To see the other types of publications on this topic, follow the link: WSNs.

Journal articles on the topic 'WSNs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'WSNs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Han, Bing, Feng Ran, Jiao Li, Limin Yan, Huaming Shen, and Ang Li. "A Novel Adaptive Cluster Based Routing Protocol for Energy-Harvesting Wireless Sensor Networks." Sensors 22, no. 4 (2022): 1564. http://dx.doi.org/10.3390/s22041564.

Full text
Abstract:
With the various applications of the Internet of Things, research into wireless sensor networks (WSNs) has become increasingly important. However, because of their limited energy, the communication abilities of the wireless nodes distributed in the WSN are limited. The main task of WSNs is to collect more data from targets in an energy-efficient way, because the battery replacement of large amounts of nodes is a labor-consuming work. Although the life of WSNs can be prolonged through energy-harvesting (EH) technology, it is necessary to design an energy-efficient routing protocol for the energy harvesting-based wireless sensor networks (EH-WSNs) as the nodes would be unavailable in the energy harvesting phase. A certain number of unavailable nodes would cause a coverage hole, thereby affecting the WSN’s monitoring function of the target environment. In this paper, an adaptive hierarchical-clustering-based routing protocol for EH-WSNs (HCEH-UC) is proposed to achieve uninterrupted coverage of the target region through the distributed adjustment of the data transmission. Firstly, a hierarchical-clustering-based routing protocol is proposed to balance the energy consumption of nodes. Then, a distributed alternation of working modes is proposed to adaptively control the number of nodes in the energy-harvesting mode, which could lead to uninterrupted target coverage. The simulation experimental results verify that the proposed HCEH-UC protocol can prolong the maximal lifetime coverage of WSNs compared with the conventional routing protocol and achieve uninterrupted target coverage using energy-harvesting technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Sahar, Gul, Kamalrulnizam Abu Bakar, Sabit Rahim, Naveed Ali Khan Kaim Khani, and Tehmina Bibi. "Recent Advancement of Data-Driven Models in Wireless Sensor Networks: A Survey." Technologies 9, no. 4 (2021): 76. http://dx.doi.org/10.3390/technologies9040076.

Full text
Abstract:
Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four types of data-driven models that correspond with various applications are identified as WSNs: query-driven, event-driven, time-driven, and hybrid-driven. The aim of the classification of data-driven models is to get real-time applications of specific data. Many challenges occur during data collection. Therefore, the main objective of these data-driven models is to save the WSN’s energy for processing and functioning during the data collection of any application. In this survey article, the recent advancement of data-driven models and application types for WSNs is presented in detail. Each type of WSN is elaborated with the help of its routing protocols, related applications, and issues. Furthermore, each data model is described in detail according to current studies. The open issues of each data model are highlighted with their challenges in order to encourage and give directions for further recommendation.
APA, Harvard, Vancouver, ISO, and other styles
3

Sajid Hasan. "Role of Computational Intelligence and Genetic Programming for Enhancing WSNs in Biomedical Monitoring and Applications." Power System Technology 48, no. 3 (2024): 230–56. https://doi.org/10.52783/pst.813.

Full text
Abstract:
Wireless sensor networks (WSNs) are event-monitoring and distributed autonomous data-collecting devices that are tightly distributed, lightweight nodes deployed in large numbers to monitor physical or environmental conditions cooperatively. WSNs face many challenges related to communication failures, storage and computational constraints, and limited power supply; in this context, different Computational Intelligence (CI) techniques provide adaptive mechanisms to alter WSN's dynamic nature and provide autonomous behavior, flexibility, scenario changes, robustness against communication failure and topology changes. Paradigms of CI have been successfully used in recent years to address various challenges in medical domains, such as data aggregation and fusion, energy-aware routing, task scheduling, security, optimal deployment, and localization. In this review, we intend to close the computational gap and foster collaboration by offering a detailed introduction to WSNs and their properties based on genetic programming approaches for investigating biomedical problems. Furthermore, an extensive survey of CI applications to various problems in WSNs from various biomedical research areas and publication venues is presented. Besides, a discussion on the advantages and disadvantages of CI algorithms over traditional WSN solutions is offered. Also, it explores the benefits of CI techniques in real-time disease monitoring and how they may be used to solve various problems associated with WSNs in healthcare systems. In addition, a general evaluation of CI algorithms is presented, which will serve as a guide for using CI algorithms for WSNs to treat computational health applications. The most common CI paradigms, such as fuzzy systems, evolutionary algorithms, artificial neural networks, swarm intelligence, and artificial immune systems, are explored to introduce Real-Time Disease Monitoring systems in time, space, complexity and cost optimization. Finally, a short conclusion and future recommendations are provided.
APA, Harvard, Vancouver, ISO, and other styles
4

Et. al., S. SriGowthem,. "Trust-based Routing Protocols in Wireless Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (2021): 567–72. http://dx.doi.org/10.17762/turcomat.v12i1s.1931.

Full text
Abstract:
the Wireless sensor Networks is usually consisting of all-inclusive amount of bound sensor accessories which are announced in balance of the wireless media. As WSN’s become added and added capital to accustomed life, their aegis and assurance become a primary concern. However because of the attributes of WSNs, aegis architecture can be challenging. Trust-aware acquisition protocols play a capital role in aegis of Wireless Sensor Networks (WSNs). The key allotment of the acquisition agreement is avenue alternative based on account theory. Our after-effects announce that trust-based geographic acquisition approaches the ideal achievement akin accessible by flooding-based acquisition in bulletin supply arrangement and bulletin adjournment after incurring abundant bulletin overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Arshad, Hashmi, Tabrez Nafis Md, and Rahman Nafisur. "A Descriptive Study on Wireless Sensor Networks (WSNs) using Cloud Computing (CC)." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 6–14. https://doi.org/10.5281/zenodo.10147676.

Full text
Abstract:
<i>This paper presents a descriptive study on Wireless Sensor Networks (WSNs) using Cloud Computing (CC). WSNs are widely used in various applications, including environmental monitoring, industrial automation, and healthcare. However, WSNs face several challenges, such as limited storage capacity, processing power, and energy constraints. Cloud Computing (CC) provides a viable solution to overcome these challenges by providing a scalable, cost-effective, and on-demand computing platform for WSNs.</i><i>The paper examines the benefits and challenges of using Cloud Computing (CC) in WSNs. Moreover, the study analyzes the current trends and future directions of cloud-based WSNs, including the use of edge computing, machine learning, and artificial intelligence. The paper also discusses the security and privacy concerns associated with cloud-based WSNs and examines the different security solutions and best practices to ensure the security and privacy of WSNs.</i><i>Overall, this descriptive study provides valuable insights into the integration of Cloud Computing (CC) with Wireless Sensor Networks (WSNs) and highlights the potential of cloud-based WSNs to transform various industries and domains. The study serves as a useful resource for researchers, practitioners, and organizations interested in leveraging the power of Cloud Computing (CC) for Wireless Sensor Networks (WSNs).</i>
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jinmeng, Jianxun Lv, Penghui Zhao, Yucheng Sun, Haiwen Yuan, and Hai Xu. "Research and Application of Energy-Efficient Management Approach for Wireless Sensor Networks." Sensors 23, no. 3 (2023): 1567. http://dx.doi.org/10.3390/s23031567.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely used in industrial applications. However, many of them have limited lifetimes, which has been a considerable constraint on their widespread use. As a typical application of WSNs, distributed measurement of the electric field under high-voltage direct-current (HVDC) transmission lines also suffers from this issue. This paper first introduces the composition of the electric-field measurement system (EFMS) and its working principle. Considering the actual power supply of the system, this paper mainly introduces the composition of the wireless sensor node (WSND) and analyzes the power consumption and potential working state transformation of the WSND, together with a comprehensive study on parameters affecting the power consumption of the wireless communication unit. Moreover, an energy-efficient scheduling approach is proposed after specially designing a working sequence and the study on system parameters. The proposed approach is verified by experiments on not only the experimental line of the national HVDC test base, but also a commercial operation HVDC transmission line with the challenge of long endurance, which is considered in this paper with a new strategy. The results show that the proposed method can greatly extend the lifetime of the WSND.
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Biao, Minyan Lu, and Hong Zhang. "Multi-Agent Modeling and Jamming-Aware Routing Protocols for Movable-Jammer-Affected WSNs." Sensors 23, no. 8 (2023): 3846. http://dx.doi.org/10.3390/s23083846.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely used in various fields, and the reliability and performance of WSNs are critical for their applications. However, WSNs are vulnerable to jamming attacks, and the impact of movable jammers on WSNs’ reliability and performance remains largely unexplored. This study aims to investigate the impact of movable jammers on WSNs and propose a comprehensive approach for modeling jammer-affected WSNs, comprising four parts. Firstly, agent-based modeling of sensor nodes, base stations, and jammers has been proposed. Secondly, a jamming-aware routing protocol (JRP) has been proposed to enable sensor nodes to weigh depth and jamming values when selecting relay nodes, thereby bypassing areas affected by jamming. The third and fourth parts involve simulation processes and parameter design for simulations. The simulation results show that the mobility of the jammer significantly affects WSNs’ reliability and performance, and JRP effectively bypasses jammed areas and maintains network connectivity. Furthermore, the number and deployment location of jammers has a significant impact on WSNs’ reliability and performance. These findings provide insights into the design of reliable and efficient WSNs under jamming attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Chenrui, Liang Gong, Rui Fang, Yixiang Huang, Wei Wu, and Chengliang Liu. "Integration of Agricultural Wireless Sensor Networks to Web-of-Things Through an Edge-Computing-Enriched WSNs/WoT Gateway." International Journal of Interdisciplinary Telecommunications and Networking 14, no. 1 (2023): 1–15. http://dx.doi.org/10.4018/ijitn.309694.

Full text
Abstract:
To connect agricultural wireless sensor networks (WSNs) to web services and applications, the agricultural WSNs/WoT gateway is empowered with local data management and network maintenance functions for downstream WSNs in addition to traditional upstream data collection. This work demonstrates a low-cost, highly scalable, rapidly deployable web of things (WoT) gateway with edge computing capabilities. First, an agricultural WSNs/WoT topology is architected, connecting a ZigBee WSNs to the Web for remote monitoring the local environmental and agronomical information, and simultaneously for managing the solar-powered WSNs for a prolonged lifespan according to the instant data scrawled from the cloud. Second, a WSNs/WoT gateway is designed with the hardware platform Raspberry Pi 3, which serves multiple needs for bidirectional information exchange and local WSNs management. Finally, experimentation demonstrates the proposed hardware platform and architecture can perform edge computing, and efficiently realize the up and down transmission and distribution of data stream.
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Mui Duc, Minh Tuan Nguyen, Thang Chien Vu, Tien Minh Ta, Quang Anh Tran, and Dung The Nguyen. "A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes." Journal of Computing Theories and Applications 2, no. 1 (2024): 102–17. http://dx.doi.org/10.62411/jcta.10486.

Full text
Abstract:
The paper evaluates potential applications of blockchain technology in enhancing the security and reliability of Wireless Sensor Networks (WSNs). The existing vulnerabilities in WSNs, such as concerns regarding data integrity and security, demand innovative security solutions. Through systematic analysis, this paper provides valuable insights to expand understanding of WSNs security, explaining the feasibility and benefits of deploying blockchain technology. Possible attacks in the networks are classified to point out either risks or potential solusions to protect the networks. By exploring the integration of Blockchain within WSNs, the paper highlights its potential to minimize various security risks. In addition, this work discusses the challenges and considerations associated with implementing Blockchain in WSNs. Overall, this paper contributes on securing WSNs and underscores the role of blockchain technology as a promising way for enhancing security of WSNs.
APA, Harvard, Vancouver, ISO, and other styles
10

Alfawaz, Oruba, Ahmed M. Khedr, Bader Alwasel, and Walid Osamy. "Reliability Evaluation for Chain Routing Protocols in Wireless Sensor Networks Using Reliability Block Diagram." Journal of Sensor and Actuator Networks 12, no. 2 (2023): 34. http://dx.doi.org/10.3390/jsan12020034.

Full text
Abstract:
There are many different fields in which wireless sensor networks (WSNs) can be used such as environmental monitoring, healthcare, military, and security. Due to the vulnerability of WSNs, reliability is a critical concern. Evaluation of a WSN’s reliability is essential during the design process and when evaluating WSNs’ performance. Current research uses the reliability block diagram (RBD) technique, based on component functioning or failure state, to evaluate reliability. In this study, a new methodology-based RBD, to calculate the energy reliability of various proposed chain models in WSNs, is presented. A new method called D-Chain is proposed, to form the chain starting from the nearest node to the base station (BS) and to choose the chain head based on the minimum distance D, and Q-Chain is proposed, to form the chain starting from the farthest node from the BS and select the head based on the maximum weight, Q. Each chain has three different arrangements: single chain/single-hop, multi-chain/single-hop, and multi-chain/multi-hop. Moreover, we applied dynamic leader nodes to all of the models mentioned. The simulation results indicate that the multi Q-Chain/single-hop has the best performance, while the single D-Chain has the least reliability in all situations. In the grid scenario, multi Q-Chain/single-hop achieved better average reliability, 11.12 times greater than multi D-Chain/single-hop. On the other hand, multi Q-Chain/single-hop achieved 6.38 times better average reliability than multi D-Chain/single-hop, in a random scenario.
APA, Harvard, Vancouver, ISO, and other styles
11

Dong, Biao. "Reconfigurable Publish/Subscribe Middleware for Wireless Sensor Networks." Applied Mechanics and Materials 536-537 (April 2014): 740–43. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.740.

Full text
Abstract:
This paper presented a approach, called LBS, for modeling and implementing the architecture of wireless sensor networks (WSNs) publish/subscribe (Pub/Sub) applications using a local broker subcomponent (LBS) model. Considering the reconfigurability of WSNs applications which was necessary for WSNs middleware, a graph oriented local broker subcomponent (GOLBS) model was defined based on the LBS model by integrated WSNs middleware with Pub/Sub. The analysis indicated that GOLBS provided reconfiguration management and non-predefined dynamic reconfiguration management for WSNs middleware. The results imply that GOLBS can easily be constructed, while ensuring good reconfigurability.
APA, Harvard, Vancouver, ISO, and other styles
12

Devi, Sharmila, Anju Sangwan, Anupma Sangwan, et al. "The Use of Computational Geometry Techniques to Resolve the Issues of Coverage and Connectivity in Wireless Sensor Networks." Sensors 22, no. 18 (2022): 7009. http://dx.doi.org/10.3390/s22187009.

Full text
Abstract:
Wireless Sensor Networks (WSNs) enhance the ability to sense and control the physical environment in various applications. The functionality of WSNs depends on various aspects like the localization of nodes, the strategies of node deployment, and a lifetime of nodes and routing techniques, etc. Coverage is an essential part of WSNs wherein the targeted area is covered by at least one node. Computational Geometry (CG) -based techniques significantly improve the coverage and connectivity of WSNs. This paper is a step towards employing some of the popular techniques in WSNs in a productive manner. Furthermore, this paper attempts to survey the existing research conducted using Computational Geometry-based methods in WSNs. In order to address coverage and connectivity issues in WSNs, the use of the Voronoi Diagram, Delaunay Triangulation, Voronoi Tessellation, and the Convex Hull have played a prominent role. Finally, the paper concludes by discussing various research challenges and proposed solutions using Computational Geometry-based techniques.
APA, Harvard, Vancouver, ISO, and other styles
13

Daanoune, Ikram, Abdennaceur Baghdad, and Abdelhakim Ballouk. "Improved LEACH protocol for increasing the lifetime of WSNs." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3106. http://dx.doi.org/10.11591/ijece.v11i4.pp3106-3113.

Full text
Abstract:
&lt;p&gt;Recently, wireless sensor network (WSN) is taking a high place in several applications: military, industry, and environment. The importance of WSNs in current applications makes the WSNs the most developed technology at the research level and especially in the field of communication and computing. However, WSN’s performance deals with a number of challenges. Energy consumption is the most considerable for many researchers because nodes use energy to collect, treat, and send data, but they have restricted energy. For this reason, numerous efficient energy routing protocols have been developed to save the consumption of power. Low energy adaptive clustering hierarchy (LEACH) is considered as the most attractive one in WSNs. In the present document, we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and in data transmission, then we propose an enhanced protocol. The proposed algorithm aims to improve energy consumption and prolong the lifetime of WSN through selecting CHs depending on the remaining power, balancing the number of nodes in clusters, determining abandoned nodes in order to send their data to the sink. Then CHs choose the optimal path to achieve the sink. Simulation results exhibit that the enhanced method can decrease the consumption of energy and prolong the life-cycle of the network.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
14

Jabbar, Mohanad Sameer, and Samer Saeed Issa. "Developed cluster-based load-balanced protocol for wireless sensor networks based on energy-efficient clustering." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 196–206. http://dx.doi.org/10.11591/eei.v12i1.4226.

Full text
Abstract:
One of the most pressing issues in wireless sensor networks (WSNs) is energy efficiency. Sensor nodes (SNs) are used by WSNs to gather and send data. The techniques of cluster-based hierarchical routing significantly considered for lowering WSN’s energy consumption. Because SNs are battery-powered, face significant energy constraints, and face problems in an energy-efficient protocol designing. Clustering algorithms drastically reduce each SNs energy consumption. A low-energy adaptive clustering hierarchy (LEACH) considered promising for application-specifically protocol architecture for WSNs. To extend the network's lifetime, the SNs must save energy as much as feasible. The proposed developed cluster-based load-balanced protocol (DCLP) considers for the number of ideal cluster heads (CHs) and prevents nodes nearer base stations (BSs) from joining the cluster realization for accomplishing sufficient performances regarding the reduction of sensor consumed energy. The analysis and comparison in MATLAB to LEACH, a well-known cluster-based protocol, and its modified variant distributed energy efficient clustering (DEEC). The simulation results demonstrate that network performance, energy usage, and network longevity have all improved significantly. It also demonstrates that employing cluster-based routing protocols may successfully reduce sensor network energy consumption while increasing the quantity of network data transfer, hence achieving the goal of extending network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
15

Nishad, Dipesh Kumar, and Diwakar R. Tripathi. "Wireless Sensor Networks: Technologies and Applications." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 1 (2020): 1673–79. http://dx.doi.org/10.61841/turcomat.v11i1.14630.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have emerged as a key technology in various fields due to their ability to monitor and collect data in real-time. This paper provides a comprehensive review of WSNs, covering their fundamentals, technologies, applications, challenges, and future trends. The paper begins with an introduction to WSNs, discussing their basic architecture and components, communication protocols, and network topologies. It then explores the various applications of WSNs, including environmental monitoring, industrial automation, and smart agriculture, highlighting their importance and relevance in each field. The paper also addresses the challenges faced by WSNs, such as security, energy efficiency, and integration with Internet of Things (IoT) technologies and discusses future trends and advancements in the field. Overall, this paper aims to provide a thorough understanding of WSNs and their potential impact on society.
APA, Harvard, Vancouver, ISO, and other styles
16

Cheng, Qi, Chingfang Hsu, and Lein Harn. "Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs." Mathematical Problems in Engineering 2020 (May 16, 2020): 1–9. http://dx.doi.org/10.1155/2020/1452546.

Full text
Abstract:
Wireless sensor networks (WSNs) exhibit their potential capacity in the next generation of mobile communication networks and wireless systems (5G). Collected data in WSNs are different from most data transmitted in digital communication applications. Most collected data in WSNs contain only few bits of information. Conventional protocols are not suitable for WSNs since this environment needs more flexible and lightweight protocols for secure group communications. Hence, how to realize the mutual secure and lightweight communication is a big challenge for WSNs. User authentication and key establishment are two fundamental security services in secure communications for WSNs. In this paper, we propose a novel design which embeds the function of membership authentication and group key establishment in WSNs. By using an asymmetric bivariate polynomial, membership authentication and pairwise shared keys distribution are realized. Then, each member mixes his/her input with pairwise shared keys with other members and releases the encrypted value in a broadcast channel. After collecting all released values, each member can compute the group key efficiently. Our proposal is noninteractive and lightweight. As it enjoys low computation and communication costs compared with the state-of-the-art cryptographic solutions, this design is more suitable for efficient membership authentication and group key establishment in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhou, Guang-Dong, and Ting-Hua Yi. "Recent Developments on Wireless Sensor Networks Technology for Bridge Health Monitoring." Mathematical Problems in Engineering 2013 (2013): 1–33. http://dx.doi.org/10.1155/2013/947867.

Full text
Abstract:
Structural health monitoring (SHM) systems have shown great potential to sense the responses of a bridge system, diagnose the current structural conditions, predict the expected future performance, provide information for maintenance, and validate design hypotheses. Wireless sensor networks (WSNs) that have the benefits of reducing implementation costs of SHM systems as well as improving data processing efficiency become an attractive alternative to traditional tethered sensor systems. This paper introduces recent technology developments in the field of bridge health monitoring using WSNs. As a special application of WSNs, the requirements and characteristics of WSNs when used for bridge health monitoring are firstly briefly discussed. Then, the state of the art in WSNs-based bridge health monitoring systems is reviewed including wireless sensor, network topology, data processing technology, power management, and time synchronization. Following that, the performance validations and applications of WSNs in bridge health monitoring through scale models and field deployment are presented. Finally, some existing problems and promising research efforts for promoting applications of WSNs technology in bridge health monitoring throughout the world are explored.
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Ying-Hong, Kuo-Feng Huang, and Shaing-Ting Lin. "A Grid-Based Hole Detection Scheme in WSNs." International Journal of Distributed Systems and Technologies 3, no. 3 (2012): 53–71. http://dx.doi.org/10.4018/jdst.2012070105.

Full text
Abstract:
Wireless Sensor Networks (WSNs) can be widely utilized in many applications, especially in environmental surveillance. However, some holes exist within the WSNs caused by factors like non-uniform deployment of sensor nodes, depletion of energy from sensor nodes, the destruction from external forces, and the existence of physical obstacles, such as mountains and lakes. These holes degrade the performance of wireless sensor networks (WSNs). Hence, finding the position of the holes and utilizing the information to improve the performance of WSNs is a significant issue. To solve this problem, the authors propose a detection scheme for grid-based hole in WSNs. By means of grid architecture, they use the grid head to broadcast and forward the request and respond the holes detection. Sink then calculates the position of the holes for improving the performance of the WSNs.
APA, Harvard, Vancouver, ISO, and other styles
19

Dong, Biao. "Design and Implementation of Middleware for Wireless Sensor Networks." Applied Mechanics and Materials 530-531 (February 2014): 19–22. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.19.

Full text
Abstract:
Middleware supports programming abstract which facilitate the programmer task and bridge the gap between the application and the hardware. Middleware for wireless sensor networks (WSNs) can help bridge the gap and remove impediments. This paper designs GWSN, a middleware WSNs, whose architecture is composed of runtime support, application development kits, and software development kits. Runtime support in GWSN is the core of WSNs middleware and supports executing and maintenance of WSNs applications. Application development kits includes many basic function kits, such as display editor, rule editor, and workflow editor, which support the application development of WSNs. Software development kits provides easy-to-use application programming interface.
APA, Harvard, Vancouver, ISO, and other styles
20

Zeng, Run. "The Security Issues and Common Attacks in Wireless Sensor Networks." Advanced Materials Research 998-999 (July 2014): 1299–304. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1299.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we present a study of wireless sensor network and security issues. And we outline the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
21

Lata, Sonam, Shabana Mehfuz, Shabana Urooj, Asmaa Ali, and Nidal Nasser. "Disjoint Spanning Tree Based Reliability Evaluation of Wireless Sensor Network." Sensors 20, no. 11 (2020): 3071. http://dx.doi.org/10.3390/s20113071.

Full text
Abstract:
Wireless sensor networks (WSNs) are becoming very common in numerous manufacturing industries; especially where it is difficult to connect a sensor to a sink. This is an evolving issue for researchers attempting to contribute to the proliferation of WSNs. Monitoring a WSN depends on the type of collective data the sensor nodes have acquired. It is necessary to quantify the performance of these networks with the help of network reliability measures to ensure the stable operation of WSNs. Reliability plays a key role in the efficacy of any large-scale application of WSNs. The communication reliability in a wireless sensor network is an influential parameter for enhancing network performance for secure, desirable, and successful communication. The reliability of WSNs must incorporate the design variables, coverage, lifetime, and connectivity into consideration; however, connectivity is the most important factor, especially in a harsh environment on a large scale. The proposed algorithm is a one-step approach, which starts with the recognition of a specific spanning tree only. It utilizes all other disjoint spanning trees, which are generated directly in a simple manner and consume less computation time and memory. A binary decision illustration is presented for the enumeration of K-coverage communication reliability. In this paper, the issue of computing minimum spanning trees was addressed and it is a pertinent method for further evaluating reliability for WSNs. This paper inspects the reliability of WSNs and proposes a method for evaluating the flow-oriented reliability of WSNs. Further, a modified approach for the sum-of-disjoint products to determine the reliability of WSN from the enumerated minimal spanning trees is proposed. The proposed algorithm when implemented for different sizes of WSNs demonstrates its applicability to WSNs of various scales. The proposed methodology is less complex and more efficient in terms of reliability.
APA, Harvard, Vancouver, ISO, and other styles
22

P. Vidhyavathi. "WIRELESS SENSOR NETWORK FOR CURRENT AND FUTURE TRENDS: A REVIEW." Industrial Engineering Journal 52, no. 05 (2023): 743–49. http://dx.doi.org/10.36893/iej.2023.v52i05.743-749.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are an emerging technology that has gained immense popularity due to its ability to provide real-time data from remote locations. In recent years, WSNs [1] have been widely adopted in various applications, including environmental monitoring, healthcare, agriculture, smart homes, and smart cities. This paper presents an abstract on the current and future trends of WSNs. One of the significant trends in WSNs is the development of energy-efficient protocols and algorithms. Researchers are exploring new techniques to minimize energy consumption by sensors, which directly impacts the network's lifetime. Another trend is the integration of WSNs with other technologies, such as the Internet of Things (IoT), cloud computing, and big data analytics, to enable more advanced applications. Another trend is the use of Machine Learning (ML) and Artificial Intelligence (AI) techniques to analyze the data collected by WSNs. These techniques can be used to identify patterns and anomalies in the data, which can be used to improve the efficiency and accuracy of the system. The future of WSNs looks promising, with new technologies emerging that will enhance their capabilities. One of the upcoming trends is the development of Low-Power Wide Area Networks (LPWANs), which will enable long-range communication with low power consumption. This technology will be particularly useful in smart cities and industrial applications. The development of autonomous WSNs is another future trend. These networks will be capable of self-organization, self-configuration, and self-management, reducing the need for human intervention. This will result in more efficient and reliable networks. WSNs are an essential technology that has the potential to revolutionize various industries. As the technology continues to evolve, it is essential to keep up with the latest trends to ensure that WSNs remain at the forefront of innovation.
APA, Harvard, Vancouver, ISO, and other styles
23

Niksaz, Pejman, and Mohammad Javad Kargar. "A Full Review of Attacks and Countermeasures in Wireless Sensor Networks." International Journal of Information Security and Privacy 6, no. 4 (2012): 1–39. http://dx.doi.org/10.4018/jisp.2012100101.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs into such a constrained environment. Thus, familiarity with the security aspects of WSNs is essential before designing WSN systems. In order to provide effective integrity, confidentiality, and authentication during communication, the need for additional security measures in WSNs emerges. In this paper, the authors review the security requirements for WSNs, the different kinds of possible attacks, and security mechanisms used to overcome these attacks. The authors also present some statistical data for such attacks in WSN and some tables that indicate a comparison between different security mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Xu Dong, Ling Cheng Kong, Zhi Hua Zhang, Dan Wang, and Tao Mei. "Design of USB Interface Driver for WSNs Node Tester Based on Embedded Linux." Applied Mechanics and Materials 40-41 (November 2010): 266–71. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.266.

Full text
Abstract:
Based on the analysis of the design of USB peripheral driver program under embedded Linux and considering of the hardware characteristics of USB interface of the Portable WSNs Node Tester, the USB interface drive program for the Portable WSNs Node Tester based on the embedded Linux was designed by the way of kernel module. The WSNs Node connected the Tester through the USB interface, information transmission between the Tester and the WSNs Node was successfully realized.
APA, Harvard, Vancouver, ISO, and other styles
25

He, Bo. "Load-Balanced Low-Power Routing Algorithm Design for Wireless Sensor Networks." Advanced Materials Research 926-930 (May 2014): 3641–44. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.3641.

Full text
Abstract:
Low-power wireless sensor networks (WSNs) design involves all aspects of research in wireless sensor networks. As energy is limited in wireless sensor networks, how to effectively manage and use energy of WSNs, and how to maximize the reduction of power consumption in WSNs and extend the lifetime of WSNs become a key problem faced by wireless sensor networks. Aimed at these problems, a low-power clustering routing algorithm based on load-balanced is proposed. The algorithm introduced an energy load factor to reduce the power consumption of WSNs. The simulation results show that the low-power routing algorithm can effectively reduce power consumption of networks and extend the lifetime of networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Obbo, Aggrey, Pius Ariho, and Evarist Nabaasa. "Towards People Crowd Detection Using Wireless Sensor Networks." European Journal of Technology 6, no. 2 (2022): 32–48. http://dx.doi.org/10.47672/ejt.1071.

Full text
Abstract:
Objective: The objective of this study was to examine and propose the use of wireless sensor networks for people crowd detection in resource constrained environments such as developing economies.&#x0D; Methodology: A systematic review was carried out on current technological trends and application of Wireless Sensor Networks (WSNs) in crowd detection. For this study, focus was on WSN implementation in developing economies, where infrastructure is underdeveloped and people crowds are dynamic and spontaneous. Based on a requirement analysis and knowledge of the inherent challenges of WSNs, a WSN implementation for people crowd detection was proposed.&#x0D; Findings: Most studies in crowd detection using WSNs, have been in the area of non-people crowds. However issues critical to deployment of WSNs for people crowd detection in developing countries include: the uncontrollable nature of people crowds, under developed physical infrastructure and the inherent challenges of power, computational capacity and broadcast communication characterizing WSNs. Achieving people crowd detection using WSNs therefore, calls for special attention.&#x0D; Recommendation: To ensure effective people crowd detection, requires taking into consideration connectivity, scalability, performance, security, accuracy and resource utilization of WSNs.
APA, Harvard, Vancouver, ISO, and other styles
27

Cui, Baojiang, Ziyue Wang, Bing Zhao, Xiaobing Liang, and Yuemin Ding. "Enhanced Key Management Protocols for Wireless Sensor Networks." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/627548.

Full text
Abstract:
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
28

Grandhimi, Lahari Kamakshi, Thokachichu Tejaswini, Sindhu Bhargavi Sivalasetty, Induja Nandigama, Rao Samudrala Saida, and V. Suresh Chintalapudi. "Advancing precision agriculture through multi-objective optimization using butterfly algorithm." i-manager’s Journal on Future Engineering and Technology 19, no. 2 (2024): 22. http://dx.doi.org/10.26634/jfet.19.2.20481.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are transforming precision agriculture by enabling seamless monitoring and control of key factors such as temperature, humidity, solar radiation, soil moisture, and various dissolved compounds. This technology enhances efficiency and productivity while reducing costs. However, optimizing coverage area and energy efficiency in precision agriculture WSNs presents significant challenges. To address these challenges, our work focuses on developing innovative solutions inspired by advanced algorithms and state-of-the-art techniques for WSNs. Our primary objective is to improve area coverage and reduce energy consumption in precision agriculture WSNs. We are developing algorithms that can adapt to diverse agricultural landscapes. Through simulations, we aim to evaluate the performance and impact of our novel algorithm on precision agriculture applications. These simulations will provide valuable insights into the effectiveness of our algorithm in enhancing coverage area and energy efficiency in WSNs. Furthermore, our research aims to contribute to the broader field of WSNs by providing a detailed analysis of the challenges and opportunities in optimizing coverage area and energy efficiency in agricultural settings. By leveraging advanced algorithms and techniques, we aim to enhance the capabilities of WSNs in precision agriculture, leading to more sustainable and efficient farming practices.
APA, Harvard, Vancouver, ISO, and other styles
29

Lu, Chuiwei, and Defa Hu. "A Fault-Tolerant Routing Algorithm for Wireless Sensor Networks Based on the Structured Directional de Bruijn Graph." Cybernetics and Information Technologies 16, no. 2 (2016): 46–59. http://dx.doi.org/10.1515/cait-2016-0019.

Full text
Abstract:
Abstract Wireless Sensor Network (WSNs) nodes with low energy, run out of energy easily and stop working, which results then in routing failures and communication blocking. The paper puts forward a FTRSDDB algorithm based on the structured directional de Bruijn graph to enhance the performance of faulttolerant routing for WSNs. The algorithm randomly deploys some super nodes with abundant energy and powerful performance in WSNs. These nodes are responsible for the collection of topology information from the WSNs to build redundant routing table, and provide data forwarding and routing update service for popular nodes. The FTRSDDB algorithm optimizes network topology structure using de Bruijn graph, and can quickly find neighbor nodes failure and invalid routing path, and then calculate new routing information with low cost, which greatly improves the performance of fault-tolerant routing of WSNs. Experiments show that the FTRSDDB algorithm takes on better performance compared with other faulttolerant routing algorithms, even that exist malicious nodes attack in the WSNs.
APA, Harvard, Vancouver, ISO, and other styles
30

Christy Angelin, Anitha, and Salaja Silas. "An Improved Coverage Hole Finding System for Critical Applications Based on Computational Geometric Techniques." Scalable Computing: Practice and Experience 25, no. 1 (2024): 557–63. http://dx.doi.org/10.12694/scpe.v25i1.2397.

Full text
Abstract:
Wireless Sensor Networks (WSNs) contain coverage holes caused by both random node sensor deployment and malfunctioning nodes. Because fixing the battery is challenging, collaborative discovery and assessment of coverage shortfalls, as well as getting rid of these holes, has been recognized as critical in WSNs. While placing nodes for sensors in a large-scale WSN is challenging. This research provides a cost-effective coverage hole detection approach based on collaborative distributed point placement. Create a polygon first by employing an angle estimate approach and neighbor data. Following that, a based on points hole identification technique is used to assess if a coverage issue appears in a large-scale WSN's supplied ROI. Furthermore, the region of the coverage hole is estimated using computational geometry-based polygonal triangulation methods. The accuracy of the method is tested here using statistical data. The results show that it outperforms earlier coverage hole-detecting algorithms. In particular, the method improves coverage rate by 75% when compared to conventional methodologies. It also lowers energy usage by 90%, adding to increased network lifetime. The quantitative favourable results demonstrate the effectiveness of the collaborative distributed point placement technique in detecting and successfully resolving coverage gaps in WSNs. In regards to coverage rate, energy consumption, and network longevity, the system being proposed beats previous coverage hole-detecting techniques.
APA, Harvard, Vancouver, ISO, and other styles
31

Seno, Sayed, Doaa Abd Ali, and Mohammed Mohammed. "EFFICIENT ROUTING PROTOCOL ALGORITHM FOR WIRELESS SENSOR NETWORKS." Iraqi Journal for Computers and Informatics 44, no. 1 (2018): 11–17. http://dx.doi.org/10.25195/ijci.v44i1.67.

Full text
Abstract:
Recently, different applications of wireless sensor networks (WSNs) in the industry fields using different data transfer protocols has been developed. As the energy of sensor nodes is limited, prolonging network lifetime in WSNs considered a significant occurrence. To develop network permanence, researchers had considered energy consuming in routing protocols of WSNs by using modified Low Energy Adaptive Clustering Hierarchy. This article presents a developed effective transfer protocols for autonomic WSNs. An efficient routing scheme for wireless sensor network regarded as significant components of electronic devices is proposed. An optimal election probability of a node to be cluster head has being presented. In addition, this article uses a Voronoi diagram, which decomposes the nodes into zone around each node. This diagram used in management architecture for WSNs.
APA, Harvard, Vancouver, ISO, and other styles
32

Sanapala, Ravi Kumar, and Srineevasa Rao Duggirala. "A Secure LEACH Protocol for Efficient CH Selection and Secure Data Communication in WSNs." International Journal of Computer Network and Information Security 14, no. 5 (2022): 82–93. http://dx.doi.org/10.5815/ijcnis.2022.05.07.

Full text
Abstract:
Due to the applications of wireless sensor networks (WSNs) in distinct fields, like civilian and military, environmental monitoring, and target tracking, etc., it became the important research area for researchers. Therefore, an efficient organization of network topology is needed for multi-hop data aggregation based on the energy constrained WSNs with large scale deployment for making the routing task simpler, balancing the load efficiently, and enhancing the network lifetime. The low-energy adaptive clustering hierarchy (LEACH) is an architecture of application-specific protocol, which is used for WSNs. However, this LEACH protocol suffered from more energy consumption in network without considering the cluster heads (CHs) distribution on a rotation basis. In addition, the complex security mechanisms are not sufficient due to limited bandwidth and other restrictions that the sensor nodes have. Thus, it is essential to improve the energy efficiency, CH stability and secure data transmission in WSN’s, which is the main objective of this work. Motivated from these three challenges, this article proposes a stable and secure LEACH (SS-LEACH), in which a new and improved protocol of LEACH is proposed for enhancing the stability of CH and energy efficiency as it considers the nodes’ consumed energy ratio (CER) for CH selection and random number generation, here after the proposed LEACH is named as CER-LEACH. In addition, it aims to prevent the previously elected CH node and it will get another chance in the current round. This method correlates the threshold used in traditional LEACH with the energy consumption ratio of each node. Further, it also introduces a hybrid reputation-based data transmission (HRDT) scheme for secure data transmission. With the proposed CER-LEACH protocol, WSNs achieves better performance in terms of secured communication, network lifetime, and energy consumption based on the analysis of simulation results as compared to state-of-art approaches.
APA, Harvard, Vancouver, ISO, and other styles
33

Djedouboum, Asside, Ado Abba Ari, Abdelhak Gueroui, Alidou Mohamadou, and Zibouda Aliouat. "Big Data Collection in Large-Scale Wireless Sensor Networks." Sensors 18, no. 12 (2018): 4474. http://dx.doi.org/10.3390/s18124474.

Full text
Abstract:
Data collection is one of the main operations performed in Wireless Sensor Networks (WSNs). Even if several interesting approaches on data collection have been proposed during the last decade, it remains a research focus in full swing with a number of important challenges. Indeed, the continuous reduction in sensor size and cost, the variety of sensors available on the market, and the tremendous advances in wireless communication technology have potentially broadened the impact of WSNs. The range of application of WSNs now extends from health to the military field through home automation, environmental monitoring and tracking, as well as other areas of human activity. Moreover, the expansion of the Internet of Things (IoT) has resulted in an important amount of heterogeneous data that are produced at an exponential rate. Furthermore, these data are of interest to both industry and in research. This fact makes their collection and analysis imperative for many purposes. In view of the characteristics of these data, we believe that very large-scale and heterogeneous WSNs can be very useful for collecting and processing these Big Data. However, the scaling up of WSNs presents several challenges that are of interest in both network architecture to be proposed, and the design of data-routing protocols. This paper reviews the background and state of the art of Big Data collection in Large-Scale WSNs (LS-WSNs), compares and discusses on challenges of Big Data collection in LS-WSNs, and proposes possible directions for the future.
APA, Harvard, Vancouver, ISO, and other styles
34

Ding, Qianao, Rongbo Zhu, Hao Liu, and Maode Ma. "An Overview of Machine Learning-Based Energy-Efficient Routing Algorithms in Wireless Sensor Networks." Electronics 10, no. 13 (2021): 1539. http://dx.doi.org/10.3390/electronics10131539.

Full text
Abstract:
Machine learning (ML) technology has shown its unique advantages in many fields and has excellent performance in many applications, such as image recognition, speech recognition, recommendation systems, and natural language processing. Recently, the applicability of ML in wireless sensor networks (WSNs) has attracted much attention. As resources are limited in WSNs, identifying how to improve resource utilization and achieve power-efficient load balancing is becoming a critical issue in WSNs. Traditional green routing algorithms aim to achieve this by reducing energy consumption and prolonging network lifetime through optimized routing schemes in WSNs. However, there are usually problems such as poor flexibility, a single consideration factor, and a reliance on accurate mathematical models. ML techniques can quickly adapt to environmental changes and integrate multiple factors for routing decisions, which provides new ideas for intelligent energy-efficient routing algorithms in WSNs. In this paper, we survey and propose a theoretical hypothetic model formulation of ML as an effective method for creating a power-efficient green routing model that can overcome the limitations of traditional green routing methods. In addition, the study also provides an overview of past, present, and future progress in green routing schemes in WSNs. The contents of this paper will appeal to a wide range of audiences interested in ML-based WSNs.
APA, Harvard, Vancouver, ISO, and other styles
35

AWS, ABD ALKAREEM HAMEED ALTAEE. "Optimizing WSNs with Artificial Intelligence: A Survey of Approaches and Applications." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 1 (2023): 8–11. https://doi.org/10.5281/zenodo.7576297.

Full text
Abstract:
<strong>Abstract:</strong> Wireless sensor networks (WSNs) have become an increasingly important tool for a wide range of applications, from environmental monitoring to industrial automation. However, WSNs face a number of challenges, including limited resources, harsh operating environments, and high levels of noise and interference. Artificial intelligence (AI) has the potential to address these challenges and enhance the performance and reliability of WSNs. In this paper, we conduct a survey of the various approaches and applications of AI in WSNs. We first provide an overview of the key characteristics and challenges of WSNs, and then review the different types of AI techniques that have been applied to WSNs, including machine learning, natural language processing, and decision making. We also discuss the benefits and limitations of these techniques, and identify potential areas for future research. Our survey aims to provide a comprehensive overview of the state-of-the-art in AI for WSNs, and to help guide researchers and practitioners in the selection and application of AI techniques for WSN optimization. <strong>Keywords:</strong> Wireless sensor networks (WSNs), Artificial intelligence (AI), Machine learning, Natural language processing, Decision making, Network optimization, Resource management, Data management. <strong>Title:</strong> Optimizing WSNs with Artificial Intelligence: A Survey of Approaches and Applications <strong>Author:</strong> AWS ABD ALKAREEM HAMEED ALTAEE <strong>International Journal of Novel Research in Computer Science and Software Engineering</strong> <strong>ISSN 2394-7314</strong> <strong>Vol. 10, Issue 1, January 2023 - April 2023</strong> <strong>Page No: 8-11</strong> <strong>Novelty Journals</strong> <strong>Website: www.noveltyjournals.com</strong> <strong>Published Date: 27-January-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7576297</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.noveltyjournals.com/upload/paper/Optimizing%20WSNs%20with%20Artificial-27012023-3.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
36

Lu, Peng, Guang Wei Zhang, and Fang Chun Yang. "Node Capture Attack Detection in Dynamic WSNs Based on New Node Tracking." Advanced Materials Research 945-949 (June 2014): 2372–79. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2372.

Full text
Abstract:
Since the nodes of WSNs are always deployed on the outside, nodes are easy to be captured. The traditional detection approaches of capture attack can be categorized as approaches based on time of absence and approaches based on target tracking. The former only suitable in static WSNs and the latter usually requires a large communication cost. In this paper, a novel node capture attack detection approach is proposed in dynamic WSNs. Through this approach, every node record its neighbors and detect new nodes in real-time, if new nodes join in the network, a new node tracking algorithm is performed in WSNs and find out which of them are captured by adversaries. Simulation results show that, this method can greatly improve the detection accuracy in dynamic WSNs, and the communication cost is low.
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Joon-Ku, You-Rak Choi, Beom-Kyu Suh, Sang-Woo Jung, and Ki-Il Kim. "A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks." Applied Sciences 15, no. 4 (2025): 2213. https://doi.org/10.3390/app15042213.

Full text
Abstract:
Owing to limited resources, implementing conventional security components in wireless sensor networks (WSNs) rather than wireless networks is difficult. Because most sensor nodes are typically powered by batteries, the battery power should be sufficiently long to prevent the shortening of the network lifetime. Therefore, many studies have focused on detecting and avoiding energy drainage attacks in WSNs. However, a survey paper has yet to be published for energy drain attacks in WSNs since 2019. Therefore, we present a novel comprehensive survey paper for energy drainage attacks in WSNs. First, we address an overview of WSNs and their security issues. Next, we explain the methodology for this study and explain the existing approaches for energy drainage attacks in layered architectures. Based on the results of this analysis, open issues and further research directions are presented.
APA, Harvard, Vancouver, ISO, and other styles
38

I.Vallirathi and S. Ebenezer Juliet Dr. "Study of Energy-Efficient Routing Protocols in WSN-Deployment and Energy Consumption." Journal of Web Development and Web Designing 3, no. 3 (2018): 28–42. https://doi.org/10.5281/zenodo.2342988.

Full text
Abstract:
The appropriated nature and dynamic topology of Wireless Sensor Networks (WSNs) presents extremely unique prerequisites in steering conventions that ought to be met. The most essential component of a directing convention, so as to be proficient for WSNs, is the vitality utilization and the expansion of the system&#39;s lifetime. Amid the ongoing years, numerous vitality effective directing conventions have been proposed for WSNs. In this paper, dialog around a comprehensive inside parameter exchange or concentrate on the vitality effective steering conventions for WSNs. First portray a logical study on vitality proficient directing conventions for WSNs. At that point this paper give WSN Architecture, genuine sending and vitality utilization in remote sensor arrange. At long last talk about Energy effective course determination approach for vitality proficient steering convention in WSN.
APA, Harvard, Vancouver, ISO, and other styles
39

Kaleeswaran, D., and R. Kavitha. "Optimal Cellular Microscopic Pattern Recognizer- (OCMPR-) Based Wireless Detection Network for Efficiently Leveraging the Parallel Distributed Processing Capabilities." Scanning 2022 (August 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/5875260.

Full text
Abstract:
Recognizing patterns associated with particular events enables the detection of specific critical changes in the events. Due to the resource constraints inherent in WSNs, pattern recognition is highly dependent on the complexity of the computation, the number of iterations, and the requirements for node training. Iterative learning is frequently used in computer-based computer vision. As a result, these methods are in conflict with the perfectly alright architecture of the WSN. The proposed technique, Optimal Cellular Microscopic Pattern Recognizer (OCMPR), enables the detection of macroscale events in WSN. Using the distributed system computational resources of WSNs, the approach reduces calculations for conserving energy and improves recognition. The method generates promising results by combining a well-known optimization technique (the genetic algorithm) with CMPR. This approach addresses the resource-constrained WSN’s real-time mission-critical application needs. Global and quick recognition is achieved by dispersing processing over a network’s nodes, allowing for loosely connected communication. The results demonstrate the suggested scheme’s versatility.
APA, Harvard, Vancouver, ISO, and other styles
40

Harbouche, Ahmed, Djamal Djabour, and Amine Saiah. "Z-MSP: Zonal-Max Stable Protocol for Wireless Sensor Networks." Engineering, Technology & Applied Science Research 14, no. 6 (2024): 18036–41. https://doi.org/10.48084/etasr.8691.

Full text
Abstract:
Clustering is a well-known energy enhancement approach used to prolong the lifetime of Wireless Sensor Networks (WSNs). However, it introduces another issue, which is the selection of the optimum number of clusters along with the appropriate cluster heads. In this paper, we study in detail the clustering approach and its impact on enhancing WSN lifetime. We provide a mathematical study that discusses the impact of clustering, where the WSN is divided into multiple zones, each zone functioning as an independent cluster. The WSN topology consists of 10 zones, all similar in area and density but differing in their distances to the base station. To prolong the WSN’s lifetime, we developed Z-MSP, an extension of MSP for Zonal WSNs. It maintains the highest stable period of MSP for the Z-WSN. Z-MSP prolongs the network's stable period by 315.625%, 315.625%, and 287.258%, and the lifetime by 245.340%, 237.277%, and 232.475%, with a very high throughput level compared to FBECS, E-CAFL, and LEACH-FC, respectively.
APA, Harvard, Vancouver, ISO, and other styles
41

Vishnoi, Navneet, and Rakesh Kumar Dwivedi. "An effective adjustment approach of event reliability (EAAER) with mobile sink using shortest path routing for WSN." Journal of Information and Optimization Sciences 44, no. 6 (2023): 1139–49. http://dx.doi.org/10.47974/jios-1452.

Full text
Abstract:
A crucial requirement for Wireless Sensor Networks (WSNs) is reliable data transfer. To maintain the overall reliability of the network, it is essential that the data delivered from a source node reach its intended destination without any loss or errors. In order to collect data from the sensor nodes that are deploy randomly around the sensor region, wireless sensor networks (WSNs) typically use static sinks. In the static sink-based technique, the data packets are transmitted through the network to reach the base station. The static sink is ineffective at utilizing energy as a result. This paper presents an effective adjustment approach for event reliability (EAAER) to find duplicate events using a mobile sink for homogenous wsn’s. The EAAER approach improves the routing against the base model by using shortest path routing. Simulation results show that the performance of EEAER increases battery utilization and the number of received packets while minimizing duplicate packets and packets lost during transmission compared to the base model.
APA, Harvard, Vancouver, ISO, and other styles
42

Raji, Kamaldeen Ayodele, Ayisat Wuraola Asaju-Gbolagade, and Kazeem Alagbe Gbolagade. "EFFECTIVE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS USING CRT-LEACH ALGORITHM." MALAYSIAN JOURNAL OF COMPUTING 6, no. 2 (2021): 798. http://dx.doi.org/10.24191/mjoc.v6i2.10396.

Full text
Abstract:
Wireless Sensor Networks (WSNs) consist of huge number of sensor nodes dispersed in a domain of enthusiasm with at least one sink for watching the environment and physical situation. These sensor hubs are circulated in threatening conditions and are unprotected to deficiencies, for example, power dissemination, equipment glitches, communication link errors and malicious attacks, among others. It has been established that essentialness, speed and unwavering quality are the chief test in the usefulness of WSNs as they are controlled with compelled imperativeness and restricted equipment assets. Accordingly, it is necessary to structure vitality proficient steering conventions for WSNs applications. Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. The consequences of exploratory reproductions show that the proposed structure delivered powerful directing convention for WSNs when contrasted with existing routing protocols to the extent essentialness usage, speed, equipment necessities and transformation delay continuously WSNs.
APA, Harvard, Vancouver, ISO, and other styles
43

Lea-Cox, John D., William L. Bauerle, Marc W. van Iersel, et al. "Advancing Wireless Sensor Networks for Irrigation Management of Ornamental Crops: An Overview." HortTechnology 23, no. 6 (2013): 717–24. http://dx.doi.org/10.21273/horttech.23.6.717.

Full text
Abstract:
Wireless sensor networks (WSNs) transmit sensor data and control signals over long distances without the need for expensive infrastructure, allowing WSNs to add value to existing irrigation systems since they provide the grower with direct feedback on the water needs of the crop. We implemented WSNs in nine commercial horticulture operations. We provide an overview of the integration of sensors with hardware and software to form WSNs that can monitor and control irrigation water applications based on one of two approaches: 1) “set-point control” based on substrate moisture measurements or 2) “model-based control” that applied species-specific irrigation in response to transpiration estimates. We summarize the economic benefits, current and future challenges, and support issues we currently face for scaling WSNs to entire production sites. The series of papers that follow either directly describe or refer the reader to descriptions of the findings we have made to date. Together, they illustrate that WSNs have been successfully implemented in horticultural operations to greatly reduce water use, with direct economic benefits to growers.
APA, Harvard, Vancouver, ISO, and other styles
44

Ompal, Ompal, Niraj Kumar, Vishnu Mohan Mishra, and Adesh Kumar. "Wireless sensor networks protocols, applications, and network-on-chip communications." IAES International Journal of Robotics and Automation (IJRA) 13, no. 3 (2024): 338. http://dx.doi.org/10.11591/ijra.v13i3.pp338-350.

Full text
Abstract:
A wireless sensor network (WSN) is a network consisting of self-governing sensors that are deployed in space and communicate with each other using wireless technology to monitor physical or environmental variables. These networks generally include compact, inexpensive sensor nodes equipped with sensing, processing, and communication functionalities. WSNs are specifically engineered to gather data from their immediate environment, do local data processing, and subsequently communicate pertinent information either to a central hub or to other interconnected nodes within the network. Continuous research in the domain of WSNs is devoted to advancing security concerns, developing novel sensing technologies, and optimizing communication protocols. The advancements in these domains enhance the ongoing development and efficiency of WSNs. The WSNs are very important for getting information from the real world in many situations. WSNs are flexible tools for keeping an eye on and controlling different environments because they have sensor nodes, wireless communication, and distributed processing. WSNs use network-on-chip (NoC) communication architecture to connect sensor nodes. The article explains the introduction to WSN, the background of wireless communication, motivation, ZigBee protocol, and WSN applications.
APA, Harvard, Vancouver, ISO, and other styles
45

Ye, Guang, Baihai Zhang, Senchun Chai, and Lingguo Cui. "Energy Balanced Redeployment Algorithm for Heterogeneous Wireless Sensor Networks." Mathematical Problems in Engineering 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/608121.

Full text
Abstract:
Wireless sensor networks (WSNs) have gained worldwide attention in recent years. Since WSNs can be conveniently deployed to monitor a given field of interest, they have been considered as a great long-term economic potential for military, environmental, and scientific applications and so forth. One of the most active areas of research in WSNs is the coverage which is one of the most essential functions to guarantee quality of service (QoS) in WSNs. However, less attention is paid on the heterogeneity of the node and the energy balance of the whole network during the redeployment process. In this work, the energy balanced problems in mobile heterogeneous WSNs redeployment have been analyzed. The virtual force algorithm with extended virtual force model is used to improve the QoS of the deployment. Furthermore energy model is added to enhance or limit the movement of the nodes so that the energy of nodes in the whole WSNs can be balanced and the lifetime of the networks can be prolonged. The simulation results verify the effectiveness of this proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
46

Ahmed, Akinsola, Ejiofor Oluomachi, Akinde Abdullah, and Njoku Tochukwu. "Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security." International Journal of Network Security & Its Applications 16, no. 2 (2024): 47–63. http://dx.doi.org/10.5121/ijnsa.2024.16204.

Full text
Abstract:
The article discusses the emergence of Wireless Sensor Networks (WSNs) as a groundbreaking technology in data processing and communication. It outlines how WSNs, composed of dispersed autonomous sensors, are utilized to monitor physical and environmental factors, transmitting data wirelessly for analysis. The article explores various applications of WSNs in healthcare, national security, emergency response, and infrastructure monitoring, highlighting their roles in enhancing patient care, public health surveillance, border security, disaster management, and military operations. Additionally, it examines the foundational concepts of data privacy in WSNs, focusing on encryption techniques, authentication mechanisms, anonymization techniques, and access control mechanisms. The article also addresses vulnerabilities, threats, and challenges related to data privacy in healthcare and national security contexts, emphasizing regulatory compliance, ethical considerations, and socio-economic factors. Furthermore, it introduces the Diffusion of Innovation Theory as a framework for understanding the adoption of privacy-enhancing technologies in WSNs. Finally, the article reviews empirical studies demonstrating the efficacy of security solutions in preserving data privacy in WSNs, offering insights into advancements in safeguarding sensitive information.
APA, Harvard, Vancouver, ISO, and other styles
47

Brown, Anthony, Felipe Goñi-de-Cerio, Ainhoa Bilbao, et al. "An Assessment of the Antifungal Efficacy of a Novel Topical Onychomycosis Treatment Using Human Nail and Skin Infection Models." Journal of Fungi 11, no. 5 (2025): 345. https://doi.org/10.3390/jof11050345.

Full text
Abstract:
Onychomycosis, a fungal nail infection, affects about 4% of the global population. Current topical antifungals like ciclopirox and amorolfine have limited effectiveness, highlighting the need for better treatments. WSNS-PO is a novel water-soluble therapy designed to treat and prevent onychomycosis by enhancing nail health. This study evaluated WSNS-PO’s ability to penetrate the nail plate and to treat and prevent infection by Trichophyton rubrum using bovine hoof membranes and human nail clippings. The anti-fungal efficacy of WSNS-PO was additionally evaluated against other dermatophytes, non-dermatophyte fungi, and yeast. The results showed that WSNS-PO effectively permeated nails and reduced and prevented the colonization of human nail fragments by T. rubrum ex vivo, demonstrating an efficacy comparable to ciclopirox and amorolfine. WSNS-PO also prevented the transfer of T. rubrum infection between nails and inhibited the fungal colonization of human skin by dermatophyte and non-dermatophyte fungi and yeast. Together, these results indicate that WSNS-PO possesses fungistatic, barrier-forming, and anti-adhesive properties, suggesting that it holds promise as an onychomycosis treatment against dermatophytes, yeast, and molds.
APA, Harvard, Vancouver, ISO, and other styles
48

Ompal, Niraj Kumar, Vishnu Mohan Mishra, and Adesh Kumar. "Wireless sensor networks protocols, applications, and network-on-chip communications." IAES International Journal of Robotics and Automation 13, no. 3 (2024): 338–50. https://doi.org/10.11591/ijra.v13i3.pp338-350.

Full text
Abstract:
A wireless sensor network (WSN) is a network consisting of self-governing sensors that are deployed in space and communicate with each other using wireless technology to monitor physical or environmental variables. These networks generally include compact, inexpensive sensor nodes equipped with sensing, processing, and communication functionalities. WSNs are specifically engineered to gather data from their immediate environment, do local data processing, and subsequently communicate pertinent information either to a central hub or to other interconnected nodes within the network. Continuous research in the domain of WSNs is devoted to advancing security concerns, developing novel sensing technologies, and optimizing communication protocols. The advancements in these domains enhance the ongoing development and efficiency of WSNs. The WSNs are very important for getting information from the real world in many situations. WSNs are flexible tools for keeping an eye on and controlling different environments because they have sensor nodes, wireless communication, and distributed processing. WSNs use network-on-chip (NoC) communication architecture to connect sensor nodes. The article explains the introduction to WSN, the background of wireless communication, motivation, ZigBee protocol, and WSN applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Adu-Manu, Kofi Sarpong, Jamal-Deen Abdulai, Felicia Engmann, et al. "WSN Architectures for Environmental Monitoring Applications." Journal of Sensors 2022 (September 9, 2022): 1–18. http://dx.doi.org/10.1155/2022/7823481.

Full text
Abstract:
Wireless sensor networks (WSNs) have become ubiquitous, permeating every aspect of human life. In environmental monitoring applications (EMAs), WSNs are essential and provide a holistic view of the deployed environment. Physical sensor devices and actuators are connected across a network in environmental monitoring applications to sense vital environmental factors. EMAs bring together the intelligence and autonomy of autonomous systems to make intelligent decisions and communicate them using communication technologies. This paper discusses the various architectures developed for WSNs in environmental monitoring applications and the support for specific design goals, including machine learning in WSNs and its potential in environmental monitoring applications.
APA, Harvard, Vancouver, ISO, and other styles
50

Alahmadi, Hanan, and Fatma Boabdullah. "A Review of Multi-Channel Medium Access Control Protocols for Wireless Sensor Networks." European Journal of Engineering and Technology Research 6, no. 6 (2021): 39–53. http://dx.doi.org/10.24018/ejeng.2021.6.6.2222.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are witnessing a momentum spread especially with the growth of the Internet of Things (IoT) paradigm. Indeed, WSNs are considered as the main enabling infrastructure for IoT networks. Nowadays, the emerging WSNs applications require not only long network lifespan but also considerably high data rate. Consequently, conceiving Multichannel MAC protocols that save the scarceenergy budget of sensor nodes while providing high network throughput is crucial for the emerging WSNs applications. In this paper, a thorough review of recent multichannel MAC protocols is provided along with a classification framework to deeply understand the design aspects for each protocol.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!