Withthe rapid advances in technologies such as MEMS sensors, low-power embedded processing and wireless networking, sensor networks are becoming more powerful in terms of data acquisition and processing capabilities....
详细信息
ISBN:
(纸本)9781595937636
Withthe rapid advances in technologies such as MEMS sensors, low-power embedded processing and wireless networking, sensor networks are becoming more powerful in terms of data acquisition and processing capabilities. sensor networks can now be deployed in the physical world for various important applications such as environmental monitoring, weather monitoring and modeling, military surveillance, healthcare monitoring, tracking of goods and manufacturing processes, smart homes and offices, etc.
Wireless sensor network (WSN) applications are notoriously difficult to develop and debug. this paper describes Clairvoyant which is a comprehensive source-level debugger for wireless, embedded networks. With Clairvoy...
详细信息
ISBN:
(纸本)9781595937636
Wireless sensor network (WSN) applications are notoriously difficult to develop and debug. this paper describes Clairvoyant which is a comprehensive source-level debugger for wireless, embedded networks. With Clairvoyant, a developer can wirelessly connect to a sensor network and execute standard debugging commands including break, step, watch, and back-trace, as well as new commands that are specially designed for debugging WSNs. Clairvoyant attempts to minimize its effect on the program being debugged in terms of network load, memory footprint, execution speed, clock consistency, and flash lifetime.
A novel autonomic communication framework is proposed for two-tiered heterogeneous sensor networks. the framework consists of an autonomic data-link protocol, LADD, and a communication scheduler. Networks consist of b...
详细信息
ISBN:
(纸本)9781595937636
A novel autonomic communication framework is proposed for two-tiered heterogeneous sensor networks. the framework consists of an autonomic data-link protocol, LADD, and a communication scheduler. Networks consist of both sensing nodes and more powerful relaying nodes. LADD is able to adapt to time varying and asymmetric wireless links with minimal energy consumption. the distributed scheduling scheme provides fair and efficient co-ordination of communication streams over multiple radio hops.
Wireless sensor network has been identified as being useful in a variety of domains including the battlefield and perimeter defense. these mission critical applications raise the concern for security in sensor network...
详细信息
ISBN:
(纸本)9781595937636
Wireless sensor network has been identified as being useful in a variety of domains including the battlefield and perimeter defense. these mission critical applications raise the concern for security in sensor network. Typical security problems identified include passive information gathering, subversion of a node, legitimate addition of a node to an existing sensor network, and so forth [1]. Under traditional routing concept, information security is usually ensured through high-level security protocols, but limited computational power and memory space in sensor nodes make traditional cryptographical techniques cumbersome to be implemented in sensor networks.
Efficient data acquisition in WSNs has attracted significant interest. For example, TinyDB [2] introduced query dissemination and data aggregation trees. Later, a probabilistic model of the physical world is used in [...
详细信息
ISBN:
(纸本)9781595937636
Efficient data acquisition in WSNs has attracted significant interest. For example, TinyDB [2] introduced query dissemination and data aggregation trees. Later, a probabilistic model of the physical world is used in [1]. Recently, [3] argues that probabilistic models of the physical world used in acquisition may miss outliers and introduces spatio-temporal suppression-based methods. We classify these established approaches as query-and-data centric approaches for optimizing the data acquisition process.
Existing protocols for Secure key establishment all rely on an unspecified mechanism for initially deploying secrets to sensor nodes. However, no commercially viable and secure mechanism exists for initial setup. With...
详细信息
ISBN:
(纸本)9781595937636
Existing protocols for Secure key establishment all rely on an unspecified mechanism for initially deploying secrets to sensor nodes. However, no commercially viable and secure mechanism exists for initial setup. Without a guarantee of secure key deployment, the traffic over a sensor network cannot be presumed secure. To address this problem, we present a user-friendly protocol for the secure deployment of cryptographic keys in sensor networks. We propose it collection of five techniques to prevent an attacker from eavesdropping on key deployment. To demonstrate feasibility for real-world use, we implement our protocol on Telos motes and conduct a user study.
暂无评论