Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077079
R. Raicheal, C. Arunachalaperumal
In this paper we study about the secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed.
{"title":"Security enhancement for MIMO based wireless network using codebook and diversity multiplexing","authors":"R. Raicheal, C. Arunachalaperumal","doi":"10.1109/ICECCT.2011.6077079","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077079","url":null,"abstract":"In this paper we study about the secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077078
B. Pakiaraj, M. Baladjy, R. Divya
In this paper the bit-error rate performances using Gaussian approximation technique and pseudo-orthogonal prime sequence code with a modified prime sequence code using the elements of Galoi's Field for a particular prime number have been developed. The capacities of the prime sequence codes are determined. Detailed simulation results shows the performance of the codes. The codes are useful for medium access in fiber optic CDMA LAN.
{"title":"Pseudo-orthogonal signature sequences for fiber optic CDMA LAN","authors":"B. Pakiaraj, M. Baladjy, R. Divya","doi":"10.1109/ICECCT.2011.6077078","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077078","url":null,"abstract":"In this paper the bit-error rate performances using Gaussian approximation technique and pseudo-orthogonal prime sequence code with a modified prime sequence code using the elements of Galoi's Field for a particular prime number have been developed. The capacities of the prime sequence codes are determined. Detailed simulation results shows the performance of the codes. The codes are useful for medium access in fiber optic CDMA LAN.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077063
R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda
This paper discusses the implementation of automated Supply Chain Management (SCM) in Rourkela steel plant. This paper covers the model of a SCM, highlight the complexity in Supply Chain Management. Finally this paper will suggest implementation of RFID technology at Rourkela Steel Plant to improve the existing logistic in transportation system and identification of items.
{"title":"Automation of Supply Chain Management in Rourkela steel plant","authors":"R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda","doi":"10.1109/ICECCT.2011.6077063","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077063","url":null,"abstract":"This paper discusses the implementation of automated Supply Chain Management (SCM) in Rourkela steel plant. This paper covers the model of a SCM, highlight the complexity in Supply Chain Management. Finally this paper will suggest implementation of RFID technology at Rourkela Steel Plant to improve the existing logistic in transportation system and identification of items.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077066
Mahboob Imran Shaik
The Rapid development of technologies in the field of electronics has brought tremendous changes in every walk of human life without being limited to any particular field. Starting with many transistors and other electronic components to embedding of large number of transistors along with in numerable other electronic components in a single chip, that too in a compact single chip, with the properties of diverse/ different functions. And these developments in electronics have also entered the ever growing field of industrial processes, viz., optimization of production, safety related aspects etc. The Design & Implementation of ARM Based Data Acquisition System presented here is an intelligent remote unit based on embedded technology for data acquisition, monitoring and output control. This system is very much compact in design, as it uses a highly integrated 32-bit RISC microcontroller along with serial A/D and D/A converters. This Device has high performance and offers the widest range of features viz., flexibility, reliability, durability, when compared with conventional and old solutions to control and data acquisition. The capabilities of input and output are expandable to maximize the functions of the system and also can be used for different applications in real time environment to control and data acquisition. Besides being a single stand-alone system, the tasks like the control, supervision, data acquisition can even be accomplished through Ethernet within the local area network (LAN) of an industrial area.
{"title":"Design & implementation of ARM based data acquisition system","authors":"Mahboob Imran Shaik","doi":"10.1109/ICECCT.2011.6077066","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077066","url":null,"abstract":"The Rapid development of technologies in the field of electronics has brought tremendous changes in every walk of human life without being limited to any particular field. Starting with many transistors and other electronic components to embedding of large number of transistors along with in numerable other electronic components in a single chip, that too in a compact single chip, with the properties of diverse/ different functions. And these developments in electronics have also entered the ever growing field of industrial processes, viz., optimization of production, safety related aspects etc. The Design & Implementation of ARM Based Data Acquisition System presented here is an intelligent remote unit based on embedded technology for data acquisition, monitoring and output control. This system is very much compact in design, as it uses a highly integrated 32-bit RISC microcontroller along with serial A/D and D/A converters. This Device has high performance and offers the widest range of features viz., flexibility, reliability, durability, when compared with conventional and old solutions to control and data acquisition. The capabilities of input and output are expandable to maximize the functions of the system and also can be used for different applications in real time environment to control and data acquisition. Besides being a single stand-alone system, the tasks like the control, supervision, data acquisition can even be accomplished through Ethernet within the local area network (LAN) of an industrial area.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134627935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077060
R. Sudha, S. Lecturer, D. Sivakumar
Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs' attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities Much work is going on to provide security to the network. One of the solution to the problem is ARAN — (Authenticated routing protocol) which is a secure protocol and provides Integrity, availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses Temporal table based schemes that can be applied to ARAN to detect selfish node and improve the performance.
{"title":"A temporal table authenticated routing protocol for adhoc networks","authors":"R. Sudha, S. Lecturer, D. Sivakumar","doi":"10.1109/ICECCT.2011.6077060","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077060","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs' attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities Much work is going on to provide security to the network. One of the solution to the problem is ARAN — (Authenticated routing protocol) which is a secure protocol and provides Integrity, availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses Temporal table based schemes that can be applied to ARAN to detect selfish node and improve the performance.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077075
K. Gowrishankar
In this paper, a self tuning Proportional Integral Derivative (PID) with PSS controller is presented for improving stability of a system in simulink environment. The development of a PID with power system stabilizer in order to maintain stability and enhance the performance of a power system is described widely. The application of the PID with PSS controller is investigated by means of simulation studies on a single machine infinite bus system. The functional blocks of PID with PSS are developed in Simulink and simulation studies are carried out. A study case for the validation of the proposed simulink mechanism is presented and analysed with control application for a synchronous generator excitation system. The superior performance of this stabilizer in comparison to PSS proves the efficiency of this new PID with PSS controller. The comparison studies carried out for various results such as speed deviation, field voltage, rotor angle and load angle in Simulink based MATLAB environment.
{"title":"Modelling and performance analysis of PID power system stabilizer using adaptation law in Simulink environment","authors":"K. Gowrishankar","doi":"10.1109/ICECCT.2011.6077075","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077075","url":null,"abstract":"In this paper, a self tuning Proportional Integral Derivative (PID) with PSS controller is presented for improving stability of a system in simulink environment. The development of a PID with power system stabilizer in order to maintain stability and enhance the performance of a power system is described widely. The application of the PID with PSS controller is investigated by means of simulation studies on a single machine infinite bus system. The functional blocks of PID with PSS are developed in Simulink and simulation studies are carried out. A study case for the validation of the proposed simulink mechanism is presented and analysed with control application for a synchronous generator excitation system. The superior performance of this stabilizer in comparison to PSS proves the efficiency of this new PID with PSS controller. The comparison studies carried out for various results such as speed deviation, field voltage, rotor angle and load angle in Simulink based MATLAB environment.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077062
M. Akila, T. Iswarya
Due to the high vehicle mobility, the topology of vehicular ad hoc networks (VANETs) dynamically changes, and disconnections may frequently occur. When two vehicles are disconnected, they are not able to access data from each other. Data replication has been widely used to reduce the effect of intermittent connectivity and improve data access performance in distributed systems. However, many nodes in VANET may only have limited storage space, and thus cannot replicate all the data such as large music files or video clips. To address this problem, we propose an efficient data replication method for data access applications in VANETs. In this method the vehicles are grouped into a platoon and they contribute part of their buffers to replicate data for others in the same platoon and share data with them. When a vehicle leaves the platoon, it prefetches interested data and transfers its buffered data to other vehicles in advance so that they can still access the data after it leaves. We implement this algorithm in NS-2 and GrooveNet Simulators. The GroveNet Simulator is used to generate the vehicle mobility trace file, which is used in the ns-2 simulations. Extensive simulation results show that this method provides high data availability, low data access overhead, and low false alarm rate.
{"title":"An efficient data replication method for data access applications in vehicular ad-hoc networks","authors":"M. Akila, T. Iswarya","doi":"10.1109/ICECCT.2011.6077062","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077062","url":null,"abstract":"Due to the high vehicle mobility, the topology of vehicular ad hoc networks (VANETs) dynamically changes, and disconnections may frequently occur. When two vehicles are disconnected, they are not able to access data from each other. Data replication has been widely used to reduce the effect of intermittent connectivity and improve data access performance in distributed systems. However, many nodes in VANET may only have limited storage space, and thus cannot replicate all the data such as large music files or video clips. To address this problem, we propose an efficient data replication method for data access applications in VANETs. In this method the vehicles are grouped into a platoon and they contribute part of their buffers to replicate data for others in the same platoon and share data with them. When a vehicle leaves the platoon, it prefetches interested data and transfers its buffered data to other vehicles in advance so that they can still access the data after it leaves. We implement this algorithm in NS-2 and GrooveNet Simulators. The GroveNet Simulator is used to generate the vehicle mobility trace file, which is used in the ns-2 simulations. Extensive simulation results show that this method provides high data availability, low data access overhead, and low false alarm rate.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077080
T. Narasimmalou, G. Appasami
Green computing is one of the emerging computing technologies to provide Green environment. It is mainly used to protect environment, optimize energy consumption and keeps green environment. Green computing also refers to environmentally energy sustainable computing. Modern world needs Secured and reliable data in unsecured communications. Energy efficient usage, Optimum resource allocation and dynamic routing help for green computing. The intelligent machines collaborative decisions and information sharing without direct human intervention is one Machine point to another machine point communication. In this paper we discussed secured and reliable point to point communications towards green computing.
{"title":"Security layers and reliable communications towards green computing","authors":"T. Narasimmalou, G. Appasami","doi":"10.1109/ICECCT.2011.6077080","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077080","url":null,"abstract":"Green computing is one of the emerging computing technologies to provide Green environment. It is mainly used to protect environment, optimize energy consumption and keeps green environment. Green computing also refers to environmentally energy sustainable computing. Modern world needs Secured and reliable data in unsecured communications. Energy efficient usage, Optimum resource allocation and dynamic routing help for green computing. The intelligent machines collaborative decisions and information sharing without direct human intervention is one Machine point to another machine point communication. In this paper we discussed secured and reliable point to point communications towards green computing.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077073
A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi
This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.
{"title":"Investigation and management solution for privacy identification and electrical energy theft","authors":"A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi","doi":"10.1109/ICECCT.2011.6077073","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077073","url":null,"abstract":"This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-15DOI: 10.1109/ICECCT.2011.6077072
R. K. Mugelan, M. Alsath, V. Yokesh
This paper enables the personnel to monitor and acquire data from hazardous environments where the human inspection is difficult. The wireless sensor motes are developed for measuring the real-time parameters like temperature, humidity, pressure etc. Further ZigBee protocol has been utilized to enable Inter networking of sensor motes which allows the personnel to aggregate data which makes the available data more reliable. The data sensed by different motes are communicated to the cluster head. The cluster head performs data aggregation which is then communicated to the officials through GSM technology. Whenever the measured real time data crosses a predefined threshold, a complete picture of the environment is sent to the official's mobile as MMS. Failure of any node wont affect the Data Aggregation and data from the remaining node can be used to know about the Environment. The proposed algorithm is built using Atmel Processor and the results are presented.
{"title":"Fault tolerant wireless sensor network for remote data acquisition","authors":"R. K. Mugelan, M. Alsath, V. Yokesh","doi":"10.1109/ICECCT.2011.6077072","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077072","url":null,"abstract":"This paper enables the personnel to monitor and acquire data from hazardous environments where the human inspection is difficult. The wireless sensor motes are developed for measuring the real-time parameters like temperature, humidity, pressure etc. Further ZigBee protocol has been utilized to enable Inter networking of sensor motes which allows the personnel to aggregate data which makes the available data more reliable. The data sensed by different motes are communicated to the cluster head. The cluster head performs data aggregation which is then communicated to the officials through GSM technology. Whenever the measured real time data crosses a predefined threshold, a complete picture of the environment is sent to the official's mobile as MMS. Failure of any node wont affect the Data Aggregation and data from the remaining node can be used to know about the Environment. The proposed algorithm is built using Atmel Processor and the results are presented.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"596 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}