Wireless sensor networks for structural and environmental monitoring

  • Authors:
  • Igor Dunajewski

  • Affiliations:
  • Institute of Environmental Mechanics and Applied Computer Science, Kazimierz Wielki University, Chodkiewicza 30, 85-072 Bydgoszcz

  • Venue:
  • Annales UMCS, Informatica
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The article discusses various applications of Wireless Sensor Networks (WNS) in environment and civil engineering constructions monitoring with a particular emphasis on the evaluation of the influence of individual node failures on the operation of the whole network. The dynamic development of civilization more and more necessitates the use of applications of integrated measure and control systems enabling constant monitoring and tracking of environmental conditions as well as industrial and civilian constructions in real time. Appropriate measurements of relocations and deformations of geotechnical and hydrotechnical structures have a key significance for ensuring safety precautions and their appropriate use and operation. The article explores possibilities for the application of WNS's in the above fields. WNS networks make it possible to monitor engineering constructions, to keep track of any changes occurring in buildings and structures and their immediate surroundings, to measure the settlement and vertical dislocation of structures or surfaces, or to monitor land-slips of bridges, tunnels or road embankments. Information collected by sensor networks is reported and dispatched progressively from measure points (nodes) providing accurate description of abrupt or gradual changes in the state of a building and the conditions of the surrounding area. However, due to harsh environmental conditions, unattended operation and unique characteristics of WSN's, sensors are subjected to various hazards and risks. It is pointed out in the article that those features that decide on the practicality and applicability of the networks are at the same time instrumental in the vulnerability of the system or that their application involves a risk of purposeful malicious actions aiming at disruption of the whole monitoring system.