Дисертації з теми "Wireless sensor networking"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Wireless sensor networking".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Spinden, David, Jeffrey Jasper, and Kurt Kosbar. "Comparison of Wireless Ad-Hoc Sensor Networks." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605786.
Повний текст джерелаThere are a number of telemetry applications where it would be helpful to have networks of sensors that could autonomously discover their connectivity, and dynamically reconfigure themselves during use. A number of research groups have developed wireless ad-hoc sensor network systems. This paper reviews the state-of-the-art in wireless ad-hoc networks, examining the features, assumptions, limitations and unique attributes of some of the more popular solutions to this problem.
Kuppaswamy, Karthik. "Maximizing the System Lifetime in Wireless Sensor Networks using Improved Routing Algorithm." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/theses/677.
Повний текст джерелаZhang, Fenghui. "Effective algorithms and protocols for wireless networking: a topological approach." Diss., Texas A&M University, 2008. http://hdl.handle.net/1969.1/86012.
Повний текст джерелаXie, Liguang. "Modeling and Optimization of Rechargeable Sensor Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/52243.
Повний текст джерелаPh. D.
Yagli, Mehmet. "The Feasibility, Reliable Communication And Networking Aspects Of Passive Wireless Sensor Networks." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607729/index.pdf.
Повний текст джерелаGhataoura, D. S. "Networking and application interface technology for wireless sensor network surveillance and monitoring." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1348374/.
Повний текст джерелаModieginyane, Kgotlaetsile Mathews. "Flexible network management in software defined wireless sensor networks for monitoring application systems." Thesis, University of Pretoria, 2018. http://hdl.handle.net/2263/66016.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2018.
National Research Foundation (NRF)
Telkom Centre of Excellence
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
Lydon, Sean Michael. "General Direction Routing Protocol." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/97.
Повний текст джерелаKuntz, Romain. "Medium Access Control Facing the Dynamics of Wireless Sensor Networks." Phd thesis, Université de Strasbourg, 2010. http://tel.archives-ouvertes.fr/tel-00521389.
Повний текст джерелаSun, Zhi. "Reliable and efficient communication in wireless underground sensor networks." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41150.
Повний текст джерелаZen, Kartinah. "MAC protocol design considerations for efficient mobility in wireless sensor networks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/1869.
Повний текст джерелаClark, Shyla. "Remote Monitoring of Cherry Wetness Using a Leaf Wetness Sensor and a Wireless Sensor Network." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2448.
Повний текст джерелаSegura, Gustavo Alonso Nuñez. "Energy consumption prediction in software-defined wirelwss sensor networks." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-04052018-113551/.
Повний текст джерелаA conservação da energia é uma das principais preocupações nas Redes de Sensores Sem Fio (WSN, do inglês Wireless Sensor Networks). Para reduzir o consumo de energia, é importante saber como a energia é gasta e quanta energia há disponível durante o funcionamento da rede. Diversos trabalhos anteriores propuseram modelos de consumo de energia focados no módulo de comunicação, ignorando o consumo por tarefas de processamento e sensoriamento. Outros trabalhos apresentam modelos mais completos e complexos, mas carecem de experimentos que demonstrem a exatidão em dispositivos reais. O objetivo principal deste trabalho é projetar e avaliar um modelo de consumo de energia para WSN que considere o consumo por sensoriamento, processamento e comunicação. Este modelo foi utilizado para implementar dois mecanismos de previsão de consumo de energia, um deles baseado em cadeias de Markov e o outro baseado em séries temporais. As métricas para avaliar o desempenho do modelo e dos mecanismos de previsão de consumo de energia foram: exatidão da estimativa de consumo de energia, exatidão da previsão de consumo de energia e uso dos recursos de comunicação e processamento do nó. O desempenho dos mecanismos de previsão de consumo de energia foram comparados utilizando dois esquemas de implementação: rodando o algoritmo de previsão no nó sensor e rodando o algoritmo de previsão em um controlador de rede definida por software. A implementação foi conduzida utilizando IT-SDN, um arcabouço de desenvolvimento de redes de sensores sem fio definidas por software. A avaliação foi feita com simulações e emulações utilizando o simulador COOJA e ensaios com dispositivos reais utilizando o TelosB. Os resultados mostraram que considerando o consumo de energia por sensoriamento, processamento e communicação, é possivel fazer uma estimativa de consumo de energia em redes de sensores sem fio com uma boa exatidão. Ainda, o uso de um controlador de rede definida por software para processamento de algoritmos de previsão complexos pode aumentar a exatidão da previsão.
Baccelli, Emmanuel. "IP-Disruptive Wireless Networking: Integration in the Internet." Habilitation à diriger des recherches, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00770791.
Повний текст джерелаJin, Xinyu. "Trajectory Privacy Preservation in Mobile Wireless Sensor Networks." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/983.
Повний текст джерелаPignaton, de Freitas Edison. "Cooperative Context-Aware Setup and Performance of Surveillance Missions Using Static and Mobile Wireless Sensor Networks." Doctoral thesis, Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16476.
Повний текст джерелаErdelj, Milan. "Mobile wireless sensor network architecture : applications to mobile sensor deployment." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2013. http://tel.archives-ouvertes.fr/tel-00914987.
Повний текст джерелаLetswamotse, Babedi Betty. "Software defined networking based resource management and quality of service support in wireless sensor network applications." Thesis, University of Pretoria, 2018. http://hdl.handle.net/2263/67319.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2019.
National Research Foundation
University of Pretoria
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
Mehta, Anil. "MAC AND APPLICATION LAYER PROTOCOLS FOR HIGH PERFORMANCE NETWORKING." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/396.
Повний текст джерелаFreitas, Edison Pignaton de. "Cooperative context-aware setup and performance of surveillance missions using static and mobile wireless sensor networks." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2011. http://hdl.handle.net/10183/39120.
Повний текст джерелаSurveillance systems are usually employed to monitor wide areas in which their users are interested in detecting and/or observing events or phenomena of their interest. The use of wireless sensor networks in such systems is of particular interest as these networks can provide a relative low cost and robust solution to cover large areas. Emerging applications in this context are proposing the use of wireless sensor networks composed of both static and mobile sensor nodes. Motivation for this trend is to reduce deployment and operating costs, besides providing enhanced functionalities. This work focuses on the proposal of solutions for wireless sensor networks including static and mobile sensor nodes specifically regarding cooperative and context aware mission setup and performance. The goal is to keep the communication costs as low as possible in the execution of the proposed solutions. This concern comes from the fact that communication increases energy consumption, which is a particular issue for energy constrained sensor nodes often used in wireless sensor networks, especially if battery supplied. In the case of the mobile nodes, this energy constraint may not be valid, since their motion might need much more energy, but links instabilities and short time windows available to receive and transmit data. Therefore, it is better to communicate as little as possible. For the interaction among static sensor nodes, the problems of dissemination and allocation of sensing missions are studied and a solution that explores local information is proposed and evaluated. This solution uses mobile software agents that have capabilities to take autonomous decisions about the mission dissemination and allocation using local context information. For mobile wireless sensor networks, the problem studied is how to perform handover of missions among the nodes according to their movements and locations in relation to the place where the missions have to be performed. To handle this problem, a mobile agent approach is proposed in which the agents implement the sensing missions’ migration from node to node using geographical context information to decide about their migrations. For the networks combining static and mobile sensor nodes, the cooperation among them is approached by a biologically-inspired mechanism to deliver data from the static to the mobile nodes. The data delivery mechanism explores an analogy based on the behaviour of ants building and following trails, inspired by the ant colony algorithm. The proposed solutions are flexible, being able to be applied to different application domains. Obtained experimental results provide evidence of the scalability of these proposed solutions, for example by evaluating their cost in terms of communication, among other metrics of interest for each solution. These results are compared to those achieved by reference solutions (theoretical optimum and floodingbased), providing indications of the proposed solutions’ efficiency. These results are considered close to the theoretical optimum one and significantly better than the ones achieved by flooding-based solutions.
Davis, Joseph A. Sr. "An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT)." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2297.
Повний текст джерелаThe objective of this research is to analyze the network performance and sensor functionality, efficacy and usability of IEEE 802.x wireless MESH networks within a DoD Tactical network environment. Multiple sensor configurations operating with wireless MESH network technologies will be researched and analyzed for performance in expeditionary environment situations. Specifically, this thesis will attempt establish the foundation for the development of wireless MESH "network health" models by examining the performance of sensors operating within a MESH network and define which network performance metrics equate to good quality of service. This research will experiment with different application, sensor, and network configurations of currently available COTS components, such as, voice, video and data hardware. This thesis will lay the groundwork for wireless network MESH predictability, which will enable the optimal use of sensors within a tactical network environment.
Lieutenant Commander, United States Navy
Pumpichet, Sitthapon. "Novel Online Data Cleaning Protocols for Data Streams in Trajectory, Wireless Sensor Networks." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/1004.
Повний текст джерелаStucki, Eric Thomas. "Medium Access Control and Networking Protocols for the Intra-Body Network." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1182.pdf.
Повний текст джерелаMilicic, Gregory J. "Analysis of hardware requirements for airborne tactical mesh networking nodes." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2218.
Повний текст джерелаWireless mesh mobile ad hoc networks (MANETs) provide the military with the opportunity to spread information superiority to the tactical battlespace in support of network-centric warfare (NCW). These mesh networks provide the tactical networking framework for providing improved situational awareness through ubiquitous sharing of information including remote sensor and targeting data. The Naval Postgraduate School's Tactical Network Topology (TNT) project sponsored by US Special Operations Command seeks to adapt commercial off the shelf (COTS) information technology for use in military operational environments. These TNT experiments rely on a variety of airborne nodes including tethered balloon and UAVs such as the Tern to provide reachback from nodes on the ground to the Tactical Operations Center (TOC) as well as to simulate the information and traffic streams expected from UAVs conducting surveillance missions and fixed persistent sensor nodes. Airborne mesh nodes have unique requirements that can be implemented with COTS technology including single board computers and compact flash.
Lieutenant, United States Navy
Dunkels, Adam. "Programming Memory-Constrained Networked Embedded Systems. PhD thesis." Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-173.
Повний текст джерелаMahfoudh, Saoucene. "Energy efficiency in wireless ad hoc and sensor networks : routing, node activity scheduling and cross-layering." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00757251.
Повний текст джерелаMeghji, Mahir Lumumba. "On a Joint Physical Layer and Medium Access Control Sublayer Design for Efficient Wireless Sensor Networks and Applications." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2013. https://ro.ecu.edu.au/theses/590.
Повний текст джерелаLönn, Johan, and Jonas Olsson. "ZigBee for wireless networking." Thesis, Linköping University, Department of Science and Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2885.
Повний текст джерелаThe past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. However, there are many wireless monitoring and control applications for industrial and home environments which require longer battery life, lower data rates and less complexity than those from existing standards. What the market need is a globally defined standard that meets the requirement for reliability, security, low power and low cost. For such wireless applications a new standard called ZigBee has been developed by the ZigBee Alliance based upon the IEEE 802.15.4 standard.
The aim of this diploma work is to design fully functional ZigBee and IEEE 802.15.4 modules, and to evaluate an application in a sensor network.
This diploma work has resulted in two fully functional ZigBee and IEEE 802.15.4 modules, respectively. It is also shown that ZigBee sensors can be networked wirelessly. Eventually it is the authors hope that the modules will be used within ITN, and also be developed further for new applications.
Chis, Andréea. "Méthodes et outils pour la compilation et l'optimisation logicielle des systèmes embarqués sans fil dédiés à des applications." Phd thesis, Ecole normale supérieure de lyon - ENS LYON, 2012. http://tel.archives-ouvertes.fr/tel-00768830.
Повний текст джерелаKaba, James, and Paul Hashfield. "AD HOC NETWORKING OVERVIEW AND APPLICATION TO A BATTLEFIELD SENSORS SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606673.
Повний текст джерелаAd hoc networking protocols enable the formation of self-organizing networks with automatic selfhealing operation in dynamic environments. There are a number of existing or planned ad hoc implementations and a body of research on protocols and performance. Ad Hoc technologies promise significant impact in future communications architectures. This paper presents a general overview of ad hoc networking and presents specific examples, including a recent implementation of a prototype ad hoc networked sensor system. The protocols used have unique characteristics derived by tailoring particular protocols to the specific application requirements. The potential relevance of ad hoc networking to possible telemetry applications is discussed.
Claeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Повний текст джерелаThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Brun-Laguna, Keoma. "Deterministic Networking for the Industrial IoT." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS157.
Повний текст джерелаThe Internet of Things (IoT) evolved from a connected toaster in 1990 to networks of hundreds of tiny devices used in industrial applications. Those “Things” usually are tiny electronic devices able to measure a physical value (temperature, humidity, etc.) and/or to actuate on the physical world (pump, valve, etc). Due to their cost and ease of deployment, battery-powered wireless IoT networks are rapidly being adopted. The promise of wireless communication is to offer wire-like connectivity. Major improvements have been made in that sense, but many challenges remain as industrial application have strong operational requirements. This section of the IoT application is called Industrial IoT (IIoT). The main IIoT requirement is reliability. Every bit of information that is transmitted in the network must not be lost. Current off-the-shelf solutions offer over 99.999% reliability. That is, for every 100k packets of information generated, less than one is lost. Then come latency and energy-efficiency requirements. As devices are battery-powered, they need to consume as little as possible to be able to operate during years. The next step for the IoT is to target time-critical applications. Industrial IoT technologies are now adopted by companies over the world, and are now a proven solution. Yet, challenges remain and some of the limits of the technologies are still not fully understood. In this work we address TSCH-based Wireless Sensor Networks and study their latency and lifetime limits under real-world conditions. We gathered 3M network statistics 32M sensor measurements on 11 datasets with a total of 170,037 mote hours in real-world and testbeds deployments. We assembled what we believed to be the largest dataset available to the networking community. Based on those datasets and on insights we learned from deploying networks in real-world conditions, we study the limits and trade-offs of TSCH-based Wireless Sensor Networks. We provide methods and tools to estimate the network performances of such networks in various scenarios. We believe we assembled the right tools for protocol designer to built deterministic networking to the Industrial IoT
Younus, Muhammad Usman. "Contribution to energy optimization in WSN : routing based on RL and SDN oriented routing." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30052.
Повний текст джерелаWireless Sensor Networks (WSNs) have achieved great significance as these networks allow real-world observations because of their technical deployment into many global applications and low-power usage of computing devices. These networks consist of several on-chip sensors that are low-power and low-cost. The multi-hop communication at low data rates is made by a small range of communication of sensor nodes, but with limited bandwidth. Therefore, individual devices transmit their data to a central device (e.g., sink) by detecting the surrounding environment through the multiple-hops. WSNs applications mainly include healthcare monitoring, environmental monitoring, industrial monitoring, target tracking, and many other commercial areas. Such types of WSNs applications are low-powered nodes that remain active after their initial deployment for long-term without any external control. A node will discharge its battery in a couple of days when no energy-efficient approach is used for communication. It leads the researchers to develop routing protocols that should be able to minimize energy consumption. WSNs energy consumption can be reduced by managing network resources. For this purpose, some networking architectures (i.e., Software Defined Networking (SDN)) and learning techniques (i.e., Reinforcement Learning (RL)) can be used for network management (routing) that lead to reduce the energy consumption of sensor nodes. One of the solutions being proposed is the RL technique to overcome the routing problem. RL is a class of machine learning (ML) which provides a framework to learn the system from its previous interactions with environment to select future action efficiently. In RL, the learner is known as an agent that interacts with its environment to select the next action that would be applied to the environment. Also, it gets the feedback in terms of reward that can be positive or negative according to performed action. For example, to make the routing decision, the router interacts with neighboring nodes to select the next forwarder for the data packet transmission up to the destination (i.e., Base Station (BS) or sink node). In such case the router is an agent, the neighboring nodes behave as an environment for that agent, and actions select the next neighboring nodes to send the data packets. RL can be a good choice to optimize a routing path where network energy consumption is reduced to enhance the lifetime. Another proposed solution is the concept of SDN to overcome the routing problem. It can be defined as an emergent architecture of networks to carry out the decoupling of network control that is precisely programmable. This novel paradigm is dramatically promising to enable evolution and network management. The basic idea behind this concept is the same as computing resources and storage. In this thesis, we propose energy-efficient mechanisms in WSNs for the routing purposes to extend the network’s lifetime. The proposed work is performed by using two different techniques, namely as RL and SDN. The first part of this thesis provides a comprehensive detail of existing energy-efficient mechanisms; while, the second part contains the proposed techniques
Zeghilet, Houda. "Le routage dans les réseaux de capteurs multimédia." Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00922266.
Повний текст джерелаMakkaoui, Leila. "Compression d'images dans les réseaux de capteurs sans fil." Phd thesis, Université de Lorraine, 2012. http://tel.archives-ouvertes.fr/tel-00795503.
Повний текст джерелаHarchi, Said. "Un protocole de session dans les réseaux de capteurs sans fils." Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00961091.
Повний текст джерелаFrancillon, Aurélien. "Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks." Phd thesis, Grenoble INPG, 2009. http://tel.archives-ouvertes.fr/tel-00540371.
Повний текст джерелаErdene-Ochir, Ochirkhand. "Résilience et application aux protocoles de routage dans les réseaux de capteurs." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00862710.
Повний текст джерелаMouradian, Alexandre. "Proposition et vérification formelle de protocoles de communications temps-réel pour les réseaux de capteurs sans fil." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00910394.
Повний текст джерелаLi, Yanjun. "Support de la qualité de service dans les réseaux de capteurs sans fil pour la détection d'événements." Phd thesis, Université Henri Poincaré - Nancy I, 2010. http://tel.archives-ouvertes.fr/tel-00537600.
Повний текст джерелаNefzi, Bilel. "Mécanismes auto-adaptatifs pour la gestion de la Qualité de Service dans les réseaux de capteurs sans fil." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00645504.
Повний текст джерелаHalász, Dávid. "Internet of Things zařízení s podporou ZigBee a 6LoWPAN." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-363739.
Повний текст джерелаLu, Hsi-Feng, and 陸錫峰. "Design of Wireless Sensor Networking Architecture." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/95266949130799308235.
Повний текст джерела國立東華大學
資訊工程學系
97
Advances in micro-sensor and radio technology enable the deployment of small but smart sensor nodes for various environmental monitoring applications. Because sensor nodes may be spread over a large outdoors area or deployed in many isolate indoor space, managing numerous wireless sensor nodes directly is inefficient or impossible. Hierarchical management can reduce the costs of managing nodes and of the communication among them. This study presents an algorithm for self-organization management of higher-level nodes, contesting member nodes using multi-hop to form hierarchical clusters, and applying the “20/80 Rule” to determine the ratio of headers to member nodes. Furthermore, the broadcast tree is constructed with the minimum number of hops. The simulation indicates how the 20/80 Rule affects the formation of clusters between sensor nodes. From the observations of simulation results, comparing with the same type approach, the proposed algorithm has lower cover loss about 22%~6% at the same conditions that 100 nodes deployed randomly in different sensor field areas (100*100, 200*200, and 300*300). In addition, the simulation shows too high the ratio of header and member is waste. The higher density achieves the stronger link between the nodes, and the stronger link achieves the lower cover loss. From the observations of above results, we found the density and proper proportional that are very important factors for self-organization mechanism of wireless sensor network. This study also proposed a novel middleware of wireless sensor network for tele-homecare systems and it is suitable for all kinds of wireless sensor network. The architecture includes three layers: device management layer, data management layer and application layer. Vital signs sensing is achieved by wireless sensor node integrated with medical device or by sensors connected with serial link. The two-layer middleware is defined as the software above the medical sensor network but below the application program that provides a common programming abstraction for tele-homecare system. An application— Tele-Homecare Household Monitor System— was implemented and evaluated based on the proposed middleware. The performance of the middleware also was discussed and compared in the case of with/without aggregation and three different level of the aggregation implementation. To increase power efficiency and prolong the system life-time, the aggregation functions should be implemented on the sensor node of the wireless sensor network if this is feasible. To minimize the message delay, the aggregation functions should be implemented on cluster head. Therefore, the aggregation function should be implemented in every level of the wireless sensor network if the wireless nodes have enough memory and computation power for it. Good message aggregation and filtering significantly reduce the number of messages transmitted and stored in the system, and could translate the sensed readings into useful and meaningful information. For the variety of interfaces to sensor network and the heterogeneous of wireless sensor network, a middleware is necessary to provide a common platform for programmer to develop WSN applications fast and easily. Moreover, this study presents an intelligent sensor network for object detection, classification, and recognition. Wireless sensors are utilized in the first layer of the network to discover the coordinates of unauthorized intruders. Cameras are activated to capture image features for object classification and recognition. Additionally, a hierarchical image extraction approach is developed to reduce processing time. Global object features such as size and motion are acquired for classification into a number of classes. If the intruder is unauthorized, the cameras will be requested to capture detailed images for object recognition. Experimental results show that the proposed system can not only detect any unauthorized intrusion efficiently, but can also classify and recognize the intruder accurately with a recognition rate of 95.4%. Finally, a SNMP-based wireless sensor network management architecture is proposed and a prototype system is implemented. This prototype system presents the necessary functions and the user interfaces for the features of wireless sensor network. It is a good start for researchers to design wireless sensor network management application.
Tsai, Chia-Hung, and 蔡佳宏. "Networking Issues in ZigBee Wireless Sensor Networks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/83925947173477044638.
Повний текст джерела國立交通大學
資訊科學與工程研究所
100
ZigBee is a communication standard which is considered to be suitable for wireless sensor networks. In the ZigBee protocol stack, physical and MAC layer protocols are adopted from the IEEE 802.15.4 standard [16]. ZigBee solves interoperability issues from the physical layer to the application layer. IEEE 802.15.4 defines two different modes for medium access: beaconenabled mode and beaconless mode. ZigBee supports tree and mesh network topologies. In this dissertation, we will focus on the networking issues in ZigBee beacon-enabled, tree-based networks and beaconless mesh networks. Among the well-known ZigBee topologies, ZigBee beacon-enable cluster-tree is especially suitable for wireless sensor applications with its supporting of power-saving operation and lightweight routing. The backbone of a tree network is formed by ZigBee distributed address assignment scheme. This assignment is easy to implement, but it restricts the number of children of a device and the depth of the network. We observe that the ZigBee address assignment policy is too conservative, thus usually making the utilization of the address pool poor. Those devices that can note network addresses will be isolated from the network and become orphan nodes. The orphan problem leads to the difficulty in smoothly increasing the network coverage or device density. Therefore, we propose our first research work to addressing how to alleviate the orphan problems effectively. We propose a ZigBee-compatible address assignment through temporal duplications to alleviate orphans and scale the networks. A light-weight, address-based, tree-based routing is proposed to support one-to-one routings in address-reused environments. Simulation results verify the effectiveness of the proposed solution. In our second research work, we discuss the ZigBee orphan problems in long-thin (LT) topologies. Although our temporal duplication addressing can significantly alleviate orphans in ZigBee tree networks, its deployment is still a main concern. We further observe that many monitoring applications for WSNs have adopted a path-connected-cluster (PCC) topology, where regions to be monitored are deployed with clusters of sensor nodes. Since these clusters might be physically separated, paths of sensor nodes are used to connect them together. We call such networks PCC-WSNs. PCC-WSNs may be widely applied in real situations, such as bridgeconnected islands, street-connected buildings, and pipe-connected ponds. In this work, we show that the address assignment scheme defined by ZigBee will perform poorly in terms of address utilization. We then propose a systematical solution, which includes network formation, automatic address assignment, and light-weight routing. Simulation results verify the effectiveness of the proposed solution. In our third research topic, we address the networking issues in ZigBee mesh networks. Mesh network topologies are seen as a flexible and robust manner to provide multi-hop communication. Mesh topologies offer flexibility and robustness by facilitating path formation from any source to any destination within the network. In ZigBee, stochastic address assignment mechanism is recommended in ZigBee mesh topologies such that networks can be easily scaled up without orphan problems. However, ZigBee mesh networks can only operate in beaconless mode. Power saving is a major concern in a wireless sensor network. Hence, we are interested in linking the asynchronous power-saving protocol and the energy-efficient routing problem together in ZigBee mesh networks. A cross-layer solution is proposed. On the MAC layer, we propose to use the grid-quorum system [40] to serve as the underlying power-saving framework. On the network layer, we propose to find routing paths based on the power cost incurred by grid quorums used by nodes along a path. We show how these two layers interwork with each other to support continuous queries in an energy-efficient way. Simulation results also verify the effectiveness of the proposed solution.
Charalambous, Charalambos. "A Biologically Inspired Networking Model for Wireless Sensor Networks." 2009. http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7508.
Повний текст джерелаNadziejko, Aleksandra Katarzyna. "Wireless Sensor Networking Applied to Swarms of Aquatic Drones." Master's thesis, 2016. http://hdl.handle.net/10400.6/5875.
Повний текст джерелаOs veículos não-tripulados de superfície aquática (VNTSA) tem um enorme potencial para uma vasta gama de atividades marítimas, tais como a monitorização ambiental ou a amortização da vida marinha. Estes veículos podem ser também aplicados em miss6es militares de apoio ao exercito, em situaç6es potencialmente perigosas, tais como miss6es de reconhecimento ou de vigilância. Os USVs (VNTSA) são capazes de realizar diversas tarefas devido ao progresso tecnológico e a redução do tamanho dos equipamentos nos últimos anos. A redução do tamanho e preço, acompanhado pelo aumento da fiabilidade, permitiu o desenvolvimento de sistemas multi-agente em larga escala. Os sistemas multi-agente dos USVs autónomos aquáticos podem agir como um sistema de sen¬sores distribuídos, melhorando o desempenho global, quando comparado com o desempenho de uma unidade de USV isolado, ou seja, quantos mais unidades no sistema, maior área monitor¬izada. Uma abordagem promissora, inspirada na natureza, e inteligência de cardume (swarm intelligence), que pode ser observada na população de insetos, como por exemplo nas formigas. O comportamento do cardume (swarm) e um movimento de um grande numero de elementos, em que cada ume autónomo, porem só em grupo são capazes de resolver tarefas complexas. A troca de informaç6es entre as unidades e essencial para o sucesso do grupo. A arquitectura de comunicação aplicada a cardume pode ser suportada pelas Redes de Sensores Sem Fios (RSSF). Nesta dissertação, foi proposto um cenário para a comunicação "com" e "dentro" do cardume. Os desafios decorrentes das condiç6es ambientais difíceis exigem uma abordagem heterogénea, tal como o proposto nesta dissertação. A comunicação dentro do cardume e realizada uti¬lizando tecnologia de comunicação de curto alcance, tais como os módulos XBee-PRO. Todos os nos atuam como agentes de deteção, que estão equipados com tecnologia de comunicação de curto alcance. A comunicação com o cardume e concretizada usando os nos que funcionam como portas de comunicação (gateways) para a estação de base equipada com tecnologia de longo alcance, tais como os módulos SX1272 de Semtech, chamados LoRa. Foi ainda proposto, implementar nos, atuando como portas de comunicação (gateways) para a estação de base, designados de boias, com localização fixa. Cada no na rede tem conhecimento das coordenadas de GPS das boias, assim, em caso de perda de comunicação, podem (re)orientar-se na direção da boia mais próxima, aumentando a probabilidade de sucesso de comunicação com a estação de base. A tecnologia de comunicação de curto alcance XBee-PRO foi testada, a fim de determinar o alcance da comunicação com linha de vista e sem linha de vista. O objetivo foi melhorar o alcance da ligação (link) de comunicação, que hoje em dia e realizado via Wi-Fi, a distancias de aproximamente 30 m. Os resultados revelam potencial para a implementação no mundo real dos drones aquáticos de superfície.
(9850244), P. Rijal. "A Goal based Architectural Style for Wireless Sensor Networks." Thesis, 2012. https://figshare.com/articles/thesis/A_Goal_based_Architectural_Style_for_Wireless_Sensor_Networks/13387064.
Повний текст джерелаChen, Chih-Jung, and 陳志榮. "Developing an Embedded IPv6 Networking Stack for Wireless Sensor Network." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/24657309724763821846.
Повний текст джерела國立中央大學
資訊工程學系在職專班
101
The integration of Cloud Computing and Internet of Things is considered an important trend and industry in the future. IPv6 protocol is playing a key role in the development. There are a lot of IPv6 solutions presented to fulfill either a specific application or a hardware specification. Therefore, all of them are limited at a variety of heterogeneous network interconnections, low-power consumption and low-cost networking applications. We present an embedded IPv6 networking protocol stack which is based on Contiki uIPv6 and improves the functionality of uIPv6. We separate uIPv6 from Contiki OS in order to reduce the demand of the system resources, like the memory capacity. We also design our own IPv6 packet header compression / decompression mechanisms and the pseudo MAC address header in order to improve the scalability and the network connectivity of low-cost devices. Finally, we achieve the hardware-independent IPv6 networking stack. We also reduce the requirement of the frame payload length of the physical layer to improve the portability of IPv6 networking stack and accelerate the development of a variety of low-cost networking embedded systems. Our experiments show that the low-cost wireless sensor node and the gateway based on 2.4G RF successfully perform the improved uIPv6 networking stack in the absence of Contiki OS assistance. The wireless sensor node and the gateway can perform the IPv6 address configuration, ICMPv6 / UDP, the related network management mechanisms, the packet header compression / decompression mechanisms and the pseudo MAC address processing. The wireless sensor node, the gateway and the remote data collection center can effectively communicate each other via IPv6/ICMPv6/UDP. The research results will provide the rapid development of low-cost embedded IPv6 networking equipment, and accelerate the development of Internet of Things.
(9833915), G. Shafiullah. "Application of wireless sensor networking techniques for train health monitoring." Thesis, 2009. https://figshare.com/articles/thesis/Application_of_wireless_sensor_networking_techniques_for_train_health_monitoring/20380206.
Повний текст джерелаThe use of wireless sensor networking in conjunction with modern machine learning tech- niques is a growing area of interest in the development of vehicle health monitoring (VHM) system. This VHM system informs forward -looking decision making and the initiation of suitable actions to prevent any future disastrous events. The main objective of this thesis is to investigate the design and possible deployment of a less expensive, low-power VHM system for railway operations.
The performance of rail vehicles running on railway tracks is governed by the dynamic behaviours of railway bogies, especially in the cases of lateral instability and track irregular- ities. The proposed VHM system measures and interprets vertical accelerations of railway wagons attached to a moving locomotive using a wireless sensor network (WSN) and ma- chine learning techniques to monitor lateral instability and track irregularities. Therefore this system enables reduction of maintenance and inspection requirements of railway systems while preserving the necessary high levels of safety and reliability.
The thesis is divided into three major sections. First, an energy -efficient data commu- nication system is proposed for railway applications using WSN technology. Initially, a conceptual design of sensor nodes with appropriate hardware design is presented. Then an energy -efficient adaptive time division multiple access (TDMA) protocol is developed, further reducing the power consumption of the data communication system. This data communication system collects data from sensor nodes on the wagons and passes it to the locomotive. Secondly, a data acquisition model involving machine learning techniques is used to further reduce power consumption, computational load and hardware cost of the overall condition monitoring system. Only three sensor nodes are required on each railway wagon body to collect sufficient data to develop a VHM system instead of four sensor nodes in an existing system. Finally, a VHM system is developed to interpret the vertical acceler- ation behaviour of railway wagons using popular regression algorithms that predicts typical dynamic behaviour of railway wagons due to track irregularities and lateral instability.
To summarise, this study introduces wireless sensor networking technology that enables the development of an energy-efficient, reliable and low cost data communication system for railway operational applications. By using machine learning techniques, an energy -efficient VHM system is developed which can be used to continuously monitor railway systems, particularly railway track irregularities and derailment potential with integrity. A major benefit of the developed system is a reduction in maintenance and inspection requirements of railway systems.
Shu, Yu-Yuan, and 許酉遠. "A Convex Hull-Based Localization Scheme for Irregular Wireless Sensor Networking Characteristics." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/91882893361546267153.
Повний текст джерела國立雲林科技大學
電機工程系碩士班
97
Wireless Sensor Network applications have gained more and more attention from the research community. In many applications like environmental monitoring, event detection, route discovery, disaster relief, and objects tracking, location information is both necessary and essential. Central to these applications is a requirement that sensor nodes should be located accurately and efficiently. As far as localization is concerned, considerable literature has assumed the circular coverage area of each wireless sensor node. This assumption, however, is untenable in most cases, because wireless signals are generally subject to physical constraints of propagation path loss and reflection, diffraction, refraction, and scattering of electromagnetic waves. As a consequence, radio signals become irregular, making position assessment liable to significant errors or inaccurate processing. As a remedy, this thesis exploits a mobile anchor node to assist in determining the position of wireless sensor nodes. Unlike other studies restricting the mobile anchor to move rectilinearly, we allow for a pragmatic situation where the mobile anchor can move flexibly to avoid obstacles in course of carrying out the localization process. Accordingly, this thesis provides a means to locate sensor nodes in a variety of non-idealized outdoor spaces containing obstacles. Our scheme distinguishes itself from previous studies in that it operates without reliance upon any baseline measurements about angle, distance, and received signal strength indication between radio transceivers. Our scheme is inspired from the convex hull algorithm to deal with radio signal irregularity that causes localization errors. Thus, our scheme takes on salient capabilities of performing localization in adverse circumstance. Apart from qualitative comparisons with other well known approaches, simulations have been conducted to provide quantitative comparisons among subject schemes as well. Performance results indicate that our proposal is cost effective in sense of maintaining high localization accuracy throughout, yet at the expense of insignificant overhead. Overall performance evaluation concludes that the proposed scheme can get fielded promisingly in practice.