the problem of interest is the detection of transient signals in additive white Gaussian noise (AWGN) in the presence of missing signal observations (samples). Specifically, a fusion center aims at detecting the prese...
详细信息
the problem of interest is the detection of transient signals in additive white Gaussian noise (AWGN) in the presence of missing signal observations (samples). Specifically, a fusion center aims at detecting the presence of transient signals by collecting measurements from individual sensors through erasure channels. Under the assumption that the fusion center can control the sampling procedure through a feedback channel, a strategy is proposed to adapt the sampling rate in response to sample missing withthe goal of achieving accurate and timely decisions withthe minimum communication cost measured by sampling rate. the proposed strategy is flexible in that it can be configured to suit different performance requirements. Compared with fixed-rate sampling, the proposed strategy achieves better tradeoff between Quality of Detection (QoD) and communication cost through dynamic adaptation.
Mobile ad hoc network (MANET) is a collection of autonomous nodes or terminals that communicate with each other by forming a multihop radio network. these nodes maintain connectivity in a decentralized manner. MANET i...
详细信息
Mobile ad hoc network (MANET) is a collection of autonomous nodes or terminals that communicate with each other by forming a multihop radio network. these nodes maintain connectivity in a decentralized manner. MANET is characterized by a rapidly changed topology. As a result packets select different multi-hops paths to reach their destinations. Even though packets are somehow independent from each other, there are still some hidden relations (patterns) among them. these relations may be utilized to give useful information to different MANET protocols. In this work association rule technique is applied to obtain these hidden relations.
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. the traditional approach to address sybil attacks is to employ ...
详细信息
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. the traditional approach to address sybil attacks is to employ cryptographic-related methods. However, conventional security approaches may not always desirable due to their infrastructural overhead. In this paper, we propose to utilize K-means cluster analysis for detecting sybil attacks based on the spatial correlation between the signal strength and physical locations. Our approach requires minimal overhead to wireless devices. We have evaluated our methods through experimentation using both an 802.11 (WiFi) network as well as an 802.15.4 (ZigBee) network in two office buildings. Our results show that the proposed sybil attack detector is highly effective with over 95% detection rates and under 5% false positive rates.
In the next-generation WiMAX system, cooperative communication is being considered as an advanced technique to increase the throughput and improve the signal quality. In a cooperative scenario, multiple stations can j...
In the next-generation WiMAX system, cooperative communication is being considered as an advanced technique to increase the throughput and improve the signal quality. In a cooperative scenario, multiple stations can jointly emulate the antenna elements of a multi-input multi-output (MIMO) system in a distributed fashion. Unlike conventional space-time coding (STC) mechanisms used by a ieee 802.16e antenna array, distributed space-time coding (DSTC) is employed across the cooperating stations to achieve a higher spatial diversity gain. In this paper, we present the framework for DSTC in the emerging relay-assisted WiMAX network, and develop a cooperative MAC layer protocol, called CoopMAX, for DSTC deployment in a WiMAX system. through extensive simulations, we evaluate the performance of CoopMAX and show that DSTC can yield capacity gains of up to about 50% for the uplink of an ieee 802.16 network.
sensor networks are now enabling the monitoring of various environmental phenomena with more accuracy than the previous labour intensive and less technological solutions. this paper is concerned withthe application o...
详细信息
sensor networks are now enabling the monitoring of various environmental phenomena with more accuracy than the previous labour intensive and less technological solutions. this paper is concerned withthe application of opportunistic networking techniques to wildlife monitoring, where the sensors are attached to animals moving in their habitat. We present seal-2-seal, a novel protocol for logging of node (i.e., animal) contacts in mobile networks and for dissemination of that information to sinks for further analysis. the protocol utilises an efficient data summary mechanism to reduce the amount of information that needs to be transmitted, thus reducing energy consumption. To evaluate the performance of the protocol, we implemented it for the Contiki operating system on sensor devices and ran simulations based on real-life mobility traces using the Cooja emulator.
In this paper, the problem of tracking cooperative mobile nodes in wireless sensor networks is addressed. Aiming at an efficient resource solution, the research adopts a strategy of combining target tracking with node...
详细信息
In this paper, the problem of tracking cooperative mobile nodes in wireless sensor networks is addressed. Aiming at an efficient resource solution, the research adopts a strategy of combining target tracking with node selection procedures in order to select informative sensors to minimize the energy consumption of the tracking task. We devise a cluster-based architecture to address the limitations in computational, battery power and communications of the sensor devices. To track mobile nodes two kinds of particle filters, bootstrap and unscented particle filter, are considered to estimate the actual position and predict future locations. the particle filters have been already used in tracking algorithms, but their energy efficiency has received less attention. To save energy, a node selection procedure is proposed. the node selection problem is formulated as a cross-layer optimization problem and it is solved using greedy algorithms.
Due to applications and systems such as sensor networks, data streams, and peer-to-peer (P2P) networks, data generation and storage become increasingly distributed. therefore a challenging problem is to support best-m...
详细信息
ISBN:
(纸本)9781424418367;1424418364
Due to applications and systems such as sensor networks, data streams, and peer-to-peer (P2P) networks, data generation and storage become increasingly distributed. therefore a challenging problem is to support best-match query processing in highly distributed environments. In this paper, we present a novel framework for top-k query processing in large- scale P2P networks, where the dataset is horizontally distributed to peers. Our proposed framework returns the exact results to the user, while minimizing the number of queried super-peers and transferred data. through simulations we demonstrate the feasibility of our approach in terms of overall response time.
We introduce a self-organizing stochastic-communications scheme, called BSTeR, for wireless ad-hoc/sensor networks (mobile or stationary). the introduced scheme involves three ideas essentially: 1) Each node i determi...
We introduce a self-organizing stochastic-communications scheme, called BSTeR, for wireless ad-hoc/sensor networks (mobile or stationary). the introduced scheme involves three ideas essentially: 1) Each node i determines its transmit power dynamically according to a random variable P i ; 2) Node i computes the Probability Mass Function (PMF) of P i , based on the topology of the network and the PMFs of other nodes in the network dynamically; and 3) Each time node i needs to transmit a data packet, it generates a random number pi i according to P i , and transmits the data with power level pi i . Compared to the widely employed fixed-power communication schemes, the introduced scheme provides significant performance gains over many performance aspects concurrently, including network connectivity, end-to-end power/energy consumption, end-to-end delay and throughput, energy-delay relation, system longevity, and coverage.
For many applications in wireless sensor networks, accurate data collection is a crucial problem. Users may want to continuously extract data from the networks for analysis after. Clustering and prediction techniques,...
详细信息
For many applications in wireless sensor networks, accurate data collection is a crucial problem. Users may want to continuously extract data from the networks for analysis after. Clustering and prediction techniques, which exploit spatial and temporal correlation among sensor data, provide opportunities for reducing the energy consumption of sensor data collection. We propose the LEAP (localized energy-aware prediction) approach. LEAP is clustering based. A cluster head represents all sensor nodes in the cluster, and collects data values from them. LEAP implements local prediction algorithms, and only data values not within a specified error bound are collected by a cluster head. By doing so, the cluster head maintains an accurate view of the sensor data, while the communication cost is reduced. In this paper, we present energy-aware prediction models used in LEAP, analyze the performance tradeoff between reducing communication cost and limiting prediction cost, and design algorithms to exploit the benefit of energy-aware prediction. We believe LEAP has broad applications. Our proposed models, analysis, and algorithms are validated via simulation.
作者:
Marc LoschonskyIMTEK
Department of Microsystems Engineering Laboratory for Electrical Instrumentation Albert-Ludwigs-Universität Freiburg Freiburg im Breisgau Germany
Surface and bulk acoustic wave (SAW and BAW) devices are suitable as passive wireless sensor elements, called SAW transponders or BAW sensors, for measuring physical quantities e.g. temperature, pressure or specific b...
Surface and bulk acoustic wave (SAW and BAW) devices are suitable as passive wireless sensor elements, called SAW transponders or BAW sensors, for measuring physical quantities e.g. temperature, pressure or specific bio molecules even in liquids. But the sensitivity of the resonance frequency in liquids depends on the polarization of the acoustic wave and therefore shear wave polarizes surface or bulk acoustic waves are respectively needed. In the recent years different kinds of approaches of SAW transponders for sensor applications were published mainly based on piezoelectric materials designed for filter applications with longitudinal wave polarizations e.g. Rayleigh waves for SAW transponders or longitudinal waves for BAW sensors. A new approach is presented designing adapted piezoelectric materials with Metal-Organic-Vapor-Phase-Epitaxy (MOVPE) especially for sensor application and therefore with shear wave polarization of the acoustic waves in this work.
暂无评论