In RFID systems, some readers will suffer from RF interference, which can lead to reader collision. Consequently, an anti-collision algorithm based on distributed power control (DPC) scheme was proposed as a solution ...
详细信息
ISBN:
(纸本)9781424437092
In RFID systems, some readers will suffer from RF interference, which can lead to reader collision. Consequently, an anti-collision algorithm based on distributed power control (DPC) scheme was proposed as a solution for the problem in this paper. the proposed algorithm dynamically adjusts power output of a RFID reader based on the signal-to-interference ratio (SIR) of RFID reader receiver, minimizes the reader collision ratio while maintaining a desired read range. the simulation results shown that the proposed algorithm reduces the collision ratio greatly while ensure overall coverage area of the RFID system.
Pairing algorithm is the key to uplink (UL) virtual Multiple Input-Multiple Output (V-MIMO) systems. Orthogonal pairing algorithm is more effective than most of other existing pairing algorithms. However, in real-life...
详细信息
ISBN:
(纸本)9781424437092
Pairing algorithm is the key to uplink (UL) virtual Multiple Input-Multiple Output (V-MIMO) systems. Orthogonal pairing algorithm is more effective than most of other existing pairing algorithms. However, in real-life systems, e. g. Worldwide Interoperability for Microwave Access (WiMAX), it's impossible to calculate orthogonality of two Mobile Stations (MSs) on their shared subcarriers directly, which is the most troublesome problem of orthogonal pairing algorithm. Based on WiMAX distributed subcarrier allocation mode, we propose a feasible way to resolve the above problem. Our proposed way utilizes the characteristic of pseudo-randomization of WiMAX distributed subcarrier allocation mode and avoids direct computation of orthogonality of two MSs on their shared subcarriers. the correctness of our proposal is verified by two simulation experiments.
the Heihe Watershed Allied Telemetry Experimental Research (HiWATER) is a significant research project that performs airborne, satellite-borne and ground-based remote sensing experiments at various scales by coordinat...
详细信息
ISBN:
(纸本)9781479962365
the Heihe Watershed Allied Telemetry Experimental Research (HiWATER) is a significant research project that performs airborne, satellite-borne and ground-based remote sensing experiments at various scales by coordinating interdisciplinary researchers from different institutions and projects. therefore, in order to discover, access and process sensors within the heterogeneous systems, we use the sensor Model Language (sensorML) to model these sensors and sensorsystems in the stations, and use sensor Observation Service (SOS) to display the sensor information and observation data information. In this paper, we firstly introduce the sensorML and SOS;then mainly present a model of sensor station and the application of this model in SOS.
In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) ...
详细信息
ISBN:
(纸本)9780769546001
In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. the main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. the fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. the proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. the security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors.
A new algorithm named QRNA (Quasi Regular Node Activation) is proposed in this paper, which employ equilateral triangular structure to control topology distribution of active nodes. In QRNA, sufficient and necessary c...
详细信息
Redundancy suppression is a network traffic compression technique that, by caching recurring transmission contents at receiving nodes, avoids repeatedly sending duplicate data. Existing implementations require abundan...
详细信息
ISBN:
(纸本)9783642136504
Redundancy suppression is a network traffic compression technique that, by caching recurring transmission contents at receiving nodes, avoids repeatedly sending duplicate data. Existing implementations require abundant;memory both to analyze recent traffic for redundancy and to maintain the cache. Wireless sensor nodes at the same time cannot provide such resources due to hardware constraints. the diversity of protocols and traffic patterns in sensor networks furthermore makes the frequencies and proportions of redundancy in traffic unpredictable. the common practice of narrowing down search parameters based on characteristics of representative packet traces when dissecting data for redundancy thus becomes inappropriate. Such difficulties made us devise a novel protocol that conducts a probabilistic traffic analysis to identify and cache only the subset of redundant transfers that yields most traffic savings. We verified this approach to perform close enough to a solution built on exhaustive analysis and unconstrained caching to be practicable.
the use of Fog computing for real-time Big Data monitoring of power consumption is gaining popularity. In traditional systems, Cloud servers receive sensor Big Data, perform predictions and detect anomalies or any thr...
详细信息
ISBN:
(纸本)9781728170220
the use of Fog computing for real-time Big Data monitoring of power consumption is gaining popularity. In traditional systems, Cloud servers receive sensor Big Data, perform predictions and detect anomalies or any threat patterns and then raise the alarms. With exponentially increasing sensor data, Cloud servers are becoming impractical to process this data because of the issues of volume, velocity, variety, network bandwidth, real-time support and security issues. Fog computing is introduced as a distributedcomputing paradigm that uses intermediate computing infrastructure for processing to overcome the limitations of Cloud computing. In this paper, we propose a hierarchically distributed Fog computing architecture to deploy machine learning based anomaly detection models for generating insights from the collected Smart meter sensor data from the household. the anomaly detection is divided into two steps: model training and anomaly detection. We perform detailed analysis and evaluation of the models using standard open datasets obtained from UCI machine learning repository. the results confirm the efficacy of our proposed architecture. We used open source framework and software for our experiments.
the node localization problem in mobile sensor networks has recently received significant attention. Particle filters, adapted from robotics, have produced good localization accuracies in conventional settings, but su...
详细信息
ISBN:
(纸本)9783642136504
the node localization problem in mobile sensor networks has recently received significant attention. Particle filters, adapted from robotics, have produced good localization accuracies in conventional settings, but suffer significantly when used in challenging indoor and mobile environments characterized by a high degree of radio irregularity. We propose FuzLOC, a fuzzy logic-based approach for mobile node localization in challenging environments and formulate the localization problem as a fuzzy multilateration problem, with a fuzzy grid-prediction scheme for sparse networks. We demonstrate the performance and feasibility of our localization scheme through extensive simulations and a proof-of-concept implementation on hardware, respectively. Simulation results augmented by data gathered from our 42 node indoor testbed demonstrate improvements in the localization accuracy from 20%-40% when the radio irregularity is high.
After discussing the drawbacks of localization algorithm for stationary or slow speed target in WSN, new algorithm based on precise propagation time delay measurement is introduced. Mechanisms for time sampling and TO...
详细信息
暂无评论