Explore chapters and articles related to this topic
Wireless Sensor Applications for Building Operation and Management
Published in Barney L. Capehart, Lynne C. Capehart, Paul J. Allen, David C. Green, Web Based Energy Information and Control Systems:, 2021
Michael R. Brambley, Michael Kintner-Meyer, Srinivas Katipamula, Patrick J. O’Neill
For wireless local area networks (LANs) higher bandwidth provides higher data rates, a generally desirable feature. Wireless sensor networks, on the contrary, are generally low-data-rate applications sending, for instance, a temperature measurement every 5 minutes. Hence, higher frequencies provide no bandwidth benefit for sensor network applications. In fact, higher frequency signals attenuate more rapidly in passing through media, thus shortening the range of the RF transmission as signals penetrate materials, e.g., in walls and furnishings. [17] To maximize transmission range, a low transmission frequency technology should be selected (see the discussion on signal attenuation in the section Designing and Installing a Wireless System Today: Practical Considerations).
Wireless Sensor Applications for Building Operation and Management
Published in Barney L. Capehart, Timothy Middelkoop, Paul J. Allen, David C. Green, Handbook of Web Based Energy Information and Control Systems, 2020
Michael R. Brambley, Michael Kintner-Meyer, Srinivas Katipamula, Patrick J. O’Neil
There are a large number of wireless technologies on the market today, and “wireless networks” as a technology span applications from cellular phone networks to wireless temperature sensors. In building automation applications where line power is not available, power consumption is of critical importance. For example, battery-powered “peel-and-stick” temperature sensors will only be practical if they and their network use power at a very low rate. In general, a 3- to 5-year battery lifetime is believed to be a reasonable minimum. Although power is generally available in commercial buildings, it is often not conveniently available at the precise location at which a sensor is needed. Thus, for many wireless sensors, some kind of onboard power, such as a battery is necessary to keep the installed cost low. To maximize battery life, communication protocols for wireless sensor networks must minimize energy use.
Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine
Published in Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong, Cyber Defense Mechanisms, 2020
Yerra Shankar Rao, Hemraj Saini, Ranjita Rath, Tarini Charan Panda
Coupled with the progress of the digital era, increasing development of network applications and cloud computing, networks have become an inevitable part of our daily life. Today’s enterprise systems and networks are frequent targets of malicious attacks such as worms, viruses, spyware, and intrusions that can disrupt or even disable critical services. Among the popular networks, the wireless sensor network is the most vulnerable to attacks of malicious codes due to the structural constraint of its sensor nodes and absence of physical security. A wireless network is a group of sensor nodes which sense, compute, and gather information from the physical environment, and transmit the collected data to a central station. A sensor node is a low-power device which comprises an array of sensors, radio unit, processor unit, memory unit, and power unit. Wireless sensor networks are used in military area monitoring, weather monitoring, healthcare monitoring, vehicle tracking, earth sensing, disaster management, and daily life applications.
Fuzzy based hybrid BAT and firefly algorithm for optimal path selection and security in wireless sensor network
Published in Automatika, 2023
P. Dinesh Kumar, K. Valarmathi
Wireless Sensor Network (WSN) is a group of nodes/devices that are connected as a network that can transfer and share the data collected from an environment via intermediate links. In such a scenario, security is the significant factor to be considered for the transmission of data. Security, Computation, Privacy, Reliability, and Energy constraints are the several challenges to be taken into account mainly at the time of routing in WSN [1–5]. Various researchers suggested a clustering algorithm based on Particle Swarm Optimization (PSO) for WSNs with mobile sinks. Many simulations have been undertaken to determine the system's productivity. The results have shown that the system is found to be efficient in terms of network lifetime, energy consumption, and transmission delay. The research reduced the node's energy consumption, improved network lifetime, and reduced transmission delay using hybrid BAT and Firefly algorithms [6–8]. The research work, utilized LEACH along with an enhanced BAT algorithm (BA) to decrease the energy cost of the system in WSN. The performance analysis has shown that the system is more effective than the other state-of-the-art methods in improving the network lifetime and reducing energy consumption. Modified BA has to be employed yet for related problem optimization [9–11].
Blockchain-based Light-weight Authentication Approach for a Multiple Wireless Sensor Network
Published in IETE Journal of Research, 2022
Wireless Sensor Network has various restrictions such as restricted energy supply, poor memory capacity, and poor processing speed. It has become a supporter method to extend the physical range of tracking capabilities. In WSN, a big set of sensors are required to make certain region coverage and improve the reliability of the gathered data. After their employment, nodes are required to remain accessible to all others and form a network. Network communication allows nodes to coordinate their activities during a challenge, and to relay their readings to a Base-Station to act as a gateway to remote command centres [1]. The security benefits of WSNs are frequently centred on cryptography. The utilisation of safeguard benefits in WSN is to ensure the data and assets towards assaults and misconduct. The safeguard requires WSN that incorporate Availability, Authorisation, Authentication, Confidentiality, Integrity, and Non-repudiation [2]. A single of the basic security determinations of IoT systems is the authentication procedure. Along these lines, a node ought to have the option to check that the data got from another node is gathered by the sensor indicated. [3].
An H i/H ∞ optimisation approach to distributed event-triggered fault detection over wireless sensor networks
Published in International Journal of Systems Science, 2021
Maiying Zhong, Ting Xue, Xiaoqiang Zhu, Lu Zhang
A wireless sensor network is usually composed of numerous tiny sensor nodes densely deployed in a prescribed sensing field to cooperatively monitor and measure the signal of interest from the plant or physical phenomenon. These sensor nodes are often connected via some wireless network medium and can communicate with adjacent nodes owing to the onboard wireless radio transceivers and digital processing units. However, such tiny sensor nodes are often powered with small batteries, meaning that they are not capable to persistently measure and broadcast their sensed data packets to their underlying neighbours at each time instant over the network. On the other hand, the wireless communication network sometimes also possesses finite bandwidth. For example, the underwater wireless communication has a restricted bandwidth, thereby permitting relatively low data transmission rate (Ge et al., 2020). A critical question that naturally arises is how to efficiently schedule the data exchanges among these sensor nodes over wireless sensor networks in such a way as to allocate the limited communication and network resources in a reasonable manner. Event-triggered mechanisms have been emerging in this regard and have yet been well developed in the last decade (X. Zhang et al., 2020). Some recent results on event-triggered distributed filtering over wireless sensor networks are referred to Q. Liu et al. (2015), Muehlebach and Trimpe (2018), D. Ding et al. (2019), Ge, Han, and Wang (2019), D. Ding et al. (2020) and the latest survey (Ge et al., 2020).