An important design challenge in wireless sensor network application development is to provide appropriate middleware service protocols to control the energy consumption according to specific application scenarios. In...
详细信息
In patch-and-stitch localization algorithms, a flip-error refers to the kind of error in which a patch is stitched to the map as being wrongly reflected. In this paper, we present an anchor-free localization algorithm...
详细信息
In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication issues in distributed and large-scale...
详细信息
ISBN:
(纸本)9780769534923
In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication issues in distributed and large-scaled sensor nodes in wireless sensor network application. There are two communication categories under consideration, i.e. intra-nodes and inter-nodes. Due to the potentially higher frequency in file signal propagation within the sensor node, the characteristics of the interconnect among various systems-on-chips cannot be described in the traditionally lumped R, L, C components. We adapt a distributed transmission line model to address such issues and possibly improve the reliability in the intra-nodes communication. Furthermore, based on the bandwidth requirements of each sensor node, the large-scaled senor network is proposed to be transformed into a maze diagram by a user defined threshold bandwidth, so that many existing approaches may be applied to determine the routing paths in the inter-nodes communication to improve the efficiency of the overall network.
In the recent years, wireless sensor networks have attracted a lot of attention due to their broad application areas. In many application scenarios, hundreds or thousands of sensor nodes may be deployed in the physica...
详细信息
This paper introduces a framework for in-field-maintenance services for wireless sensor networks. The motivation of this work is driven by an observation that many applications using wireless sensor networks require o...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
This paper introduces a framework for in-field-maintenance services for wireless sensor networks. The motivation of this work is driven by an observation that many applications using wireless sensor networks require one-time deployment and will be largely unattended. It is also desirable for the applications to have a long system lifetime. However, the performance of many individual protocols and the overall performance of the system deteriorate over time. The framework we present here allows the system or each individual node in the network to identify the performance degradation, and to act to bring the system back to a desirable coherent state. We implement and apply our framework to a case study for a real system, called VigilNet [5]. The performance evaluation demonstrates that our framework is effective and efficient.
This paper presents a security-enhanced variant of LEAP+, called LEAP++. The proposed scheme not only improves the security against node capture attacks but also provides additional robustness against denial-of-servic...
详细信息
In a wireless sensor network, an adversary may crack legal nodes or deploy malicious nodes to launch various attacks. These nodes are collectively called compromised nodes. In this paper, we define a Data Transmission...
详细信息
We propose a light-weight and scalable broadcast authentication scheme, Curtain, for sensor network. Instead of using Merkel tree to combine multiple mu TESLA instance, we apply compressed Bloom filters to multiple mu...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
We propose a light-weight and scalable broadcast authentication scheme, Curtain, for sensor network. Instead of using Merkel tree to combine multiple mu TESLA instance, we apply compressed Bloom filters to multiple mu TESLA. Our scheme can support longer duration and prolong the self-healing property. We greatly reduce the communication overhead at the cost of allocating a moderate space in each receiver. Combing with PKC computation like ECC, our scheme can guarantee the long-term security and also mitigate energy consumption. Moreover, our methods can be extend to the situation of multiple senders, offering efficient user addition and revocation.
This paper presents an energy-aware, sleep scheduling algorithm called SSMTT to support multiple target tracking sensor networks. SSMTT leverages the awakening result of interfering targets to save the energy consumpt...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
This paper presents an energy-aware, sleep scheduling algorithm called SSMTT to support multiple target tracking sensor networks. SSMTT leverages the awakening result of interfering targets to save the energy consumption on proactive wake-up communication. For the alarm message-miss problem introduced by multiple target tracking, we present a solution that involves scheduling the sensor nodes' sleep pattern. We compare SSMTT against three sleep scheduling algorithms for single target tracking: the legacy circle scheme, MCTA, and TDSS. Our experimental evaluations show that SSMTT achieves better energy efficiency than handling multiple targets separately through single target tracking algorithms.
This paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless sensor Network (WSN) using vector algebra in GF(q). The proposed scheme i...
详细信息
ISBN:
(纸本)9781424425747
This paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless sensor Network (WSN) using vector algebra in GF(q). The proposed scheme is deterministic, pair-wise keys are not pre-distributed but generated starting from partial key components, keys management exploits benefits from both symmetric and asymmetric schemes (hybrid cryptography) and each key in a pair node can be generated only if nodes have been authenticated (key authentication). Network topology authentication, and hybrid key cryptography are the building blocks for this proposal: the former means that a cryptographic key can be generated if and only if the current network topology is compliant to the "planned network topology", which acts as the authenticated reference;the latter means that the proposed scheme is a combination of features from symmetric (for the ciphering and authentication model) and asymmetric cryptography (for the key generation model). The proposal fits the security requirement of a cryptographic scheme for WSN in a limited computing resource. A deep quantitative security analysis has been carried out. Moreover the cost analysis of the scheme in terms of computational time and memory usage for each node has been carried on and reported for the case of a 128-bit key.
暂无评论