Search results for " Sensor Networks."

showing 10 items of 157 documents

Secure random number generation in wireless sensor networks

2014

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…

Computer Networks and CommunicationsComputer scienceRandom number generationNetwork securitybusiness.industryDistributed computingRangingComputer Science ApplicationsTheoretical Computer ScienceKey distribution in wireless sensor networksComputational Theory and MathematicsRobustness (computer science)Home automationWirelessbusinessWireless sensor networkSoftwareConcurrency and Computation: Practice and Experience
researchProduct

A group-based wireless body sensors network using energy harvesting for soccer team monitoring

2016

[EN] In team-based sports, it is difficult to monitor physical state of each athlete during the match. Wearable body sensors with wireless connections allow having low-power and low-size devices, that may use energy harvesting, but with low radio coverage area but the main issue comes from the mobility. This paper presents a wireless body sensors network for soccer team players' monitoring. Each player has a body sensor network that use energy harvesting and each player will be a node in the wireless sensor network. This proposal is based on the zone mobility of the players and their dynamism. It allows knowing the physical state of each player during the whole match. Having fast updates an…

Computer Networks and CommunicationsComputer scienceWearable computer02 engineering and technologyGroup-based wireless sensor networkTEORIA DE LA SEÑAL Y COMUNICACIONES0202 electrical engineering electronic engineering information engineeringWirelessDynamismElectrical and Electronic Engineeringbusiness.industryNode (networking)020206 networking & telecommunicationsINGENIERIA TELEMATICAWSNComputer Science ApplicationsKey distribution in wireless sensor networksControl and Systems EngineeringEmbedded system020201 artificial intelligence & image processingState (computer science)Wireless body sensor networkMobilitysoccerbusinessEnergy harvestingWireless sensor networkComputer network
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Computation of Psycho-Acoustic Annoyance Using Deep Neural Networks

2019

Psycho-acoustic parameters have been extensively used to evaluate the discomfort or pleasure produced by the sounds in our environment. In this context, wireless acoustic sensor networks (WASNs) can be an interesting solution for monitoring subjective annoyance in certain soundscapes, since they can be used to register the evolution of such parameters in time and space. Unfortunately, the calculation of the psycho-acoustic parameters involved in common annoyance models implies a significant computational cost, and makes difficult the acquisition and transmission of these parameters at the nodes. As a result, monitoring psycho-acoustic annoyance becomes an expensive and inefficient task. Thi…

Computer scienceComputationsubjective annoyanceContext (language use)Annoyance02 engineering and technologycomputer.software_genre01 natural sciencesConvolutional neural networklcsh:TechnologyReduction (complexity)lcsh:Chemistryconvolutional neural networks0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials Sciencewireless acoustic sensor networksInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processesbusiness.industrylcsh:TProcess Chemistry and Technology010401 analytical chemistryGeneral EngineeringRegression analysislcsh:QC1-9990104 chemical sciencesComputer Science Applicationspsycho-acoustic parametersTransmission (telecommunications)lcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040020201 artificial intelligence & image processingData miningbusinesslcsh:Engineering (General). Civil engineering (General)Zwicker modelcomputerlcsh:PhysicsApplied Sciences
researchProduct

Constraint Hubs Deployment for efficient Machine-Type-Communications

2018

Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …

Computer scienceReliability (computer networking)Wireless communication050801 communication & media studies02 engineering and technology0508 media and communicationsSINR modelTelecommunications link5G mobile communication0202 electrical engineering electronic engineering information engineeringWirelessPath lossFadingElectrical and Electronic EngineeringDelaysRadio access networkConnectivityta213business.industryApplied Mathematics05 social sciences020206 networking & telecommunicationsRelay Node PlacementReliabilityWireless sensor networksComputer Science ApplicationsBackhaul (telecommunications)businessInterferenceWireless sensor network5GWireless Sensor NetworkComputer networkIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

Wireless sensor network for Spectrum Cartography based on Kriging interpolation

2012

Dynamic spectrum access with Cognitive Radio (CR) network is a promising approach to increase the efficiency of spectrum usage. To allow the optimization of resource allocation and transmission adaptation techniques, each CR terminal needs to acquire awareness of the state of the time-frequency-location varying radio spectrum. In this paper we present a Spectrum Cartography (SC) approach where CR terminals are supported by a fixed wireless sensor network (WSN) to estimate and update the Power Spectral Density (PSD) over the area of interest. The wireless sensors collaborate to estimate the spatial distribution of the received power at a given frequency using either a centralized or a distri…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyRadio spectrumKey distribution in wireless sensor networks0508 media and communicationsCognitive radioKriging0202 electrical engineering electronic engineering information engineeringResource allocationWirelessRadio resource managementFixed wirelessbusinessWireless sensor networkCartography
researchProduct

Predictive models for energy saving in Wireless Sensor Networks

2011

ICT devices nowadays cannot disregard optimizations toward energy sustainability. Wireless Sensor Networks, in particular, are a representative class of a technology where special care must be given to energy saving, due to the typical scarcity and non-renewability of their energy sources, in order to enhance network lifetime. In our work we propose a novel approach that aims to adaptively control the sampling rate of wireless sensor nodes using prediction models, so that environmental phenomena can be consistently modeled while reducing the required amount of transmissions; the approach is tested on data available from a public dataset.

Computer sciencebusiness.industryReliability (computer networking)Distributed computingData modelingKey distribution in wireless sensor networksPredictive ModelWirelessEnergy sourcebusinessWireless sensor networkWireless Sensor NetworkEnergy (signal processing)Predictive modellingEnergy Saving.Computer network2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
researchProduct