On network connectivity of wireless sensor networks for sandstorm monitoring
نویسندگان
چکیده
As serious natural disasters, sandstorms have caused massive damages to the natural environment, national economy, and human health in the Middle East, Northern Africa, and Northern China. To avoid such damages, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can collaboratively monitor the origin and development of sandstorms. Despite the potential advantages, the deployment of WSNs in the vicinity of sandstorms faces many unique challenges, such as the temporally buried sensors and increased path loss during sandstorms. Consequently, the WSNs may experience frequent disconnections during the sandstorms. In this paper, the connectivity issue of WSNs for sandstorm monitoring is studied. First, four types of channels a sensor can utilize during sandstorms are analyzed, which include air-to-air channel, air-to-sand channel, sand-to-air channel, and sand-to-sand channel. Based on these analytical results, the percolation-based connectivity analysis is performed. It is shown that if the sensors are buried in shallow depth, allowing sensor to use multiple types of channels improves network connectivity. Accordingly, much smaller sensor density is required compared to the case, where only terrestrial air channels are used. Through this connectivity analysis, a WSN architecture can be established for efficient and effective sandstorm monitoring. 2010 Elsevier B.V. All rights reserved.
منابع مشابه
Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
متن کاملRepresenting a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
متن کاملENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS
Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 55 شماره
صفحات -
تاریخ انتشار 2011