• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 20
  • 8
  • 3
  • 1
  • Tagged with
  • 41
  • 41
  • 35
  • 23
  • 12
  • 11
  • 11
  • 9
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Security techniques and implementation for wireless sensor network nodes

Iwendi, Celestine O. January 2012 (has links)
No description available.
2

Efficient RF energy scavenging and ultra-low power management for powering wireless sensor nodes /

Arumugam, Vikrant P. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2010. / Printout. Includes bibliographical references (leaves 79-82). Also available on the World Wide Web.
3

Hummingbird: An UAV-aided Energy E cient Algorithm for Data Gathering in Wireless Sensor Networks

Unknown Date (has links)
Energy e ciency is a critical constraint in wireless sensor networks. Wireless sensor networks (WSNs) consist of a large number of battery-powered sensor nodes, connected to each other and equipped with low-power transmission radios. Usually, the sensor nodes closer to the sink are more likely to become overloaded and subject to draining their battery faster than the nodes farther away, creating a funneling e ect. The use of a mobile device as a sink node to perform data gathering is a well known solution to balance the energy consumption in the entire network. To address this problem, in this work we consider the use of an UAV as a mobile sink. An unmanned aircraft vehicle (UAV) is an aircraft without a human pilot on-board, popularly known as a Drone. In this thesis, besides the use of the UAV as a mobile sink node, we propose an UAV-aided algorithm for data gathering in wireless sensor networks, called Humming- bird. Our distributed algorithm is energy-e cient. Rather than using an arbitrary path, the UAV implements an approximation algorithm to solve the well-known NP- Hard problem, the Traveling Salesman Problem (or TSP), to setup the trajectory of node points to visit for data gathering. In our approach, both the path planning and the data gathering are performed by the UAV, and this is seamlessly integrated with sensor data reporting. The results, using ns-3 network simulator show that our algorithm improves the network lifetime compared to regular (non-UAV) data gathering, especially for data intensive applications. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
4

Distributed Algorithms for Energy-Efficient Data Gathering and Barrier Coverage in Wireless Sensor Networks

Unknown Date (has links)
Wireless sensor networks (WSNs) provide rapid, untethered access to information, eliminating the barriers of distance, time, and location for many applications in national security, civilian search and rescue operations, surveillance, border monitoring, and many more. Sensor nodes are resource constraint in terms of power, bandwidth, memory, and computing capabilities. Sensor nodes are typically battery powered and depending on the application, it may be impractical or even impossible to recharge them. Thus, it is important to develop mechanisms for WSN which are energy efficient, in order to reduce the energy consumption in the network. Energy efficient algorithms result in an increased network lifetime. Data gathering is an important operation in WSNs, dealing with collecting sensed data or event reporting in a timely and efficient way. There are various scenarios that have to be carefully addressed. In this dissertation we propose energy efficient algorithms for data gathering. We propose a novel event-based clustering mechanism, and propose several efficient data gathering algorithms for mobile sink WSNs and for spatio-temporal events. Border surveillance is an important application of WSNs. Typical border surveillance applications aim to detect intruders attempting to enter or exit the border of a certain region. Deploying a set of sensor nodes on a region of interest where sensors form barriers for intruders is often referred to as the barrier coverage problem. In this dissertation we propose some novel mechanisms for increasing the percentage of events detected successfully. More specifically, we propose an adaptive sensor rotation mechanism, which allow sensors to decide their orientation angle adaptively, based on the location of the incoming events. In addition, we propose an Unmanned Aerial Vehicle UAV aided mechanism, where an UAV is used to cover gaps dynamically, resulting in an increased quality of the surveillance. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2019. / FAU Electronic Theses and Dissertations Collection
5

Evaluating and improving collection tree protocol in mobile wireless sensor network

Sharma, Dixit 01 July 2011 (has links)
There has been growing interest in the Mobile WSN applications where mobility is the fundamental characteristic of the sensor nodes. Mobility poses many challenges to the routing protocols used in such applications. In this thesis we evaluate the performance of Collection Tree Protocol as applied in mobile WSN scenarios. The simulation study shows CTP performs poorly in mobile scenario because of the frequent tree re-generation resulting from node movements. We compare Collection Tree Protocol with reactive ad hoc network routing protocols. The simulation results show that collection tree protocol performs better than reactive MANET protocols in terms of data delivery ratio and control overhead under low traffic rates. The end-to-end delay obtained in case of reactive protocols is also higher compared to that obtained when using CTP, which is due to their route discovery process. This thesis presents an improved data collection protocol Fixed Node Aided CTP based on the analysis of CTP. The protocol introduces the concept of fixed aided routing into CTP. It is shown that our enhanced CTP outperforms CTP in terms of data delivery ratio and control overhead chosen as performance metrics. / UOIT
6

EFFICIENT AND SECURE IMAGE AND VIDEO PROCESSING AND TRANSMISSION IN WIRELESS SENSOR NETWORKS

Assegie, Samuel January 2010 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Sensor nodes forming a network and using wireless communications are highly useful in a variety of applications including battle field (military) surveillance, building security, medical and health services, environmental monitoring in harsh conditions, for scientific investigations on other planets, etc. But these wireless sensors are resource constricted: limited power supply, bandwidth for communication, processing speed, and memory space. One possible way of achieve maximum utilization of those constrained resource is applying signal processing and compressing the sensor readings. Usually, processing data consumes much less power than transmitting data in wireless medium, so it is effective to apply data compression by trading computation for communication before transmitting data for reducing total power consumption by a sensor node. However the existing state of the art compression algorithms are not suitable for wireless sensor nodes due to their limited resource. Therefore there is a need to design signal processing (compression) algorithms considering the resource constraint of wireless sensors. In our work, we designed a lightweight codec system aiming surveillance as a target application. In designing the codec system, we have proposed new design ideas and also tweak the existing encoding algorithms to fit the target application. Also during data transmission among sensors and between sensors and base station, the data has to be secured. We have addressed some security issues by assessing the security of wavelet tree shuffling as the only security mechanism.
7

Investigating credit based mechanisms for enhancing performance in wireless ad hoc networks

Goldberg, Ariel Shei 12 1900 (has links)
Thesis (MSc)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: This thesis explores two key aspects of wireless ad hoc networks. The first aspect concerns the topic of stimulating cooperation between nodes in a wireless ad hoc network. The functionality of a wireless ad hoc network depends entirely on the willingness of nodes to relay messages on behalf of other nodes. Network functionality depends on ensuring cooperation between nodes, so that each node benefits from continued participation in the network. This suggests an important question: how can cooperation among individual nodes be managed to improve overall wireless ad hoc network performance? The second aspect explored in this thesis concerns the concept of optimal resource utilisation. Wireless ad hoc networks are characterised by limited bandwidth and energy resources, which facilitates deployment in situations in which traditional infrastructure based networks are not practical. This suggests another important question: how can the use of the limited energy and bandwidth resources of wireless ad hoc networks be optimised? This research relies on the concept of a credit-based market economy. Nodes in simulated ad hoc networks use credits to pay for the cost of sending their own traffic and earn credits by forwarding traffic on behalf of other nodes. We show that a credit-based market economy approach can be employed to stimulate and regulate cooperation between nodes in a wireless ad hoc network. We show that this approach can be implemented in a simple decentralised manner and that it has several variants depending on which node is considered to be paying for the service, what the price of each service should be and how we route packets around the network using information derived from the credit-based economy. This thesis demonstrates that several variants of a credit-based scheme can be implemented in a packet based simulator and that these variants result in the stable operation of the network and improve the overall performance. The credit-based mechanisms also show significant improvement to network performance in resource constrained conditions and represent an effective means for optimising limited energy and bandwidth resource. The effectiveness of the credit-based mechanisms increases as the load on the networks increases. / AFRIKAANSE OPSOMMING: Hierdie tesis ondersoek twee belangrike aspekte van draadlose ad hoc-netwerke. Die eerste aspek het betrekking op die onderwerp van 'n stimulerende samewerking tussen die nodusse in 'n draadlose ad hoc-netwerk. Dat die network funksioneer hang daarvan af om samewerking tussen die nodusse te verseker sodat elke nodus voordeel put uit voortgesette deelname in die netwerk. Dit dui op 'n belangrike vraag: Hoe kan die samewerking tussen die individuele nodusse bestuur word om die prestasie van 'n draadlose ad hoc-netwerk te verbeter? Die tweede aspek wat in hierdie tesis ondersoek word, behels die konsep van optimale hulpbronbenutting. Draadlose ad hoc-netwerke word gekenmerk deur beperkte bandwydte- en energie-hulpbronne, wat ontplooiing bewerkstellig in situasies waar tradisionele infrastruktuur-gebaseerde netwerke nie practise moontlik is nie. Dit dui op 'n ander belangrike vraag: Hoe kan die gebruik van die beperkte energie- en bandwydte-hulpbronne van draadlose ad hoc-netwerke optimaal bestuur word? Hierdie navorsing berus op die konsep van 'n krediet-gebaseerde markekonomie. Nodusse in gesimuleerde ad hoc-netwerke gebruik krediete om te betaal vir die versending van hul eie verkeer en nodusse verdien krediete deur die verkeer van ander nodusse aan te stuur. Ons wys dat die benadering van 'n krediet-gebaseerde markekonomie gebruik kan word om die samewerking tussen die nodusse in 'n draadlose ad hoc-netwerk te stimuleer en te reguleer. Ons wys dat hierdie benadering geïmplementeer kan word op 'n eenvoudige gedesentraliseerde wyse. Ons ondersoek verskeie variasies van die benadering, na gelang van watter nodus oorweeg word om vir die diens te betaal, wat die prys van elke diens moet wees en hoe inligting afgelei van die krediet-gebaseerde ekonomie gebruik kan word om pakkies in die netwerk te roeteer. Hierdie tesis toon dat verskeie variante van 'n krediet-gebaseerde skema geïmplementeer kan word in 'n netwerksimulator en dat hierdie variante die stabiele bedryf van en algehele verbetering in die prestasie van die network tot gevolg het. Die krediet-gebaseerde meganismes toon 'n beduidende verbetering in hulpbronbenutting en netwerkprestasie in omgewings met beperkte hulpbronne en verteenwoordig 'n doeltreffende manier om die beperkte energie- en bandwydte-hulpbronne optimaal te benut. Laastens, die doeltreffendheid van die krediet-gebaseerde meganismes word verhoog as die las op die netwerke word verhoog.
8

Anchor Nodes Placement for Effective Passive Localization

Pasupathy, Karthikeyan 08 1900 (has links)
Wireless sensor networks are composed of sensor nodes, which can monitor an environment and observe events of interest. These networks are applied in various fields including but not limited to environmental, industrial and habitat monitoring. In many applications, the exact location of the sensor nodes is unknown after deployment. Localization is a process used to find sensor node's positional coordinates, which is vital information. The localization is generally assisted by anchor nodes that are also sensor nodes but with known locations. Anchor nodes generally are expensive and need to be optimally placed for effective localization. Passive localization is one of the localization techniques where the sensor nodes silently listen to the global events like thunder sounds, seismic waves, lighting, etc. According to previous studies, the ideal location to place anchor nodes was on the perimeter of the sensor network. This may not be the case in passive localization, since the function of anchor nodes here is different than the anchor nodes used in other localization systems. I do extensive studies on positioning anchor nodes for effective localization. Several simulations are run in dense and sparse networks for proper positioning of anchor nodes. I show that, for effective passive localization, the optimal placement of the anchor nodes is at the center of the network in such a way that no three anchor nodes share linearity. The more the non-linearity, the better the localization. The localization for our network design proves better when I place anchor nodes at right angles.
9

Long-term tracking and monitoring of mobile entities in the outdoors using wireless sensors

Radoi, Ion Emilian January 2017 (has links)
There is an emerging class of applications that require long-term tracking and monitoring of mobile entities for characterising their contexts and behaviours using data from wireless sensors. Examples include monitoring animals in their natural habitat over the annual cycle; tracking shipping containers and their handling during transit; and monitoring air quality using sensors attached to bicycles used in public sharing schemes. All applications within this class require the acquisition of sensor data tagged with spatio-temporal information and uploaded wirelessly. Currently there is no solution targeting the entire class of applications, only point solutions focused on specific scenarios. This thesis presents a complete solution (firmware and hardware) for applications within this class that consists of attaching mobile sensor nodes to the entities for tracking and monitoring their behaviour, and deploying an infrastructure of base-stations for collecting the data wirelessly. The proposed solution is more energy efficient compared to the existing solutions that target specific scenarios, offering a longer deployment lifetime with a reduced size and weight of the devices. This is achieved mainly by using the VB-TDMA low-power data upload protocol proposed in this thesis. The mobile sensor nodes, consisting of the GPS and radio modules among others, and the base-stations are powered by batteries, and the optimisation of their energy usage is of primary concern. The presence of the GPS module, in particular its acquisition of accurate time, is used by the VB-TDMA protocol to synchronise the communication between nodes at no additional energy costs, resulting in an energy-efficient data upload protocol for sparse networks of mobile nodes, that can potentially be out of range of base-stations for extended periods of time. The VB-TDMA and an asynchronous data upload protocol were implemented on the custom-designed Prospeckz-5-based wireless sensor nodes. The protocols’ performances were simulated in the SpeckSim simulator and validated in real-world deployments of tracking and monitoring thirty-two Retuerta wild horses in the Doñana National Park in Spain, and a herd of domesticated horses in Edinburgh. The chosen test scenario of long-term wildlife tracking and monitoring is representative for the targeted class of applications. The VB-TDMA protocol showed a significantly lower power consumption than other comparable MAC protocols, effectively doubling the battery lifetime. The main contributions of the thesis are the development of the VB-TDMA data upload protocol and its performance evaluation, along with the development of simulation models for performance analysis of wireless sensor networks, validated using data from the two real-world deployments.
10

Energy-optimized design techniques for wireless communication and ubiquitous sensing nodes

Kim, Stephen T. 12 December 2011 (has links)
The objective of the proposed research is to analyze and develop energy optimized design techniques that can improve the operating efficiency for a wireless sensor device. To enhance the operating efficiency, all active functional blocks in a system should focus on energy conservation while achieving the required tasks. In addition, variations in the operating condition should be properly observed and compensated. Otherwise, a wireless sensor device would consume unnecessary energy for a given task or too little energy to meet the requirements. In this research, design strategies and some new circuit topologies are discussed in terms of ultra-low energy constraints. In particular, the signal processing unit, the memory unit, and the power unit in a conventional wireless sensor device will be main focus. As an example of the signal processing unit, a subthreshold current mode computation system has been designed and tested to prove the "low power consumption" feature of analog signal processing. For the memory unit, conventional SRAM cells are compared to a new fully-gated 10T-SRAM cell. For the power unit, a semi-active high-efficient CMOS rectifier with a reverse leakage control has been developed. It employs a cross-coupled NMOS pair and two leakage control comparators to reduce reverse charge leakage currents. In addition, the adaptive body bias control technique is utilized to improve the reliability of the rectifier. In addition, a novel link-variation sensing technique is proposed. The proposed technique can evaluate operational disturbances such as component mismatches and displacement variations so that the performance of a wireless sensor device in the actual environment can be close to the optimum without wasting an excessive amount of energy.

Page generated in 0.0585 seconds