To see the other types of publications on this topic, follow the link: Industrial wireless protocols.

Journal articles on the topic 'Industrial wireless protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Industrial wireless protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Li Xin, and Liang Wang. "Industrial Monitoring Wireless Sensor Network Routing Algorithm and Simulation." Advanced Materials Research 457-458 (January 2012): 1149–54. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.1149.

Full text
Abstract:
Aiming at the routing protocol in an industrial monitoring system, this paper analyzes the demand of the industrial monitoring wireless routing protocol, proposes a region adaptive routing protocol, and provides the algorithm, procedure and data structure of the route protocol in the industrial monitoring system. Simulation results show that the result of quantitative description compared energy consumption with time delay, this protocol is superior to orientation spreading, sensor protocols for information via negotiation(SPIN) and passing more energy protocols in both aspects, this algorithm can replace the all existing route protocols in the field of industrial monitoring area.
APA, Harvard, Vancouver, ISO, and other styles
2

Yoo, Seong-eun, and Taehong Kim. "Industrial Wireless Sensor Networks: Protocols and Applications." Sensors 20, no. 20 (October 14, 2020): 5809. http://dx.doi.org/10.3390/s20205809.

Full text
Abstract:
Wireless sensor networks are penetrating our daily lives, and they are starting to be deployed even in an industrial environment. The research on such industrial wireless sensor networks (IWSNs) considers more stringent requirements of robustness, reliability, and timeliness in each network layer. This Special Issue presents the recent research result on industrial wireless sensor networks. Each paper in the special issue has unique contributions in the advancements of industrial wireless sensor network research and we expect each paper to promote the relevant research and the deployment of IWSNs.
APA, Harvard, Vancouver, ISO, and other styles
3

Pandeeswaran, Chelliah, Natrajan Papa, and Sundar G. Jayesh. "EE-Hybrid MAC Protocol for Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 407–11. http://dx.doi.org/10.4028/www.scientific.net/amm.573.407.

Full text
Abstract:
MAC protocol design in Wireless sensor networks becomes vibrant research field for the past several years. In this paper an EE-Hybrid MAC protocol (Energy efficient hybrid Medium Access Control) has been proposed, which is energy efficient and low latency MAC protocol, which uses interrupt method to assign priority for certain wireless sensor nodes assumed to be present in critical loops of industrial process control domain. EE-Hybrid MAC overcomes some of the limitations in the existing approaches. Industrial wireless sensor network require a suitable MAC protocol which offers energy efficiency and capable of handling emergency situations in industrial automation domain. Time critical and mission critical applications demands not only energy efficiency but strict timeliness and reliability. Harsh environmental condition and dynamic network topologies may cause industrial sensor to malfunction, so the developed protocol must adapt to changing topology and harsh environment. Most of the existing MAC protocols have number of limitations for industrial application domain In industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay. The proposed EE-Hybrid MAC protocol is simulated in NS2 environment, from the result it is observed that proposed protocol provides better performance compared to the conventional MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Kristić, Ante, Julije Ožegović, and Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.

Full text
Abstract:
Networks based on IEEE 802.11 standard are one of the main options for deployment in industrial environment. Degradation of throughput in congested networks and short-term unfairness are well-known drawbacks of 802.11 DCF and similar MAC protocols. Those shortcomings represent significant limitation in forecasted growth of wireless usage. This is especially important in industrial wireless networks (IWN) where the scalability of wireless MAC is one of the main requirements. In this paper, a novel self-adapting MAC protocol (SaMAC) is defined and mathematically modeled. SaMAC employs constrained countdown freezing enhanced with shifted window mechanism. As a result, the protocol outperforms 802.11 DCF standard as well as shifted contention window (SCW) and constrained countdown freezing (CPCF) protocols in achieved throughput, fairness, and jitter, while keeping simple implementation. Despite protocol’s simple design, it is shown that its mathematical model is extremely complex. For proposed protocol, the assumption of constant contention loss probability, which is normally used for modeling of MAC schemes, does not hold. In the presented multidimensional Markov chain model, a unique iterative method for determining contention loss probability is developed as well as a method for throughput calculation based on such a chain. Accuracy of the presented model is verified in several network scenarios. Considering the performance of the proposed protocol, authors believe that it could be of benefit to deploy it in heavily loaded wireless networks with timing constraints, such as IWNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zhaowei, Peng Zeng, Linghe Kong, Dong Li, and Xi Jin. "Node-Identification-Based Secure Time Synchronization in Industrial Wireless Sensor Networks." Sensors 18, no. 8 (August 18, 2018): 2718. http://dx.doi.org/10.3390/s18082718.

Full text
Abstract:
Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Tiab, Amal, and Louiza Bouallouche-Medjkoune. "Routing in Industrial Wireless Sensor Networks: A Survey." Chinese Journal of Engineering 2014 (February 12, 2014): 1–7. http://dx.doi.org/10.1155/2014/579874.

Full text
Abstract:
Recently, industrial wireless sensor networks have attracted more attention, due to their large benefits in terms of faster installation, cost savings, and flexibility. Nevertheless, the acceptance of wireless sensor networks by the industrial community is not without its difficulties. In fact, several research efforts have been made in this field and a number of state-of-the-art reviews exist, presenting the current standards, the challenges, and the design principles. However, a comprehensive review on routing protocols appears to be missing. In this paper, we give a survey on routing protocols for industrial monitoring applications of the wireless sensor networks technology, and we present their limitations and weaknesses according to the industrial requirements.
APA, Harvard, Vancouver, ISO, and other styles
7

KANELLOPOULOS, DIMITRIS. "Rethinking Cluster-based Routing in Wireless Sensor Networks." Oriental journal of computer science and technology 12, no. 1 (April 22, 2019): 03–07. http://dx.doi.org/10.13005/ojcst12.01.02.

Full text
Abstract:
A wireless sensor network (WSN) can be employed in many application areas such as traffic control and industrial automation. In WSNs, clustering achieves energy efficiency and scalable performance. A cluster is formed by several sensors nodes, and one of them is elected as cluster-head (CH). A CH collects information from the cluster members and sends aggregated sensed data to the base station (BS) or another CH. The main task of a routing protocol in a WSN is to forward these sensed data to the BS. This paper analyses the advantages of cluster-based routing protocols vs. flat routing protocols in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Zhi Yan, Guang You Yang, Jing Jing Zhou, and Xiong Gan. "Energy-Efficient Routing Protocol of Wireless Sensor Network for Industrial Application." Key Engineering Materials 579-580 (September 2013): 732–39. http://dx.doi.org/10.4028/www.scientific.net/kem.579-580.732.

Full text
Abstract:
An energy-efficient wireless sensor routing protocol (Energy-efficient clustering hierarchy routing protocol, EECH) for industrial field is proposed based on LEACH protocol according to the energy inefficiency of existing routing protocols and the characteristics of industrial field applications. The EECH protocol takes full advantages of the node clustering and time slot distribution in LEACH and implements the functions such as clustering, multi hop time slot distribution, node sleeping and data gathering. The cluster heads can be evenly distributed in the area with the geography location information of the wireless nodes, so that the optimal data gathering path can be established. Meanwhile, the EECH protocol can reduce the conflict in data receiving/transmitting and the energy consumption of the nodes, and extend the network lifetime through the multi hop time slot distribution and node sleep mechanism. The simulation results have shown that the death time of the first node in EECH protocol is extended double time than that of LEACH protocol. When most of the nodes dies, the amount of received data of the base station node is more than twice as much as the LEACH protocol, which has verified the energy efficiency characteristic of the EECH protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Taher, Bahaa Hussein, Huiyu Liu, Firas Abedi, Hongwei Lu, Ali A. Yassin, and Alzahraa J. Mohammed. "A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications." Journal of Sensors 2021 (April 27, 2021): 1–18. http://dx.doi.org/10.1155/2021/8871204.

Full text
Abstract:
With the booming integration of IoT technology in our daily life applications such as smart industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the security and privacy challenges of these systems. Furthermore, time-critical IoT applications in healthcare require access from external parties (users) to their real-time private information via wireless communication devices. Therefore, challenges such as user authentication must be addressed in IoT wireless sensor networks (WSNs). In this paper, we propose a secure and lightweight three-factor (3FA) user authentication protocol based on feature extraction of user biometrics for future IoT WSN applications. The proposed protocol is based on the hash and XOR operations, including (i) a 3-factor authentication (i.e., smart device, biometrics, and user password); (ii) shared session key; (iii) mutual authentication; and (iv) key freshness. We demonstrate the proposed protocol’s security using the widely accepted Burrows–Abadi–Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool, and the informal security analysis that demonstrates its other features. In addition, our simulations prove that the proposed protocol is superior to the existing related authentication protocols, in terms of security and functionality features, along with communication and computation overheads. Moreover, the proposed protocol can be utilized efficiently in most of IoT’s WSN applications, such as wireless healthcare sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Silva, Fernando A. "Industrial Wireless Sensor Networks: Applications, Protocols, and Standards [Book News]." IEEE Industrial Electronics Magazine 8, no. 4 (December 2014): 67–68. http://dx.doi.org/10.1109/mie.2014.2361239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jeong, Wootae, and Shimon Y. Nof. "Performance evaluation of wireless sensor network protocols for industrial applications." Journal of Intelligent Manufacturing 19, no. 3 (January 25, 2008): 335–45. http://dx.doi.org/10.1007/s10845-008-0086-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Brahim, Mohammed Taieb, Houda Abbad, and Sofiane Boukil-Hacene. "A Low Energy MCL-Based Clustering Routing Protocol for Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 10, no. 1 (January 2021): 70–95. http://dx.doi.org/10.4018/ijwnbt.2021010105.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted increasing attention during the two last decades. Indeed, their applications target a wide range of fields such as healthcare, industrial control, environmental monitoring, etc. The main challenge of WSNs is the limitation of resources requiring efficient management of energy consumption. Coverage is also considered as one of the critical indicators of the quality of service (QoS) of WSNs. Therefore, the design of routing protocols should focus on energy efficiency and network coverage. In this paper, the authors propose a novel energy-efficient clustering protocol that is more efficient than some prominent routing protocols and offers better coverage of the network than LEACH. The protocol combines the MCL algorithm for cluster formation and a new cluster head selection strategy based on location and residual energy of sensors. Simulation results demonstrate that the proposed protocol is better than other protocols in terms of energy management and extending the lifetime of the network, whereas, it achieves good coverage than LEACH.
APA, Harvard, Vancouver, ISO, and other styles
13

Mishra, Amitabh, and Dharma P. Agrawal. "Evaluation of Suitability of Current Industrial Standards in Designing Control Applications for Internet of Things Healthcare Sensor Networks." Journal of Sensor and Actuator Networks 8, no. 4 (November 28, 2019): 54. http://dx.doi.org/10.3390/jsan8040054.

Full text
Abstract:
Internet of Things (IoT) holds great promises for industrial, commercial, and consumer applications. While wireless techniques have matured with time and have gained the users’ confidence in relaying data containing qualitative as well as quantitative information, cynicism still exists on trusting them for applications involving control. The wireless protocols and techniques used for industrial control have proved their robustness. In this work we have attempted to test some aspects of feasibility on the use of wireless control involving such protocols for IoT healthcare sensor networks (IoT-HSNs). We conceptualized and simulated a 24-channel IoT-HSN model that includes biosensors as well as bioactuators. Currently, no protocol supporting control in such networks has been standardized. We tried to fit in the widely used WirelessHART (Highway Addressable Remote Transducer) industrial protocol for sensing as well as control in the model to test if it would work for a healthcare sensor network. We probed the performance of the model with respect to network parameters such as channels, bandwidth, Quality of Service (QoS) requirements, payload, transmission delays, and allowable errors. For the parameters considered, the results obtained from the model were encouraging, suggesting that WirelessHART fits the IoT-HSN control requirements according to this initial probe. The findings could provide useful insights for researchers working in the field of control in IoT-HSNs and for designers and manufacturers of IoT-HSN equipment.
APA, Harvard, Vancouver, ISO, and other styles
14

Meng, Fan Gui, Bao Chen Jiang, and Cheng You Wang. "An Improvement of ZigBee Cluster-Tree Routing Protocol." Advanced Materials Research 588-589 (November 2012): 1214–17. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.1214.

Full text
Abstract:
ZigBee is a wireless standard for Wireless Personal Area Networks (WPANs), and it is widely used in industrial, commercial, medical fields where low energy consumption is needed. ZigBee routing protocols should be stable, reliable and low-power. Cluster-Tree routing protocol is a simple and reliable routing protocol used in ZigBee network, and it only takes into account parent-child relationships of nodes, therefore its routing path is single and inefficient. This paper improves Cluster-Tree algorithm by introducing a neighbor table. The improved routing protocol has better performance in less energy consumption and a longer life cycle of entire ZigBee network.
APA, Harvard, Vancouver, ISO, and other styles
15

Suresh, Bhukya, and G. Shyama Chandra Prasad. "A Survey on Enhanced Energy Efficient Routing Protocol of WSN for Internet of Things." Journal of University of Shanghai for Science and Technology 23, no. 07 (August 1, 2021): 1499–508. http://dx.doi.org/10.51201/jusst/21/07326.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are a resource-constrained network class recognized as a major energy consumer. Wireless sensor technologies are used in many commercialized industrial automation processes and other real-world applications. The WSN protocol is well-suited to harsh situations where deployment is difficult or impossible, such as the battlefield, a toxic chemical plant, the cloud, fog computing, and the Internet of Things, but not in a high-temperature network infrastructure environment. WSNs have introduced various Energy-Efficient Routing Protocols based on network (NW) organization and protocols in recent years. Various WSN routing options for energy efficiency are explored in this work. The WSN Energy Efficient Routing Protocol is compared to other routing systems. We also compare and investigate better WSN routing algorithms for cloud computing, fog computing, and the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
16

Ding, Yong. "Study Routing Metrics Based on OPRM for Wireless Sensor Networks." Advanced Materials Research 121-122 (June 2010): 651–56. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.651.

Full text
Abstract:
Wireless sensor network (WSN) consists of tiny nodes with sensing, actuating, computation, wireless communications capabilities. Because of node's limited energy, the energy control Routing metric is becoming an important research topic, this paper firstly makes a summary to the existing routing metrics, accordingly analyzes that it is deficient to design routing protocols for wireless sensor networks based existing routing metric. Secondly, finds the several key characteristics of wireless sensor networks communication link. Finally, the energy control routing metric is proposed in the paper and this routing metric is adopted to improve the traditional directed diffusion routing protocol. Simulation results show that the optimization transmits power can reduce lots of power consumptions, which will meet to industrial requirements.
APA, Harvard, Vancouver, ISO, and other styles
17

Duan, Shi Hong, Ya Dong Wan, and Qin Wang. "Extended Simulation Framework for Industrial Wireless Sensor Networks Reliability Modeling." Applied Mechanics and Materials 241-244 (December 2012): 903–7. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.903.

Full text
Abstract:
Wireless sensor networks (WSNs) are gradually adopted in the industrial world due to their less cost and easy deployment. The contributions of this paper are modeling transmission reliability in typical industrial environment and implementing the model as extended simulation framework for optimizing the hopping scheme. The statics model is realized as Extended Industrial Framework (EIF) based on OMNet++ to support the description of diverse wireless link characteristics in diverse industrial utility. The simulation results show accuracy of EIF with consistent trend as actual measurement and validity to simulate the operation of industrial WSN protocols.
APA, Harvard, Vancouver, ISO, and other styles
18

Sha, Mo, Dolvara Gunatilaka, Chengjie Wu, and Chenyang Lu. "Empirical Study and Enhancements of Industrial Wireless Sensor–Actuator Network Protocols." IEEE Internet of Things Journal 4, no. 3 (June 2017): 696–704. http://dx.doi.org/10.1109/jiot.2017.2653362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

PHUA, VALANCE, and AMITAVA DATTA. "A LINK STATE DEPENDENT TDMA PROTOCOL FOR INDUSTRIAL WIRELESS SENSOR NETWORK APPLICATIONS IN PERIODICALLY CHANGING ENVIRONMENTS." Journal of Interconnection Networks 09, no. 03 (September 2008): 231–54. http://dx.doi.org/10.1142/s0219265908002254.

Full text
Abstract:
Existing TDMA-based MAC protocols for wireless sensor networks are not specifically built to consider communication channels that are prone to fading. We describe the impact of periodically changing environment on small-scale fading effects in industrial indoor wireless networks. Using a site-specific ray tracer, we show that the position of nodes and the periodic movements of objects with constant velocities in the environment have significant impact on signal fading. Finding that fading is approximately periodic, we propose a TDMA-based MAC protocol for wireless sensor networks built for industrial applications that uses link state dependent scheduling. In our approach, nodes gather samples of the channel quality and generate prediction sets from the sample sets in independent slots. Using the prediction sets, nodes only wake up to transmit/receive during scheduled slots that are predicted to be clear and sleep during scheduled slots that may potentially cause a transmitted signal to fade. We simulate our proposed protocol and compare its performance with the well published Z-MAC protocol. We found that our protocol significantly improves packet throughput and energy consumption as compared to Z-MAC. We also found that in conditions which are not perfect under our assumptions, the performance of our protocol degrades gracefully.
APA, Harvard, Vancouver, ISO, and other styles
20

Kumar, Dinesh, and Dr. S. Smys. "An Efficient Packet Delivery Scheme Using Trust Routing in G.9959 Protocol in a Wireless Sensor Network." Journal of Ubiquitous Computing and Communication Technologies 2, no. 3 (July 21, 2020): 118–25. http://dx.doi.org/10.36548/jucct.2020.3.001.

Full text
Abstract:
Wireless Sensor Network (WSN) has drawn high attention in the recent years both in the industrial and the research frontier. It integrates multiple application-based services in areas like disaster management, military usage, smart city, habitat monitoring, healthcare etc. It uses the term Internet of Things (IoT) when providing different services and applications. Similarly, when this network associates with industrial revolution, it is commonly addressed as the Industrial Internet of Things (IIoT). Using IPv6, it gives high scalability using the strength of Internet users. Hence it is crucial to ensure efficiency of the protocols and working modules. This will determine the battery lifetime when it is deployed, connected to the battery’s draining short-term. Based on this consideration, many protocols are tested using IIoT in WSN. For this paper we have chosen G.9959 as the protocol and a comparison is drawn with the IPv6 packet delivery rate. Experimental results indicate that the proposed work performs more efficiently when compared to other previous schemes.
APA, Harvard, Vancouver, ISO, and other styles
21

Khan, Muhammad Kamran, Muhammad Shiraz, Kayhan Zrar Ghafoor, Suleman Khan, Ali Safaa Sadiq, and Ghufran Ahmed. "EE-MRP: Energy-Efficient Multistage Routing Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/6839671.

Full text
Abstract:
Wireless sensor networks (WSNs) have captivated substantial attention from both industrial and academic research in the last few years. The major factor behind the research efforts in that field is their vast range of applications which include surveillance systems, military operations, health care, environment event monitoring, and human safety. However, sensor nodes are low potential and energy constrained devices; therefore, energy-efficient routing protocol is the foremost concern. In this paper, an energy-efficient routing protocol for wireless sensor networks is proposed. Our protocol consists of a routing algorithm for the transmission of data, cluster head selection algorithm, and a scheme for the formation of clusters. On the basis of energy analysis of the existing routing protocols, a multistage data transmission mechanism is proposed. An efficient cluster head selection algorithm is adopted and unnecessary frequency of reclustering is exterminated. Static clustering is used for efficient selection of cluster heads. The performance and energy efficiency of our proposed routing protocol are assessed by the comparison of the existing routing protocols on a simulation platform. On the basis of simulation results, it is observed that our proposed routing protocol (EE-MRP) has performed well in terms of overall network lifetime, throughput, and energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
22

Ehrlich, Marco, Arne Neumann, Alexander Biendarra, and Jürgen Jasperneite. "Quality-of-Service monitoring of hybrid industrial communication networks." at - Automatisierungstechnik 67, no. 1 (January 28, 2019): 69–78. http://dx.doi.org/10.1515/auto-2018-0057.

Full text
Abstract:
Abstract Today many hybrid (wired & wireless) industrial communication networks with a huge variety of heterogeneous technologies and protocols are present in the manufacturing and automation domain. The increasing requirements regarding e. g., latency, reliability, or determinism create the need for a holistic network management concept in order to assure a network-wide Quality-of-Service (QoS) resource provisioning and the assurance of the admissioned resources. Consequently, a monitoring of the whole network is required to feed the network management system with the needed information about the underlying network processes. Various technical approaches using different methods of extracting the information from network traffic are available for the purpose of QoS parameter observance and measurement at the moment. Therefore, this paper provides a state of the art research about network management and QoS provisioning respectively QoS assurance concepts. In addition, the passive network monitoring approach using the flow export technique based on the Internet Protocol Flow Information Export (IPFIX) is investigated for a utilisation in the nowadays industry domain based on a conceptual case study with a wireless protocol. As a conclusion, an evaluation is performed in order to clarify the limits and the overall usability of IPFIX for the monitoring of industrial networks in order to support future network management systems.
APA, Harvard, Vancouver, ISO, and other styles
23

Peserico, Giovanni, Alberto Morato, Federico Tramarin, and Stefano Vitturi. "Functional Safety Networks and Protocols in the Industrial Internet of Things Era." Sensors 21, no. 18 (September 10, 2021): 6073. http://dx.doi.org/10.3390/s21186073.

Full text
Abstract:
Functional safety networks are becoming of paramount importance in industrial systems, due to the progressive innovation introduced by the Industry 4.0 paradigm, characterized by high production flexibility, reliability and scalability. In this context, new and challenging applications have emerged such as hyperautomation, which refers to the combination of machine vision, robotics, communication, and learning, with the explicit involvement of humans. This requires the pervasive and ubiquitous connectivity encompassed by the Industrial Internet of Things, typically achieved via wireless systems. As an example, wireless communications are today fundamental to open up to new categories of autonomous devices that can actively collaborate with human personnel in the production process. This challenging scenario has important implications for safety. Indeed, a reliable coordination among sensors, actuators and computing systems is required to provide satisfactory levels of safety, especially in the case of innovative processes and technologies, such as mobile and collaborative robotics. Hence, it becomes imperative to ensure the correct transfer of safety-critical data via communication networks. In this paper, we address the challenges concerned with functional safety networks and protocols in Industrial Internet of Things ecosystems. We first introduce the design characteristics of functional safety networks and discuss the adoption of safety protocols over wireless networks. Then, we specifically address one of such protocols, namely Fail Safety over EtherCAT (FSoE), and provide the results of an extensive experimental session carried out exploiting a prototype system, implemented using commercial devices based on a WiFi network. Finally, the outcomes of the experiments are used as a basis for a discussion about future trends of functional safety in the Industrial Internet of Things era.
APA, Harvard, Vancouver, ISO, and other styles
24

Abrishambaf, Reza, Suha N. Bayindir, and Majid Hashemipour. "Energy analysis of routing protocols in wireless sensor networks for industrial applications." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 226, no. 5 (November 9, 2011): 678–84. http://dx.doi.org/10.1177/0959651811426822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (May 17, 2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.

Full text
Abstract:
A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.
APA, Harvard, Vancouver, ISO, and other styles
26

Mahboub, Aziz, El Mokhtar En-Naimi, Mounir Arioua, Hamid Barkouk, Younes El Assari, and Ahmed El Oualkadi. "An energy-efficient clustering protocol using fuzzy logic and network segmentation for heterogeneous WSN." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4192. http://dx.doi.org/10.11591/ijece.v9i5.pp4192-4203.

Full text
Abstract:
Wireless sensor networks have become an emerging research area due to their importance in the present industrial application. The enlargement of network lifetime is the major limitation in WSN. Several routing protocols study the extension of lifespan in WSN. Routing protocols significantly influence on the global of energy consumption for sensors in WSN. It is essential to correct the energy efficiency performance of routing protocol in order to improve the lifetime. The protocols based on clustering are the most routing protocols in WSN to reduce energy consumption. The protocols dedicate to WSN have demonstrated their limitation in expanding the lifetime of the network. In this paper, we present Hybrid SEP protocol : Multi-zonal Fuzzy logic heterogeneous Clustering based on Stable Election Protocol (FMZ-SEP). The FMZ-SEP characterizes by four parameters: WSN segmentation (splitting the WSN into the triangle zones ), the Subtractive Clustering Method to determine a correct number of clusters, the FCM and the SEP protocol. The FMZ-SEP prolong the stability period and extend the lifetime. The simulation results point out that the stability period of FMZ-SEP. FMZ-SEP protocol outperforms of MZ-SEP, FSEP and SEP protocol by improving the network lifetime and the stability period.
APA, Harvard, Vancouver, ISO, and other styles
27

Chupaev, A. V., R. S. Zaripova, R. R. Galyamov, and A. Y. Sharifullina. "The use of industrial wireless networks based on standard ISA-100.11a and protocol WirelessHART in process control." E3S Web of Conferences 124 (2019): 03013. http://dx.doi.org/10.1051/e3sconf/201912403013.

Full text
Abstract:
This article considers wireless technologies in the field of automation of technological processes and production in the energy, chemical, petrochemical and oil refining, gas, railway, mining, metallurgical and other industries where the use of wireless industrial devices is necessary due to specific features. Wireless technologies provide the ability to connect measuring devices directly to the wireless network with further transfer of information through a wireless gateway to an automated control system. This article will discuss the types of wireless networks that are classified according to the possible range of action (Wireless Wide area network, Wireless Local Area Network, Wireless Personal Area Network). The most common standards of organization of wireless industrial networks, including IEEE 802.11 b/g/n, IEEE 802.15.1, IEEE 802.15.4, IEEE 802.16 e, will also be considered, including in the field of management of chemical-technological processes and productions. Data transmission protocols ISA-100.11.a and WirelessHART and a number of their features will be analyzed. The basic standard network structures based on the ISA-100.11.a and WirelessHART protocols, their typical components, will be considered. The article provides an analytical comparison of the ISA100.11a and WirelessHART over the OSI network model layers, including the physical layer, the link layer, the network layer, the transport layer, the session layer, the presentation layer and the application layer (process control, management, security, application sublayer). The main stages of calculation of wireless industrial network are given, in particular: calculation of the network information load, calculation of the network’s energy parameters, frequency-territorial planning, development of the communication scheme and interface with external networks. The formulas for calculating the network information load using Nazarov’s methodology, calculating the network’s energy parameters, taking into account the overall losses in the propagation of radio waves, including losses in free space, losses in partitions and walls inside the building, losses due to interference and signal fading are given.
APA, Harvard, Vancouver, ISO, and other styles
28

Martin, K. M., and B. Seetha Ramanjaneyulu. "Priority Based Centralized Scheduling for Time Slotted Channel Hopping Based Multihop IEEE 802.15.4 Networks." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 363–72. http://dx.doi.org/10.1166/jctn.2020.8676.

Full text
Abstract:
To meet the growing demands of low power and determinism in Industrial Wireless applications, IEEE defined IEEE 802.15.4e amendment that includes many channel access methods. Time Slotted Channel Hopping protocol is one of the most popular MAC protocols under IEEE 802.15.4e. However, scheduling of time slots for time slotted channel hopping, was not part of the protocol and so different scheduling algorithms were proposed by researchers. A new time slotted channel hopping scheduling mechanism that considers priorities to meet the time critical industrial applications is proposed in this work. Latency improvements of about 40 percentage are obtained here, for slot allocations to higher priority devices, when compared with the conventional queuing methods.
APA, Harvard, Vancouver, ISO, and other styles
29

Igarashi, Yuichi, Yoshiki Matsuura, Minoru Koizumi, and Naoki Wakamiya. "Priority-Based Dynamic Multichannel Transmission Scheme for Industrial Wireless Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/9124858.

Full text
Abstract:
Industrial wireless sensor network (IWSN) applications are required to provide precise measurement functions as feedback for controlling devices. Current industrial wireless communication protocols, such as ISA100.11a and wirelessHART, have difficulty, however, in guaranteeing latency for unpredictable on-demand communications. In this paper, a priority-based dynamic multichannel transmission scheme is proposed for IWSNs. In the proposed scheme, a root node controls the transmission timing of high-priority packets, while other nodes autonomously decide what channel to use and when to transmit packets to a neighbor. Simulation results show that real time control is possible where a response delay from transmission of a request to reception of a reply at a root node is within 1,140 ms at per-link communication success probability with a retry of higher than 93%.
APA, Harvard, Vancouver, ISO, and other styles
30

Gherbi, Chirihane, Zibouda Aliouat, and Mohamed Benmohammed. "A survey on clustering routing protocols in wireless sensor networks." Sensor Review 37, no. 1 (January 16, 2017): 12–25. http://dx.doi.org/10.1108/sr-06-2016-0104.

Full text
Abstract:
Purpose In particular, this paper aims to systematically analyze a few prominent wireless sensor network (WSN) clustering routing protocols and compare these different approaches according to the taxonomy and several significant metrics. Design/methodology/approach In this paper, the authors have summarized recent research results on data routing in sensor networks and classified the approaches into four main categories, namely, data-centric, hierarchical, location-based and quality of service (QoS)-aware, and the authors have discussed the effect of node placement strategies on the operation and performance of WSNs. Originality/value Performance-controlled planned networks, where placement and routing must be intertwined and everything from delays to throughput to energy requirements is well-defined and relevant, is an interesting subject of current and future research. Real-time, deadline guarantees and their relationship with routing, mac-layer, duty-cycles and other protocol stack issues are interesting issues that would benefit from further research.
APA, Harvard, Vancouver, ISO, and other styles
31

Ranaware, Priyanka, and N. D. Dhoot. "Wireless Sensor Network for Performance Monitoring of Electrical Machine." International Journal of Reconfigurable and Embedded Systems (IJRES) 4, no. 1 (March 1, 2015): 1. http://dx.doi.org/10.11591/ijres.v4.i1.pp1-5.

Full text
Abstract:
<p class="Default">This paper proposes a novel industrial wireless sensor network for industrial machine condition monitoring. To avoid unexpected equipment failures and obtain higher accuracy in diagnostic and prognostic for the health condition of a motor, efficient and comprehensive data collecting, monitoring, and control play an important role to improve the system more reliable and effective. A novel wireless data collection for health monitoring system of electric machine based on wireless sensor network is proposed and developed in this paper. The unique characteristics of ZigBee networks such as low power, low cost, and high flexibility make them ideal for this application. The proposed system consists of wireless sensor nodes which are organized into a monitoring network by ZigBee protocols. A base station and wireless nodes have been developed to form a prototype system. Various sensors have the capability to monitor physiological as well as environmental conditions. Therefore proposed system provides a flexible solution that makes our living spaces more intelligent.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Robert, Rakay, Visnovsky Martin, Galajdova Alena, and Simsik Dusan. "POSSIBILITES OF COMMUNICATION ENHANCEMENT FOR EXPERIMENTAL PRODUCTION SYSTEM." TECHNICAL SCIENCES AND TECHNOLOG IES, no. 3(13) (2018): 173–79. http://dx.doi.org/10.25140/2411-5363-2018-3(13)-173-179.

Full text
Abstract:
Urgency of the research. Modern trends in the industrial communication focus on implementation of new communication protocols, wireless data transfer at reduced costs. Communication part of every automation system is crucial and reliability of these systems is very important. Target setting. When designing automation systems and solving connection of different devices, developers have to solve the various aspects as addressing, data rates, data security, etc. The modern Ethernet based communication protocols and data transfer technologies provide significant cost and work reduction. Actual scientific researches and issues analysis. To prepare this paper, different publicly available datasheets and experimental solutions were analyzed as well as conclusions of our previous experiments were used to create the knowledge base about this research topic. Uninvestigated parts of general matters defining. Since there are many different communication solutions, wired and wireless too, and every manufacturer of industrial devices provides its own best solution for communication there is large amount of solutions. This paper is insufficient to describe them all. The research objective. In this article, different communication and connection technologies were analyzed for future im-plementation to an existing experimental production system at the Department of Automation, Control and Human-Machine Interactions. The statement of basic materials. To integrate an existing model of industrial production system to the concept of the Industry 4.0 it is necessary to implement the newest communication technologies. Using Ethernet-based communication protocol, such as Profinet with combination of IO-Link provides good basis to solve this issue. Conclusions. The proposed paper provides possibilities of extending the communication interface for the FMS-500 experimental system. This system is currently based on programmable controllers S7-300 and the PROFIBUS communication inter-face. The planned rebuilding of the assembly system involves the exchange of programmable controllers, the expansion of communication protocols and the integration of new functionalities.
APA, Harvard, Vancouver, ISO, and other styles
33

Zabłudowski, Łukasz, Beata Marciniak, Zbigniew Lutowski, and Sławomir Bujnowski. "Quality Parameters in Wireless Distributed Control Systems." Solid State Phenomena 223 (November 2014): 231–37. http://dx.doi.org/10.4028/www.scientific.net/ssp.223.231.

Full text
Abstract:
Controlling and monitoring industrial processes are important elements that allow high quality tasks to be performed, thanks to discovering all anomalies in those processes and making rapid responses to emerging issues. Currently, the most commonly used approaches are distributed systems, which consist of intelligent modules (motes) whose tasks are to collect the information, analyse it and perform the correct actions. Those modules are commonly cooperating with each other by exchanging the information using a network connecting those elements. For passing the information in distributed systems, wireless motes can be used which work in the ISM band. In the presented article, the authors show the results of the examination of the proposed routing protocols, which were implemented in the simulation environment. Each of the protocols has been tested for purposes of the quality parameters. The determinant of the quality parameter is the probability of the correctly received information by the motes of the exemplary distributed system.
APA, Harvard, Vancouver, ISO, and other styles
34

Kambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. "A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks." Symmetry 12, no. 4 (April 6, 2020): 579. http://dx.doi.org/10.3390/sym12040579.

Full text
Abstract:
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their security and privacy threats. To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN) protocols, namely BLE, Z-Wave, ZigBee, Thread, and EnOcean. A succinct but exhaustive review of the relevant literature from 2013 up to now is offered as a side contribution.
APA, Harvard, Vancouver, ISO, and other styles
35

Tramarin, Federico, Aloysius K. Mok, and Song Han. "Real-Time and Reliable Industrial Control Over Wireless LANs: Algorithms, Protocols, and Future Directions." Proceedings of the IEEE 107, no. 6 (June 2019): 1027–52. http://dx.doi.org/10.1109/jproc.2019.2913450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kumar S., A. Ajith, Knut Ovsthus, and Lars M. Kristensen. "An Industrial Perspective on Wireless Sensor Networks — A Survey of Requirements, Protocols, and Challenges." IEEE Communications Surveys & Tutorials 16, no. 3 (2014): 1391–412. http://dx.doi.org/10.1109/surv.2014.012114.00058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhu, Bo Tao, Xiao Xiao Liu, Jun Steed Huang Huang, and Zu Jue Chen. "Implicit Encryption of Timing Packet with Statistical Side Channel Coding." Applied Mechanics and Materials 513-517 (February 2014): 1221–26. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1221.

Full text
Abstract:
This paper proposes a statistical coding methodology using covert side channel information to solve timing packet security issue, the main purpose here is to enhance the security of the timing protocol with backward compatible capability. In wireless communications, either ad-hoc military/ industrial network, or LTE/ LTE-A networks, GPS is used to provide time and location; however, the hackers often trying to spoof the signal. The alternative way of providing such signal is using protocols like IEEE1588 Precision Time Protocol (PTP); unfortunately, current timing packet is not encrypted, it can be altered by the hackers. To maintain the simplicity of such protocols, most vendors are reluctant to add encryption on top of it; nevertheless, the end customer wishes to see it. To solve this dilemma, we propose a backward compatible solution here. The basic idea is demonstrated using Matlab FFT calculation tool. The future extension using Fractional FFT is also suggested at.
APA, Harvard, Vancouver, ISO, and other styles
38

Mittal, Nitin. "ZEEHC: Zone-Based Energy Efficient Hierarchal Clustering Hierarchy for Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 3003–17. http://dx.doi.org/10.17762/turcomat.v12i2.2340.

Full text
Abstract:
Wireless Sensor Network (WSN) is an emerging technology with potential applications in the field of habitat monitoring and industrial applications. Sensors monitor changes in an environment's physical attribute such as temperature, and observe the data collected and forward it to the base station (BS). Mostly these sensors are unattended, and their limited battery life makes energy a valuable resource that has to be used wisely. For the collection of information, the sensor network must be maintained for a longer duration of time in an energy-efficient manner.Therefore, designing protocols that prolong the life of the network and which are energy-efficient is incessantly fascinating. This paper proposed a protocol referred to as the zone-based energy-efficient hierarchical clustering (ZEEHC) protocol that divides the network into small zones and increases network lifetime. In order to achieve minimum energy consumption, multi-hop contact is implemented between ZHs - CHs -BS. The results further reveal that the proposed protocol significantly outperforms existing algorithms in terms of energy optimization and system lifetime.
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar, Lokku Guru, Gangireddy Harinatha Reddy, Payasam Venkata Sai, Sk Irfan, and K. Pushpa Pujitha. "Real Time Remote Monitoring, Control and Reporting Dashboard System to Avoid Industrial Disasters Using Industrial IOT." Advances in Science and Technology 106 (May 2021): 143–49. http://dx.doi.org/10.4028/www.scientific.net/ast.106.143.

Full text
Abstract:
In today’s global scenario, with the evolution of new technologies and robust ideas, the world gets more involved and embed the advancements of wireless communication with information technology. An ongoing Gartner report assesses that, by 2021, there will be 25.1 billion web associated gadgets, developing at a pace of 32% every year. Bounties of automation are minimizing the human assistance, intervention and reduced risk factor in industry. Here Industrial Automation is used to control systems or things such as computers or robots or machines or sensors with the help of Internet protocol and cloud computing. In this paper six parameters viz., vibration, temperature, humidity, air quality, sound rate and pressure are monitored and controlled remotely using cloud computing. The system performance automatically changes on the basis of sensor data being collected at regular intervals with a feedback mechanism, thereby allowing the system to control or monitor various devices using internet protocols. The threshold values for all the sensors are set as per the industrial standards. These automation techniques find extensive applications in various control mechanisms to operate the equipment under production processes like boilers and heat-treating ovens, steering and stabilization, pressure exerted by ideal gases in confined containers, vibrations by machinery, air pollution released from chemical composites etc.,
APA, Harvard, Vancouver, ISO, and other styles
40

Sahoo, Prasan Kumar, Sudhir Ranjan Pattanaik, and Shih-Lin Wu. "A Novel Synchronous MAC Protocol for Wireless Sensor Networks with Performance Analysis." Sensors 19, no. 24 (December 6, 2019): 5394. http://dx.doi.org/10.3390/s19245394.

Full text
Abstract:
Synchronous medium access control (MAC) protocols are highly essential for wireless sensor networks (WSN) to support transmissions with energy saving, quality services, and throughput in industrial, commercial and healthcare applications. In this paper, a synchronous channel access mechanism is designed, where sensors can reserve the contention free data transmission slots in different available channels. To reduce the delay of data transmission among the nodes in the mesh topology, a linear programming problem (LPP) model is designed to select suitable relay nodes. Moreover, the performance of the proposed MAC is analyzed and our models are validated with simulation and analytical results. The results show that our proposed MAC protocol outperforms the IEEE 802.15.4e MAC mechanism in terms of throughput, reliability, delay, energy, packet drop rate and transmission success rate.
APA, Harvard, Vancouver, ISO, and other styles
41

MANJUNATHA, P., A. K. VERMA, and A. SRIVIDYA. "ROUTING PATH OPTIMIZAION TO MAXIMIZE THE LIFETIME OF WIRELESS SENSOR NETWORK." International Journal of Reliability, Quality and Safety Engineering 16, no. 06 (December 2009): 509–20. http://dx.doi.org/10.1142/s021853930900354x.

Full text
Abstract:
Wireless sensor network (WSN) consists of a large number of sensor nodes which are able to sense their environment and communicate with each other using wireless interface. However these sensor nodes are constrained in energy capacity. The lifetimes of sensor node and sensor network mainly depends upon these energy resources. To increase the life time of sensor network, many approaches have been proposed to optimize the energy usage. All these proposed protocols mainly use minimum hop or minimum energy path. Continuously using the shortest path will deplete energy of the nodes at a much faster rate and causes network partition. This paper proposes an energy efficient routing protocol to extend the network lifetime for delay constrained network. Each sensor node selects the optimized path for forwarding packets to the base station based on routing metrics. Proposed studies and simulation results shows that the protocol put forward in the paper can achieve higher network lifetime by striking a balance between the delay and power consumption in comparison to other routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
42

Kandeeban, Selvakani, and N. Suresh Kumar. "Investigational Security Structural Design Using Client and Server Ambitious Protocols for WMN." International Journal of Informatics and Communication Technology (IJ-ICT) 4, no. 1 (April 1, 2015): 13. http://dx.doi.org/10.11591/ijict.v4i1.pp13-22.

Full text
Abstract:
<p>Wireless mesh network plays an vital role in our day to day life, Networks are mainly used to deliver voice, video and data but using WMN’s we can communicate in outdoor environments without wired. A wireless mesh can deliver network capacity, reliability and security along with the flexibility. Nowadays the WMN’s are used by municipalities, public safety agencies, port authorities, and industrial organizations to connect to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, In this paper we propose MobiSEC, a complete security architecture protocols and algorithms for WMNs that provides both access control for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (March 22, 2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Full text
Abstract:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
APA, Harvard, Vancouver, ISO, and other styles
44

Panimozhi, K., and G. Mahadevan. "QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (October 1, 2017): 2713. http://dx.doi.org/10.11591/ijece.v7i5.pp2713-2720.

Full text
Abstract:
Wireless sensor nodes consist of a collection of sensor nodes with constrained resources in terms of processing power and battery energy. Wireless sensors networks are used increasingly in many industrial and consumer applications. Sensors detect events and send via multi hop routing to the sink node for processing the event. The routing path is established through proactive or reactive routing protocols. To improve the performance of the Wireless Sensor Networks, multi stack architecture is addressed. But the multi stack architecture has many problems with respect to life time, routing loop and QOS. In this work we propose a solution to address all these three problems of life time, routing loop and QOS in case of multi stack architecture.
APA, Harvard, Vancouver, ISO, and other styles
45

Su, Xiao Qin, Xu Hua Pan, and Zhao Ming Lei. "A Novel MAC Protocol with Different QoS for WMSNs Materials." Advanced Materials Research 321 (August 2011): 146–50. http://dx.doi.org/10.4028/www.scientific.net/amr.321.146.

Full text
Abstract:
The adoption of wireless multimedia sensor networks (WMSNs) by applications that require complex operations, ranging from health care to industrial monitoring, has brought forward a new challenge of fulfilling the quality of service (QoS) requirements of these applications. Since the requirements depend on the applications, it would be difficult to design a single MAC that satisfies the wide range of applications. This calls for a suitable MAC protocol capable of achieving application-specific QoS. In this paper, we have proposed a novel MAC protocol with different QoS for WMSNs, which not only adapts to application oriented QoS, but also attempts to conserve energy without violating QoS-constraints. Simulation results demonstrate that the proposed protocol is capable of providing a bound latency including real-time and better throughput, at the cost of reasonable energy consumption, in comparison to other existing MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
46

Jin, Rencheng, Xiaolei Fan, and Ting Sun. "Centralized Multi-Hop Routing Based on Multi-Start Minimum Spanning Forest Algorithm in the Wireless Sensor Networks." Sensors 21, no. 5 (March 4, 2021): 1775. http://dx.doi.org/10.3390/s21051775.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely applied in environmental monitoring, target tracking, military, and industrial fields. However, the battery energy of sensor nodes in WSNs is limited, which limits its development. Previous studies have shown that clustering protocols and multi-hop communication are beneficial to reduce nodes energy consumption. The multi-hop protocol based on low energy adaptive clustering hierarchy (LEACH) has been proven to significantly reduce energy dissipation. However, LEACH-based multi-hop protocols generally have the problem of unbalanced energy dissipation and data conflicts. In this paper, we propose a centralized multi-hop routing based on multi-start minimum spanning forest (LEACH-CMF) to optimize LEACH. In order to realize multi-hop communication, we introduced a multi-start minimum spanning tree algorithm to select relay nodes with the minimum relay cost and generate appropriate multi-hop paths. To avoid data collision in multi-hop communication and make nodes including the cluster heads sleep as much as possible in the non-working state, we design a bottom-up continuous time slot allocation method to improve the time division multiple access (TDMA) cycle. We performed simulation in NS2. The simulation results show that the network lifetime is approximately doubled compared to LEACH and centralized low energy adaptive clustering hierarchy (LEACH-C). The simulation results show that the proposed protocol can effectively balance the energy dissipation of nodes and prolong network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Wenting, Bin Li, Yiming Zhao, Ping Wang, and Fushan Wei. "Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/8539674.

Full text
Abstract:
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.
APA, Harvard, Vancouver, ISO, and other styles
48

Calvo, Isidro, Ismael Etxeberria-Agiriano, Miguel A. Iñigo, and Pablo González-Nalda. "Key Vulnerabilities of Industrial Automation and Control Systems and Actions to Prevent Cyber-Attacks." International Journal of Online Engineering (iJOE) 12, no. 1 (January 18, 2016): 9. http://dx.doi.org/10.3991/ijoe.v12i1.4888.

Full text
Abstract:
Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. However, the widespread adoption of the new communication technologies, such as the Internet protocols and wireless communications has changed this scenario. During recent years there have been many evidences of cyber-attacks to IACS that exploit their vulnerabilities. Unfortunately, these attacks have increased significantly during the last five years, and we should be aware that only the tip of the iceberg comes to the public knowledge. The purpose of this article is twofold: (1) to raise awareness about the security vulnerabilities that most companies are facing at their IACS and (2) to set a starting point by proposing a roadmap that seeks to guide designers and programmers in the new and complex world of industrial cyber-security.
APA, Harvard, Vancouver, ISO, and other styles
49

Rani, Meenu, and Poonam Singal. "Networks of Underwater Sensor Wireless Systems." International Journal of Wireless Networks and Broadband Technologies 10, no. 1 (January 2021): 59–69. http://dx.doi.org/10.4018/ijwnbt.2021010104.

Full text
Abstract:
Underwater wireless networks have been the subject of considerable attention in research and development by both academia and industry, while applications are expanding to a wide range of uses, including industrial, scientific, military, and environmental applications. The paper presents a analysis of the underwater wireless sensor network, a system that is promising to reveal the secrets of marine life and other underwater applications. The information about the underwater channel was listed with a focus on communication of both the acoustic and optical kind. Then, the node location strategies and related protocols for routing that can be applied to the desired communication type were discussed briefly. The hard environment and peculiar features of UWSNs are responsible for efficient communication between sensors in UWSNs. This paper proposes a robust and energy-efficient UWSN location-free routing system, based on constraint. RE-PBR takes into account three criteria, including performance, depth, and residual power connections, to balance energy consumption and to produce usable results. The findings of the simulation show that the proposed work decreases travel costs and by using less energy increases the network's life.
APA, Harvard, Vancouver, ISO, and other styles
50

Songzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao, and Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions." Journal of Marine Science and Engineering 9, no. 5 (April 27, 2021): 468. http://dx.doi.org/10.3390/jmse9050468.

Full text
Abstract:
Underwater wireless communication has gained a great deal of attention in the last couple of decades because of its applications in the military, industrial, and monitoring sectors. Despite the extreme physical and MAC layer difficulties, acoustics are used for various applications among the various modes of underwater communication technologies used. While significant research efforts have been made to address these issues, the bottleneck remains in achieving high bandwidth, high throughputs, and data rate. Researchers have begun to look into full duplex (FD) implementation to improve bandwidth efficiency and increase data rate and throughput. Users can send and receive data simultaneously over the FD links, maximizing bandwidth utilization and increasing throughput. As a result, we thoroughly reviewed various FD physical layered UWAC systems and MAC layered protocols for underwater communication. The various problems that the aforementioned systems and protocols have faced, as well as the solutions suggested in previous works to solve each problem, are also highlighted. Various metrics are used to compare the performance of various physical layered FD systems and FD MAC protocols. We also explore some of the open research questions in these FD-physical layered and MAC layered protocols, as well as future research directions. Based on ample information, we suggest a cross-layered architecture based on various IBFD-SI cancellations, DA-CSMA, and FD-MAC protocols. This review provides a broad view of the current FD physical and MAC layered protocols based on acoustic communication, as well as recommendations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography