scholarly journals QoI-Aware DODAG Construction in RPL-Based Event Detection Wireless Sensor Networks

2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Hongliang Tian ◽  
Zhihong Qian ◽  
Xue Wang ◽  
Xiao Liang

LLNs are gradually attracting people’s attention for the feature of low energy consumption. RPL is specifically designed for LLNs to construct a high energy efficiency network topology. In the noisy environment, the packet loss rate of RPL-based WSN increases during data transmission. The DODAG constructed by RPL-based WSN increases in depth when communication is affected by noise. In this situation the data transmission in the network will consume more energy. In event detection WSNs, the appropriate network topology enables root to use less sensor data to fuse enough information to determine whether or not an event has occurred. In this paper, we will improve RPL in two ways to optimize topology and reduce energy consumption.(1)The neighbor list and the information of DIO sender’s parent of a node are used to construct a better DODAG in the noisy environment.(2)SPRT and the quality of information of the data are used in the event detecting process for saving energy consumption. Simulation results show that, compared with the original RPL, QoI-aware RPL can reduce the energy consumption by collecting the same quality of information with less data transmission.

2005 ◽  
Vol 291-292 ◽  
pp. 39-44 ◽  
Author(s):  
Berend Denkena ◽  
M. Reichstein ◽  
Niklas Kramer ◽  
J. Jacobsen ◽  
M. Jung

Eco-efficiency of manufacturing processes is increasingly important. Here grinding is supposed to be unfavorable because of the need for coolant and a high energy consumption per removed material volume. Nevertheless, it can be not be substituted by an alternative process due to the superior quality of ground parts. The overall eco-efficiency of grinding can be improved by different approaches. A better understanding of grinding processes and a modified setup of the process chain minimizes the material to be removed by grinding. Design changes of the machine tool can significantly reduce the energy consumption of additional devices as coolant supply units without a loss of flexibility. Adapted process parameters increase eco-efficiency and can also improve cost effectiveness while maintaining part quality.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Naveed Jan ◽  
Sarmadullah Khan ◽  
Ali H. Al-Bayatti ◽  
Madini O. Alassafi ◽  
Ahmed S. Alfakeeh ◽  
...  

Source location privacy (SLP) is a serious issue in wireless sensor networks (WSN) since Eavesdroppers tries to determine the source location. Hunting Animals in Forest is considered as an example for SLP. Many conventional schemes have been proposed for SLP in WSN, namely, Random Walk Routing, and Fake Messages Transmission, which cause critical issues (less safety period, packet delivery latency, and high energy consumption). Furthermore, the security analysis is not properly investigated in any previous work. In this paper, we propose a new model called the circular chessboard-based secure source location privacy model (C2S2-LOOP) with the following tasks: key generation, network topology management (clustering), intercluster routing (travel plan), and data packets encryption. All sensor nodes are deployed in a circular chessboard (Circular Field) and the key generation ( P U K , S E K ) is invoked using elliptic curve cryptography (ECC) with Ant Lion Optimization algorithm, which mitigate the issues of conventional ECC. Then, the network topology is managed using clustering where residual energy of the nodes is used for Cluster Head (CH) selection. Intercluster routing is implemented using packet traversing using clockwise and anticlockwise directions, which are mainly concerned with establishing a secure route between the source to the destination node. To ensure data security, we present the Chaotic Artificial Neural Network (C-ANN) in which encryption is executed. Assume that CH near to the source node has a high trust value, then it traverses (clock-wise) real packets towards sink node and similarly in the left side region (anticlockwise), fake packets are transmitted. Network simulations (OMNeT++) are evaluated and compared with the previous approaches, and finally, our proposed scheme concludes that it maintains not only source node location privacy (large safety period) and also reduces energy consumption by more than 40% and latency by more than 35%.


Energies ◽  
2019 ◽  
Vol 13 (1) ◽  
pp. 168
Author(s):  
Bin Qian ◽  
Tao Yu ◽  
Haiquan Bi ◽  
Bo Lei

In recent years, the energy performance of public buildings has attracted substantial attention due to the significant energy-saving potential. As a semi-open high-space building, the high-speed railway station is obviously different from other public buildings and even traditional stations in terms of energy consumption and internal environment. This paper investigates the current energy consumption situation and environmental quality of 15 high-speed railway passenger stations in China. Results show that the energy consumption of the high-speed railway station is between 117–470 kWh/(m2·a). The energy consumption of the station is related to the area and the passenger flow. The energy use of the station using district heating is higher than that of the station without district heating in the same region. The higher glazing ratio induces good natural lighting in the station, but the uniformity of the lighting in the station is not good. The acceptable temperature range of passengers in winter is larger than that in summer. The average air change rate of the high-speed railway station is 3.2 h−1 in winter and 1.8 h−1 in summer, which is the main reason of high energy consumption of the HVAC (Heating Ventilation Air Conditioning) system in this kind of building.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1771
Author(s):  
Eden Teshome ◽  
Diana Deac ◽  
Steffen Thielemans ◽  
Matthias Carlier ◽  
Kris Steenhaut ◽  
...  

Smart buildings benefit from IEEE 802.15.4e time slotted channel hopping (TSCH) medium access for creating reliable and power aware wireless sensor and actuator networks (WSANs). As in these networks, sensors are supposed to communicate to each other and with actuators, IPv6 multicast forwarding is seen as a valuable means to reduce traffic. A promising approach to multicast, based on the Routing Protocol for Low Power and Lossy Networks (RPL) is Bidirectional Multicast RPL Forwarding (BMRF). This paper aimed to analyze the performance of BMRF over TSCH. The authors investigated how an adequate TSCH scheduler can help to achieve a requested quality of service (QoS). A theoretical model for the delay and energy consumption of BMRF over TSCH is presented. Next, BMRF’s link layer (LL) unicast and LL broadcast forwarding modes were analyzed on restricted and realistic topologies. On topologies with increased interference, BMRF’s LL broadcast on top of TSCH causes high energy consumption, mainly because of the amount of energy needed to run the schedule, but it significantly improves packet delivery ratio and delay compared to ContikiMAC under the same conditions. In most cases, the LL unicast was found to outperform the LL broadcast, but the latter can be beneficial to certain applications, especially those sensitive to delays.


2020 ◽  
pp. 144-157 ◽  
Author(s):  
D.Yu. CHEREVATSKYI

The unity and struggle of opposites in the context of quality of life determines the use of primary energy resources, whether fossil or alternative sources, which is related to the state of the environment. An effective policy for the sustainable development of mankind requires the consumption of large amounts of energy to make life dignified, and the strict limitation of the consumption of energy to protect the environment. Th e purpose of the article is to determine the dependence of the quality of life of the population on the consumption of primary energy resources in national economies. Th e novelty of the research lies in the comparison of the quality of life of the population in national economies with the consumption of primary energy resources; application of the indicator of lost years of healthy life as a measure of the quality of life of the population; introduction of concepts of density of lost years of healthy life and ecological density (the ratio of the national value of Footprint to the energy resources consumption). Research methods. Th e work is based on the use of the Global Disease Burden project methodology; comparative research, mathematical statistics (regression and cluster analysis); mathematical modelling. Th e uneven specific consumption of energy resources in national economies of different types is proved based on cluster analysis results, it is found that industrial countries consume more energy than countries with warm climates, but less than developed countries, high energy consumption reduces the number of lost years of active life, but greatly increases the size of ecological Footprint. Th e phenomenon of peninsulas in quality of life is demonstrated, the density of lost years of healthy life and ecological density in national economies in relation to primary energy consumption is analyzed, the significant non-linearity of dependencies is proved, and it is shown that meeting the requirements of sustainable development is impossible without deteriorating the quality of life of countries with population that consumes a lot of energy, but under the conditions of exponential characteristics of the development deterioration is unlikely to be catastrophic.


2017 ◽  
Vol 13 (12) ◽  
pp. 138 ◽  
Author(s):  
Liang Hu ◽  
Huayi Yin ◽  
Chaoqun Hong

<span style="font-family: 'Times New Roman',serif; font-size: 9pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-size: 11.0pt;">In this paper, considering the high energy consumption, loss of network lifetime and data leak in transmission during the data aggregation of the wireless sensor network, we propose an improved spatial data aggregation algorithm. Through comparison with traditional data aggregation algorithms, we verify the feasibility and rationality of the proposed algorithm and obtain the following conclusions: the proposed algorithm carries out node sensing and data aggregation within a certain area based on multiple dynamic routes. The calculation process does not require encryption and decryption, and is not affected by network topology, so it can better address the data aggregation problems in the dynamic change of network structure. Compared with other traditional data aggregation algorithms, the proposed algorithm has the advantages of low traffic, low energy consumption in data transmission, low probability of data leakage and high transmission accuracy. In data aggregation, 3 slices is the optimal quantity.</span>


2020 ◽  
Vol 12 (18) ◽  
pp. 7606 ◽  
Author(s):  
Artur Głuchowski ◽  
Ewa Czarniecka-Skubina ◽  
Maria Buła

Nowadays, the reduction of food waste, as well as protection of the nutritional value, are significant trends in domestic and catering food processing. Among the trends are innovations in food technology like sous-vide. The aim of this study was to evaluate the effect of sous vide cooking on the technological, nutritional, and microbiological quality of the chicken breast as well as to compare it to conventional methods (boiling and steaming). Meats after low-temperature sous-vide heat treatment were characterized by a significantly higher yield (p ≤ 0.05) and water content than those prepared with conventional methods. The energy and time consumption of sous-vide preparation was 5–10 times higher than other methods. The examined heat treatments resulted in a good microbiological quality of samples. The nutritional value of sous-vide products depended on the process parameters. A higher temperature and sous-vide processing time resulted in a higher content of dry matter, protein, and fat in the meat and was close to that of conventional methods. Low parameters of the process resulted in the least changed profile of fatty acids in meat. The use of the sous-vide method protects the nutritional value and allows for the extension of the shelf life of the meat which ultimately reduces food waste. The sous-vide heat treatment method is more suitable for foodservice than use in home conditions because of high energy consumption, despite the protection of nutrition value.


In the current years, Underwater Mobile Ad hoc Network (UWMANET) has emerged as an enthusiastic field for supporting disaster prevention applications (Climate and Weather Observation, Earthquakes in Ocean (Tsunamis), underwater level navigation and tracking). In UWMANET, conventional data transmission methods have certain drawbacks such as high energy consumption, packet loss rate and end-toend delay. Nowadays, mobile node i.e. Autonomous Underwater Vehicle (AUV) is widely used for data collection from underwater sensors, which act as a relay between sensor node and surface sink. Security is a significant issue in UWMANET, which is required for secure communications. In this paper, Energy Efficient Secure Cluster based Routing Protocol called E2 -SCRP is presented in 3D UWMANET environment. The qu-Vanstone based Elliptic Curve Cryptography (qV-ECC) based short-term public key generation scheme is proposed for sensor node authentication. To reduce energy consumption, layer based clustering algorithm is proposed using Type-2 Fuzzy Logic System (T2fls) where Trust value, Distance between neighbors, Relative mobility and Node buffer size for cluster head (CH) election are considered. Next step is to execute two different security schemes based on Event Management. For event occurred clusters, Ciphertext Stealing Technique (CST) is used to resolve the ciphertext expansion problem. For normal data transmission, Lightweight Digital Watermarking (LDW) with Firefly algorithm is proposed. Optimal route for data transmission is executed by Pigeons Swarm Optimization (PiSO) and the forward to sink node via Adjacent AUV. Experiments conducted using NS3 (3.26) and the performance is evaluated for several metrics include packet delivery ratio, energy consumption, end-to-end delay, security strength, and throughput


Sign in / Sign up

Export Citation Format

Share Document