e-Petri Net Model for Programming Integrated Network of Wireless Sensor Networks and Grids

Author(s):  
Adi Mallikarjuna Reddy V ◽  
D. Janakiram
Author(s):  
Hugo Rodriguez ◽  
Ruben Carvajal ◽  
Beatriz Ontiveros ◽  
Ismael Soto ◽  
Rolando Carrasco

2012 ◽  
Vol 2012 ◽  
pp. 1-20 ◽  
Author(s):  
Ali Shareef ◽  
Yifeng Zhu

Energy consumption of energy-constrained nodes in wireless sensor networks (WSNs) is a fatal weakness of these networks. Since these nodes usually operate on batteries, the maximum utility of the network is dependent upon the optimal energy usage of these nodes. However, new emerging optimal energy consumption algorithms, protocols, and system designs require an evaluation platform. This necessitates modeling techniques that can quickly and accurately evaluate their behavior and identify strengths and weakness. We propose Petri nets as this ideal platform. We demonstrate Petri net models of wireless sensor nodes that incorporate the complex interactions between the processing and communication components of an WSN. These models include the use of both an open and closed workload generators. Experimental results and analysis show that the use of Petri nets is more accurate than the use of Markov models and programmed simulations. Furthermore, Petri net models are extremely easier to construct and test than either. This paper demonstrates that Petri net models provide an effective platform for studying emerging energy-saving strategies in WSNs.


2019 ◽  
Vol 8 (4) ◽  
pp. 10124-10128

Wireless Sensor Networks (WSNs) have numerous applications in the field of engineering. These networks have variety of design constraints and energy is most important one. As energy harvesting is not possible in most of the cases, energy conservation is the only option available to the researchers. Energy efficient communication is the key to energy conservation as most of the energy is spent in transfer of data from one node to another. This article is devoted to development of energy efficient communication system design process model based on Petri Net for Wireless Sensor Networks. This model not only facilitates to examine the dynamicity in design process but also evaluates the design process for any deadlock conditions. Based on this model, radiating element array for communication in sensor networks can be designed and developed and therefore can be used to improve the overall energy efficiency of the network.


2013 ◽  
Vol 5 (4) ◽  
pp. 12-24 ◽  
Author(s):  
S. Kumar ◽  
N. Nagarajan

Wireless Sensor Networks (WSN) have appeared as one of the important fields at present due to their low-cost, self-organizing behavior, sensing ability in inconsiderate environments, and their huge application extent. One of the most challenging topics in relay network is security. The existing Network Topology Acquisition (NTA) processes for non transparent mode relay networks are not effective in providing the security features. At the same time, it is critical to provide privacy and validation in order to prevent information from relay networks. In the proposed system, key management is provided for privacy and simultaneously, validation for security measure is offered with relay nodes. Incorporated Network Topological control and Key management (INTK) scheme on the relay network provide the effective routing and security solution. INTK Scheme encompasses the incorporation of security and routing, active security, robust re-keying, low complexity and the multiple intensity of encrypt features in relay networks. Security scheme is designed with consideration of the multi cluster based topology control through a multiple intensity keying. The proposed security scheme has low communication energy due to its multi cluster-key executive. INTK Scheme acquires results on 4.5% improved security level with lesser execution time and communication energy consumption. A variety of numerical parameters are computed using ns2 simulator on existing NTA processes for non transparent mode relay networks and proposed INTK Scheme. INTK is highly realistic because it is intended to incorporate routing layer and security protocol without sacrificing energy.


2017 ◽  
Vol 7 (2) ◽  
pp. 1-7 ◽  
Author(s):  
Khanh Le ◽  
Thanh Cao ◽  
Phuc Le ◽  
Bao Pham ◽  
Thang Bui ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document