scholarly journals Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario

Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5548 ◽  
Author(s):  
Aleksandr Ometov ◽  
Sergey Bezzateev ◽  
Natalia Voloshina ◽  
Pavel Masek ◽  
Mikhail Komarov

Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and improves the scalability. Moreover, we employ an authentication mechanism to ensure the transparent migration of the nodes between different network segments while maintaining a high level of system security. Finally, we report on the real-life deployment results.

2014 ◽  
Vol 998-999 ◽  
pp. 1092-1095
Author(s):  
Qi Sheng Zhao ◽  
Xiao Ming Liu ◽  
Hui Sheng Zhu

The information security of wireless sensor networks is one of hot issues on the current research; this paper combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center, reduces the computing and communication costs, and promotes communication.


Author(s):  
Ryoma Yasutani ◽  
Koki Kitazumi ◽  
Shusuke Narieda ◽  
Takeo Fujii ◽  
Kenta Umebayashi ◽  
...  

2017 ◽  
Vol 13 (08) ◽  
pp. 4
Author(s):  
Yong Jin ◽  
Zhenjiang Qian ◽  
Xiaoshuang Xing ◽  
Lu Shen

ensor nodes vulnerable becomes a major bottleneck restricting the wide application of wireless sensor networks WSNs (Wireless Sensor Networks). In order to satisfy the needs of industrial production and daily living environment monitoring, it is important to improve the survivability of wireless sensor networks in environmental monitoring application. In order to have a reliable environment monitoring system, this paper analyzed the damage types and causes of WSNs and the measurement methods of WSNs survivability. Then, we studied the fault detection method and finally realized the design can improve the survivability of the scheme. The robust guarantee scheme through hardware design and algorithm model, realized the remote wireless communication services and prolonged the network life cycle, so as to improve the survivability of the environmental monitoring system.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Wenting Li ◽  
Bin Li ◽  
Yiming Zhao ◽  
Ping Wang ◽  
Fushan Wei

Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Munsyi Munsyi ◽  
Muhammad Syahid Febriadi ◽  
Nahdi Saubari

Di era Internet of Things (IoT). Siapapun dapat mengakses data dimanapun dan kapanpun. Semua data yang tersimpan dapat diakses dengan menggunakan perangkat seperti smartphone, laptop, dan komputer. Salah satu dari teknologi Internet of Things adalah smart city untuk memonitoring lingkungan. Untuk dapat mengetahui kondisi dan kualitas suatu lingkungan, seseorang tidak perlu lagi menunggu pengumuman informasi atau datang ke instansi terkait di pemerintahan. Pemanfaatan IoT pada monitoring lingkungan dapat di terapkan pada bidang peternakan. Hal ini dapat membantu seseorang dalam mengetahui kualitas dari kondisi lingkungan yang akan dimanfaatkan untuk peternakan. Dalam hal ini adalah bagaimana mengetahui peternakan yang cocok untuk diterapkan dilingkungan yang dia tuju untuk membangun peternakan sapi atau peternakan ayam. Menggunakan perangkat wireless sensor networks (WSN) untuk melakukan pengambilan nilai dari kondisi lingkungan tersebut dapat membantu mengetahui kondisi dan kualitas lingkungan. IoT membantu seseorang untuk membuka usaha dibidang peternakan yang cocok untuk wilayah tersebut tanpa harus melakukan banyak survey yang menelan banyak biaya. Hanya dengan menggunakan teknologi IoT siapapun dapat mendapatkan data kualitas lingkungan yang cocok untuk membuka sebuah peternakan dengan kondisi lingkungan yang sudah diketahui sebelumnya. Kata kunci: Internet of Things, Kondisi Lingkungan, Peternakan, Smart City, WSN. In the Internet of Things era (IoT). Everyone can access the data in anywhere and anytime. All stored data can be accessed using end devices such as smartphones, laptops and computers. One of the IoT technologies is a smart city for monitoring the environment. To be able to know the condition and quality of an environment, everyone does not need to wait for the announcement of information or come to the relevant agencies in the government. Utilization of IoT on Environmental Monitoring can be applied to the field of ranch. in this case it will be used for helping someone in knowing the quality of environmental conditions that will be used for. In this case it is how to find out which ranchs are suitable to be applied in the environment from the user that he want to construct cow or chicken ranch. Using wireless sensor networks (WSN) to retrieve values from these environmental conditions can help determine the condition and quality of the environment. IoT helps someone to open a business in field of ranchs that is suitable for region without having to do many survey. Only by using IoT, anyone can get suitable environmental quality data to open a ranch with environmental conditions that have been known before.Keywords: Environmental conditions, Internet of Things, Ranch, Smart City, WSN. 


Author(s):  
Anshu Kumar Dwivedi ◽  
Awadhesh Kumar Sharma ◽  
Pawan Singh Mehra

Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.


Sign in / Sign up

Export Citation Format

Share Document