The paper is motivated by recent surge of interest in utilization of a large number of sensor nodes in cyber-physical systems (CPSs) and the critical importance of managing sensor's restricted resources. In this r...
详细信息
ISBN:
(纸本)9781538639917
The paper is motivated by recent surge of interest in utilization of a large number of sensor nodes in cyber-physical systems (CPSs) and the critical importance of managing sensor's restricted resources. In this regard, we propose a multi-sensor and open-loop estimation algorithm with an information-based triggering mechanism. In the open-loop topology considered in this paper, each sensor transfers its measurements to the fusion centre (FC) only in occurrence of specific events (asynchronously). Events are identified using the information-based triggering mechanism without incorporation of a feedback from the FC and/or implementation of a local filter at the sensor level. We propose a multi-sensor triggering approach based on the projection of each local observation into the state-space which corresponds to the achievable gain in the sensor's information state vector. The simulation results show that the proposed multi sensor information-based triggering mechanism closely follows its full-rate estimation counterpart.
Several solutions have recently been proposed to securely estimate sensor positions even when there is malicious location information which distorts the estimate. Some of those solutions are based on the Minimum Mean ...
ISBN:
(纸本)9781467372145
Several solutions have recently been proposed to securely estimate sensor positions even when there is malicious location information which distorts the estimate. Some of those solutions are based on the Minimum Mean Square Estimation (MMSE) methods which efficiently estimate sensor positions. Although such solutions can filter out most of malicious information, if an attacker knows the position of a target sensor, the attacker can significantly alter the position information. In this paper, we introduce such a new attack, called Inside-Attack, and a technique that is able to detect and filter out malicious location information.
Numerous sensors are involved in sensing almost everything around us in a cyber-physical system. They generate heterogeneous data which are diverse in format and protocol. Prevailing standards formally define sensor d...
详细信息
ISBN:
(纸本)9781479946181
Numerous sensors are involved in sensing almost everything around us in a cyber-physical system. They generate heterogeneous data which are diverse in format and protocol. Prevailing standards formally define sensor data encodings and provide syntactic interoperability but failed to provide semantic capability required for searching, reasoning, querying on sensors and their observations. The paper extends ieee SUMO and Ontosensor to create an ontological structure that captures various sensor concepts and their relationships. It logically classifies sensor information into four major sensor knowledge representation (1) hierarchy (2) data (3) function and (4) data exchange. The proposed sensor ontology has been extended for energy meter as an energy sensor. The represented semantic can be captured through Protege 4.3.0 and subsequently by OWL-XML. Reasoning on the sensor data can be carried out using SWRL.
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field....
详细信息
ISBN:
(纸本)9781479946181
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field. Combining the two techniques, MaWi not only achieves a high localization accuracy, but also effectively reduces human labor in building fingerprint databases: to avoid war-driving, MaWi is designed to work with low quality fingerprint databases that can be efficiently built by only one person. Our experiments demonstrate that MaWi, with a fingerprint database as scarce as one data sample at each spot, outperforms the state-of-the-art proposals working on a richer fingerprint database.
This paper demonstrates a technique to write in air using Micaz motes. The application, named MicaPen is low-cost and can be used by the disabled who does not have fingers or limbs. Patients can wear the mote as a wri...
详细信息
ISBN:
(纸本)9781728143514
This paper demonstrates a technique to write in air using Micaz motes. The application, named MicaPen is low-cost and can be used by the disabled who does not have fingers or limbs. Patients can wear the mote as a wrist watch or bracelet and move their hands based on what character they want to write. The mote detects the movement pattern using the accelerometer of MTS310 sensorboard and displays the characters on the screen. The application can also be extended in several applications including virtual touchscreen or remotely interact with different controlled devices.
In this paper, we present OVERTAKE, an opportunistic routing protocol for Time-Slotted Channel Hopping (TSCH). OVERTAKE combines (1) opportunistic routing, (2) concurrent transmissions and (3) TSCH. We show that this ...
详细信息
ISBN:
(数字)9781728143514
ISBN:
(纸本)9781728143514
In this paper, we present OVERTAKE, an opportunistic routing protocol for Time-Slotted Channel Hopping (TSCH). OVERTAKE combines (1) opportunistic routing, (2) concurrent transmissions and (3) TSCH. We show that this novel combination enables low-latency, central scheduling withstanding node failures. Our initial results show its ability to withstand node failures of up to 40% of nodes of a flow while keeping minimal latency.
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifyin...
详细信息
ISBN:
(纸本)9781479946181
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifying the nodes of malware propagation, (ii) leading a flying robot along a path in the WSN that guarantees the minimum recovery time to (iii) heal the infected nodes. We formulate the targeted curing problem as a binary integer problem and determine the optimal solution by a central solver. We use the analytical result as a benchmark to evaluate the recovery time of the proposed solution. The achieved results show a satisfactory performance in terms of tracking the presence of an ongoing epidemic and healing the nodes.
We consider sensor selection to optimize multiple conditions. Specifically, we model the sensor network as a graph, in which weighted edges indicate the ability of one node to predict the data of another. Each node is...
详细信息
ISBN:
(纸本)9781538639917
We consider sensor selection to optimize multiple conditions. Specifically, we model the sensor network as a graph, in which weighted edges indicate the ability of one node to predict the data of another. Each node is associated with several data types, so there are links for each data type. The objective is to maximize the coverage of all data types. This is applicable to such problems as monitoring air quality in cities and coal mines using several indicators of quality. We first define the maximization criteria, and then how to modify the model and existing algorithms to solve the problem. We demonstrate the importance of the problem and the quality of our methodology on synthetic and realistic scenarios.
In this paper we present a distributed, autonomous network calibration algorithm, which enables visual sensor networks to gather knowledge about the network topology. A calibrated sensor network provides the basis for...
详细信息
ISBN:
(纸本)9781538639917
In this paper we present a distributed, autonomous network calibration algorithm, which enables visual sensor networks to gather knowledge about the network topology. A calibrated sensor network provides the basis for more robust applications, since nodes are aware of their spatial neighbors. In our approach, sensor nodes estimate relative positions and orientations of nodes with overlapping fields of view based on jointly detected objects and geometric relations. Distance and angle measurements are the only information required to be exchanged between nodes. The process works iteratively, first calibrating camera neighbors in a pairwise manner and then spreading the calibration information through the network. Further, each node operates within its local coordinate system avoiding the need for any global coordinates. While existing methods mostly exploit computer vision algorithms to relate nodes to each other based on their images, we solely rely on geometric constraints.
The adaptive configuration of nodes in a sensor network optimizes the use of scarce network resources to improve target tracking performance. Moreover, the effective fusion of measurements from heterogeneous sensing n...
详细信息
ISBN:
(纸本)9781728105703
The adaptive configuration of nodes in a sensor network optimizes the use of scarce network resources to improve target tracking performance. Moreover, the effective fusion of measurements from heterogeneous sensing nodes provides diversity in information on the state of the target for additional performance gains. However, the joint configuration of the heterogeneous parameters of nodes and the fusion of heterogeneous measurements for sequential estimation are challenging tasks. To tackle these challenges, a sequential Monte Carlo method is presented in this work that adaptively configures heterogeneous sets of sensing nodes and fuses heterogeneous data for target tracking. A simulation experiment is provided as an example application of the method to demonstrate the configuration of cognitive foveal and radar nodes and the fusion of heterogeneous data for accurate and efficient single target tracking.
暂无评论