A STATIC-LEACH WSNs for Hazardous Materials Monitoring

Article Preview

Abstract:

In this paper, hazardous materials transportation monitoring system is designed, implemented, and tested using Wireless Sensor Networks (WSNs). According to energy consumption and response time during clustering of Wireless Sensor Networks LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, we proposed STATIC-LEACH routing protocol based on static clustering, it can effectively reduce energy consumption of the wireless sensor nodes and reduce network latency of cluster. With WSN and GSM/GPRS, low cost and easy deployment remote monitoring is possible without interfering with the operation of the transportation.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 463-464)

Pages:

261-265

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zajicek, J,  Schechtner, K, Area wide hazardous goods monitoring on the TERN in Austria - project SHAFT, Proceedings of Intelligent Transportation Systems, p.598 – 600, (2005).

DOI: 10.1109/itsc.2005.1520062

Google Scholar

[2] E. Planas, E. Pastor, F. Presutto, J. Tixier, Results of the MITRA project: Monitoring and intervention for the transportation of dangerous goods, Journal of Hazardous Materials, Vol. 152, No. 4, p.516–526, (2008).

DOI: 10.1016/j.jhazmat.2007.07.032

Google Scholar

[3] W. Chen, Y. Chen, D. Guo, Design and implementation of monitoring and management system for Tank Truck Transportation, WSEAS Transactions on information science and applications, Vol. 7, No. 1, pp.26-35, (2010).

Google Scholar

[4] L. Sun, Petrochemical dangerous goods logistics improvement based on GPS, GIS and RFID,. Journal of Shanghai Maritime University, Vol. 27, No. 4, 164-168, (2006).

Google Scholar

[5] Y. Chen, W. Chen, D. H. Guo and W. E. Wong, System Design of Smart Card Application for Tank Truck Conveying Management,. IEEE International Workshop on Anti-counterfeiting, Security, and Identification, pp.398-401, (2005).

DOI: 10.1109/iwasid.2007.373664

Google Scholar

[6] D. Culler, D. Estrin and M. Srivastava, Overview of Sensor Networks, Computer, Vol. 37, No. 8, pp.41-49, (2004).

DOI: 10.1109/mc.2004.93

Google Scholar

[7] W. Archer, P. Levis. Interface contracts for TinyOS,. In Proceedings of the international conference on Information Processing in Sensor Networks, ACM, p.158–165, (2007).

DOI: 10.1109/ipsn.2007.4379675

Google Scholar

[8] Deborah Estrin, Wireless Sensor Networks Tutorial Part IV: Sensor Network Protocols, Mobicom, pp.23-28, (2002).

Google Scholar

[9] Lv Qin, Cao Pei, Cohen E, Search and Replication in Unstructured Peer-to-Peer Networks, Proc. of the 16th International Conference on Supercomputing, pp.84-95, (2002).

DOI: 10.1145/514191.514206

Google Scholar