Testing of Event Detection Lateness in Wireless Sensor Networks

نویسندگان

  • Laye Hadji Diakite
  • Li Yu
  • Rabiu Haruna
چکیده

A wireless sensor network (WSNs) technology determines physical properties of the environment through detection of unusual events. The sensor consists of small mini computers powered by batteries and use radio communication for the exchange of information it gathers. The sensors are able to collect the data and exchange the information with all the nodes that were affected and triggered during the event detection. Although the technology has been in use for a period of time it has been noted that there is lateness of the event detection by the technology. Therefore the essence of this paper is to describe the factors affecting the lateness detection of events by WSNs. From the experiment it is evident that varying distance of the sensor nodes to the base station and the transmission power affect the packet data transmission efficiency and thus lateness detection of events. Power level at 5 dBm (maximum level) ensures 90% of the event detected is communicated effectively to the base station whereas minimum power level at -10 dBm allows ineffective detection of events. At -10dBm the base station node could not detect a transmitted data packet at distances beyond 30 feet. Thus the application of any sensor node with the transmitting power at -10 dBm will only be effective at the distance less than 10ft. Therefore, distance of the sensor nodes and the transmission power of the WSNs affect the data packet delivery performance and hence lateness of event detection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

A multi-hop PSO based localization algorithm for wireless sensor networks

A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks

Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer and Information Science

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2013