Crisis management using MAS-based wireless sensor networks
نویسندگان
چکیده
Wireless communication is increasingly used to manage large-scale crises (e.g., natural disasters or a large-scale city fire). Communication has traditionally been based on cellular networks. However, real-life experience has proven that the base stations of these networks may collapse or become unreachable during a crisis. An incident commander must also know as much information as possible about the occurring events to control them quickly and efficiently. This paper thus proposes a crisis management approach that overcomes the problems encountered by the base stations and insures relevant, rich and realtime information about events. This approach is based on wireless sensor networks, which are distributed in nature with no need for infrastructure and could be deployed in dangerous and inaccessible zones to gather information. Our proposal uses a multi-agent system as a software layer. The multi-agent system aims to improve the wireless sensor network performance by allowing cooperation between sensor nodes, offering better lifetime management and virtualizing the application layer. This virtualization supports several required applications simultaneously, including event monitoring and object tracking. Through successive simulations, we prove the importance of our approach in crisis management using several criteria to estimate the position’s error in object tracking, end-toend delay and wireless sensor network lifetime management. 2012 Elsevier B.V. All rights reserved.
منابع مشابه
Target Tracking Based on Virtual Grid in Wireless Sensor Networks
One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملAn Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 57 شماره
صفحات -
تاریخ انتشار 2013