{"title":"Wireless Sensor Network Energy Use While Tracking Secure Area Intrusions","authors":"R. Hartwell","doi":"10.1109/MILCOM.2013.287","DOIUrl":null,"url":null,"abstract":"Understanding energy use in a wireless sensor network is the most important aspect of these cheaply deployed sensor nets. This paper models and calculates the energy consumption of a network, as an intrusion into a secured area is tracked. The network is composed of a randomly distributed array of wireless sensors, which can simulate multiple protocols for relaying detection information. Increasing the number of cluster heads within the sensor distribution area as well as increasing the transmission range of individual nodes, directly reduces energy consumed while tracking an intrusion. However, increasing sensor fidelity increases the energy consumed while tracking an intrusion. The models created to simulate a network, its protocols and data transfers, and a penetrating agent, proved to be an effective toolset to test network conditions and determine energy costs.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2013 - 2013 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2013.287","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Understanding energy use in a wireless sensor network is the most important aspect of these cheaply deployed sensor nets. This paper models and calculates the energy consumption of a network, as an intrusion into a secured area is tracked. The network is composed of a randomly distributed array of wireless sensors, which can simulate multiple protocols for relaying detection information. Increasing the number of cluster heads within the sensor distribution area as well as increasing the transmission range of individual nodes, directly reduces energy consumed while tracking an intrusion. However, increasing sensor fidelity increases the energy consumed while tracking an intrusion. The models created to simulate a network, its protocols and data transfers, and a penetrating agent, proved to be an effective toolset to test network conditions and determine energy costs.