4,613 research outputs found

    Comparison of CSMA based MAC protocols of wireless sensor networks

    Full text link
    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.Comment: International Journal of AdHoc Network Systems, Volume 2, Number 2, April 201

    Sleep Deprivation Attack Detection in Wireless Sensor Network

    Full text link
    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.Comment: 7 pages,4 figures, IJCA Journal February 201

    Development of a building information modelling (BIM) migration path model for construction professionals

    Get PDF
    The construction professionals have the notion that by implementing Building Information Modelling (BIM) in construction could overcome problems such as delay, cost overrun, clashes in project design and undesirable quality in construction. However, they failed to take the advantages of the BIM benefit as they are still trying to find the best way to take on board the BIM into current practices. Most of the professionals do not know ‘when’ and ‘how’ to apply BIM throughout the construction lifecycle. Several research models related to BIM has been developed to improve and encourage BIM implementation. Nevertheless, the developed models have limitations in highlighting the steps involved that could assist the construction professionals in implementing BIM effectively in Malaysia. Therefore, this research is aimed to develop a model that would be able to assist Malaysian construction professionals in implementing BIM in a structured way. A semi-structured interview was carried out with respondents that have various experienced and currently involved in BIM projects in the Malaysian construction industry. Findings show that the construction professionals are lacking in knowledge and experience in using BIM in various stages of construction. Thus, they were unable to fully capitalise the benefit of 3D models. Migration path model was proposed and evaluated as a strategic approach for BIM implementation in the Malaysian construction industry. The identification of five (5) activities (BIM Awareness, Develop BIM Strategy, Implement BIM, Monitor BIM and Expand BIM Implementation) with the three (3) enablers (BIM work contract, BIM work process and BIM technology) in the model is expected to be able to assist construction professionals to implement BIM with the right BIM concept and later, the benefit could be obtained for improving construction project. The proposed model could be as a guideline for construction professionals in implementing BIM, specifically in countries that new in BIM. The model is also expected to be able to fill the gap in BIM implementation by supporting the initiatives by the Malaysian government for increasing productivity in construction projects by using new technology like BIM
    • …
    corecore