Today’s process industries have increasingly come to rely on information gained from networks of sensors installed at key points through the factory or field site. Measurement of air pressure, electrical current, weight load, fuel levels, temperature, corrosion, pipe flow, seismic activity – such readings are critical to the effective and efficient safe operation of oil pipelines and refineries, pharmaceutical and chemical companies, food and beverage manufacturers, and power plants. The evolution of sensor technologies has enabled managers and administrators to gain more insight into complex processes. For example, the introduction of microprocessors and digital communications led to Distributed Control Systems (DCSs) and the migration of intelligence into field devices, allowing enterprises to improve operations significantly. The main idea of our work is to provide a low cost, reliable and secured wireless automation using sensor networks through an efficient routing protocol, which would be compatible for industrial and home applications and to offer significantly improved monitoring, reduced energy consumption and power dissipation.

">

Secured Wireless Automation using Wireless Sensor Networks

S. Ganesh*, Sean Laurel Rex**, S. Arun Kumar***
* Research Scholar, Sathyabama University, Chennai, Tamil Nadu, India.
** Engineer, ECE Department, Panimalar Institute of Technology, Tamil Nadu, India.
*** B.E Student, ECE Department, Panimalar Institute of Technology, Tamil Nadu, India.
Periodicity:April - June'2013
DOI : https://doi.org/10.26634/jwcn.2.1.2306

Abstract

Today’s process industries have increasingly come to rely on information gained from networks of sensors installed at key points through the factory or field site. Measurement of air pressure, electrical current, weight load, fuel levels, temperature, corrosion, pipe flow, seismic activity – such readings are critical to the effective and efficient safe operation of oil pipelines and refineries, pharmaceutical and chemical companies, food and beverage manufacturers, and power plants. The evolution of sensor technologies has enabled managers and administrators to gain more insight into complex processes. For example, the introduction of microprocessors and digital communications led to Distributed Control Systems (DCSs) and the migration of intelligence into field devices, allowing enterprises to improve operations significantly. The main idea of our work is to provide a low cost, reliable and secured wireless automation using sensor networks through an efficient routing protocol, which would be compatible for industrial and home applications and to offer significantly improved monitoring, reduced energy consumption and power dissipation.

Keywords

Wireless Sensor Networks, Process Control, Secured Automation, Routing Protocol, Reduced Energy Consumption.

How to Cite this Article?

Ganesh, S., Rex, S.L., and Kumar, S.A. (2013). Secured Wireless Automation Using Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 2(1), 9-17. https://doi.org/10.26634/jwcn.2.1.2306

References

[1]. C. Y. Leong., A. R. Ramli and T. Perumal, (2009). "A rule-based framework for heterogeneous subsystems management in smart home environment", IEEE Transactions on Consumer Electronics, vol.55, no.3, pp.1208- 1213, August 2009
[2]. T. Perumal., A. R. Ramli., and C. Y. Leong, (2008). "Design and implementation of SOAP-based residential management for smart home systems", IEEE Transactions on Consumer Electronics, Vol. 54, pp. 453-459, 2008.
[3]. X. Li., and W. Zhang, (2004). “The design and implementation of home networks systems using OSGi compliant middleware”, IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 528-534, May 2004.
[4]. R. D. Redondo., A. F. Villas., M. Ramos., J. J. Pazos Arias, and M. Rey López, (2007). “Enhancing residential gateways: OSGi service composition”, IEEE Transactions on Consumer Electronics, Vol. 53, No. 1, pp. 87-95, Feb. 2007.
[5]. C.E.Otero., A.Velazquez., I.Kostanic., C.Subramanian., J.Pinelli., L. Buist, (2009). ”Real-Time Monitoring of Hurricane Winds using Wireless and Sensor Technology”, Journal of Computers, Vol. 4, Nov 2009.
[6]. C. Intanagonwiwat., R. Govindan and D. Estrin, (2000). "Directed diffusion: a scalable and robust communication paradigm for sensor networks," Proceedings of ACM MobiCom '00, pp. 56-67, March 2000.
[7]. M. Chu., H. Haussecker and F. Zhao, (2002). "Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks", The International Journal of High Performance Computing Applications, Vol. 16, No. 3, August 2002.
[8]. Yu-Seok Bae., Bong-Jin Oh., Kyeong-Deok Moon., Young-Guk Ha and Sang-Wook Kim, (2010). "Design and implementation of an adaptive middleware based on the universal middleware bridge for heterogeneous home networks", IEEE Transactions on Consumer Electronics, vol.56, no.2, pp.620-626, May 2010.
[9]. J. Zha., Ahmet T. Erdogan and T. Arslan., (2006). “A Novel Application Specific Network Protocol for Wireless Sensor Networks”, IEEE Transactions on Consumer Electronics, vol. 55, no. 5, pp. 767-790, May 2006.
[10]. L.Li., S. Dong and X. Wen, (2006). "An Energy Efficient Clustering Routing Algorithm for Wireless Sensor Networks," Journal of China Universities of Posts and Telecommunications, Vol.3, No.13, pp.71-75, June 2006.
[11]. Y. Sangho., H. Junyoung., C. Yookun and H.Jiman., (2007). "PEACH: Power-Efficient and adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks," Computer Communications, Vol.30, No.14-15, pp. 2842-2852, April 2007.
[12]. Brad Karp., and H.T. Kung, (2000). “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks” In Proc. ACM Mobicom Pages: 243 – 254, ISBN:1-58113-197-6, 2000
[13]. J.Y.Cheng., S.J.Ruan., R.G.Chenghsu (2006). "PADCP: Power aware Dynamic Clustering Protocol for Wireless Sensor Network," Proceedings of IFIP International Conference on Wireless and Optical Communications Networks, pp.1-6, April 2006.
[14]. Heinzelmann.,W.R, Kulik., J.and Balakrishnan (1999). “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. In Fifth ACM/IEEE MOBICOM Conference August 1999.
[15]. Sandra M. Hedetniemi., Stephen T. Hedetniemi., Arthur L. Liestman (1988). “A survey of gossiping and broadcasting in communication networks”, Networks 1971-1995 Volume 18,Issue 4 , Pages319 – 349 Copyright © 1988 Wiley Periodicals, Inc., A Wiley Company.
[16]. Hairong Qi., Phani Teja Kuruganti and Yingyue Xu “The Development of Localized Algorithms in Wireless Sensor Networks” Published on 22 July 202 Sensors ISSN 1424- 8220.
[17]. S. Ganesh and R. Amutha, (2012). 'Efficient and Secure Routing Protocol for Wireless Sensor Networks through Two level intrusion detection mechanism” Wulfenia Journal, Vol.19, pp.388– 406, December 2012.
[18]. S.Ganesh., and R.Amutha, (2011). “Network Security in Wireless Sensor Networks Using Triple Umpiring System” European Journal of Scientific Research, 2011, Vol.64, issue 1.
[19]. Ganesh.S and R.Amutha, (2012). “Modified Triple Umpiring System for Wireless Sensor Networks” PSG tech-National Journal of Technology, Vol.8, issue 1, March 2012, pp 48-63.
[20]. YaXu., JohnHeidemann., DeborahEstrin, (2001). “Geography informed Energy Conservation for Ad Hoc Routing” Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM Mobicom), 2001.
[21]. Mark Stemm and Randy H. Katz. “Measuring and reducing energy consumption of network interfaces in hand-held devices”. IEICE Transactions on Communications, Special Issue on Mobile Computing.
[22]. Y.Yu., D. Estrin and R. Govindan, (2001). “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, May 2001.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.