An important class of sensor network applications alms at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. These networks thereby essentially ac...
详细信息
ISBN:
(纸本)9783540730897
An important class of sensor network applications alms at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. These networks thereby essentially act as a distributed sampling system. However, unlike in the event detection class of sensor networks, the notion of sensing range is largely meaningless in this case. As a result, existing techniques to exploit sensing redundancy for event detection, which rely on the existence of such sensing range, become unusable. Instead, this paper presents a new method to exploit redundancy for the sampling class of applications, which adaptively selects the smallest set of reporting sensors to act as sampling points. By projecting the sensor space onto an equivalent Hilbert space, this method ensures sufficiently accurate sampling and interpolation, without a priori knowledge of the statistical structure of the physical process. Results are presented using synthetic sensor data and show significant reductions in the number of active sensors.
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is dif...
详细信息
ISBN:
(纸本)9780769536422
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is different from the ground environment in that there are some critical problems in reliability due to the large path loss of the underground. Therefore, in this paper we propose an opportunistic routing protocol for improving the reliability in the underground environment. Through the test-bed experiments the proposed routing protocol is compared with other routing protocols.
For security sensitive Internet of Things (IoT) and Wireless sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security atta...
详细信息
ISBN:
(纸本)9781538625651
For security sensitive Internet of Things (IoT) and Wireless sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security attacks. In this paper, we propose Bloom filter based authentication scheme suitable for the WSNs and IoT of large hop count (i.e., the large number of intermediate sensor nodes through which data must pass between source sensor node and gateway node). The novelty of our proposed protocol is, it eliminates unauthorized querying message transmission at the initial level (i.e., at the sensor node itself) to avoid bogus message flooding from the sensor nodes to the gateway node (which exhausts the resources of WSNs). We perform the formal and informal security analysis of the proposed schemes using widely accepted AVISPA tool and random oracle model. The computational analysis shows that our system is suitable for resource constrained sensor nodes like TelosB and MicaZ. The relative security and performance analysis results indicate that our scheme is more secure, efficient and robust in comparison to other existing systems.
sensor networks have a wide range of potential, practical and useful applications. However, there are issues that need to be addressed for efficient operation of sensor network systems in real applications. To extend ...
详细信息
ISBN:
(纸本)9781424413119
sensor networks have a wide range of potential, practical and useful applications. However, there are issues that need to be addressed for efficient operation of sensor network systems in real applications. To extend the lifetime of a sensor network, clustering algorithm is a kind of key technique used to reduce energy consumption, which can increase network scalability and lifetime. In this paper, we proposed a distributed Energy Balance Clustering (DEBC) protocol for heterogeneous network. Cluster heads are selected by a probability depending on the ratio between remaining energy of node and the average energy of network. The high initial and remaining energy nodes have more chances to be the cluster heads than the low energy nodes. Simulation result shows that our protocol provides longer lifetime than the existing clustering protocol and uses the best of energy in heterogeneous network.
The total and causal ordering of group operations in distributedsystems is at the core of solutions to many problems in distributedcomputing. Existing approaches are based on either a centralized coordinator to assi...
详细信息
The total and causal ordering of group operations in distributedsystems is at the core of solutions to many problems in distributedcomputing. Existing approaches are based on either a centralized coordinator to assign a sequence number for each operation or on a distributed two-phase protocol to determine the total ordering number. This paper proposes an efficient distributed single-phase protocol which determines the total ordering of group operations at the moment when operations are generated, without the need for a dedicated phase of determining the total ordering.
This paper is to describe a novel approach of building a secure and anonymous yet transparent and immutable identification management system. A consortium block chain with delegated proof of stack (DPOS) is used to bu...
详细信息
ISBN:
(纸本)9781509062966
This paper is to describe a novel approach of building a secure and anonymous yet transparent and immutable identification management system. A consortium block chain with delegated proof of stack (DPOS) is used to build consensus based user credential. It can be used to provide ID related services to various applications including internet social media in which human being is identified from social bots. A prototype shows that such ID management system is feasible. It is also immune to many id attacks.
distributed scalable video coding (DSVC) has recently been gaining many attentions due to its benefits in terms of computational complexity, error resilience and scalability, which are important for emerging video app...
详细信息
ISBN:
(纸本)9781538679630
distributed scalable video coding (DSVC) has recently been gaining many attentions due to its benefits in terms of computational complexity, error resilience and scalability, which are important for emerging video applications like wireless sensor networks and visual surveillance system (VSS). In DSVC, the side information (SI) creation plays a key role as it directly affects the DSVC compression performance and the encoder/decoder computational complexity. However, for many VSS applications, the energy of each VSS node is usually attenuating along the time, making the difficulty in transmitting surveillance video in real time. To address this problem, we propose a complexity controlled SI creation solution for the newly DSVC framework. To achieve the flexible SI creation, the complexity associated with SI creation process is modeled using a linear model in which the model parameters are estimated from a fitting process. To adjust the SI complexity, a user parameter is defined based on the availability of the VSS energy resource. Experiments conducted for a rich set of video surveillance data have revealed the benefits of the proposed complexity control solution, notably in both complexity control and compression performance.
暂无评论