Abstract: Wireless sensor networks (WSN) have grabbed much attention in recent years due to their potential use in many applications. One such application is deploying WSN in underground mines to monitor the miner 's physical signals as well as the environment they are exposed to. However, due to the resource constraints of sensor nodes and the adhoc-formation of the network, in addition with an unattended deployment, pose un-conventional demands provoke the need for special techniques for design and management of WSN. Because of the restrictions caused by the lossy dielectric walls and ceilings in the underground mines, the radio signal propagation characteristics are significantly different from those of terrestrial wireless channels. In this paper, underground WSN is designed considering worker’s safety in under-ground, increased energy efficiency and productivity as main goals.
Keywords: WSN, BS, Energy, Latency, Throughput
Design:
We assume a group of 15-20 miners are going down the given architecture to coal mine every day. Availability of power to the sensor node is the most important metric to be taken into consideration because the sensor node functionality is degraded if it is not aided with sufficient power supply. Dis-functioning of such sensor nodes might affect the functioning of the entire sensor network and safety of workers cannot be ensured. Batteries of mobile sensor suit of the worker can be charged or replaced if the energy is insufficient to monitor
In the location-based routing, sensor nodes are distributed randomly in an interesting area. They are positioned mostly by utilizing of Global position system. The distance among the sensor nodes is evaluated by the signal strength obtained from those nodes and coordinates are computed by interchanging information among neighbouring nodes. Location-based routing networks are;
So we will definitely need to have a base station that controls all the sensors and makes sure that it uses encryption to secure communication. We will have authentication, so that we can ensure data integrity and origin and to prevent injection of unauthorized messages. Use confidentiality, so that we can ensure secrecy of data and prevent eavesdropping. To accomplish this we are going to use Sensor-Network Encryption Protocol (SNEP) and micro Timed Efficient Stream Loss-tolerant Authentication
After 13 years of marriage, celebrity couple Gwen Stefani and Gavin Rossdale have decided to call it quits. It is reported that 45-year-old Stefani was the one to file for divorce, citing "irreconcilable differences" in her divorce petition. Stefani also denied spousal support and filed for joint custody of the couple's three sons Kingston (age 9), Zuma (age 6), and Apollo (age 1).
Abstract - Wireless Sensor Networks (WSN) comprises of several tiny, low-cost, resource constrained sensor nodes. These nodes are placed in harsh environments and generally are used for air pollution monitoring, water quality monitoring, industrial monitoring, health monitoring and more. Routing is difficult in such surroundings primarily due to the unique constraints the wireless sensor networks suffer from. Wireless sensor network is highly dynamic, making existing routing protocols ineffective. This paper concentrates on energy efficiency of the protocols. Both the protocol presented are hierarchical and cluster based. Both have sensor nodes and a base station (BS). The BS selects the Cluster Heads (CH) among themselves. CH is the elected sensor node which passes on the sensor data collected by sensor nodes of its cluster to either BS or other CH. All candidate nodes for becoming CH are listed, based on the various factors like relative distance of the candidate node from the Base Station, outstanding energy level, possible number of neighboring sensor nodes the
At present, much of the edible food of Australia is being needlessly thrown away. This problem should be controlled, due to the fact that is one of the most significant causes of environmental disasters. In addition, it may entail issues related to hunger in both wealthy and poor countries.
Wireless Sensor Network (WSN) consists of a large number of low cost sensor nodes depolyed in parking area. These sensor nodes form a multi-hop ad-hoc network by wireless commnunication.
Wireless Ad hoc Network are important emerging technology that is low cost, most effective. Although a large amount of research has been done on mobile Ad hoc Network technology, yet truly understanding these networks has been low and the implementation of these networks is very less. This is because in some areas it is difficult to implement wireless networks as it is an expensive process and implementing new algorithm and new protocols is difficult replacing all the protocols that are currently used. Although the important fact is that these networks are not used to its full capacity. Large amount of research is going on the Ad hoc networks and exploit these networks in far more better way. Ad hoc network technology has many future applications. It can be used widely used for military application, can be used for UAV's , for detecting of the chemicals and materials underground.
Sensor nodes are deployed without any prior planning so the topology of network may change due to many reasons like change in node position, failure of node due to physical damage, and limited available power.
In most cases, the sensors forming these networks are deployed randomly and left unattended to and are expected to perform their mission properly and efficiently. As a result of this random deployment, the WSN has usually varying degrees of node density along its area. Sensor networks are also energy constrained since the individual sensors, which the network is formed with, are extremely energy-constrained as well. The communication devices on these sensors are small and have limited power and range.
processing. Sensor nodes are of very small size, consume extremely low energy, are operated in high
The clustering protocols aim is to minimize the energy consumption for each node and to maximize the network lifetime of wireless sensor networks. In wireless sensor networks the node are densely deployed and it consumes large energy, it acquires from cluster formation overhead and fixed level clustering. The proposing method is Power Efficient and Adaptive Clustering Hierarchy Protocol (PEACH) for wireless sensor networks. In PEACH, when the anticipation of the node reaching highest energy to become a Cluster Head, legitimacy in power consumption can be improved. PEACH supports adaptive multilevel clustering and the cluster structure forms without additional overhead. The simulation result analyzes that the, PEACH protocol minimizes the energy consumption of each node and the proposing method support the hybrid multi-hop routing algorithm which extend the network lifetime of wireless sensor network from surviving with hot spot problem.
WSN devices can operate over a wide temperature range, are less prone to shocks and vibration, and provide safety and electromagnetic compatibility. A wireless measurement system frees you from the confines of wired infrastructure [8].
There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage. This paper is an effort to introduce the
All the sensor nodes are battery powered devices, and energy consumption of these nodes affects the life-time of the entire network during transmission or reception of packets. Presently number of energy efficient routing protocols has been developed like LEACH
Wireless communication has become an indispensable tool in the world today. Most of the world is connected and as a result, we have been able to carry out multiple tasks in a short time leaving us spare time to engage in other activities that demand our attention. Wireless networks have gone through several developmental phases to offer the fast and efficient services that we have presently. In this paper, I discuss the various classifications of wireless networks, going into details about their unique characteristics and why most people and organizations opt for them instead of their wired counterparts.