432 research outputs found

    Analyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies

    Get PDF
    AbstractClustering techniques in wireless sensor networks enables energy efficient coordination among the densely deployed nodes for data delivery till the base station. Many clustering protocols have been suggested in the recent past. The topology of the nodes, mostly seen in the literature, is of random type. This paper analyzes the performance aspects of various centralized clustering techniques for wireless sensor networks. LEACH-Centralized, KMeans-CP, FCM-CP and HSA-CP protocols have been compared with respect to clustering and data delivery process for various realistic topologies. The simulations were performed for these protocols and performance of the protocols has been critically analyzed. HSA-CP clustering method performs better compared to other techniques for almost each topology examined in the paper

    Occupancy monitoring and prediction in ambient intelligent environment

    Get PDF
    Occupancy monitoring and prediction as an influential factor in the extraction of occupants' behavioural patterns for the realisation of ambient intelligent environments is addressed in this research. The proposed occupancy monitoring technique uses occupancy detection sensors with unobtrusive features to monitor occupancy in the environment. Initially the occupancy detection is conducted for a purely single-occupant environment. Then, it is extended to the multipleoccupant environment and associated problems are investigated. Along with the occupancy monitoring, it is aimed to supply prediction techniques with a suitable occupancy signal as the input which can enhance efforts in developing ambient intelligent environments. By predicting the occupancy pattern of monitored occupants, safety, security, the convenience of occupants, and energy saving can be improved. Elderly care and supporting people with health problems like dementia and Alzheimer disease are amongst the applications of such an environment. In the research, environments are considered in different scenarios based on the complexity of the problem including single-occupant and multiple-occupant scenarios. Using simple sensory devices instead of visual equipment without any impact on privacy and her/his normal daily activity, an occupant is monitored in a living or working environment in the single-occupant scenario. ZigBee wireless communication technology is used to collect signals from sensory devices such as motion detection sensors and door contact sensors. All these technologies together including sensors, wireless communication, and tagging are integrated as a wireless sensory agent

    FUZZY BASED SECURITY ALGORITHM FOR WIRELESS SENSOR NETWORKS IN THE INTERNET OF THINGS PARADIGM

    Get PDF
    Published ThesisThe world is embracing the idea of Internet of Things and Industrial Revolution 4.0. However, this acceptance of computerised evolution is met with a myriad of challenges, where consumers of this technology are also growing ever so anxious about the security of their personal data as well as reliability of data collected by the millions and even billions of sensors surrounding them. Wireless sensor networks are the main baseline technology driving Internet of things; by their very inherent nature, these networks are too vulnerable to attacks and yet the network security tools designed for conventional computer networks are not effective in countering these attacks. Wireless sensors have low computational resources, may be highly mobile and in most cases, these networks do not have a central point which can be marked as an authentication point for the sensors, any node can join or leave whenever they want. This leaves the sensors and the internet of things applications depending on them highly susceptible to attacks, which may compromise consumer information and leave security breaches in situation that need absolute security such as homes or even the cars they drive. There are many possibilities of things that could go wrong when hackers gain control of sensors in a car or a house. There have been many solutions offered to address security of Wireless Sensor Networks; however, most of those solutions are often not customised for African context. Given that most African countries have not kept pace with the development of these underlying technologies, blanket adoption of the solutions developed for consumption in the developed world has not yielded optimal results. The focus of this research was the development of an Intrusion Detection System that works in a hierarchical network structured Wireless Sensor Network, where cluster heads oversee groups of nodes and relay their data packets all the way to the sink node. This is a reactive Intrusion Detection System (IDS) that makes use of a fuzzy logic based algorithm for verification of intrusion detections. This system borrows characteristics of traditional Wireless Sensor Networks in that it is hosted external to the nodes; that is, on a computer or server connected to the sink node. The rational for this is the premise that developing the system in this manner optimises the power and processing resource of nodes because no part of the IDS is found in the nodes and they are left to focus purely on sensing. The Intrusion Detection System makes use of remote Over The Air programming to communicate with compromised nodes, to either shut down or reboot and is designed with the ZigBee protocol in mind. Additionally, this Intrusion Detection System is intended to being part of a larger Internet of Things integration framework being proposed at the Central University of Technology. This framework is aimed at developing an Internet of Things adoption strategy customised for African needs and regionally local consumers. To evaluate the effectiveness of the solution, the rate of false detections being picked out by the security algorithm were reduced through the use of fuzzy logic systems; this resulted in an accuracies of above 90 %. The algorithm is also very light when asymptotic notation is applied, making it ideal for Wireless Sensors. Lastly, we also put forward the Xbee version of the Triple Modular Redundancy architecture, customised for Wireless sensor networks in order to beef-up on the security solution presented in this dissertation

    A Security Algorithm for Wireless Sensor Networks in the Internet of Things Paradigm

    Get PDF
    Conference ProceedingsIn this paper we explore the possibilities of having an algorithm that can protect Zigbee wireless sensor networks from intrusion; this is done from the Internet of Things paradigm. This algorithm is then realised as part of an intrusion detection system for Zigbee sensors used in wireless networks. The paper describes the algorithm used, the programming process, and the architecture of the system developed as well as the results achieved

    Predicting Wireless sensor readings with Neural network

    Get PDF
    Wireless sensor networks are becoming a part of our daily lives, as they act as a bridge between the physical world and the virtual world.One of the problems encountered by this type of networks while trying to fulfill their goals is the rate of energy consumption. The approach considered in this paper was that of an artificial neural network with the aim of reducing the rate of power consumption and thereby increasing the performance and durability of the network. Support vector machines backed artificial neural model was the best of all models picked. It was then compared with a linear regression model to see if there would be any good reasons to migrate to the this new approach. At the end, it was observed that the chosen network performed slightly above the level of the existing model. The implications of the observed results were that another form of prediction model can replace the existing one or alternated with one another in the process of operation of a wireless sensor network.Juhtmevabadest sensorvõrkudest on saamas osa meie igapäevalust. Tegemist on sillaga füüsilise ja virtuaalse maailma vahel. Üheks probleemiks seda laadi võrkude puhul on aga energia tarbimise määr. Käesolevas lõputöös uuriti lähenemist, kus kasutatakse tehisneurovõrke eesmärgiga vähendada energiatarvet ja seeläbi parendada sensorvõrgu efektiivsust ning vastupidavust. Tugivektormasinatega toetatud tehisneuromudel valiti välja kui parim vaatluse all olnud mudel. Seda mudelit võrreldi lineaarse regressiooni mudeliga, et näha kas väljavalitud mudeli puhul leidub mõjuvaid põhjuseid just seda eelistada. Lõpuks selgitati välja, et uuritava mudeli efektiivsus oli veidi kõrgem kui võrreldaval mudelil. Töö tulemustest järeldub, et olemasolevaid ennustusmudeleid võib asendada alternatiivsetega või kasutada neid vaheldumisi juhtmevaba sensorvõrgu töö käigus

    Fuzzy clustering with balance constraint

    Get PDF
    We study equality in fuzzy clustering algorithms where an equality constraint is added to the existing model. Equality is being used in various areas, such as districting (either zonal or political), industries (distribution companies). We focus on wireless sensor networks problem. Existing protocols do not pay too much attention to the cluster head selection step and equality of workload of the clusters. These two issues have significant e ect on the consumption of energy in a network where increasing lifetime of network is critical. A solution approach based on the Lagrangean relaxation is developed. The proposed algorithm is compared with the popular LEACH protocol. Results show that in the same simulated environment, our algorithm works better
    corecore