By Topic

Wireless Networked Security System Based on ZigBee Technology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Liting Cao ; Coll. of Autom., Beijing Union Univ., Beijing ; Yanxia Liu ; Shuo Yang

The existing security systems show many shortcomings such as difficult to extend and severe time-consuming because it is based on wiring network technology. In this paper, we present a wireless networked security system based on ZigBee technology. The system adopts hybrid topology structure based on cluster, which consists of many micro-sensor nodes, network coordinator nodes, network gateway (router), communication network and monitor centre (computer). For short distance transmission, the micro-sensor nodes collect data from the monitoring surroundings and transmit to the gateway using ZigBee communication. For long distance transmission, from the gateway to the monitor centre, system uses TCP/IP protocol. The gateway in this system is the protocol conversion used to transform a data package in ZigBee protocol to TCP/IP protocol before transmitting. A modified routing protocol based on LEACH is adopted in the system. The simulation result shows that the modified LEACH protocol has superiority on survival time. The wireless micro-sensor can be scattered to the surroundings that human unable enter. Then the sensor nodes self-organizing networked security system and realize security monitor task. The system also can be used to forest fireproofing and environment pollution inspection after modification.

Published in:

2008 4th International Conference on Wireless Communications, Networking and Mobile Computing

Date of Conference:

12-14 Oct. 2008