Ultra Low Power Energy Storage Circuit for Piezoelectric Nanogenerators

Author(s):  
Richard Galos ◽  
Xi Chen ◽  
Yong Shi

MEMS and NEMs devices benefit many applications due to their unique performance and tiny size. We have researched replacing components of a Wireless Sensor Network (WSN) mote with several such devices. In this paper, we present an energy conversion and storage circuit that can be used with piezoelectric nanogenerators for self powered motes. Energy from external vibration or environmental acoustics is capacitively stored and released at certain time intervals according to the application. Stored and lost power is compared against a detailed WSN mote power budget to size the generator and capacitor.

2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Daniel Ayala-Ruiz ◽  
Alejandro Castillo Atoche ◽  
Erica Ruiz-Ibarra ◽  
Edith Osorio de la Rosa ◽  
Javier Vázquez Castillo

Long power wide area networks (LPWAN) systems play an important role in monitoring environmental conditions for smart cities applications. With the development of Internet of Things (IoT), wireless sensor networks (WSN), and energy harvesting devices, ultra-low power sensor nodes (SNs) are able to collect and monitor the information for environmental protection, urban planning, and risk prevention. This paper presents a WSN of self-powered IoT SNs energetically autonomous using Plant Microbial Fuel Cells (PMFCs). An energy harvesting device has been adapted with the PMFC to enable a batteryless operation of the SN providing power supply to the sensor network. The low-power communication feature of the SN network is used to monitor the environmental data with a dynamic power management strategy successfully designed for the PMFC-based LoRa sensor node. Environmental data of ozone (O3) and carbon dioxide (CO2) are monitored in real time through a web application providing IoT cloud services with security and privacy protocols.


2020 ◽  
Vol 309 ◽  
pp. 02006
Author(s):  
Jianbo Yao ◽  
Chaoqiong Yang

It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key cryptography is proposed. The security architecture is based on identity based cryptosystem, but not requires key handshaking. The analysis shows that the security architecture ensures a good level of security and is very much suitable for the resources constrained trend of wireless sensor network.


Nano Energy ◽  
2020 ◽  
Vol 67 ◽  
pp. 104266 ◽  
Author(s):  
Feng Wen ◽  
Hao Wang ◽  
Tianyiyi He ◽  
Qiongfeng Shi ◽  
Zhongda Sun ◽  
...  

Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


Sign in / Sign up

Export Citation Format

Share Document