Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wireless transmission medium and by the limited hardware and software capabilities of the nodes in such networks. We an...
详细信息
ISBN:
(纸本)9780769534923
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wireless transmission medium and by the limited hardware and software capabilities of the nodes in such networks. We analyze the requirements for using RF fingerprints to initialize secure authenticated links in a wireless sensor network for a surveillance application that allows older people to remain in their homes longer (termed the 'Aging in Place' application). We survey the applicable research for RF fingerprints and other security-related and authentication-related work. We show that RF fingerprints alone are inadequate for authentication. We present a new authentication protocol based on digital credentials that binds together physical-layer RF fingerprint data with higher cryptographic protocol layer data which is practical, but based on well-known and proven security principles.
High level system modeling has significant impact on the early analysis and evaluation of the embedded electronic systems. Being a class of distributed embedded systems, wireless ad hoc sensor networks can benefit fro...
详细信息
We propose a novel algorithm of counting indistinguishable objects by a collection of sensors. the information on multiple counting is recovered from the stochastic correlation patterns.
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
We propose a novel algorithm of counting indistinguishable objects by a collection of sensors. the information on multiple counting is recovered from the stochastic correlation patterns.
Energy efficiency has been known as the most important problem in wireless sensor networks. As a classic clustering-based protocol LEACH do a tremendous contribution on energy, efficiency. But it has some drawbacks th...
详细信息
ISBN:
(纸本)9780769532882
Energy efficiency has been known as the most important problem in wireless sensor networks. As a classic clustering-based protocol LEACH do a tremendous contribution on energy, efficiency. But it has some drawbacks that the cluster head may not well distributed, and the number of nodes in each cluster is distributed unequally. In this paper we proposed a new protocol BCBE (Balanced Cluster and Balanced Energy), the advantage of this routing protocol is we only have to know the location information of two nodes to locate other sensor nodes. the key feature of the protocol is: balanced cluster, balanced energy dissipation, hierarchical routing and load balance. Simulation results show that the proposed routing protocol can achieve longer network lifetime than LEACH.
Power management of sensor nodes is essential to maximize the lifetime of wireless sensor networks. Energy consumption of individual sensor node differs greatly depending on its type. Existing operating systems for se...
详细信息
ISBN:
(纸本)9781424425747
Power management of sensor nodes is essential to maximize the lifetime of wireless sensor networks. Energy consumption of individual sensor node differs greatly depending on its type. Existing operating systems for sensor networks typically leave the power management of sensors to applications. Unless specific features of the sensors and batteries are considered in the application design, energy consumption may increase or the application may malfunction. In this paper, we define factors to be considered for sensor-specific power management, and then propose an automated sensor-specific power management system. the system is implemented on the multi-threaded RETOS operating system for sensor networks. the experiment results with various applications show that the proposed system reduced the energy consumption by up to 29% without modification of the application code.
In wireless sensor networks (WSN) node failures are typically detected using a heartbeat application, where a neighbor detects a failed node when it misses successive short messages ("heartbeats") that shoul...
详细信息
ISBN:
(纸本)9781424425747
In wireless sensor networks (WSN) node failures are typically detected using a heartbeat application, where a neighbor detects a failed node when it misses successive short messages ("heartbeats") that should have been sent by the failed node. However, wireless links are usually lossy, hence, to distinguish node failures from intermittent link failures, the threshold on the number of missed heartbeats is usually set to a large number, incurring in a long delay for declaring a node dead. In this paper we present "GroupBeat" an accurate node failure detection system for WSN and propose the "Communication By Signaling" scheme as an energy-efficient low-overhead implementation of GroupBeat.
Establishing and maintaining secure communication paths in a wireless sensor network poses mathematical and technical challenges. We suggest to use random nonces to set up secure communication links after the network ...
详细信息
ISBN:
(纸本)9780769534923
Establishing and maintaining secure communication paths in a wireless sensor network poses mathematical and technical challenges. We suggest to use random nonces to set up secure communication links after the network deployment phase. this idea exploits some of the inherent features of sensor networks, e.g.: nodes are densely deployed;the wireless communication areas of neighbouring nodes have a large overlap. We outline the analytical properties of such a scheme and show simulation results which corroborate them for practical purposes.
In a wide range of applications, such as detecting environmental hazards, monitoring remote terrain and even monitoring customer behavior, Wireless sensor Networks (WSNs) are playing an important role. Due to the limi...
详细信息
ISBN:
(纸本)9780769534923
In a wide range of applications, such as detecting environmental hazards, monitoring remote terrain and even monitoring customer behavior, Wireless sensor Networks (WSNs) are playing an important role. Due to the limited energy in each node, a lot of attention has been paid on improving energy efficiency. In this paper, we first propose an Energy-Efficient Waiting Caching (EEWC) algorithm to improve the Data-Centric (DC) transport control protocol by cutting down traffic How. Second, we deploy Networked Predictive Controller (NPC) to shorten network delay. thus, the energy consumption can be reduced accordingly. We also analyze the proposed algorithm. Finally, we conduct extensive simulation experiments to evaluate the performance of the proposed algorithm.
In wireless sensor networks, each sensor node has very small memory space compared with any other embedded computingsystems. For this reason, operating systems running on the sensor nodes cannot allocate sufficient f...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
In wireless sensor networks, each sensor node has very small memory space compared with any other embedded computingsystems. For this reason, operating systems running on the sensor nodes cannot allocate sufficient fixed-size stack space for all threads. In the previous work, SESAME was proposed to allocate stack space more space-efficiently, but there is a problem of time overhead. In this paper, we present SESAME-P, which is a dynamic stack allocation scheme based on memory pool. the size of memory pool is predetermined by using static analysis of each function's stack usage information. Using the determined memory pool, SESAME-P reduces the dynamic stack allocation cost. Our experimental results show that SESAME-P significantly reduces the time overhead compared withthe existing SESAME.
A flexible, ubiquitous, and universal solution for management of distributed dynamic systems will be presented. It allows us to grasp complex systems on a higher than usual, semantic level, penetrating their infrastru...
详细信息
ISBN:
(纸本)9789898111319
A flexible, ubiquitous, and universal solution for management of distributed dynamic systems will be presented. It allows us to grasp complex systems on a higher than usual, semantic level, penetrating their infrastructures, also creating and modifying them, while establishing local and global dominance over the system organizations and coordinating their behavior in the way needed. the approach may allow the systems to maintain high runtime integrity and automatically recover from indiscriminate damages, preserving global goal orientation and situation awareness in unpredictable and hostile environments.
暂无评论