Skip to main navigation Skip to search Skip to main content

Anomaly resilient node placement approach for pipelines monitoring

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Wireless sensor network has proven to be a good candidate for many monitoring applications such as habitat monitoring, structural health monitoring, pipeline monitoring, etc. Pipeline monitoring is a challenging application where the sensors are placed in a linear topology. This linear topology requires careful attention in placing sensors to ensure robustness against anomaly, minimize the energy consumption and maximize the network lifetime. This paper investigates this problem by improving and evaluating the performance of two greedy node placement approaches. In contrast to existing work, we have validated experimentally the 31 power levels of CC2420 TelosB chipon and their corresponding transmission ranges. Having more power-level resolution yields less energy consumption and longer lifetime compared to traditional 8 power levels. Extensive simulation and real experiments have been conducted. The results demonstrate 23% extension in the lifetime when all power levels are adopted.

Original languageEnglish
Title of host publication2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages311-316
Number of pages6
ISBN (Electronic)9781509043729
DOIs
StatePublished - 19 Jul 2017

Publication series

Name2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Equal-Power Placement
  • Pipeline Monitoring
  • TelosB
  • WSN

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing

Fingerprint

Dive into the research topics of 'Anomaly resilient node placement approach for pipelines monitoring'. Together they form a unique fingerprint.

Cite this