Sunteți pe pagina 1din 4

IOT BASED FOREST FIRE MONITORING SYSTEM

VISHAL RAO#, VIKAS CHANDRA#, VIVEK BHARDWAJ#


#

Electronics And Instrumentation, GCET,Knowledge Park-1,


Greater Noida-201306
rao.vishal76@gmail.com

Abstract- The project proposes an efficient implementation for IoT


(Internet of Things) used for monitoring and controlling the Forest fire
system via World Wide Web. Using temp. and gas sensor the system
monitors whether there is any case of fire in the forest. The system
continuously transmit the live data using internet. From the transmitted
data continuous graph can be drawn and can be checked from anywhere on
internet using mobiles or computers.
Since the system is also to work as anti-fire system therefore and addition
microcontroller is provided so to switch the buzzer and LEDs in case of fire.

data and service". These devices collect useful data with the help of
various existing technologies and then autonomously flow the data
between other devices. Current market examples include smart
thermostat systems and washer/dryers that use Wi-Fi for remote
monitoring.

Therefore the system will work for monitoring as well as fire preventing
system.

I. INTRODUCTION
The internet of things (IoT) is the internetworking of physical
devices, vehicles, buildings and other itemsembedded with
electronics, software,sensors, actuators, and network connectivity that
enable these objects to collect and exchange data. In 2013 the Global
Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as
"the infrastructure of the information society." The IoT allows objects to
be sensed and/or controlled remotely across existing network
infrastructure, creating opportunities for more direct integration of the
physical world into computer-based systems, and resulting in improved
efficiency, accuracy and economic benefit. When IoT is augmented with
sensors and actuators, the technology becomes an instance of the more
general class of cyber-physical systems, which also encompasses
technologies such as smart grids, smart homes, intelligent transportation
and smart cities. Each thing is uniquely identifiable through its
embedded computing system but is able to interoperate within the
existing Internet infrastructure. Experts estimate that the IoT will consist
of almost 50 billion objects by 2020.
British entrepreneur Kevin Ashton coined the term in 1999 while
working at Auto-ID Labs (originally called Auto-ID centers, referring to
a global network of objects connected to radio-frequency identification,
or RFID). Typically, IoT is expected to offer advanced connectivity of
devices, systems, and services that goes beyond machine-to-machine
(M2M) communications and covers a variety of protocols, domains, and
applications. The interconnection of these embedded devices (including
smart objects), is expected to usher in automation in nearly all fields,
while also enabling advanced applications like a smart grid, and
expanding to the areas such as smart cities. "Things," in the IoT sense,
can refer to a wide variety of devices such as heart monitoring implants,
biochip transponders on farm animals, electric clams in coastal waters,
automobiles with built-in sensors, DNA analysis devices for
environmental/food/pathogen monitoring or field operation devices that
assist firefighters in search and rescue operations. Legal scholars suggest
to look at "Things" as an "inextricable mixture of hardware, software,

Fig 1: IOT Based Fire Forest Monitoring System

The IOT Based Fire Forest Monitoring System can be used for
monitoring as well as preventing system. Since the system alerts in case
of fire.

Monitoring - The system can be used to contionus monitor the forest.


The system is provide with Gas as well as Temp. sensor. Since it is IOT
based it transmits the real time data to the server and a graph can be
drawn using it.
JKHJHJHJHJHJHJHJHJHHHHHJ.
Preventing The microcontroller can be set to a specific values of gas
and temp. sensor exceeding which triggers the alarm as well as LEDs.

II. MICROCONTROLLERS
A microcontroller (or MCU, short for microcontroller unit) is a small
computer (SoC) on a single integrated circuit containing a processor
core, memory, and programmable input/output peripherals. Program
memory in the form of Ferroelectric RAM, NOR flash or OTP ROM is
also often included on chip, as well as a typically small amount of
RAM. Microcontrollers are designed for embedded applications, in

contrast to the microprocessors used in personal computers or other


general purpose applications consisting of various discrete chips.

communication as part of his "Six Webs" framework, presented at the


World Economic Forum at Davos in 1999.

III. MICROCONTROLLER USED IN SYSTEM


The Atmel 8-bit AVR RISC-based microcontroller combines 32 kB ISP
flash memory with read-while-write capabilities, 1 kB EEPROM, 2 kB
SRAM, 23 general purpose I/O lines, 32 general purpose working
registers, three flexible timer/counters with compare modes, internal and
external interrupts, serial programmable USART, a byte-oriented 2-wire
serial interface, SPI serial port, 6-channel 10-bit A/D converter (8channels in TQFP and QFN/MLF packages), programmable watchdog
timer with internal oscillator, and five software selectable power saving
modes. The device operates between 1.8-5.5 volts. The device achieves
throughput approaching 1 MIPS per MHz.

The concept of the internet of things first became popular in 1999,


through the Auto-ID Center at MIT and related market-analysis
publications. Radio-frequency identification (RFID) was seen by Kevin
Ashton (one of the founders of the original Auto-ID Center) as a
prerequisite for the internet of things at that point. If all objects and
people in daily life were equipped with identifiers, computers could
manage and inventory them. Besides using RFID, the tagging of things
may be achieved through such technologies as near field
communication, barcodes, QR codes and digital watermarking.

Fig 2: Specification of ATMega 328.

IV. HISTORY OF IOT


As of 2016, the vision of the internet of things has evolved due to a
convergence of multiple technologies, including ubiquitous wireless
communication, real-time analytics, machine learning, commodity
sensors, and embedded systems. This means that the traditional fields of
embedded systems, wireless sensor networks, control systems,
automation (including home and building automation), and others all
contribute to enabling the internet of things (IoT).
The concept of a network of smart devices was discussed as early as
1982, with a modified Coke machine at Carnegie Mellon University
becoming the first internet-connected appliance, able to report its
inventory and whether newly loaded drinks were cold. Mark Weiser's
seminal 1991 paper on ubiquitous computing, "The Computer of the
21st Century", as well as academic venues such as UbiComp and
PerCom produced the contemporary vision of IoT. In 1994 Reza Raji
described the concept in IEEE Spectrum as "[moving] small packets of
data to a large set of nodes, so as to integrate and automate everything
from home appliances to entire factories".[30] Between 1993 and 1996
several companies proposed solutions like Microsoft's at Work or
Novell's NEST. However, only in 1999 did the field start gathering
momentum. Bill Joy envisioned Device to Device (D2D)

In its original interpretation,[when?] one of the first consequences of


implementing the internet of things by equipping all objects in the world
with minuscule identifying devices or machine-readable identifiers
would be to transform daily life. For instance, instant and ceaseless
inventory control would become ubiquitous. A person's ability to
interact with objects could be altered remotely based on immediate or
present needs, in accordance with existing end-user agreements. For
example, such technology could grant motion-picture publishers much
more control over end-user private devices by remotely enforcing
copyright restrictions and digital rights management, so the ability of a
customer who bought a Blu-ray disc to watch the movie becomes
dependent on so-called "copyright holder's" decision, similar to Circuit
City's failed DIVX.

V. APPLICATIONS
According to Gartner, Inc. (a technology research and advisory
corporation), there will be nearly 20.8 billion devices on the internet of
things by 2020. ABI Research estimates that more than 30 billion
devices will be wirelessly connected to the internet of things by 2020.
As per a recent survey and study done by Pew Research Internet Project,
a large majority of the technology experts and engaged Internet users
who responded83 percentagreed with the notion that the
Internet/Cloud of Things, embedded and wearable computing (and the
corresponding dynamic systems) will have widespread and beneficial
effects by 2025. As such, it is clear that the IoT will consist of a very
large number of devices being connected to the Internet. In an active
move to accommodate new and emerging technological innovation, the
UK Government, in their 2015 budget, allocated 40,000,000 towards
research into the internet of things. The former British Chancellor of the
Exchequer George Osborne, posited that the internet of things is the next
stage of the information revolution and referenced the inter-connectivity
of everything from urban transport to medical devices to household
appliances.
Integration with the Internet implies that devices will use an IP
address as a unique identifier. However, due to the limited address space
of IPv4 (which allows for 4.3 billion unique addresses), objects in the
IoT will have to use IPv6 to accommodate the extremely large address
space required. Objects in the IoT will not only be devices with sensory
capabilities, but also provide actuation capabilities (e.g., bulbs or locks
controlled over the Internet). To a large extent, the future of the internet
of things will not be possible without the support of IPv6; and

consequently the global adoption of IPv6 in the coming years will be


critical for the successful development of the IoT in the future.
The ability to network embedded devices with limited CPU, memory
and power resources means that IoT finds applications in nearly every
field. Such systems could be in charge of collecting information in
settings ranging from natural ecosystems to buildings and factories,
thereby finding applications in fields of environmental sensing and
urban planning.
On the other hand, IoT systems could also be responsible for performing
actions, not just sensing things. Intelligent shopping systems, for
example, could monitor specific users' purchasing habits in a store by
tracking their specific mobile phones. These users could then be
provided with special offers on their favorite products, or even location
of items that they need, which their fridge has automatically conveyed to
the phone. Additional examples of sensing and actuating are reflected in
applications that deal with heat, electricity and energy management, as
well as cruise-assisting transportation systems. Other applications that
the internet of things can provide is enabling extended home security
features and home automation. The concept of an "internet of living
things" has been proposed to describe networks of biological sensors
that could use cloud-based analyses to allow users to study DNA or
other molecules. All these advances add to the numerous list of IoT
applications. Now with IoT, you can control the electrical devices
installed in your house while you are sorting out your files in office.
Your water will be warm as soon as you get up in the morning for the
shower. All credit goes to smart devices which make up the smart home.
Everything connected with the help of Internet.
Environmental monitoring applications of the IoT typically use sensors
to assist in environmental protection by monitoring air or water quality,
atmospheric or soil conditions, and can even include areas like
monitoring the movements of wildlife and their habitats. Development
of resource constrained devices connected to the Internet also means that
other applications like earthquake or tsunami early-warning systems can
also be used by emergency services to provide more effective aid. IoT
devices in this application typically span a large geographic area and can
also be mobile. It has been argued that the standardization IoT brings to
wireless sensing will revolutionize this area
VI. PROPOSED FOREST FIRE MONITORING PARADIGM
In this section, we describe our forest fire monitoring paradigm in
detail. For the development of FFMP, we made some assumptions about
the static and mobile sensor nodes.
The static sensor nodes are densely deployed in the forest in order to
obtain a high sensing coverage rate. They are strictly limited by energy,
computation, communication band and storage. Even though it is not
necessary to densely deploy the mobile sensor nodes, their quality must
be god enough that they can cover the interest area by their
communication capability.
The energy of a mobile sensor node is much more than that of a static
node. We also assume that the mobile sensor nodes are capable of
moving and avoiding obstacles which can guarantee that the mobile
sensor nodes can move to a proper location.

All the sensor nodes can obtain its geographic information by


equipment such as GPS or some other form of localization techniques.
This is essential, because when monitoring forest fires, we not only want
to know whether there is fire, but also where is the fire. Therefore, the
sensors should capable of locating themselves.
The paradigm is composed of three phases: (1) mobile sensor nodes
deployment, (2) information fusion, and (3) locating the fire.

Mobile Sensor Node Deployment and Cluster Formation: After


being randomly scattered in the forest, the sensor nodes need to
automatically organize themselves into a network. In this paper, we
organize our network in a hierarchical way. Our network is divided into
two layers: the static sensor nodes compose the lower layer and the
mobile sensor nodes compose the higher layer. The responsibility of the
lower layer is monitoring the environment and uploading the
information to the higher layer. The sensor nodes in the higher layer
need to process the data and upload the processed data to the base
station. Initially, the static sensor nodes turn into an energy-saving sleep
mode and keep receiving message modules, but only when they are live.
The mobile sensors first upload theirlocation information to the base
station through a routing protocol, such as a flooding routing protocol.
To prolong the lifetime and balance the load of the WSNs, we divide the
interest area into regular hexagons, like the cellular systems in Figure 1.
At each core of the cellular, a mobile sensor node exists and controls the
static sensor nodes located in the entire cellular.

Fig 3: Deployment of the Mobile Sensor Nodes

Information Fusion Phase: The responsibilities of the mobile sensor


nodes in our paradigm are for controlling the
clusters and processing and transmitting the data uploaded by the static
sensor nodes. However, the mobile sensor nodes dont monitor the
surrounding environment. Opposed to the mobile sensor nodes, the
static sensor nodes need to collect the information. In this paper, we use
temperature to indicate the forest fire. The structure of the message
generated by the static sensor nodes is [location, temperature]. The
temperature is used to detect the fire and location is used to locate the
fire. As discussed previously, wireless sensor nodes are strictly limited
by some resources, such as energy and communication bandwidth.
Therefore, saving energy is one of the most important issues in WSNs.
Recognizing that in-network computations would generate less energy
consumption than that of communication; we can save the energy by
fusing the data and transmitting the data fusion results, instead of the
original data. The loss of information is the cost of information

fusion.When building the temperature distribution graph, the more


information we have, the more
accurate the graph is.
Fire Locating: After receiving all of the temperature data from the
interest area, the base station needs to locate the fire and predict the
developing trend. The location of the fire is defined as follows:The
LOCATION of the fire is the max set of Grids where the centers
temperature is beyond a preset threshold. The resolution R of the Grids
is also preset by the users.

VIII. CONCUSION
In this thesis, an overview of the IOT based Fire Monitoring System
and its various modalities has been discussed. As our future work, we
plan to design a more robust and intelligent mechanism for forest fire
monitoring. Fire developing trend prediction based on a temperature
distribution graph and the LOCATION of the fire is another challenge
for us. In addition, reducing the data transmission and prolonging the
life of the network further are another two important issues.
REFERENCES
[1]
[2]
[3]
[4]
[5]

Fig 4: Location of Fire

VII. PERFORMANCE EVALUATIONS


We use ns-3 simulator (version 3.21) to evaluate the performance of
the FFMP approach. To simulate the readings of the sensor nodes, we
extract 100 similar sub-traces from the temperature traces provided by
the Live from Earth and Mars project at the University of Washington.
Each sub-trace contains 800 readings, as illustrated in Figure 11. To
reduce the randomness, we do the same experiment 10 times and present
the average result. For each experiment, we employ one or several subtraces to simulate the readings of the sensor nodes. To simulate the
spatial correlation of the sensor readings, we attempt to dispatch the
successive readings in the sub-trace to the neighboring sensor nodes in
the simulated network.

[6]
[7]

[8]

[9]

[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]

Fig 7: A Possible Trace

L. M. Oliveira and J. J. Rodrigues, Wireless sensor networks: a survey on


environmental monitoring, Journal of communications, vol. 6, no. 2, (2011),pp.
143-151.
W. B. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, An applicationspecific protocol architecture for wireless microsensor networks, Wireless
Communications, IEEE Transactions on, vol. 1, no. 4, (2002),pp. 660-670.
Z. J. Zhang, J. S. Fu and H. C. Chao, An energy-efficient motion strategy for
mobile sensors in mixed wireless sensor networks, International Journal of
Distributed Sensor Networks, (2013).
Z. Q. Hao and Z. J. Zhang, Two Centralized Energy-Efficient Deployment
Algorithms for Mobile Nodes in a Mixed Wireless Sensor Network, Journal of
Computers, vol. 24, no. 4, (2014),pp. 32-43.
G. Wang, G. Cao and T. LaPorta, A bidding protocol for deploying mobile
sensors, Network Protocols, 2003. Proceedings. 11th IEEE International
Conference on. IEEE, (2003),pp. 315-324.
G. Wang, G. Cao, P. Berman, et al., Bidding protocols for deploying mobile
sensors, Mobile Computing, IEEE Transactions on, vol. 6, no. 5, (2007),pp. 563576.
Z. Wan, P. Wang and X. Li, Using MODIS land surface temperature and
normalized difference vegetation index products for monitoring drought in the
southern Great Plains, USA, International Journal of Remote Sensing, vol. 25, no.
1, (2004),pp. 61-72.
T. J. Lynham, C. W. Dull and A. Singh, Requirements for space-based
observations in fire management: A report by the wild land fire hazard team,
committee on earth observation satellites (CEOS) disaster management support
group (DMSG), Geoscience and Remote Sensing Symposium, 2002. IGARSS'02.
2002 IEEE International. IEEE, vol. 2, (2002),pp. 762-764.
F. Bao, R. Chen, M. J. Chang, et al., Hierarchical trust management for wireless
sensor networks and its applications to trust-based routing and intrusion detection,
Network and Service Management, IEEE Transactions on, vol. 9, no. 2, (2012),pp.
169-183.
M. Hefeeda and M. Bagheri, Wireless sensor networks for early detection of forest
fires, Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal
Conference on. IEEE, (2007),pp. 1-6.
L. Hu and D. Evans, Localization for Mobile Sensor Networks, Proc. ACM
MobiCom,(2004)September, pp. 45-57.
K. F. Ssu, C. H. Ou and H. C. Jiau, Localization with Mobile Anchor Points in
Wireless Sensor Networks, IEEE Trans. Vehicular Technology, vol. 54, no. 3,
(2005)May, pp. 1187-1197.
G. Wang, G. Cao and T. LaPorta, A bidding protocol for deploying mobile
sensors, Network Protocols, 2003. Proceedings. 11th IEEE International
Conference on. IEEE, (2003),pp. 315-324.
G. Wang, G. Cao and T. La Porta, Movement-assisted sensor deployment,
Mobile Computing, IEEE Transactions on, vol. 5, no. 6, (2006),pp. 640-652.
B. Khaleghi, A. Khamis, F. O. Karray, et al., Multisensor data fusion: A review of
the state-of-the-art, Information Fusion, vol. 14, no. 1, (2014),pp. 28-44.
M. De Berg, M. V. Kreveld, M. Overmars, et al., Computational geometry,
Springer Berlin Heidelberg, (2000).
http://www.nsnam.org/.
Live from Earth and Mars (LEM) Project,(2006),http://wwwk12.atmos.washington.edu/k12/grayskies/.
M. Wu, J. Xu, X. Tang, et al., Top-k monitoring in wireless sensor networks,
Knowledge and Data Engineering, IEEE Transactions on, vol. 19, no. 7, (2007),pp.
962-976.

S-ar putea să vă placă și