Accepting recent proposals for building modern E-health enterprise systems using grid computing technology, this paper presents a scenario for remote patient healthcare monitoring based on an experimental grid overlay...
详细信息
ISBN:
(纸本)1424402115
Accepting recent proposals for building modern E-health enterprise systems using grid computing technology, this paper presents a scenario for remote patient healthcare monitoring based on an experimental grid overlay. The paper presents an architectural model of the implemented Remote E-Health Monitoring System prototype, together with its associated sensor and actuator framework. In addition, a set of description languages [1-3] have been proposed and developed to providing a semantic layer to enrich health monitoring data exchanged between the requester (hospital), target (patient) and the e-health intelligence framework. For instance, intelligence services can perform personalized and predictive monitoring of individual patients. A case-study of pregnancy monitoring is used to illustrate the design and usability of such a grid overlay. Finally, the paper concludes with general remarks and a statement of further work.
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Depending on different...
详细信息
Wireless sensor networks have stringent constraints on system resources and data aggregation techniques are critically important. However, accurate data aggregation is difficult due to the variation of sensor readings...
详细信息
Many applications of wireless sensor networks require the sensor nodes to obtain their locations. The main idea in most localization methods has been that some nodes with known coordinates (e.g., GPS-equipped nodes) t...
详细信息
In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenti...
详细信息
ISBN:
(纸本)0780394100
In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenticating a group of devices over an open insecure wireless channel. We choose a conference keying mechanism and extend it with symmetric authentication protocols and a key hierarchy on which group key could be distributed efficiently. We address two problems in this work. Firstly, the formation of secure groups in sensor network with a low communication complexity, secondly, provides an efficient solution to maintain such multicast group.
Mobile entity navigation in dynamic environments is an essential part of many mission critical applications like search and rescue and fire fighting. The dynamism of the environment necessitates the mobile entity to c...
详细信息
Reprogramming the sensor networks in place is an important and challenging problem. One way suggested for reprogramming is with the help of an UAV (Unmanned Ariel Vehicle). To reprogram a sensor network with the help ...
详细信息
We have developed a new on-line error modeling and optimization-based localization approach for sensor networks in the presence of distance measurement noise. The approach is solely based on the concept of consistency...
详细信息
Monitoring containers during transport in a secure, tamper resistant. and reliable manner, is the subject of the IBM Secure Trade Lane project (STL). We have evaluated a platform based on motes (i.e. very small comput...
详细信息
ISBN:
(纸本)088986568X
Monitoring containers during transport in a secure, tamper resistant. and reliable manner, is the subject of the IBM Secure Trade Lane project (STL). We have evaluated a platform based on motes (i.e. very small computers) and TinyOS as the base for communication in STL. We implemented an ieee 802.15.4 full functional device (FFD) MAC layer with beacon support, and we discovered that running this MAC layer was too much for the motes. We saw starvation and we experienced a far too slow data transfer between layers in TinyOS. We tried to overcome the starvation problems by introducing means to limit the high number of timer interrupts required by the MAC layer. Our approach is called Adaptive Timer Resolution, but it did not solve our problems in this case. We concluded that motes and TinyOS are insufficient for the 802.15.4 FFD MAC layer and that this platform is having problems running applications with a high frequency of interrupts, and still execute useful code in between. Our contributins are the evaluation of the mote platform by pushing it beyond its limits and our timer resolution control mechanism Adaptive Tinier Resolution.
We study the problem of data propagation in sensor networks, comprised of a large number of very small and low-cost nodes, capable of sensing, communicating and computing. The distributed co-operation of such nodes ma...
详细信息
We study the problem of data propagation in sensor networks, comprised of a large number of very small and low-cost nodes, capable of sensing, communicating and computing. The distributed co-operation of such nodes may lead to the accomplishment of large sensing tasks, having useful applications in practice. We present a new protocol for data propagation towards a control center ("sink") that avoids flooding by probabilistically favoring certain ("close to optimal") data transmissions. Motivated by certain applications (see [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Journal of Computer Networks 38 (2002) 393-422], [C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: 6th ACM/ieee Annual internationalconference on Mobile computing (MOBICOM 2000), 2000, pp. 56-67]) and also as a starting point for a rigorous analysis, we study here lattice-shaped sensor networks. We however show that this lattice shape emerges even in randomly deployed sensor networks of sufficient sensor density. Our work is inspired and builds upon the directed diffusion paradigm of [C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: 6th ACM/ieee Annual internationalconference on Mobile computing (MOBICOM 2000), 2000, pp. 56-67]. This protocol is very simple to implement in sensor devices, uses only local information and operates under total absence of co-ordination between sensors. We consider a network model of randomly deployed sensors of sufficient density. As shown by a geometry analysis, the protocol is correct, since it always propagates data to the sink, under ideal network conditions (no failures). Using stochastic processes, we show that the protocol is very energy efficient. Also, when part of the network is inoperative, the protocol manages to propagate data very close to the
暂无评论