Today, camera networks are pervasively used in smart environments such as intelligent homes, industrial automation or surveillance. These applications often require cameras to be aware of their spatial neighbors or ev...
详细信息
ISBN:
(纸本)9781728105703
Today, camera networks are pervasively used in smart environments such as intelligent homes, industrial automation or surveillance. These applications often require cameras to be aware of their spatial neighbors or even to operate on a common ground plane. A major concern in the use of sensor networks in general is their robustness and reliability even in the presence of attackers. This paper addresses the challenge of detecting malicious nodes during the calibration phase of camera networks. Such a resilient calibration enables robust and reliable localization results and the elimination of attackers right after the network deployment. Specifically, we consider the problem of identifying subverted nodes which manipulate calibration data and can not be detected by standard cryptographic methods. The experiments in our network show that our self-calibration algorithm enables location-unknown cameras to successfully detect malicious nodes while autonomously calibrating the network.
We call radiation at a point of a wireless network the total amount of electromagnetic quantity (energy or power density) the point is exposed to. The impact of radiation can be high and we believe it is worth studyin...
详细信息
ISBN:
(纸本)9781457705137
We call radiation at a point of a wireless network the total amount of electromagnetic quantity (energy or power density) the point is exposed to. The impact of radiation can be high and we believe it is worth studying and control;towards radiation aware wireless networking we take (for the first time in the study of this aspect) a distributedcomputing, algorithmic approach. We exemplify this line of research by focusing on sensor networks, studying the minimum radiation path problem of finding the lowest radiation trajectory of a person moving from a source to a destination point in the network region. For this problem, we sketch the main ideas behind a linear program that can provide a tight approximation of the optimal solution, and then we discuss three heuristics that can lead to low radiation paths. We also plan to investigate the impact of diverse node mobility to the heuristics' performance.
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low powe...
详细信息
ISBN:
(纸本)9780769547077
In this work, we present the process of identifying potential vulnerabilities in 6LoWPAN enabled networks through fuzzing. The 6LowPAN protocol has been designed by the IETF as an adaptation layer of IPv6 for Low power and lossy networks. The fuzzing process is build upon the Scapy packets manipulation library. It provides different mutation algorithms to be applied on 6LoWPAN protocol messages to assess its implementations security and robustness. The protocol behaviors are described using an XML format to define different testing scenarios.
Enabling visual sensor networks to perform visual analysis tasks in real-time is challenging due to the computational complexity of detecting and extracting visual features. A promising approach to address this challe...
详细信息
ISBN:
(纸本)9781479946181
Enabling visual sensor networks to perform visual analysis tasks in real-time is challenging due to the computational complexity of detecting and extracting visual features. A promising approach to address this challenge is to distribute the detection and the extraction of local features among the sensor nodes, in which case the time to complete the visual analysis of an image is a function of the number of features found and of the distribution of the features in the image. In this paper we formulate the minimization of the time needed to complete the distributed visual analysis for a video sequence subject to a mean average precision requirement as a stochastic optimization problem. We propose a solution based on two composite predictors that reconstruct randomly missing data, and use a quantile-based linear approximation of the feature distribution and time series analysis methods. The composite predictors allow us to compute an approximate optimal solution through linear programming. We use two surveillance videos to evaluate the proposed algorithms, and show that prediction is essential for controlling the completion time. The results show that the last value predictor together with regular quantile-based distribution approximation provide a low complexity solution with very good performance.
In many wireless sensor network applications the sensor nodes needs to be mobile. In order to support mobility, the management of several issues, such as routing, handover, security, addressing and auto-configuration ...
详细信息
ISBN:
(纸本)9781457705137
In many wireless sensor network applications the sensor nodes needs to be mobile. In order to support mobility, the management of several issues, such as routing, handover, security, addressing and auto-configuration of the network needs to be handled. In the past, the main focus of sensor network research has been on static sensor networks, therefore many mobility related problems remain unsolved. In this paper, the focus is on the management of handover and addressing in networks, where gateways and sensor nodes can be mobile. A novel approach, which eliminates unnecessary handovers in the case where multiple gateways are in the range of mobile sensor node, is introduced in this paper. The proposed soft handover method has been implemented and its functionality has been proven in a full-scale testbed. Furthermore, it has been evaluated that the soft handover method performs fairly well also in the sensor network, where gateways are static. The proposed solution is designed for ieee 802.15.4 standard based sensor networks which use 6LoWPAN technique, but it can be easily adapted also to other type of networks.
Air pollution has become a major issue of modern megalopolis because of industrial emissions and increasing urbanization along with traffic jams and heating/cooling of buildings. Monitoring urban air quality is theref...
详细信息
ISBN:
(纸本)9781509014590
Air pollution has become a major issue of modern megalopolis because of industrial emissions and increasing urbanization along with traffic jams and heating/cooling of buildings. Monitoring urban air quality is therefore required by municipalities and by the civil society. Current monitoring systems rely on reference sensing stations that are precise but massive, costly and therefore seldom. In this ongoing work, we focus on an alternative or complementary approach, using a network of low cost and autonomic wireless sensors, allowing for a finer spatiotemporal granularity of air quality sensing. We tackle the optimization problem of sensor deployment and propose an integer programming model, which allows to find the optimal network topology while ensuring air quality monitoring with a high precision and the minimum financial cost. Most of existing deployment models of wireless sensor networks are generic and assume that sensors have a given detection range. This assumption does not fit pollutant concentrations sensing. Our model takes into account interpolation methods to place sensors in such a way that pollution concentration is estimated with a bounded error at locations where no sensor is deployed.
In wireless sensor networks, data collection (or gathering) is the task of transmitting rounds of measurements of physical phenomena from the sensor nodes to a sink node. We study how to increase the efficiency of dat...
详细信息
ISBN:
(纸本)9781509014590
In wireless sensor networks, data collection (or gathering) is the task of transmitting rounds of measurements of physical phenomena from the sensor nodes to a sink node. We study how to increase the efficiency of data collection via supervised in-network classification of rounds of measurements. We assume that the end users of the data are interested only in rounds characterized by certain patterns. Hence the wireless sensor network uses classification to select the rounds of measurements that are transmitted to the base station. The energy consumption is potentially reduced by avoiding the transmission of rounds of measurements that are not of interest to the end users. Innetwork classification requires distributed feature extraction and transmission. Such tasks can be less or more energy expensive than the transmission of measurements without classification. We provide analytical results and simulations on real data to show requirements and key trade-offs for the design of in-network data classification systems that can improve the collection efficiency. Besides, we study the impact of spatial subsampling of the sensor data (a way to further decrease energy consumption) on the classification performance.
The MAC protocol ieee 802.15.4 DSME has features for WSNs to support exigent requirements such as high reliability and adaptability to dynamic traffic. This work introduces the concept of a virtual sink, which compris...
详细信息
ISBN:
(纸本)9781665495127
The MAC protocol ieee 802.15.4 DSME has features for WSNs to support exigent requirements such as high reliability and adaptability to dynamic traffic. This work introduces the concept of a virtual sink, which comprises the sink and its 1-hop neighbors, a.k.a. satellites, as the core of a strategy to alleviate the burden caused by the funneling effect in data collection scenarios. Our strategy enables the coexistence of a centralized scheduling algorithm at the virtual sink and a decentralized scheduling algorithm for the remaining nodes of the network. Through a simulative assessment, we compare the performance of the virtual sink-based strategy with the status quo of DSME via a decentralized slot scheduler TPS. Results show an improvement of the network throughput of up to 38% and a reduction of the energy consumption of about 30% at satellites.
With the evolution of electronics, wireless sensor networks have been very popular in many domains of human life such as health, industry and military. This popularity has taken the attention on to the researches abou...
详细信息
ISBN:
(纸本)9781457705137
With the evolution of electronics, wireless sensor networks have been very popular in many domains of human life such as health, industry and military. This popularity has taken the attention on to the researches about wireless sensor networks. Wireless sensor Networks are especially very favorable in conditions where it is physically difficult and dangerous for human being to gather information. Therefore, lifetime of those networks must be prolonged as much as possible, since it will be also infeasible to replace the energy depleted sensors with the new ones deployed in such geographical areas that are difficult and dangerous for human being to enter. In this paper, we present a localized energy aware routing method LEERA-MS and an alternative LEERA-MS-TH method that are used incorporation with an energy efficient sleep-wakeup schedule which is included with pipelining mechanism we have proposed before. Employing multiple sinks improve the performance by providing the fairly distribution of the load. Simulation results show that this routing method applied on a multiple sinks topology when employed together with the pipelined sleep-wakeup schedule provides 40% longer lifetime for wireless sensor networks.
Wireless sensor networks are often distributed which makes detection of cyber-attacks or misconfiguration hard. Topology and data patterns change may result from attacks leading to the compromise of data and service a...
详细信息
ISBN:
(纸本)9781665439299
Wireless sensor networks are often distributed which makes detection of cyber-attacks or misconfiguration hard. Topology and data patterns change may result from attacks leading to the compromise of data and service availability or indicate operational problems. Graphs are often used to model topology and data paths to describe and compare state of a system. For anomaly detection, the definition of normal patterns, deviation from normal, and criteria when to declare anomaly are required. In this contribution the process of acquisition of normal patterns (ground truth), and criteria when to declare anomaly based on graph comparison are proposed. The anomaly detection is suitable for deployment at the edge of a network. Finally, the inability to define all security threats is addressed by a custom tree-based classifier which only requires normal patterns for training. A simulated wireless sensor network was used to acquire data and apply the method. Our experiments show that data and topology change can be detected at the edge of a network.
暂无评论