Thecritical Event Monitoring In Wireless Sensor Networks Using Sleep Scheduling

نویسنده

  • K. Somu
چکیده

In this project, I concentrate on critical event monitoring occur in wireless sensor networks (WSNs), most of the time small number of packets get transmit on network. When critical event occurs, an alarm message should be broadcast to the entire network as soon as possible. To elongate the network lifetime, in WSNs some sleep scheduling methods are always employed. Resulting in significant delay broadcasting, especially in large scale WSNs. In this project, I propose a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. I design two determined traffic paths for the transmission of alarm message, and level-by-level based wake-up pattern according to the paths, respectively. An alarm is quickly transmitted along one of the traffic paths to a center node, when a critical event occurs and then it is immediately broadcast by the center node along another path without any collision.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS

Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Prioritization the Criteria of Wireless Sensor Networks in the Rehabilitation Supervision Using the Fuzzy MCDM Approach

Introduction: The "Wireless Sensor Network" based rehabilitation is one of the major issue in hospitals. The purpose of this study was to prioritization the criteria of wireless sensor networks in the rehabilitation supervision using the Fuzzy MCDM Approach. Methods: In this descriptive study, the population consisted of all doctors and nurses in Tehran Day's Hospital, with 210 people. From the...

متن کامل

Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks

Over the past decade, local monitoring has been shown to be a powerful technique for improving security in multihop wireless sensor networks (WSNs). However, local monitoring as it is currently practiced is costly in terms of energy consumption. Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014