The operation of Internet of Things (IoT) networks and Wireless sensor Networks (WSN) is often disrupted by a number of problems, such as path disconnections, network segmentations, node faults, security attacks, etc....
详细信息
ISBN:
(纸本)9781665439299
The operation of Internet of Things (IoT) networks and Wireless sensor Networks (WSN) is often disrupted by a number of problems, such as path disconnections, network segmentations, node faults, security attacks, etc. A method that gains momentum in resolving some of those issues is the use of mobile nodes or nodes deployed by mobile robots. The use of mobile elements essentially increases the resources and the capacity of the network. In this work, we propose a scheme that utilizes mobile nodes for the creation of alternative paths from source to sink by also accounting the energy levels of the nodes as a contributing factor regarding the creation of alternative paths. We offer both a high level description of the concept and also a detailed algorithmic solution. The evaluation of the solution was performed in a case study of resolving congestion in the network. Results have shown that the proposed algorithm can significantly contribute to the alleviation of the problem of congestion in IoT and WSNs and can easily be used for other types of network problems.
Detecting human stress levels and emotional states with physiological body-worn sensors is a complex task, but one with many health-related benefits. Robustness to sensor measurement noise and energy efficiency of low...
详细信息
ISBN:
(纸本)9781665495127
Detecting human stress levels and emotional states with physiological body-worn sensors is a complex task, but one with many health-related benefits. Robustness to sensor measurement noise and energy efficiency of low-power devices remain key challenges in stress detection. We propose SELFCARE, a fully wrist-based method for stress detection that employs context-aware selective sensor fusion that dynamically adapts based on data from the sensors. Our method uses motion to determine the context of the system and learns to adjust the fused sensors accordingly, improving performance while maintaining energy efficiency. SELF-CARE obtains state-of-theart performance across the publicly available WESAD dataset, achieving 86.34% and 94.12% accuracy for the 3-class and 2-class classification problems, respectively. Evaluation on real hardware shows that our approach achieves up to 2.2x (3-class) and 2.7x (2-class) energy efficiency compared to traditional sensor fusion.
In current research studies and testbed deployments of sensor networks, individual sensor nodes are usually assumed to be static. However, recent applications require mobile sensor nodes, something that poses unique c...
详细信息
ISBN:
(纸本)9781457705137
In current research studies and testbed deployments of sensor networks, individual sensor nodes are usually assumed to be static. However, recent applications require mobile sensor nodes, something that poses unique challenges in aspects like resource management, topology control, and performance. In this paper we propose a novel soft-handoff mobility protocol that provides zero handoff time and zero packet losses. The proposed solution uses cross-layer information from the MAC layer, the Topology Control, and the Performance Debugging modules of the employed architecture. Our solution was implemented and evaluated in a critical scenario inside an oil refinery.
Most underwater sensor networks choose acoustics as the medium for wireless transmission. However, electromagnetic waves also offer great merits for transmission in special underwater environment. A small scale wirele...
详细信息
ISBN:
(纸本)9781424444465
Most underwater sensor networks choose acoustics as the medium for wireless transmission. However, electromagnetic waves also offer great merits for transmission in special underwater environment. A small scale wireless sensor network is deployed using electromagnetic waves with a multi-hop static topology under shallow water conditions where there is a high level of sediment and aeration in the water column. Data delivery is scheduled via daily cycles of sleeping and waking up to transmit. Due to the unique features of the network, ad-hoc on-demand Distance Vector (AODV) is chosen as the routing protocol. Modeling and simulations are conducted to evaluate network performance in terms of failure tolerance, congestion handling, and optimal grid arrangements. The results demonstrate the likely effectiveness of the designated network for this and similar scenarios.
We introduce and study the localization problem in large scale underwater acoustic sensor networks. Considering that depth information is typically available for underwater sensors, we transform the 3D underwater posi...
详细信息
ISBN:
(纸本)9781424444465
We introduce and study the localization problem in large scale underwater acoustic sensor networks. Considering that depth information is typically available for underwater sensors, we transform the 3D underwater positioning problem into its two-dimensional counterpart via a projection technique. We then introduce a localization scheme specifically designed for large scale acoustic underwater sensor networks. The proposed localization scheme does not require time-synchronization in the network. This scheme relies on time-differences of arrival (TDoA) measured locally at a sensor to detect range differences from the sensor to three anchors that can mutually hear each other We consider variations in the speed of sound and analyze the performance of the proposed scheme in terms of the number of localized nodes, location errors, and the number of reference nodes.
Whereas software adaptation has been identified as an effective approach for addressing context-aware applications, the existing work on WSNs fails to support context-awareness and mostly focuses on developing techniq...
详细信息
ISBN:
(纸本)9781457705137
Whereas software adaptation has been identified as an effective approach for addressing context-aware applications, the existing work on WSNs fails to support context-awareness and mostly focuses on developing techniques to reprogram the whole sensor node rather than reconfiguring a particular portion of the sensor application software. Therefore, enabling adaptively in the higher layers of the network architecture such as the middleware and application layers, beside the consideration in the lower layers, becomes of high importance. In this paper we propose an approach to hide heterogeneity and offer a single common configuration and processing component for all nodes of that heterogeneous system. This advances the current state-of-the-art, by providing a lego-like model whereby a single simple but powerful component is deployed in any node regardless of its underlying differences and the system is able to remotely configure and process data in any node in a most flexible way, since every node has the same uniform API, processing and access functionalities.
Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN netw...
详细信息
ISBN:
(纸本)9781728105703
Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN networks relies on simulations or early testing, which are typically time-consuming and prevent effective exploration of the design space. This paper proposes an analytical model to calculate the delay and energy consumed for reliable Uplink (UL) data delivery in Class A LoRaWAN. The analytical model is evaluated using a real network test-bed as well as simulation experiments based on the ns-3 LoRaWAN module. The resulting comparison confirms that the model accurately estimates the delay and energy consumed in the considered environment. The value of the model is demonstrated via its application to evaluate the impact of the number of end-devices and the maximum number of data frame retransmissions on delay and energy consumed for the confirmed UL data delivery in LoRaWAN networks. The model can be used to optimize different transmission parameters in future LoRaWAN networks.
ieee 802.15.4 addresses low-rate wireless personal area networks, enables low power devices, and includes a number of security provisions and options (the security sublayer). Security competes with performance for the...
详细信息
ISBN:
(纸本)9781457705137
ieee 802.15.4 addresses low-rate wireless personal area networks, enables low power devices, and includes a number of security provisions and options (the security sublayer). Security competes with performance for the scarce resources of low power, low cost sensor devices. So, a proper design of efficient and secure applications requires to know the impact that ieee 802.15.4 security services have on the protocol performance. In this paper we present the preliminary results of a research activity aimed at quantitatively evaluating such impact from different standpoints including memory consumption, network performance, and energy consumption. The evaluation exploits a free implementation of the ieee 802.15.4 security sublayer.
We investigate the problem of efficient computation of a partition of a Random Geometric Graph (RGG) into a limited number of densely packed bipartite grid sub graphs. The study focuses on the collection of subgraphs ...
详细信息
ISBN:
(纸本)9781538639917
We investigate the problem of efficient computation of a partition of a Random Geometric Graph (RGG) into a limited number of densely packed bipartite grid sub graphs. The study focuses on the collection of subgraphs each individually having similar size and structure and the union employing most (e.g. over 85%) of the vertices. The residual vertices we seek to minimize are attributed to the inherent variations in densities of the randomly placed vertices and to any shortcomings of our greedy algorithms. RGG's have been extensively employed in recent times to model the deployment of numerous instances of Wireless sensor Networks (WSN's) Pl. The properties investigated in our selected bipartite grid backbones are those deemed most relevant for applications to the foundations of this widely growing field. distributed algorithms are primarily used to determine backbones. Our results review what backbone grid partitions exist in the data. This provides a metric to measure the effectiveness of any distributed algorithm against an existing optimal result. The visual display of selected backbone grids suggests local algorithm design strategies. Furthermore, these partitions must be efficiently computable for highly scalable computation, e.g. WSN's with 100's of thousands of vertices and millions of edges in the resulting RGG. We consider distributions over a segment of the plane and over the surface of the sphere to model sensor distributions both in limited planar regions, all around the globe or on distant planets.
This paper presents initial results and future directions for data description and payload encodings for heterogeneous networks in IP based building intelligence systems. The efficiency of several open standards for s...
详细信息
ISBN:
(纸本)9781457705137
This paper presents initial results and future directions for data description and payload encodings for heterogeneous networks in IP based building intelligence systems. The efficiency of several open standards for sensor data representation are evaluated along with a consideration of the complexity of implementation and suitability for use in development of 6lowPAN based intelligent building systems. A combination of a simplified generic XML schema for data description combined with Google Protobuffer encoding is suggested as the basis for further development of the architecture as this combines simple, platform independent implementation for developers with efficient compression and payload encoding for limited bandwidth 6lowPAN networks.
暂无评论