A Fire Monitoring Application for Scattered Wireless Sensor Networks - A Peer-to-Peer Cross-layering Approach
نویسندگان
چکیده
A cross-layering alarm application is proposed for supporting fire fighting operations. It runs on scattered wireless sensor networks (WSN) composed by several isolated WSNs, where sensor nodes can be destroyed by fire. Mobile patrol nodes deploy the alarm monitoring application and collect the alarm records, containing the set of sensor measurements above the threshold values. The application was implemented in TinyOS 2.0, on Telos B motes. It uses a new Multimode Hybrid MAC, which can be controlled by the application. The application uses asynchronous mode when no alarms are active to optimise energy consumption; changes to full on mode (without sleeping) to minimise delay during fire handling situations; and uses the synchronous mode (with reserved bandwidth) during the transference of alarm records to the patrol node, balancing delay and energy saving. The alarm application organises sensor nodes into a clustered virtual overlay network and run a peer-to-peer searching service on top of it. This service is used to locate nodes outside the danger area, and to locate alarm records. The application performance was tested using TOSSIM simulations. Simulations results show the application capacity to capture a fire evolution.
منابع مشابه
Prioritization the Criteria of Wireless Sensor Networks in the Rehabilitation Supervision Using the Fuzzy MCDM Approach
Introduction: The "Wireless Sensor Network" based rehabilitation is one of the major issue in hospitals. The purpose of this study was to prioritization the criteria of wireless sensor networks in the rehabilitation supervision using the Fuzzy MCDM Approach. Methods: In this descriptive study, the population consisted of all doctors and nurses in Tehran Day's Hospital, with 210 people. From the...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملAn Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کامل