scholarly journals Wireless Sensor Network for Environmental Monitoring: Application in a Coffee Factory

2011 ◽  
Vol 8 (1) ◽  
pp. 638067 ◽  
Author(s):  
J. Valverde ◽  
V. Rosello ◽  
G. Mujica ◽  
J. Portilla ◽  
A. Uriarte ◽  
...  

Wireless sensor networks have been a big promise during the last few years, but a lack of real applications makes difficult the establishment of this technology. In this paper a real monitoring application in an instant coffee factory is presented. This application belongs to the group of environmental solutions based on wireless sensor networks, and it is focused on the impact of the instant coffee production processes in one of the largest instant coffee factories in Europe. The paper includes the entire application scenario, from the hardware of the WSN nodes to the software that will evaluate the impact and will close the loop.

2013 ◽  
Vol 13 (3/4) ◽  
pp. 209 ◽  
Author(s):  
Manuel Delamo Ramos ◽  
Andrew David Foster ◽  
Santiago Felici Castell ◽  
Vicent Gallart Fos ◽  
Juan José Pérez Solano

2018 ◽  
Vol 7 (2.4) ◽  
pp. 153
Author(s):  
Harkesh Sehrawat ◽  
Yudhvir Singh ◽  
Vikas Siwach

A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.  


Author(s):  
D.P. Mishra ◽  
Ramesh Kumar

Wireless Sensor Network is special type of Ad-hoc network formed with autonomous motes with power and memory constraint. WSN is used in various applications such as healthcare, Environmental monitoring, habitat monitoring military, ecology, home and many more practicable solution for challenging applications of different areas. When wireless sensor networks are deployed in an open, hostile or specific defense environment the security becomes extremely important, since WSN motes are resource constraint there is scope for different types of malicious attacks on them. This paper analyses the security solutions and the security mechanisms that will overcome security issues and attacks and recommends adequate solution for the WSN threats.


2013 ◽  
Vol 9 (7) ◽  
pp. 471917 ◽  
Author(s):  
Ruan Delgado Gomes ◽  
Marcéu Oliveira Adissi ◽  
Abel Cavalcante Lima-Filho ◽  
Marco Aurélio Spohn ◽  
Francisco Antônio Belo

Author(s):  
Ryoma Yasutani ◽  
Koki Kitazumi ◽  
Shusuke Narieda ◽  
Takeo Fujii ◽  
Kenta Umebayashi ◽  
...  

2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2017 ◽  
Vol 13 (08) ◽  
pp. 4
Author(s):  
Yong Jin ◽  
Zhenjiang Qian ◽  
Xiaoshuang Xing ◽  
Lu Shen

ensor nodes vulnerable becomes a major bottleneck restricting the wide application of wireless sensor networks WSNs (Wireless Sensor Networks). In order to satisfy the needs of industrial production and daily living environment monitoring, it is important to improve the survivability of wireless sensor networks in environmental monitoring application. In order to have a reliable environment monitoring system, this paper analyzed the damage types and causes of WSNs and the measurement methods of WSNs survivability. Then, we studied the fault detection method and finally realized the design can improve the survivability of the scheme. The robust guarantee scheme through hardware design and algorithm model, realized the remote wireless communication services and prolonged the network life cycle, so as to improve the survivability of the environmental monitoring system.


2017 ◽  
Vol 13 (07) ◽  
pp. 36
Author(s):  
Yuxia Shen

<p><span style="font-size: medium;"><span style="font-family: 宋体;">In wireless sensor networks, for improving the time synchronization perfromance of online monitoring and application of ZigBee protocol, a scheme is designed. For this objective, first of all, the ZigBee protocol specification is summarized, a profound analysis of the hardware abstraction architecture of TinyOS operating system is made; the advantages of the ZigBee protocol compared with the traditional radio technology are comparatively analyzed. At the same time, the node design block diagram based on CC2430 and related development system is provided. In the TinyOS2.x operating system, we analyze CC2430 application program abstract architecture, and on this basis, give the realization process of program design. The research results showed that we achieve an on-line monitoring system based on ZigBee protocol, which has realistic significance of applying ZigBee protocol in wireless sensor network of electrical equipment online monitoring. Based on the above research, it is concluded that the online monitoring system can collect the temperature parameters of the monitored object in real time that it can be widely applied in wireless sensor networks.</span></span></p>


Sign in / Sign up

Export Citation Format

Share Document