scholarly journals Fully Automated and Robust Cable Tension Estimation of Wireless Sensor Networks System

Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7229
Author(s):  
Min Zhang ◽  
Huating He ◽  
Gengying Li ◽  
Haiyang Wang

Accurate estimation of cable tension is crucial for the structural health monitoring of cable-supported structures. Identifying the cable’s force from its vibration data is probably the most widely adopted method of cable tension estimation. According to string theory, the accuracy of estimated cable tension is highly related to identified modal parameters including natural frequencies and frequency order. To alleviate the factors that impact the accuracy of modal parameters when using the peak-picking method in wireless sensor networks, a fully automated and robust identifying method is proposed in this paper. This novel method was implemented on the Xnode wireless sensor system and validated with the data obtained from Jindo Bridge. The experiment results indicate that, through this method, the wireless sensor is able to distinguish the cognizable power spectrum, extract the peaks, eliminate false frequencies and determine frequency orders automatically to estimate cable tension force without any manual intervention or preprocessing. Meanwhile, the results of natural frequencies, corresponding orders and cable tension force obtained from the Xnode system show excellent agreement with the results obtained using the Matlab program method. This demonstrates the effectiveness and reliability of the Xnode estimation system. Furthermore, this method is also appropriate for other high-performance wireless sensor network systems to realize self-identification of cable in long-term monitoring.

Author(s):  
Soojin Cho ◽  
Jerome Peter Lynch ◽  
Chung-Bang Yun

Cable tension force is one of the most important structural parameters to monitor in cable-stayed bridges. For example, cable tension needs to be monitored during construction and maintenance to ensure the bridge is not overloaded. To economically monitor tension forces, this study proposes the use of an automated wireless tension force estimation system (WFTES) developed solely for cable force estimation. The design of the WFTES system can be divided into two parts: low-cost hardware and automated software. The low-cost hardware consists of an integrated platform containing a wireless sensing unit constructed from commercial off-the-shelf components, a low-cost commercial MEMS accelerometer, and a signal conditioning board for signal amplification and filtering. With respect to the automated software, a vibration-based algorithm using estimated modal parameters and information on the cable sag and bending stiffness is embedded into the wireless sensing unit. Since modal parameters are inputs to the algorithm, additional algorithms are necessary to extract modal features from measured cable accelerations. To validate the proposed WFTES, a scaled-down cable model was constructed in the laboratory using steel rope wire. The wire was exposed to broad-band excitations while the WFTES recorded the cable response and embedded algorithms interrogated the measured acceleration to estimate tension force. The results reveal the embedded algorithms properly identify the lower natural frequencies of the cable and make accurate estimates of cable tension. This paper concludes with a summary of the salient research findings and suggestions for future work.


2017 ◽  
Vol 13 (2) ◽  
pp. 155014771668968 ◽  
Author(s):  
Sunyong Kim ◽  
Sun Young Park ◽  
Daehoon Kwon ◽  
Jaehyun Ham ◽  
Young-Bae Ko ◽  
...  

In wireless sensor networks, the accurate estimation of distances between sensor nodes is essential. In addition to the distance information available for immediate neighbors within a sensing range, the distance estimation of two-hop neighbors can be exploited in various wireless sensor network applications such as sensor localization, robust data transfer against hidden terminals, and geographic greedy routing. In this article, we propose a two-hop distance estimation method, which first obtains the region in which the two-hop neighbor nodes possibly exist and then takes the average of the distances to the points in that region. The improvement in the estimation accuracy achieved by the proposed method is analyzed in comparison with a simple summation method that adds two single-hop distances as an estimate of a two-hop distance. Numerical simulation results show that in comparison with other existing distance estimation methods, the proposed method significantly reduces the distance estimation error over a wide range of node densities.


Author(s):  
R. M. Boyarchuk ◽  
◽  
M. S. Pukha ◽  
A. P. Makovsʹkyy ◽  
K. D. Aystrakhanov ◽  
...  

Wireless microsensor networks, which are used to monitor the physical environment, have become an important area of application for wireless technologies. The key attributes of these new types of network systems are strictly limited computing and energy resources, as well as a special working environment. This article examines aspects of the communication security of these networks. Resource constraints and the specific architecture of sensor networks require individual security mechanisms. Our approach is to classify the types of data that exist in sensor networks and identify potential threats to communication security according to this classification. We offer a communication security scheme, where for each data type we define the appropriate security mechanism. Using this multi-tiered security architecture, where each mechanism has different resource requirements, we provide efficient resource management, which is important for wireless sensor networks.


2011 ◽  
Vol 55-57 ◽  
pp. 1305-1309
Author(s):  
Zheng Yao ◽  
Zhao Hua Wang

Energy consumption is a critical problem in operation of wireless sensor networks. For the sake of avoiding the data abundance and balancing the energy consumption in wireless sensor networks, this paper makes a research on network nodes Optimization in wireless sensor network based on ant colony algorithm and WIA-PA protocol stack. The novel design improved on hardware and software to control consumption of the energy and used transition probability of ant colony algorithm from one node to the other to calculate and determine the optimal path of network node in traversal of these locations. The results of the examples show that this method has lower energy consumption, computational briefness and higher positioning accuracy; it can not easily run into the local optimum, and also be applied to other tracking of complex network systems.


2007 ◽  
Vol 3 (4) ◽  
pp. 331-346 ◽  
Author(s):  
Wootae Jeong ◽  
Shimon Y. Nof

Recent wireless microsensor network protocols provide more flexible leverage to the applications with dynamically changing topology, but they should be designed to overcome energy constraints, the bandwidth limit, and system latency. Thus, microsensor network protocols should be effective both in energy and in latency. In addition, they should be evaluated through designated tools at each level of networking characteristics. This paper proposes a new Timeout-based Information Forwarding (TIF) protocol for wireless sensor networks. It uses a relatively simple logic to forward the data packet with multi-hop fashion to reduce the overall network energy consumption. The TIF protocol has been implemented into a network evaluation tool, called TIE/MEMS, and provides a design strategy for distributed wireless sensor network systems needed for various emerging applications. The simulated results show that the TIF protocol has low energy consumption and provides design guidelines between energy consumption and latency according to the number of hops by adjusting weight values in the timeout function.


2017 ◽  
Vol 13 (7) ◽  
pp. 155014771772215 ◽  
Author(s):  
Wooguil Pak

Many researchers have analyzed sources of uncertainty in synchronization protocols for wireless sensor networks. However, very few researchers perform this work in depth, and failed to discover comprehensive characteristics since they worked with only one or two measurement intervals. To overcome this problem, extensive measurements were conducted and analyzed to find the characteristics of the sources according to various measurement intervals. Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. The transmission node in WideMAC calculates the wakeup time of the reception node before transmitting a packet and adaptively estimates the synchronization error size according to the synchronization interval from seconds to hours. To track the reception node’s wakeup time for synchronization, WideMAC uses two estimation algorithms that estimate the wakeup time and the upper bound of the total timing error. Accurate estimation of the wakeup time results in a significant amount of energy saving at the transmission node. Finally, through extensive performance evaluations in a testbed, WideMAC confirmed that it can significantly outperform existing state-of-the-art protocols.


Author(s):  
KHYATI SHRIVASTAV ◽  
ASWATH A.R.

In the wireless sensor networks, the communication links between sensor nodes is important. This paper presents the analysis on the effect of parameters of network size, number of nodes and communication ranges on the number of communication links in the sensor network systems. The MATLAB tool is used for deployment of sensor nodes in various area fields.


2005 ◽  
Vol 1 (2) ◽  
pp. 187-203 ◽  
Author(s):  
S. Olariu ◽  
Q. Xu ◽  
M. Eltoweissy ◽  
A. Wadaa ◽  
A. Y. Zomaya

In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, denial of service attacks (DoS) that compromise or disrupt communications or target nodes serving key roles in the network, e.g. sink nodes, can easily undermine the functionality as well as the performance delivered by the network. Particularly vulnerable are the components of the communications or operation infrastructure. Although, by construction, most sensor network systems do not possess a built-in infrastructure, a virtual infrastructure, that may include a coordinate system, a cluster structure, and designated communication paths, may be established post-deployment in support of network management and operation. Since knowledge of this virtual infrastructure can be instrumental for successfully compromising network security, maintaining the anonymity of the virtual infrastructure is a primary security concern. Somewhat surprisingly, in spite of its importance, the anonymity problem has not been addressed in wireless sensor networks. The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the virtual infrastructure in a class of sensor network systems. Our solution defines schemes for randomizing communications such that the cluster structure, and coordinate system used remain undetectable and invisible to an observer of network traffic during both the setup and operation phases of the network.


Author(s):  
Tran Cong Hung ◽  
Phan Thi The

Today, science and technology is developing, particularly the internet of things (IoT), there is an increasing demand in the sensor field to serve the requirements of individuals within modern life. Wireless sensor networks (WSNs) was created to assist us to modernize our lives, saving labor, avoid dangers, and that bring high efficiency at work. There are many various routing protocols accustomed to increase the ability efficiency and network lifetime. However, network systems with one settled sink frequently endure from a hot spots issue since hubs close sinks take a lot of vitality to forward information amid the transmission method. In this paper, the authors proposed combining the colony optimization algorithm ant colony optimization (ACO) routing algorithm and mobile sink to deal with that drawback and extend the network life. The simulation results on MATLAB show that the proposed protocol has far better performance than studies within the same field.


Author(s):  
Sneh Garg ◽  
Ram Bahadur Patel

With the advancements in technology, wireless sensor networks (WSNs) are used almost in all applications. These sensor network systems are sometimes used to monitor hostile environments where human intervention is not possible. When sensing is required to be done in areas that are hostile, there is need for autonomous/self-managing systems as it is very difficult for the human to intervene within such hostile environmental conditions. Therefore, in such systems, each node is required to do all functionalities and act like autonomous decision taking node that performs both data forwarding and network control. Therefore, introducing a self-management for large-scale distributed wireless system is a highly tedious task due to resource constrained nature of these nodes. It is very difficult to achieve required quality of service by large systems as a huge amount of energy is dissipated by systems in radio communication. Owing to resource constraint as well as vulnerable nature, developing a self-managing system for distributed WSN is a very challenging and demanding task.


Sign in / Sign up

Export Citation Format

Share Document