Mobile Event Monitoring Protocol for Wireless Sensor Networks

Author(s):  
F. Bouhafs ◽  
M. Merabti ◽  
H. Mokhtar
2017 ◽  
Vol 13 (7) ◽  
pp. 155014771771759 ◽  
Author(s):  
Yalin Nie ◽  
Haijun Wang ◽  
Yujie Qin ◽  
Zeyu Sun

When monitoring the environment with wireless sensor networks, the data sensed by the nodes within event backbone regions can adequately represent the events. As a result, identifying event backbone regions is a key issue for wireless sensor networks. With this aim, we propose a distributed and morphological operation-based data collection algorithm. Inspired by the use of morphological erosion and dilation on binary images, the proposed distributed and morphological operation-based data collection algorithm calculates the structuring neighbors of each node based on the structuring element, and it produces an event-monitoring map of structuring neighbors with less cost and then determines whether to erode or not. The remaining nodes that are not eroded become the event backbone nodes and send their sensing data. Moreover, according to the event backbone regions, the sink can approximately recover the complete event regions by the dilation operation. The algorithm analysis and experimental results show that the proposed algorithm can lead to lower overhead, decrease the amount of transmitted data, prolong the network lifetime, and rapidly recover event regions.


2013 ◽  
Vol 756-759 ◽  
pp. 2711-2716
Author(s):  
Lu Lu Liang ◽  
Qi Zou ◽  
Guang Yang ◽  
Lei Shi

Recently, wireless sensor networks (WSNs) have attracted a lot of attention from the network research community, especially in the aspect of event-driven wireless sensor networks (EWSNs), such as adversary locating, fire detection and so on.As the nature of importance of event monitoring, security has to be assured in both of communication and processing. However, due to the inherent resource constraints, security inEWSNs is faceddifferent issues and challenges than traditional WSNs.In this paper, we attempt to give an outline on the security issuesin the EWSNs. And then we propose a new secure architecture for it, which covers potential security issues. In this architecture, we analyze the possible threats and give out the correspondingcountermeasures.


Sign in / Sign up

Export Citation Format

Share Document