scholarly journals Distributed Multi-Scale Calibration of Low-Cost Ozone Sensors in Wireless Sensor Networks

Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2503 ◽  
Author(s):  
Jose M. Barcelo-Ordinas ◽  
Pau Ferrer-Cid ◽  
Jorge Garcia-Vidal ◽  
Anna Ripoll ◽  
Mar Viana

New advances in sensor technologies and communications in wireless sensor networks have favored the introduction of low-cost sensors for monitoring air quality applications. In this article, we present the results of the European project H2020 CAPTOR, where three testbeds with sensors were deployed to capture tropospheric ozone concentrations. One of the biggest challenges was the calibration of the sensors, as the manufacturer provides them without calibrating. Throughout the paper, we show how short-term calibration using multiple linear regression produces good calibrated data, but instead produces biases in the calculated long-term concentrations. To mitigate the bias, we propose a linear correction based on Kriging estimation of the mean and standard deviation of the long-term ozone concentrations, thus correcting the bias presented by the sensors.

Author(s):  
Prasan Kumar Sahoo ◽  
Meng Chun Wueng ◽  
I Shyan Hwang

The K-coverage configuration is widely exploited to guarantee the surveillance quality of applications on wireless sensor networks. To prolong the system lifetime, a sensor node is determined to sleep if its sensing range is already K-covered. Many K-coverage configuration algorithms in literature cannot satisfy the requirements of high quality and low cost simultaneously. In this paper, we propose an efficient K-coverage eligibility algorithm, which determines the eligibility of each sensor node at very low cost. The distinct feature of the ACE algorithm is to discover the regions with lower coverage degree of each sensor node. Experimental results show that the accuracy of the ACE algorithm is guaranteed to be higher than 90%, while its computational cost is only 11% of a well-known deterministic algorithm. The ACE algorithm is suitable to be used for a long-term monitoring task on wireless sensor networks.


Author(s):  
Zeydin Pala

Wireless sensor networks (WSNs) still attract the attention of researchers, users and the private sector despite their low power and low range tendency for malfunction. This attraction towards WSNs results from their low cost structure and the solutions they offer for many prevalent problems. Many conditions, which remain unforeseen or unexpected during the design of the system, may arise after the initialization of the system. Similarly, many situations where security vulnerabilities take place may emerge in time in WSNs operating normally. In this study, we called nodes which enter sleeping mode without any further waking up and causing a sparser number of nodes in the network without any function in data transmission as Long-Term Sleep Nodes (LT-SN); and considered energy spaces caused by such nodes as a problem; and established two Linear Programming (LP) models based on the efficiency of the present nodes. We offered two different models which present the effect of sensor nodes, which were initially operating in wireless sensor network environment and did not wake up following sleep mode, on network lifetime. The results of the present study report that as the number of LT-SN increases, the lifetime of the network decreases.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


Author(s):  
Lina M. Pestana Leão de Brito ◽  
Laura M. Rodríguez Peralta

As with many technologies, defense applications have been a driver for research in sensor networks, which started around 1980 due to two important programs of the Defense Advanced Research Projects Agency (DARPA): the distributed sensor networks (DSN) and the sensor information technology (SensIT) (Chong & Kumar, 2003). However, the development of sensor networks requires advances in several areas: sensing, communication, and computing. The explosive growth of the personal communications market has driven the cost of radio devices down and has increased the quality. At the same time, technological advances in wireless communications and electronic devices (such as low-cost, low-power, small, simple yet efficient wireless communication equipment) have enabled the manufacturing of sensor nodes and, consequently, the development of wireless sensor networks (WSNs).


Sign in / Sign up

Export Citation Format

Share Document