journal of Smart Materials Research, pp. 1-13.
[22] B. Musznicki, P. Zwierzykowski, (2012) "Survey of Simulators for Wireless Sensor Networks”,
International Journal of Grid and Distributed Computing, Vol. 5, No. 3, pp. 23-50.
[23] T.R. Sheltami, E.M. Shakshuki, H.T. Mouftah, (2009) "Performance evaluation of TELOSB sensor
network", 7th International Conference on Advances in Mobile Computing and Multimedia, Kuala
Lumpur Malaysia, pp. 584-588.
[24] J.T. Adams, (2006) "An Introduction to IEEE STD 802.15.4", IEEE Aerospace Conference, Big Sky
Montana USA.
[25] L. Hey, E. Gelenbe, (2009) “Adaptive Packet Prioritisation for Wireless Sensor Networks”, 5th Euro-
NGI Conference on Next Generation Internet Networks, Aveiro, pp. 1-7.