05.01.2015 Views

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

EXAMPLES OF CATEGORY 1 WSN APPLICATIONS 59<br />

2.5 EXAMPLES OF CATEGORY 1 WSN APPLICATIONS<br />

In this section we discuss a number of WSN applications that either fall in the<br />

C1WSN category or have a strong research–scientific focus. The applications<br />

discussed below are just a few examples of the many possible applications that<br />

exist or are evolving. The ability to deploy WSNs that interconnect in an effective<br />

manner with unattended WNs is expected to have a significant bearing on the efficacy<br />

of military <strong>and</strong> civil applications such as, but not limited to, combat field surveillance,<br />

security, <strong>and</strong> disaster management. These WSNs process data assembled from multiple<br />

sensors in order to monitor events in an area of interest. For example, in a disaster<br />

management event, a large number of sensors can be dropped by a helicopter; networking<br />

these sensors can assist rescue operations by locating survivors, identifying<br />

risky areas, <strong>and</strong> making the rescue crew more aware of the overall situation <strong>and</strong><br />

improving overall safety. Some WSNs have camera-enabled sensors; one can have<br />

aboveground full-color visible-light cameras as well as belowground infrared<br />

cameras. The use of WSNs will limit the need for military personnel involvement<br />

in dangerous reconnaissance missions. Security applications include intrusion detection<br />

<strong>and</strong> criminal hunting [2.43]. Some examples of WSN applications are [2.6]:<br />

1. Military sensor networks to detect <strong>and</strong> gain as much information as possible<br />

about enemy movements, explosions, <strong>and</strong> other phenomena of interest<br />

2. Law enforcement <strong>and</strong> national security applications for inimical agent<br />

tracking or nefarious substance monitoring (e.g., see Figure 2.9)<br />

Figure 2.9<br />

Law enforcement–national security application.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!