Professional Documents
Culture Documents
ZigBee Technology
Abstract—The existing security systems show many shortcomings • It’s high energy-consuming system.
such as difficult to extend and severe time-consuming because it
is based on wiring network technology. In this paper, we present • The aftereffect is very serious if the cable be cut.
a wireless networked security system based on ZigBee technology.
Wireless sensor networks are the combinative production of
The system adopts hybrid topology structure based on cluster,
computer technology, communication technology and network
which consists of many micro-sensor nodes, network coordinator
nodes, network gateway (router), communication network and
technology. Wireless sensor networks are consisting of a great
monitor centre (computer). For short distance transmission, the lot of a large number of cheap micro-sensors which possess
micro-sensor nodes collect data from the monitoring surroundings computation function and communication function. The
and transmit to the gateway using ZigBee communication. For micro-sensors can real time monitor, apperceive and collect the
long distance transmission, from the gateway to the monitor environmental information [1].
centre, system uses TCP/IP protocol. The gateway in this system is ZigBee bend itself to realize a short distant double direction
the protocol conversion used to transform a data package in
wireless communication protocol which is lower complexity,
ZigBee protocol to TCP/IP protocol before transmitting. A
modified routing protocol based on LEACH is adopted in the
lower cost and lower speed. ZigBee works in three free
system. The simulation result shows that the modified LEACH frequency segments, they are 2.4 GHz allover international,
protocol has superiority on survival time. The wireless 868MHz in Europe and 915 MHz in America. It has many
micro-sensor can be scattered to the surroundings that human advantages such as safe data transmission, agile organization
unable enter. Then the sensor nodes self-organizing networked and long life when compared with the other wireless
security system and realize security monitor task. The system also communication technology.
can be used to forest fireproofing and environment pollution
In this paper, we present a security system based on
inspection after modification.
wireless sensor networks. In this system, ZigBee technology
Keywords-security system; wireless sensor networks; ZigBee which works in internatinal free freqency segment and
technology; hybrid network topology; LEACH routing arithmetic possesses self-orgnization function is adopted to solving the
problems existed in the existing security system. The structure
I. INTRODUCTION of system employs distributed structure, which consists of
many micro-sensor nodes, network coordinator nodes, network
Safety is the guarantee for the most essential existent of gateway (router), communication network and monitor centre
human beings. A security system is necessary for a building or (computer). For a short distance transmission, the micro-sensor
an area to guarantee the safety of the residents and property. nodes collect data from the monitoring surrounding and
The security system has gone through single-route monitor transmit to the gateway using ZigBee communication. For a
system, control loop monitor system, and processor plus long distance transmission, from the gateway to the monitor
multimedia monitor system eras in the past twenty years. The centre, system uses TCP/IP protocol. The gateway in this
digital monitor system which used abroad today is the fourth system is the protocol conversion used to transform a data
era production of the security system. It’s very annoying that package in ZigBee protocol to TCP/IP protocol before
all of the security systems show many shortcomings as follows. transmitting.
• The signals transmitted through cable network. Wiring The wireless micro-sensor can be scattered to the
network is a severe time-consuming and high-load surroundings that human unable enter. Then the sensor nodes
work, and it always blocks the progress of the self-organizing networked security system and realize security
engineering. monitor task. The system also can be used to forest fireproofing
and environment pollution inspection after modification.
• The information can be watched only in monitoring
chamber.
• It’s very difficult to extend system, because the wire
connection is fixed.
( )
designed by C++ was adopted in this system. According to the
2
Etotal = NEcluster = Nk Estatic + ε amp dbroadcast + convention of many references, we select 100 sensor nodes in
simulation. The simulation result in Fig. 6 shows that the
M2 survival time of modified LEACH protocol is longest, and the
TNkEstatic + kε amp +K number of bouts is most when the number of efficiency nodes
2πN ⑹ is 65. The system adopt modified LEACH protocol has
K is a constant irrespective to N in (6),so that the superiority on survival time, despite the outside factors which
can cause the node disable are ignored in this simulation.
best N can be determined by ⑺.
Tε amp M 2
N=
(
2π TEstatic + ε amp d broadcast
2
) ⑺
By choosing the best number n of cluster head to ensure
the lowest exhausting energy of the network in each bout and
the whole network. And the subsistence time of network
increased effectively.
V. DATA TRANSMISSION FLOW
In this system, the communication structure of monitor Figure 6. Simulation result of modified LEACH protocol.
centre (computer) and the sensor nodes is one host and
multi-slave. The data transmission flow is described as Fig. 5. VII. CONCLUSION
The intelligent security system designed in this paper
adopted wireless communication technology. The functions of
the system are presented as follows. Wireless remote control of
setting and withdrawing defense; remote operation and
monitor; self-organizing networked security system; it is
extended and movable, so especially suit for temporary task.
The system have many significant excellences, such as
networked, wireless, moveable, high-veracity and lower
energy-consuming. The using of embedded system improves
the stability of wireless data transmission. The system can be
applied to the hospital, the school the high speed way and
anywhere needed detect.
REFERENCES
[1] REN F Y, HUANG H N, LIN C, “Wireless sensor networks,” Journal of
Software, 14(7) , pp. 1282--1291, 2003
[2] YU Y, GOVINDAN R, ESTRIN D, “Geographical and Energy-Aware
Routing: a Recursive Data Dissemination Protocol for Wireless Sensor
Networks,” Rome, Italy: Proceedings of the Seventh Annual ACM/IEEE
Figure 5. Data transmission flow. International Conference on Mobile Computing and Networking
(MobiCom’01), pp. 85-96, 2001
The monitor computer sent command to the network [3] Heinzelman W, Chandrakasan A, Balakrishnanh, “An
Application-Specific Protocol Architecture for Wireless Micro sensor
gateway (router) via Internet. The router transmits the Networks,” IEEE Transactions on Wireless Communications, 1(4),
command to the aim coordinator node according to the routing pp.660-667, 2002.
table. The aim coordinator node awake the corresponding [4] LINDSEY S, RAGHAVENDRA C S. PEGASIS, “Power-Efficient
cluster head node by broadcasting the command to all cluster Gathering in Sensor Information Systems,” Proceedings of the IEEE
head nodes, and then the cluster head node awake the Aerospace Conference, pp.1125-1130, 2002.
corresponding sensor node by broadcasting the command to all [5] Manjeshwar A, Agrawal D. Teen, “A Routing Protocol for Enhanced
sensor nodes in the same cluster. The sensor node sent Efficiency in Wireless Sensor Networks,” Proceedings of the 15th
Parallel and Distributed Processing Symposium, pp.2009-2015, 2001.
information collect from surroundings to the cluster head node,
and then the cluster head node process and transmits the data
back to the monitor computer follow the former route. The