Unmanned Aerial Vehicles (UAVs) and smart sensors are the tools towards the fifth agricultural revolution. Remote sensing is thriving in agriculture, broadening the horizons of cultivators and farming practitioners. H...
详细信息
ISBN:
(数字)9781728143514
ISBN:
(纸本)9781728143514
Unmanned Aerial Vehicles (UAVs) and smart sensors are the tools towards the fifth agricultural revolution. Remote sensing is thriving in agriculture, broadening the horizons of cultivators and farming practitioners. However, adopting such a technological endeavour in a raw production process is a challenging task for farmers. Operation and maintenance of such systems require specific ICT knowledge. There is also a wide variety of software and hardware equipment to choose from that can greatly impact business costs and system performance according to the kind of cultivation. Due to the lack of guidance regarding the employment of precision agriculture monitoring systems, this paper proposes a detailed decision model regarding the requirements and considerations of deploying remote sensing capabilities on a cultivation. Agricultural businesses are in need of guidance when it comes to the adoption of technological advancements especially in the case when a carefully planned operation can produce a significant amount of profits.
We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through p...
详细信息
ISBN:
(纸本)9780769540597
We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to abstract the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through Non-linear Least Squares (NLS) and develop an algorithm that iteratively approaches the NLS solution by Sequential Monte Carlo Estimation. With sparse measurements of the flux information at individual sensor nodes, we are able to identify the mobile users within the network and instantly track their movements without breaking into the details of the communicational packets. A particular advantage of this approach is that compared to the vast information we can reveal the required knowledge is extremely cheap. As all fingerprint information comes from the network flux that is public under current wireless communication medium, our study indicates that most of existing systems are vulnerable in protecting the privacy of mobile users.
In wireless sensor networks, post-deployment issues persist despite extensive testing, primarily due to unpredictable environmental factors and limited debugging tools for resource-constrained end nodes. This challeng...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
In wireless sensor networks, post-deployment issues persist despite extensive testing, primarily due to unpredictable environmental factors and limited debugging tools for resource-constrained end nodes. This challenge is particularly pronounced in remote applications such as extraterrestrial habitats. To address this, we propose a runtime anomaly detection and diagnosis method for resource-constrained sensor nodes. A key advantage of our approach is its ability to learn expected behavior from historical data, eliminating the need for explicit behavior modeling, unlike other runtime fault detection methods. Our method comprises three main components: logging, detection, and diagnosis. We log event traces on the sensor nodes, enabling activity tracking down to the variable level. For anomaly detection, we explore various methods, including state transition, execution interval analysis, and clustering. Subsequently, diagnosis is performed using the logged event traces.
The efficiency and effectiveness of network flooding protocols has recently been shown by many publications as well as real world deployments. One notable protocol is Glossy which combines Concurrent Transmission (CT)...
详细信息
ISBN:
(纸本)9781538654705
The efficiency and effectiveness of network flooding protocols has recently been shown by many publications as well as real world deployments. One notable protocol is Glossy which combines Concurrent Transmission (CT) with Constructive Interference (CI). A drawback of Glossy is that up to now it has only been implemented and evaluated for one type of radio transceiver. In this paper we first present the Glossy implementation for an AT86RF233 radio transceiver which simplifies the packet forwarding due to a shared receive and transmit buffer. We evaluate our implementation against the original Glossy implementation in a minimalist setup as well as in a real world testbed. However, we observed a noticeable difference in the timing accuracy of the transceiver chips but without adverse effects on the network's performance. For this reason, in the second part of this paper we provide a deeper investigation by using Software Defined Radios to emulate concurrent transmission for different types of transceivers. This work confirms the general benefit of constructive interference but also shows its limitations. Moreover, we give novel insight into hardware dependability of constructive interference in concurrent transmissions.
In complex terrain where mobile chargers hardly move around, a feasible solution to charge wireless sensor networks (WSNs) is using multiple fixed chargers to charge WSNs concurrently with relative long distance. Due ...
详细信息
ISBN:
(纸本)9781509014828
In complex terrain where mobile chargers hardly move around, a feasible solution to charge wireless sensor networks (WSNs) is using multiple fixed chargers to charge WSNs concurrently with relative long distance. Due to the radio interference in the concurrent charging, it is needed to schedule the chargers so as to facilitate each sensor node to harvest sufficient energy quickly. The challenge lies that each charger's charging utility cannot be calculated (or even defined) independently due to the nonlinear superposition charging effect caused by the radio interference. In this paper, we model the concurrent radio charging, and formulate the concurrent charging scheduling problem (CCSP) whose objective is to design a scheduling algorithm for the chargers so as to minimize the time spent on charging each sensor node with at least energy E. We prove that CCSP is NP-hard, and propose a greedy algorithm based on submodular set cover problem. We also propose a genetic algorithm for CCSP. Simulation results show that the performance of the greedy CCSP algorithm is comparable to that of the genetic algorithm.
In this paper, we propose diffusion-based least mean square (LMS) algorithms that are robust against fading phenomena in wireless channels. The proposed algorithms, developed by combining diffusion LMS and classical e...
详细信息
ISBN:
(纸本)9781457705137
In this paper, we propose diffusion-based least mean square (LMS) algorithms that are robust against fading phenomena in wireless channels. The proposed algorithms, developed by combining diffusion LMS and classical estimation approaches, are able to estimate and update the underlying system parameters at each node by exploiting the sensor measurements and the fused data obtained from the neighboring nodes. The fusion of the information at each node takes place based on a convex combination strategy whose coefficients are determined according to the channel state information, the noise statistics and the output error of the local adaptive filter. In this work, we assume the broadcast data from the sensors experience Rayleigh fading and are further contaminated by the additive noise. Numerical results demonstrate the efficiency of the proposed algorithms and show their satisfactory performance compared with the costly centralized adaptive techniques.
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low powe...
详细信息
ISBN:
(纸本)9780769547077
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low power and lossy networks. The fuzzing process is build upon the Scapy packets manipulation library. It provides different mutation algorithms to be applied on 6LoWPAN protocol messages to assess its implementations security and robustness. The protocol behaviors are described using an XML format to define different testing scenarios.
The upcoming Internet of Things (IoT) applications include real-time human activity monitoring with wearable sensors. Compared to the traditional environmental sensing with low-power wireless nodes, these new applicat...
详细信息
ISBN:
(纸本)9781538639917
The upcoming Internet of Things (IoT) applications include real-time human activity monitoring with wearable sensors. Compared to the traditional environmental sensing with low-power wireless nodes, these new applications generate a constant stream of a much higher rate. Nevertheless, the wearable devices remain battery powered and therefore restricted to low-power wireless standards such as ieee 802.15.4 or Bluetooth Low Energy (BLE). Our work tackles the problem of building a reliable autonomous schedule for forwarding this kind of dynamic data in ieee 802.15.4 TSCH networks. Due to the a priori unpredictability of these data source locations, the quality of the wireless links, and the routing topology of the forwarding network, it is wasteful to reserve the number of slots required for the worst-case scenario;under conditions of high expected datarate, it is downright impossible. The solution we propose is a hybrid approach where dedicated TSCH cells and shared TSCH slots coexist in the same schedule. We show that under realistic assumptions of wireless link diversity, adding shared slots to a TSCH schedule increases the overall packet delivery rate and the fairness of the system.
Source location privacy (SLP) is an important property for the class of asset monitoring problems in wireless sensor networks (WSNs). SLP aims to prevent an attacker from finding a valuable asset when a WSN node is br...
详细信息
ISBN:
(纸本)9781538617915
Source location privacy (SLP) is an important property for the class of asset monitoring problems in wireless sensor networks (WSNs). SLP aims to prevent an attacker from finding a valuable asset when a WSN node is broadcasting information due to the detection of the asset. Most SLP techniques focus at the routing level, with typically high message overhead. The objective of this paper is to investigate the novel problem of developing a TDMA MAC schedule that can provide SLP. We make a number of important contributions: (i) we develop a novel formalisation of a class of eavesdropping attackers and provide novel formalisations of SLP-aware data aggregation schedules (DAS), (ii) we present a decision procedure to verify whether a DAS schedule is SLP-aware, that returns a counterexample if the schedule is not, similar to model checking, and (iii) we develop a 3-stage distributed algorithm that transforms an initial DAS algorithm into a corresponding SLP-aware schedule against a specific class of eavesdroppers. Our simulation results show that the resulting SLP-aware DAS protocol reduces the capture ratio by 50% at the expense of negligible message overhead.
Occupancy refers to the presence of people in rooms and buildings. It is an essential input for IoT applications, including controlling lighting, heating, access, and monitoring space limitation policies. Occupancy in...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
Occupancy refers to the presence of people in rooms and buildings. It is an essential input for IoT applications, including controlling lighting, heating, access, and monitoring space limitation policies. Occupancy information can also be used to improve users' comfort and to reduce energy waste in buildings. This paper evaluates the performance and resource consumption of recent machine learning techniques for occupancy detection and measurement by exploiting data from distributed environmental sensors. This evaluation is founded on a dataset captured by our dedicated sensor network for indoor monitoring, comprising temperature, humidity, and carbon dioxide (CO2) sensors. Using different sensor modalities and spatio-temporal data selections, we compare eight classification algorithms based on the accuracy achieved and the required runtimes. Binary classification for occupancy detection (OD) achieves accuracies over 90% for individual modalities and close to 100% for modality combinations. Multi-class classification for occupancy measurements (OM) shows as clear ranking of the sensor modalities, and gradient boosting algorithms are superior when combining sensor modalities and fusing data from multiple sensors.
暂无评论