Wireless Multimedia sensor Networks (WMSNs) are used in many application domains, such as surveillance systems, telemedicine and so on. In order to ensure a broad deployment of such innovative services, strict require...
详细信息
This paper reviews coordinated motion control strategies of mobile sensors in mobile surveillance systems. Mobile surveillance systems include a vast array of mobile sensing nodes with varying sensing modalities that ...
详细信息
ISBN:
(纸本)9781424443970
This paper reviews coordinated motion control strategies of mobile sensors in mobile surveillance systems. Mobile surveillance systems include a vast array of mobile sensing nodes with varying sensing modalities that can sense continuously the volume of interest. These distributed nodes are capable of sensing, processing, mobilization and communication with other nodes. One of the fundamental problems of mobile surveillance systems is how to coordinate these distributed nodes in such a way that they can move together in concert. Based on the nature of the surveillance task, three coordinated motion control strategies are described. These strategies are direct control, intentional control and emergent control.
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is dif...
详细信息
ISBN:
(纸本)9780769536422
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is different from the ground environment in that there are some critical problems in reliability due to the large path loss of the underground. Therefore, in this paper we propose an opportunistic routing protocol for improving the reliability in the underground environment. Through the test-bed experiments the proposed routing protocol is compared with other routing protocols.
The total and causal ordering of group operations in distributedsystems is at the core of solutions to many problems in distributedcomputing. Existing approaches are based on either a centralized coordinator to assi...
详细信息
The total and causal ordering of group operations in distributedsystems is at the core of solutions to many problems in distributedcomputing. Existing approaches are based on either a centralized coordinator to assign a sequence number for each operation or on a distributed two-phase protocol to determine the total ordering number. This paper proposes an efficient distributed single-phase protocol which determines the total ordering of group operations at the moment when operations are generated, without the need for a dedicated phase of determining the total ordering.
An important class of sensor network applications alms at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. These networks thereby essentially ac...
详细信息
ISBN:
(纸本)9783540730897
An important class of sensor network applications alms at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. These networks thereby essentially act as a distributed sampling system. However, unlike in the event detection class of sensor networks, the notion of sensing range is largely meaningless in this case. As a result, existing techniques to exploit sensing redundancy for event detection, which rely on the existence of such sensing range, become unusable. Instead, this paper presents a new method to exploit redundancy for the sampling class of applications, which adaptively selects the smallest set of reporting sensors to act as sampling points. By projecting the sensor space onto an equivalent Hilbert space, this method ensures sufficiently accurate sampling and interpolation, without a priori knowledge of the statistical structure of the physical process. Results are presented using synthetic sensor data and show significant reductions in the number of active sensors.
For security sensitive Internet of Things (IoT) and Wireless sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security atta...
详细信息
ISBN:
(纸本)9781538625651
For security sensitive Internet of Things (IoT) and Wireless sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security attacks. In this paper, we propose Bloom filter based authentication scheme suitable for the WSNs and IoT of large hop count (i.e., the large number of intermediate sensor nodes through which data must pass between source sensor node and gateway node). The novelty of our proposed protocol is, it eliminates unauthorized querying message transmission at the initial level (i.e., at the sensor node itself) to avoid bogus message flooding from the sensor nodes to the gateway node (which exhausts the resources of WSNs). We perform the formal and informal security analysis of the proposed schemes using widely accepted AVISPA tool and random oracle model. The computational analysis shows that our system is suitable for resource constrained sensor nodes like TelosB and MicaZ. The relative security and performance analysis results indicate that our scheme is more secure, efficient and robust in comparison to other existing systems.
暂无评论