SlideShare a Scribd company logo
1 of 21
DETECTING PROXIMITY
  EVENTS IN SENSOR
     NETWORKS



               By

    Balasuresh A –PR12CS1011
OBJECTIVE

 To show a simulation of Vehicle Tracking in defined path as
well as unknown path in the terrain.

 Our Technique is to handle moving events

 We introduce the concept of Proximity Queries, which allows us
to report interesting events, observed by the nodes in the network
that lie within a certain distance from each other.
INTRODUCTION

 Sensor networks are often used to perform monitoring tasks

 concept of proximity queries - event is triggered when a user-
programmable predicate is satisfied on a sensor node

 everything based on the distributed routing index, and it is
maintained by the nodes in the network
WHAT IS PROXIMITY ?
 The quality or state of being next in time, place etc.;

 Immediate nearness, either in place, alliance.

                          Proximity Sensors

• A Proximity Sensor is a sensor able to detect the presence of
nearby objects without any physical contact.

• Different Proximity Sensors are there:
      Plastic detection – Photoelectric Proximity Sensor.
      Metal detection – Inductive Proximity Sensor.
COMPONENTS OF A
  SENSOR NODE
SENSORS NODES
SCATTERED IN THE
  SENSOR FIELD
TOPOLOGY
TRANSMITTING DATA
UNKNOWN PATH
WHAT ARE THE THINGS
          INCLUDED
 to correlate observations on different sensors - straightforward
implementations based on localized flooding - external processing
algorithms

 local indexing structures – maintaining routing index

 Bandwidth efficient algorithms - detecting proximity - designed
to handle moving event (i.e.) move along predefined or unknown
paths in the terrain.
Random-walk techniques

 Target at k different nodes – this technique will direct until
reaches its one of the k different destination.

spatial-temporal suppression techniques:

 reducing the cost of monitoring queries in sensor networks.

local routing table:

 In order to compute the next hop to route a message is
fundamental in the Border Gateway Protocol (BGP)
PROBLEMS OCCUR AND
      THEIR SOLUTION
(i) Sometimes we may get, like a problem of a situation where a
 lot of messages are wasted when no matching events are in the
 neighborhood.
Solution:
 Ssrc observes an event X, it initiates a search for matching events
 - at the same time the nodes that have observed these matching
 event-
(ii)Locating of events in the Corresponding Sensor Network

Solution:

            rumor-based approach - utilizes agents that upon the detection
of an event traverse the network propagating information about the
event.

             routing indices are maintained locally and are never
transmitted in the network - these indices are updated ‘‘incrementally’’
upon the announcement of an event.
(iii)Identify the neighbor node, to transmit the messages and
communication

Solution:

- GPSR (Greedy Perimeter Stateless Routing)

- allows point-to-point communication

- distant wireless nodes using the positions of the nodes

- packet’s destination to make packet forwarding



 Data-centric techniques
ROUTING INDICES

 2 major operations :

(i) How to update the routing index when the node receives
 information on new events

(ii) Given the routing index, how to determine the next hop list NH
 of the node
ISSUES
1) Track of packets, in between two nodes

2) Sometimes, if the two nodes received the same event, it is
difficult to find the target node by both of them.

3) Synchronize between two nodes indices.

4) Memory requirement for Indices.

5) Packets loss
CONCLUSION


 Our algorithms do not assume any specific sensor topology and
can also be applied to cases of clustered organizations.



 Accident detection – Service details
THANK YOU

More Related Content

What's hot

Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsKarthik Mohan
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...iosrjce
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksijassn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...ijasuc
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 

What's hot (19)

Node localization
Node localizationNode localization
Node localization
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless Sensors
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes fr...
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Ad34186189
Ad34186189Ad34186189
Ad34186189
 
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
 
N0704075079
N0704075079N0704075079
N0704075079
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 

Viewers also liked

Autonomous metal search,collect and collision avoidance robot
Autonomous metal search,collect and collision avoidance robotAutonomous metal search,collect and collision avoidance robot
Autonomous metal search,collect and collision avoidance robotAkhil Unnikrishnan
 
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopy
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopyObstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopy
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopyElijah Barner
 
How to make ir sensor using bread board
How to make ir sensor using bread boardHow to make ir sensor using bread board
How to make ir sensor using bread boardPeeyush Vishwakarma
 
Obstacle Avoidance Robot Summer training Presentation
Obstacle Avoidance Robot Summer training Presentation Obstacle Avoidance Robot Summer training Presentation
Obstacle Avoidance Robot Summer training Presentation Wasi Abbas
 
Obstacle Avoidance Robot
Obstacle Avoidance RobotObstacle Avoidance Robot
Obstacle Avoidance RobotRatan Srikanth
 
Obstacle Avoiding Robot Report Robot23
Obstacle Avoiding Robot Report Robot23Obstacle Avoiding Robot Report Robot23
Obstacle Avoiding Robot Report Robot23Abhijeet kapse
 
Inductive proximity sensor
Inductive proximity sensorInductive proximity sensor
Inductive proximity sensorAkmal Hakim
 
Obstacle Avoidance ROBOT using ARDUINO
Obstacle Avoidance ROBOT using ARDUINOObstacle Avoidance ROBOT using ARDUINO
Obstacle Avoidance ROBOT using ARDUINOjovin Richard
 
Obstacle Detctor Robot report
Obstacle Detctor Robot reportObstacle Detctor Robot report
Obstacle Detctor Robot reportNikita Kaushal
 
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNO
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNOObstacle detection Robot using Ultrasonic Sensor and Arduino UNO
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNOSanjay Kumar
 
Obstacle avoidance robot
Obstacle avoidance robotObstacle avoidance robot
Obstacle avoidance robotRahuldey1991
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Viewers also liked (14)

Microcontoller
MicrocontollerMicrocontoller
Microcontoller
 
Autonomous metal search,collect and collision avoidance robot
Autonomous metal search,collect and collision avoidance robotAutonomous metal search,collect and collision avoidance robot
Autonomous metal search,collect and collision avoidance robot
 
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopy
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopyObstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopy
Obstacle_Avoidance_Robot_Coruse_Project_ECET402_Mechatronics_FinalCopy
 
How to make ir sensor using bread board
How to make ir sensor using bread boardHow to make ir sensor using bread board
How to make ir sensor using bread board
 
Obstacle Avoidance Robot Summer training Presentation
Obstacle Avoidance Robot Summer training Presentation Obstacle Avoidance Robot Summer training Presentation
Obstacle Avoidance Robot Summer training Presentation
 
Obstacle Avoidance Robotic Vehicle
Obstacle Avoidance Robotic VehicleObstacle Avoidance Robotic Vehicle
Obstacle Avoidance Robotic Vehicle
 
Obstacle Avoidance Robot
Obstacle Avoidance RobotObstacle Avoidance Robot
Obstacle Avoidance Robot
 
Obstacle Avoiding Robot Report Robot23
Obstacle Avoiding Robot Report Robot23Obstacle Avoiding Robot Report Robot23
Obstacle Avoiding Robot Report Robot23
 
Inductive proximity sensor
Inductive proximity sensorInductive proximity sensor
Inductive proximity sensor
 
Obstacle Avoidance ROBOT using ARDUINO
Obstacle Avoidance ROBOT using ARDUINOObstacle Avoidance ROBOT using ARDUINO
Obstacle Avoidance ROBOT using ARDUINO
 
Obstacle Detctor Robot report
Obstacle Detctor Robot reportObstacle Detctor Robot report
Obstacle Detctor Robot report
 
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNO
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNOObstacle detection Robot using Ultrasonic Sensor and Arduino UNO
Obstacle detection Robot using Ultrasonic Sensor and Arduino UNO
 
Obstacle avoidance robot
Obstacle avoidance robotObstacle avoidance robot
Obstacle avoidance robot
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Detecting Proximity Events in Sensor Networks

A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
 
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...CSEIJJournal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
NS2 Projects 2014
NS2 Projects 2014 NS2 Projects 2014
NS2 Projects 2014 Senthilvel S
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd Iaetsd
 

Similar to Detecting Proximity Events in Sensor Networks (20)

O026084087
O026084087O026084087
O026084087
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find  malicious node in wireless sensor networkA simple and effective scheme to find  malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
D0952126
D0952126D0952126
D0952126
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
 
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
The Key Metric forEvaluation Localizationin Wireless Sensor Networks via Dist...
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
IJET-V2I6P1
IJET-V2I6P1IJET-V2I6P1
IJET-V2I6P1
 
NS2 Projects 2014
NS2 Projects 2014 NS2 Projects 2014
NS2 Projects 2014
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 

Detecting Proximity Events in Sensor Networks

  • 1. DETECTING PROXIMITY EVENTS IN SENSOR NETWORKS By Balasuresh A –PR12CS1011
  • 2. OBJECTIVE  To show a simulation of Vehicle Tracking in defined path as well as unknown path in the terrain.  Our Technique is to handle moving events  We introduce the concept of Proximity Queries, which allows us to report interesting events, observed by the nodes in the network that lie within a certain distance from each other.
  • 3. INTRODUCTION  Sensor networks are often used to perform monitoring tasks  concept of proximity queries - event is triggered when a user- programmable predicate is satisfied on a sensor node  everything based on the distributed routing index, and it is maintained by the nodes in the network
  • 4. WHAT IS PROXIMITY ?  The quality or state of being next in time, place etc.;  Immediate nearness, either in place, alliance. Proximity Sensors • A Proximity Sensor is a sensor able to detect the presence of nearby objects without any physical contact. • Different Proximity Sensors are there:  Plastic detection – Photoelectric Proximity Sensor.  Metal detection – Inductive Proximity Sensor.
  • 5. COMPONENTS OF A SENSOR NODE
  • 6. SENSORS NODES SCATTERED IN THE SENSOR FIELD
  • 7.
  • 9.
  • 12. WHAT ARE THE THINGS INCLUDED  to correlate observations on different sensors - straightforward implementations based on localized flooding - external processing algorithms  local indexing structures – maintaining routing index  Bandwidth efficient algorithms - detecting proximity - designed to handle moving event (i.e.) move along predefined or unknown paths in the terrain.
  • 13. Random-walk techniques  Target at k different nodes – this technique will direct until reaches its one of the k different destination. spatial-temporal suppression techniques:  reducing the cost of monitoring queries in sensor networks. local routing table:  In order to compute the next hop to route a message is fundamental in the Border Gateway Protocol (BGP)
  • 14. PROBLEMS OCCUR AND THEIR SOLUTION (i) Sometimes we may get, like a problem of a situation where a lot of messages are wasted when no matching events are in the neighborhood. Solution: Ssrc observes an event X, it initiates a search for matching events - at the same time the nodes that have observed these matching event-
  • 15. (ii)Locating of events in the Corresponding Sensor Network Solution: rumor-based approach - utilizes agents that upon the detection of an event traverse the network propagating information about the event. routing indices are maintained locally and are never transmitted in the network - these indices are updated ‘‘incrementally’’ upon the announcement of an event.
  • 16. (iii)Identify the neighbor node, to transmit the messages and communication Solution: - GPSR (Greedy Perimeter Stateless Routing) - allows point-to-point communication - distant wireless nodes using the positions of the nodes - packet’s destination to make packet forwarding  Data-centric techniques
  • 17.
  • 18. ROUTING INDICES  2 major operations : (i) How to update the routing index when the node receives information on new events (ii) Given the routing index, how to determine the next hop list NH of the node
  • 19. ISSUES 1) Track of packets, in between two nodes 2) Sometimes, if the two nodes received the same event, it is difficult to find the target node by both of them. 3) Synchronize between two nodes indices. 4) Memory requirement for Indices. 5) Packets loss
  • 20. CONCLUSION  Our algorithms do not assume any specific sensor topology and can also be applied to cases of clustered organizations.  Accident detection – Service details