Many industrial applications rely on sensors and sensor networks residing on machinery, transport containers or in the environment. For distributed processes in such domains the sharing of those sensor networks is cru...
详细信息
Wireless sensor networks are often studied with the goal of removing information from the network as efficiently as possible. However, when the application also includes an actuator network, it is advantageous to dete...
详细信息
With the improvement in computer electronics in terms of processing, memory and communication capabilities, it has become possible to scatter tiny embedded devices such as sensor nodes to monitor physical phenomena wi...
详细信息
While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a Compromised nOde Locating protocol for detecting ...
详细信息
Communication-efficiency is of key importance when constructing robust services in limited bandwidth environments, such as sensor networks. We focus on communication-efficiency in the context of quorum systems, which ...
详细信息
ISBN:
(纸本)0769525202
Communication-efficiency is of key importance when constructing robust services in limited bandwidth environments, such as sensor networks. We focus on communication-efficiency in the context of quorum systems, which are useful primitives for building reliable distributedsystems. To this end, we exhibit a new probabilistic quorum construction in which every node transmits at most O(log(2) n) bits per quorum access, where n is the number of nodes in the system. Our implementation, in addition to being communication efficient, is also robust in the face of communication failures. In particular it guarantees consistency (with high probability) in the face of network, partitions. To the best of our knowledge, no existing probabilistic quorum systems achieve polylogarithmic communication complexity and are resilient to network partitions.
distributed stream processing represents a novel computing paradigm where data, sensed externally and possibly preprocessed, is pushed asynchronously to various connected computing devices with heterogeneous capabilit...
详细信息
ISBN:
(纸本)9781424404681
distributed stream processing represents a novel computing paradigm where data, sensed externally and possibly preprocessed, is pushed asynchronously to various connected computing devices with heterogeneous capabilities for processing. It enables novel applications typically characterized by the need to process high-volume data streams in a timely and responsive fashion. Some example applications include sensor networks, location-tracking services, distributed speech recognition, and network management. Recent work in large-scale distributed stream processing tackle various research challenges in both the application domain as well as in the underlying system. The main focus of this paper is to highlight some of the signal processing challenges such a novel computing framework brings. We first briefly introduce the main concepts behind distributed stream processing. Then we define the notion of relevant information from two related information-theoretic approaches. Finally, we browse existing techniques for sensing and quantizing the information given the set of classification, detection and estimation tasks, which we refer to as task-driven signal processing. We also address some of the related unexplored research challenges.
This paper proposes a concurrency model which integrates the asynchronous and event-driven nature of networked sensors with a more familiar programming style for the developer. We argue that coroutines can provide a b...
详细信息
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a desi...
详细信息
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the difference between propagation speeds of radio and sound waves to estimate the position of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted by the prover and the distributed topology of the network. The idea is to separate the functions of the sensors. Some sensors are placed such that they receive the signal from the prover if it is inside the protected area. The others are positioned so that they can only receive the signal from the prover outside the area. Hence, the latter sensors reject the prover if they hear its signal. Our solution is versatile and it deals with provers using either omni-directional or directional propagation of radio signals without requiring any special hardware besides a radio transceiver. We estimate the bounds on the number of sensors required to protect the areas of various shapes and extend our solution to handle complex radio signal propagation, optimize sensor placement, and operate without precise topology information.
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an algorithm that (1) is flexible with respect to the outlier definition, (2) works in-network with a communication load...
详细信息
The art and science of sensing and responding to dynamic data over vast areas through distributed network of assets has long been in existence for centuries. Much of the current and emerging developments in sensor-Net...
详细信息
ISBN:
(纸本)0769525539
The art and science of sensing and responding to dynamic data over vast areas through distributed network of assets has long been in existence for centuries. Much of the current and emerging developments in sensor-Networks and Trusted computing have their metaphorical counterparts seen in history. Clear insights into the architecture and effective practices in Command, Control, Communication, Computation, Collaboration and Coordination (C*) have much to offer to the way we design and deploy new and innovative sensors as we continue to exploit latest developments in micro- and nano- scale sensors and systems. This paper presents a brief overview of how a complex web of intelligent autonomous and heterogeneous sensors might be used in a dynamic environment. The key elements of enabling technologies and required capabilities are identified to facilitate a paradigm for (design and deployment of) sensors, driven by system level considerations.
暂无评论