394 research outputs found

    Multi-channel Distributed MAC protocol for WSN-based wildlife monitoring

    Get PDF
    International audienceSeveral wild animal species are endangered by poaching. As a solution, deploying wireless sensors on animals able to send regular messages and also alert messages has been envisaged recently by several authorities and foundations. In that context, this paper proposes WildMAC, a multichannel, multihop wireless communication protocol for these specific wireless sensor networks that have to collect data from unknown large areas with different QoS requirements. WildMAC is a TDMA based MAC protocol that leverages long range communication properties to propose an efficient data collection mean. Its performance evaluation shows it meets QoS requirements

    Hunting the hunters:Wildlife Monitoring System

    Get PDF

    A Comprehensive Survey on Networking over TV White Spaces

    Full text link
    The 2008 Federal Communication Commission (FCC) ruling in the United States opened up new opportunities for unlicensed operation in the TV white space spectrum. Networking protocols over the TV white spaces promise to subdue the shortcomings of existing short-range multi-hop wireless architectures and protocols by offering more availability, wider bandwidth, and longer-range communication. The TV white space protocols are the enabling technologies for sensing and monitoring, Internet-of-Things (IoT), wireless broadband access, real-time, smart and connected community, and smart utility applications. In this paper, we perform a retrospective review of the protocols that have been built over the last decade and also the new challenges and the directions for future work. To the best of our knowledge, this is the first comprehensive survey to present and compare existing networking protocols over the TV white spaces.Comment: 19 page

    Keberkesanan program simulasi penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan elektrik

    Get PDF
    Kefahaman merupakan aset bagi setiap pelajar. Ini kerana melalui kefahaman pelajar dapat mengaplikasikan konsep yang dipelajari di dalam dan di luar kelas. Kajian ini dijalankan bertujuan menilai keberkesanan program simulasi penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan elektrik FKEE, UTHM dalam mata pelajaran Pemprosesan Isyarat Digital (DSP) bagi topik penapis FIR. Metodologi kajian ini berbentuk kaedah reka bentuk kuasi�eksperimental ujian pra-pasca bagi kumpulan-kumpulan tidak seimbang. Seramai 40 responden kajian telah dipilih dan dibahagi secara rawak kepada dua kllmpulan iaitu kumpulan rawatan yang menggunakan program simulasi penapis FIR dan kumpulan kawalan yang menggunakan kaedah pembelajaran berorientasikan modul pembelajaran DSP UTHM. Setiap responden menduduki dua ujian pencapaian iaitu ujian pra dan ujian pasca yang berbentuk kuiz. Analisis data berbentuk deskriptif dan inferens dilakllkan dengan menggunakan Peri sian Statistical Package for Social Science (SPSS) versi 11.0. Dapatan kajian menunjukkan kedua-dua kumpulan pelajar telah mengalami peningkatan dari segi kefahaman iaitu daripada tahap tidak memuaskan kepada tahap kepujian selepas menggunakan kaedah pembelajaran yang telah ditetapkan bagi kumpulan masing-masing. Walaubagaimanapun, pelajar kumpulan rawatan menunjukkan peningkatan yang lebih tinggi sedikit berbanding pelajar kumpulan kawalan. Namun begitu, dapatan kajian secara ujian statistik menunjukkan tidak terdapat perbezaan yang signifikan dari segi pencapaian markah ujian pasca di antara pelajar kumpulan rawatan dengan pelajar kumpulan kawalan. Sungguhpun begitu, penggunaan program simulasi penapis FIR telah membantu dalam peningkatan kefahaman pelajar mengenai topik penapis FIR

    DESIGN OF MOBILE DATA COLLECTOR BASED CLUSTERING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless Sensor Networks (WSNs) consisting of hundreds or even thousands of nodes, canbe used for a multitude of applications such as warfare intelligence or to monitor the environment. A typical WSN node has a limited and usually an irreplaceable power source and the efficient use of the available power is of utmost importance to ensure maximum lifetime of eachWSNapplication. Each of the nodes needs to transmit and communicate sensed data to an aggregation point for use by higher layer systems. Data and message transmission among nodes collectively consume the largest amount of energy available in WSNs. The network routing protocols ensure that every message reaches thedestination and has a direct impact on the amount of transmissions to deliver messages successfully. To this end, the transmission protocol within the WSNs should be scalable, adaptable and optimized to consume the least possible amount of energy to suite different network architectures and application domains. The inclusion of mobile nodes in the WSNs deployment proves to be detrimental to protocol performance in terms of nodes energy efficiency and reliable message delivery. This thesis which proposes a novel Mobile Data Collector based clustering routing protocol for WSNs is designed that combines cluster based hierarchical architecture and utilizes three-tier multi-hop routing strategy between cluster heads to base station by the help of Mobile Data Collector (MDC) for inter-cluster communication. In addition, a Mobile Data Collector based routing protocol is compared with Low Energy Adaptive Clustering Hierarchy and A Novel Application Specific Network Protocol for Wireless Sensor Networks routing protocol. The protocol is designed with the following in mind: minimize the energy consumption of sensor nodes, resolve communication holes issues, maintain data reliability, finally reach tradeoff between energy efficiency and latency in terms of End-to-End, and channel access delays. Simulation results have shown that the Mobile Data Collector based clustering routing protocol for WSNs could be easily implemented in environmental applications where energy efficiency of sensor nodes, network lifetime and data reliability are major concerns

    Security in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) pose a new challenge to network designers in the area of developing better and secure routing protocols. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design time. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. The security issues posed by sensor networks represent a rich field of research problems. Improving network hardware and software may address many of the issues, but others will require new supporting technologies. With the recent surge in the use of sensor networks, for example, in ubiquitous computing and body sensor networks (BSNs) the need for security mechanisms has a more important role. Recently proposed solutions address but a small subset of current sensor network attacks. Also because of the special battery requirements for such networks, normal cryptographic network solutions are irrelevant. New mechanisms need to be developed to address this type of network

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Full text link
    Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous articles only focused on the Central Authority (CA) since this leads to an increase in the computation cost and energy consumption for the specific cases on the Internet of Things (IoT). Hence, in this article, we will lessen the importance of these third parties through proposing an enhanced authentication mechanism that includes key management and evaluation based on the past interactions to assist the objects joining a secured area without any nearby CA. We refer to a mobility dataset from CRAWDAD collected at the University Politehnica of Bucharest and rebuild into a new random dataset larger than the old one. The new one is an input for a simulated authenticating algorithm to observe the communication cost and resource usage of devices. Our proposal helps the authenticating flexible, being strict with unknown devices into the secured zone. The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish communication costs (our experimental results compare to previous schemes less than 2000 bits) and raise flexibility in resource-constrained environments.Comment: 27 page

    Energy efficient wireless sensor network communications based on computational intelligent data fusion for environmental monitoring

    Get PDF
    The study presents a novel computational intelligence algorithm designed to optimise energy consumption in an environmental monitoring process: specifically, water level measurements in flooded areas. This algorithm aims to obtain a tradeoff between accuracy and power consumption. The implementation constitutes a data aggregation and fusion in itself. A harsh environment can make the direct measurement of flood levels a difficult task. This study proposes a flood level estimation, inferred through the measurement of other common environmental variables. The benefit of this algorithm is tested both with simulations and real experiments conducted in Donñana, a national park in southern Spain where flood level measurements have traditionally been done manually.Junta de Andalucía P07-TIC-0247
    • …
    corecore