A Modular Integrated Laboratory for Wireless Sensor Networks

Article Preview

Abstract:

The Wireless sensor networks (WSNs) are rising research domain relate to several subjects and applications which consist of a large number of sensor nodes. Because of the universality of sensor network technology, it is difficult to teach students. To analyze pivotal technologies and didactical specialties and has explored functions, the system structure and experiments of sensor network synthetically laboratory. In the end, the article has given an example to illustrate the actuality and the tendency of sensor network synthetically laboratory.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2472-2477

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer networks, vol. 38, no. 4, p.393–422, (2002).

DOI: 10.1016/s1389-1286(01)00302-4

Google Scholar

[2] X. Chen, K. Makki, K. Yen, and N. Pissinou, Sensor network security: A survey, Communications Surveys & Tutorials, IEEE, vol. 11, no. 2, p.52–73, (2009).

DOI: 10.1109/surv.2009.090205

Google Scholar

[3] Lu Hongjun, Setiono Rudy, Liu Rudy. Effective Data Mining Using Neural Net works [J]. IEEE Transactions on Knowledge and Data Engineering, December 1996, 8(6): 1021-1036.

DOI: 10.1109/69.553163

Google Scholar

[4] Setiono Rudy. Extracting Rules from Neural Net works by Pruning and Hidden Unit Splitting [J]. Neural Computation, 1997(9): 205-225.

DOI: 10.1162/neco.1997.9.1.205

Google Scholar

[5] I. Stojmenovic and S. Olariu: Data-Centric Protocols for Wireless Sensor Networks, in Ivan Stojmenovic (ed. ) Handbook of Sensor Networks: Algorithms and Architectures, John Wiley and Sons (2005).

DOI: 10.1002/047174414x.ch13

Google Scholar

[6] Z. Merhi, M. Elgamel and M. Bayoumi: EB-MAC: An event based medium access control for wireless sensor networks, IEEE International Conference on Pervasive Computing and Communications (2009), pp.1-6.

DOI: 10.1109/percom.2009.4912863

Google Scholar

[7] W.B. Heinzelman, A.P. Chandrakasan: An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE transactions on wireless communications, vol. 1, no. 4 (2002).

DOI: 10.1109/twc.2002.804190

Google Scholar

[8] Y.X. Hou; H.G. Wang; J.X. Liang; C. X Pei: A Cross-Layer Protocol for Event-Driven Wireless Sensor Networks, 1st International Conference on Information Science and Engineering (2009), pp.3926-3929.

DOI: 10.1109/icise.2009.17

Google Scholar

[9] J. Li, G.Y. Lazarou: A Bit-Map-Assisted Energy-Efficient MAC Scheme for Wireless Sensor Networks, Third International Symposium on Information Processing in Sensor Networks(2004), pp.55-60.

DOI: 10.1145/984622.984631

Google Scholar

[10] N. Sazak, I. Erturk, E. Koklukaya and M. Cakiroglu: An event driven slot allocation approach to TDMA based WSN MAC design and its effect on latency, Computer Engineering Conference (2010), pp.22-25.

DOI: 10.1109/icenco.2010.5720419

Google Scholar

[11] G.Y. Lazarou, J. Li, J. Picone: A cluster-based power-efficient MAC scheme for event-driven sensing applications, Ad Hoc Networks (Elsevier Publications, Netherlands 2007) vol. 5, issue 7, pp.1017-1030.

DOI: 10.1016/j.adhoc.2006.05.001

Google Scholar

[12] J. Vales-Alonso, E. Egea-Lopez, M.V. Bueno-Delgado, J.L. Sieiro-Lomba, J. Garcia-Haro: Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks, Next Generation Internet Networks (2008), pp.203-208, 28-30.

DOI: 10.1109/ngi.2008.34

Google Scholar

[13] Y. Yang, X. Wang, S. Zhu, and G. Cao, Sdap: A secure hop-by-hop data aggregation protocol for sensor networks, ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 4, p.18, (2008).

DOI: 10.1145/1380564.1380568

Google Scholar

[14] Y. Hu, A. Perrig, and D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, p.1976–1986, Ieee, (2003).

DOI: 10.1109/infcom.2003.1209219

Google Scholar

[15] B. Prasannajit, S. Anupama, K. Vindhykumari, S. Subhashini, G. Vinitha, et al., An approach towards detection of wormhole attack in sensor networks, in Integrated Intelligent Computing (ICIIC), 2010 First International Conference on, p.283–289, IEEE, (2010).

DOI: 10.1109/iciic.2010.54

Google Scholar