scholarly journals Micropower Materials Development for Wireless Sensor Networks

MRS Bulletin ◽  
2008 ◽  
Vol 33 (4) ◽  
pp. 408-409 ◽  
Author(s):  
Dan Steingart ◽  
Shad Roundy ◽  
Paul K. Wright ◽  
James W. Evans

Subcentimeter wireless computers capable of interfacing physically with their environment and communicating with each other have progressed from concept to commercial reality in the past decade. Wireless sensor nodes are an exciting technology, as they provide a backbone to measure almost any quantity in a spatially disperse way, allowing time-synchronized correlations over meters or miles. Before these devices can be deployed to monitor and protect environments (such as grid power distribution systems, buildings, factories, or even the human body) for long periods of time, they need a power source. Environmental generation looks to be a promising method.

2014 ◽  
Vol 2014 ◽  
pp. 1-7
Author(s):  
Mingxin Yang ◽  
Jingsha He ◽  
Yuqiang Zhang

Due to limited resources in wireless sensor nodes, energy efficiency is considered as one of the primary constraints in the design of the topology of wireless sensor networks (WSNs). Since data that are collected by wireless sensor nodes exhibit the characteristics of temporal association, data fusion has also become a very important means of reducing network traffic as well as eliminating data redundancy as far as data transmission is concerned. Another reason for data fusion is that, in many applications, only some of the data that are collected can meet the requirements of the sink node. In this paper, we propose a method to calculate the number of cluster heads or data aggregators during data fusion based on the rate-distortion function. In our discussion, we will first establish an energy consumption model and then describe a method for calculating the number of cluster heads from the point of view of reducing energy consumption. We will also show through theoretical analysis and experimentation that the network topology design based on the rate-distortion function is indeed more energy-efficient.


Author(s):  
Mrutyunjay Rout ◽  
Dr. Harish Kumar Verma ◽  
Subhashree Das

Wireless sensor networks (WSNs) have gained worldwide attention in recent years, particularly with the rapid progress in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. These sensors are small, with limited processing and computing resources, and they are inexpensive compared to traditional sensors. These sensor nodes can sense, measure, and gather information from the environment and, based on some local decision process, they can transmit the sensed data to the user. WSNs are large networks made of a numerous number of sensor nodes with sensing, computation, and wireless communication capabilities. In present work we provide a brief summary of the state-ofthe- art in wireless sensor networks, investigate the feasibility of indoor environment monitoring using crossbow wireless sensor nodes. Here we used nesC programming language and TinyOS operating system for programming Crossbow sensor nodes and LabVIEW GUI is used for displaying different indoor environmental parameters such as temperature, humidity and light acquired from different Wireless sensor nodes. These sensor readings can help building administrators to monitor the physical conditions of the environment in a building for creating optimized energy usage.


2020 ◽  
pp. 1286-1301
Author(s):  
Tata Jagannadha Swamy ◽  
Garimella Rama Murthy

Wireless Sensor Nodes (WSNs) are small in size and have limited energy resources. Recent technological advances have facilitated widespread use of wireless sensor networks in many real world applications. In real life situations WSN has to cover an area or monitor a number of nodes on a plane. Sensor node's coverage range is proportional to their cost, as high cost sensor nodes have higher coverage ranges. The main goal of this paper is to minimize the node placement cost with the help of uniform and non-uniform 2D grid planes. Authors propose a new algorithm for data transformation between strongly connected sensor nodes, based on graph theory.


2003 ◽  
Vol 26 (11) ◽  
pp. 1131-1144 ◽  
Author(s):  
Shad Roundy ◽  
Paul K. Wright ◽  
Jan Rabaey

2013 ◽  
Vol 440 ◽  
pp. 248-253
Author(s):  
P. Shunmuga Perumal ◽  
V. Rhymend Uthariaraj ◽  
V.R. Elgin Christo

Uninterrupted power supply through electrical grid is not possible for many remote areas like dense forest, hill areas, and deserts. The objective of the proposed work is to generate stand alone electricity using steam powered gravity assisted SP system for remote WSN applications. The proposed design drives the generator by triggering gravity force using steam powered cylinders with high thermal efficiency. The proposed SP system is used to recharge the battery systems of UAVs in remote sites thereby the UAVs are further used to recharge the remote wireless sensor nodes using laser beam transmissions.


Author(s):  
ANIL KUMAR SHARMA ◽  
SURENDRA KUMAR PATEL ◽  
GUPTESHWAR GUPTA

Wireless Sensor Networks is an emerging area of research. Wireless Sensor networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that have to be considered when designing or selecting a new operating system in order to evaluate the performance of wireless sensor nodes (motes). In this paper we focused on design issues, challenges and classification of operating systems for WSNs.


In part years wireless sensor networks (WSNs) have shown great improvement and also have become trusted areas in research. A wireless sensor networks (WSNs) is made up of many wireless sensor nodes that provides the source field and sink of a wireless network. The ability to sense the surrounding nodes, computing and connecting to other nodes wirelessly provide the wireless sensor network s(WSNs).the application of WSN is seen in many areas like military application, tracking, monitoring remote environment, surveillance, healthcare department and so on. Because of wide application the challenges for better developed technology and improvement have increased .this paper discuss some of the recent and future trends of Wireless sensor network. [1],[ 3],[5]


2016 ◽  
Vol 26 (1) ◽  
pp. 33-50 ◽  
Author(s):  
Mirjana Maksimovic ◽  
Vladimir Milosevic

Wireless Sensor Networks (WSNs) consist of wireless sensor nodes, where the choice of their deployment scheme depends highly on the type of sensors, their application, and the environment they will operate in. The performance of WSNs can be affected if the network is deployed under different topologies. In this paper various strategies for positioning nodes in WSNs for fire detection (grid, triangular and strip) are discussed. We propose the proper placement of the smoke sensors to satisfy two important network design objectives: to maximize the network lifetime after fire ignition, and to achieve full coverage by using a minimum number of sensors (especially in a deterministic node deployment).


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 5041 ◽  
Author(s):  
Radim Ostadal ◽  
Vashek Matyas ◽  
Petr Svenda ◽  
Lukas Nemec

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.


Sign in / Sign up

Export Citation Format

Share Document