Security is an important issue in sensor networks. Many applications in military, distributed information gathering etc., demand for Secure Group Communication (SGC) in sensor networks. the SGC requires common network...
详细信息
ISBN:
(纸本)9780769530994
Security is an important issue in sensor networks. Many applications in military, distributed information gathering etc., demand for Secure Group Communication (SGC) in sensor networks. the SGC requires common network-wide group key for confidentiality of, control messages and data reports. the group key should be updated when a node is compromised. In this paper we propose a new key management scheme for group key computation and distribution which is based on tree structure. the proposed scheme minimizes storage as well as communication and computation cost of end user (i.e., sensor nodes). the complex encryption/decryption operations used to distribute new group key whenever a node is compromised are replaced by one way hash functions and simple XOR operations.
distributedsensor networks, as opposed to centralized networks, offer several advantages in terms of versatility and increased safety, which make their use particularly relevant for applications of security surveilla...
详细信息
ISBN:
(纸本)9780769534954
distributedsensor networks, as opposed to centralized networks, offer several advantages in terms of versatility and increased safety, which make their use particularly relevant for applications of security surveillance. A challenge of such systems is how to build autonomously a global description of the sensed environment without supervision of a central processing unit and with minimal configuration effort. We present an approach to ubiquitous computing, based on a semantic representation of the world view in terms of correlation of local information learned at the local level. there, a statistical description of the sensed activity is provided. Correlations of events among nodes are learned using a Boltzmann machine approach and used in order to establish neighborhood correspondences. Moreover, the communication between nodes is used to enrich the local description of the sensed environment by approximating the a-posterior distributions by marginal distributions computed withthe loopy belief propagation algorithm. We present results of simulations emulating a security surveillance environment in which the sensors are cameras and activity is learned by processing video data.
Many state-of-the-art wireless sensor networks have been equipped with reprogramming modules, e.g., those for software/firmware updates. System migration tasks such as software reprogramming however will interrupt nor...
详细信息
A component framework plays an important role in CBSD as it determines how software components are developed, packaged, assembled and deployed A desirable component framework for developing diverse cross-domain embedd...
详细信息
ISBN:
(纸本)9780769533490
A component framework plays an important role in CBSD as it determines how software components are developed, packaged, assembled and deployed A desirable component framework for developing diverse cross-domain embedded applications should meet such requirements as (1) lightweight on memory use, (2) integrated task execution model, (3) fast inter-component communication, (4) support for distributed processing, and (5) transparency from underlying communication middleware. Although current embedded system component frameworks address some of the above requirements, they fail to meet all of them taken together. We thus propose a new embedded system component framework called CREAM (Component-based Remote-communicating Embedded Application Model). It achieves these goals by using build-time code generation, explicit control of task creation and execution in the component framework, static analysis of component composition to generate efficient component binding, and abstraction of the component's application logic from the communication middleware. We have implemented the CREAM component framework and conducted a series of experiments to compare its performance characteristics to a raw socket-based communication implementation and the Lightweight-CCM implementation by MicoCCM
the proceedings contain 57 papers. the topics discussed include: dealing with uncertainty in the hybrid world;distributed technology for global dominance;behavioral development for humanoid robot - towards life-long h...
ISBN:
(纸本)9789898111302
the proceedings contain 57 papers. the topics discussed include: dealing with uncertainty in the hybrid world;distributed technology for global dominance;behavioral development for humanoid robot - towards life-long human-robot;swarm intelligence and swarm robotics - the swarm-bot experiment;synchronization of arm and hand assistive robotics devices to impart activities of daily living tasks;loss minimization of induction generators with adaptive fuzzy controller;OBDD compression of numerical controllers;energy model based control for forming processes;LHTNDT: learn HTN method preconditions using decision tree;merging of advices from multiple advisory systems - with evaluation on rolling mill data;self-organization of gait pattern transition - an efficient approach to implementing animal gaits and gait transitions;and data mining and knowledge discovery for monitoring and intelligent control of a wastewater treatment plant.
In Wireless sensor Networks (WSNs), a challenging problem is how to advance network QoS. Energy-efficiency network communication traffic and failure-tolerance, these important factors of QoS are closely related with t...
详细信息
ISBN:
(纸本)9780769532882
In Wireless sensor Networks (WSNs), a challenging problem is how to advance network QoS. Energy-efficiency network communication traffic and failure-tolerance, these important factors of QoS are closely related withthe applied performance of WSNs. Hence a QoS-aware routing protocol called Directed Alternative Spanning Tree (DAST) is proposed to balance the above three factors of QoS. A directed tree-based model is constructed to bring data transmission more motivated and efficient. Based on Markov, a communication state predicted mechanism is proposed to choose reasonable parent, and packet transmission to double-parent is submitted with alternative algorithm. For enhancing network failure-tolerance, routing reconstruction is studied on. Withthe simulations, the proposed protocol is, evaluated in comparison withthe existing protocols from energy efficiency to the failure-tolerance. the Performance of DAST is verified to be efficient and available, and it is competent for satisfying QoS of WSNs.
the proceedings contain 57 papers. the topics discussed include: dealing with uncertainty in the hybrid world;distributed technology for global dominance;behavioral development for humanoid robot - towards life-long h...
ISBN:
(纸本)9789898111302
the proceedings contain 57 papers. the topics discussed include: dealing with uncertainty in the hybrid world;distributed technology for global dominance;behavioral development for humanoid robot - towards life-long human-robot;swarm intelligence and swarm robotics - the swarm-bot experiment;synchronization of arm and hand assistive robotics devices to impart activities of daily living tasks;loss minimization of induction generators with adaptive fuzzy controller;OBDD compression of numerical controllers;energy model based control for forming processes;LHTNDT: learn HTN method preconditions using decision tree;merging of advices from multiple advisory systems - with evaluation on rolling mill data;self-organization of gait pattern transition - an efficient approach to implementing animal gaits and gait transitions;and data mining and knowledge discovery for monitoring and intelligent control of a wastewater treatment plant.
We present an approach to provide Intrusion Detection systems (IDS) facilities into Wireless sensors Networks (WSN). WSNs are usually composed of a large number of low power sensors. they require a careful consumption...
详细信息
We present an approach to provide Intrusion Detection systems (IDS) facilities into Wireless sensors Networks (WSN). WSNs are usually composed of a large number of low power sensors. they require a careful consumption of the available energy in order to prolong the lifetime of the network. From the security point of view, the overhead added to standard protocols must be as light as possible according to the required security level. Starting from the DESERT tool [14, 16, 25] which has been proposed for component-based software architectures, we derive a new framework that permits to dynamically enforce a set of properties of the sensors behavior. this is accomplished by an IDS specification that is automatically translated into few lines of code installed in the sensors. this realizes a distributed system that locally detects violation of the sensors interactions policies and is able to minimize the information sent among sensors in order to discover attacks across the network.
this paper discusses a mobile robot teleoperation system via a Wireless sensor Network (WSN) to support for rescue operation in underground mail at disaster Situation. For this purpose, the teleoperation interface ser...
详细信息
ISBN:
(纸本)9784907764319
this paper discusses a mobile robot teleoperation system via a Wireless sensor Network (WSN) to support for rescue operation in underground mail at disaster Situation. For this purpose, the teleoperation interface server that controls communication between an operator and a robot via WSN was developed and a routing protocol based on AODV-uu was installed to WSN. the operator cans teleoperate of mobile robot directly and indirectly using this system.
It is an undeniable fact that people want information. Unfortunately, even in today's highly automated society, a lot of the information we desire is still manually collected. An example is fuel prices where websi...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
It is an undeniable fact that people want information. Unfortunately, even in today's highly automated society, a lot of the information we desire is still manually collected. An example is fuel prices where websites providing fuel price information either send their workers out to manually collect the prices or depend on volunteers manually relaying the information. this paper proposes a novel application of wireless sensor networks to automatically collect fuel prices from camera images of road-side price board (billboard) of service (or gas) stations. Our system exploits the ubiquity of mobile phones that have cameras as well as users contributing and sharing data. In our proposed system, cameras of contributing users will be automatically triggered when they get close to a service station. these images will then be processed by computer vision algorithms to extract the fuel prices. In this paper, we will describe the system architecture and present results from our computer vision algorithms. Based on 52 images, our system achieves a hit rate of 92.3% for correctly detecting the fuel price board from the image background and reads the prices correctly in 87.7% of them. To the best of our knowledge, this is the first instance of a sensor network being used for collecting consumer pricing information.
暂无评论