Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

In this paper, an autonomous wearable sensor node is developed for long-term continuous healthcare monitoring. This node is used to monitor the body temperature and heart rate of a human through a mobile application. Thus, it includes a temperature sensor, a heart pulse sensor, a low-power microcontroller, and a Bluetooth low energy (BLE) module. The power supply of the node is a lithium-ion rechargeable battery, but this battery has a limited lifetime. Therefore, a photovoltaic (PV) energy harvesting system is proposed to prolong the battery lifetime of the sensor node. The PV energy harvesting system consists of a flexible photovoltaic panel, and a charging controller. This PV energy harvesting system is practically tested outdoor under lighting intensity of 1000 W/m2. Experimentally, the overall power consumption of the node is 4.97 mW and its lifetime about 246 hours in active-sleep mode. Finally, the experimental results demonstrate long-term and sustainable operation for the wearable sensor node.

Go to article

Authors and Affiliations

Saeed Mohsen
Abdelhalim Zekry
Khaled Youssef
Mohamed Abouelatta
Download PDF Download RIS Download Bibtex

Abstract

Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.
Go to article

Authors and Affiliations

Joseph Kipongo
1
Theo G. Swart
1
Ebenezer Esenogho
1 2

  1. Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South Africa
  2. Department of Electrical and Electronic Engineering, University of Botswana, Gaborone, Botswana

This page uses 'cookies'. Learn more