A novel autonomic communication framework is proposed for two-tiered heterogeneous sensor networks. the framework consists of an autonomic data-link protocol, LADD, and a communication scheduler. Networks consist of b...
详细信息
ISBN:
(纸本)9781595937636
A novel autonomic communication framework is proposed for two-tiered heterogeneous sensor networks. the framework consists of an autonomic data-link protocol, LADD, and a communication scheduler. Networks consist of both sensing nodes and more powerful relaying nodes. LADD is able to adapt to time varying and asymmetric wireless links with minimal energy consumption. the distributed scheduling scheme provides fair and efficient co-ordination of communication streams over multiple radio hops.
Efficient data acquisition in WSNs has attracted significant interest. For example, TinyDB [2] introduced query dissemination and data aggregation trees. Later, a probabilistic model of the physical world is used in [...
详细信息
ISBN:
(纸本)9781595937636
Efficient data acquisition in WSNs has attracted significant interest. For example, TinyDB [2] introduced query dissemination and data aggregation trees. Later, a probabilistic model of the physical world is used in [1]. Recently, [3] argues that probabilistic models of the physical world used in acquisition may miss outliers and introduces spatio-temporal suppression-based methods. We classify these established approaches as query-and-data centric approaches for optimizing the data acquisition process.
Wireless sensor network has been identified as being useful in a variety of domains including the battlefield and perimeter defense. these mission critical applications raise the concern for security in sensor network...
详细信息
ISBN:
(纸本)9781595937636
Wireless sensor network has been identified as being useful in a variety of domains including the battlefield and perimeter defense. these mission critical applications raise the concern for security in sensor network. Typical security problems identified include passive information gathering, subversion of a node, legitimate addition of a node to an existing sensor network, and so forth [1]. Under traditional routing concept, information security is usually ensured through high-level security protocols, but limited computational power and memory space in sensor nodes make traditional cryptographical techniques cumbersome to be implemented in sensor networks.
Existing protocols for Secure key establishment all rely on an unspecified mechanism for initially deploying secrets to sensor nodes. However, no commercially viable and secure mechanism exists for initial setup. With...
详细信息
ISBN:
(纸本)9781595937636
Existing protocols for Secure key establishment all rely on an unspecified mechanism for initially deploying secrets to sensor nodes. However, no commercially viable and secure mechanism exists for initial setup. Without a guarantee of secure key deployment, the traffic over a sensor network cannot be presumed secure. To address this problem, we present a user-friendly protocol for the secure deployment of cryptographic keys in sensor networks. We propose it collection of five techniques to prevent an attacker from eavesdropping on key deployment. To demonstrate feasibility for real-world use, we implement our protocol on Telos motes and conduct a user study.
We are demonstrating a networking technology and application environment that connects highly-constrained low-power wireless embeddedsensor networks with large-scale IP networks. this technology is based on the 6LoWP...
详细信息
ISBN:
(纸本)9781595937636
We are demonstrating a networking technology and application environment that connects highly-constrained low-power wireless embeddedsensor networks with large-scale IP networks. this technology is based on the 6LoWPAN IPv6-over-802.15.4 adptation layer.
暂无评论