this paper aims at evaluating two localization algorithms for wireless sensor networks: the weighted centroid localization algorithm and the iterative trilateration. the algorithms are simulated for three different wi...
详细信息
this paper studies the spatial correlation in the sensing data gathered by densely deployed sensors. We first show that the joint entropy of a cluster of sensor nodes can be calculated through the covariance matrix of...
详细信息
ISBN:
(纸本)9781424437092
this paper studies the spatial correlation in the sensing data gathered by densely deployed sensors. We first show that the joint entropy of a cluster of sensor nodes can be calculated through the covariance matrix of their readings when they are gaussian distributed. then, two kinds of correlation patterns in the physical world are studied, and we show these two patterns have fundamental different impacts on joint entropy.
Wireless sensor networks promise an unprecedented opportunity to monitor physical environments via inexpensive wireless embedded devices. Given the sheer amount of sensed data, efficient classification of them becomes...
详细信息
Applications interoperability for the Internet of things is one of the major research challenges today. this Ph.D. work proposes a methodology for the adaptation of web services for applications interoperability in th...
详细信息
ISBN:
(纸本)9781509014590
Applications interoperability for the Internet of things is one of the major research challenges today. this Ph.D. work proposes a methodology for the adaptation of web services for applications interoperability in the Internet of things domain. the challenge of using web services in the IoT is analyzed and a solution is proposed in the form of an open, standards based methodology advocating the suitability even for resource constrained environments. the contributions are supported by peer reviewed publications in internationalconferences and journals. Further, the applicability and results of the thesis is evident by an award received, researchers/developers citations, and expect that public and private contracts and projects consider the proposal.
Imminent massive-scale IoT deployments require a Cloud-sensor architecture to facilitate an ecosystem of friction-free integration and programmability. In addition to these two functional requirements, challenging per...
详细信息
ISBN:
(纸本)9781479940936
Imminent massive-scale IoT deployments require a Cloud-sensor architecture to facilitate an ecosystem of friction-free integration and programmability. In addition to these two functional requirements, challenging performance and scalability requirements must be addressed by any such architecture. We have introduced the Cloud-Edge-Beneath (CEB) architecture which addresses scalability and performance through a built-in distributed optimization framework. In this paper, we focus on CEB's optimization framework which follows a bi-directional waterfall model in which not only sensor data can move upward to applications, but applications (fragments) can move downward to lower layers of CEB closer to data sources. the framework enables many optimization ideas and opportunities, including our own. We present the bi-directional waterfall framework along with a sketch of several of our optimization algorithms enabled by the framework. We also present an example of an experimental study to determine dominant resources in the cloud a variable which as will be seen greatly affects the logic of some of the optimization algorithms.
the 6TiSCH working group is standardizing the low-power wireless protocol stack for the Industrial IoT. the default scheduling function (SF0) standardized by 6TiSCH uses simple random slot selection. this paper propos...
详细信息
ISBN:
(纸本)9781509014590
the 6TiSCH working group is standardizing the low-power wireless protocol stack for the Industrial IoT. the default scheduling function (SF0) standardized by 6TiSCH uses simple random slot selection. this paper proposes the Low Latency Scheduling Function (LLSF), a new scheduling function which daisy-chains timeslots rather than picking them randomly. We implement LLSF in OpenWSN and evaluate its performance experimentally. LLSF yields 82.8% lower end-to-end latency on a 5-hop paththan SF0, at no extra costs.
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. the 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low powe...
详细信息
ISBN:
(纸本)9780769547077
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. the 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low power and lossy networks. the fuzzing process is build upon the Scapy packets manipulation library. It provides different mutation algorithms to be applied on 6LoWPAN protocol messages to assess its implementations security and robustness. the protocol behaviors are described using an XML format to define different testing scenarios.
Wireless sensor networking is a key enabler of Industrial IoT. IETF (Internet Engineering Task Force) has standardized a protocol suite called 6TiSCH (IPv6 over the TSCH mode of ieee802.15.4e). 6TiSCH builds an IPv6 m...
详细信息
ISBN:
(纸本)9781665439299
Wireless sensor networking is a key enabler of Industrial IoT. IETF (Internet Engineering Task Force) has standardized a protocol suite called 6TiSCH (IPv6 over the TSCH mode of ieee802.15.4e). 6TiSCH builds an IPv6 multi-hop wireless network withthe ieee802.15.4 radio, which achieves low energy consumption and high reliability. Although network formation time is one of key performance indicators of wireless sensor networks, it has not been studied well with6TiSCH standard protocols such as MSF (6TiSCH Minimal Scheduling Function) and CoJP (Constrained Join Protocol). In this paper, we propose a scheduling function called SF-Fastboot which shortens network formation time of 6TiSCH. We evaluate SF-Fastboot by simulation comparing with MSF, the state-of-the-art scheduling function. the simulation shows SF-Fastboot reduces network formation time by 41 % - 80 %.
Reservation-based and contention-based MAC protocols have their own advantages in data transmissions under mobile sensor networks. this paper presents a quantitative analysis of two types of MAC protocols in throughpu...
详细信息
ISBN:
(纸本)9781538639917
Reservation-based and contention-based MAC protocols have their own advantages in data transmissions under mobile sensor networks. this paper presents a quantitative analysis of two types of MAC protocols in throughput, delay, and energy efficiency under various traffic loads environments using queueing theory. the analytical and simulation results show the design strategies of hybrid MAC protocols for mobile dynamic traffic scenarios.
暂无评论