Search results for "Sensor Networks"
showing 10 items of 174 documents
Practical considerations for acoustic source localization in the IoT era: Platforms, energy efficiency, and performance
2019
The rapid development of the Internet of Things (IoT) has posed important changes in the way emerging acoustic signal processing applications are conceived. While traditional acoustic processing applications have been developed taking into account high-throughput computing platforms equipped with expensive multichannel audio interfaces, the IoT paradigm is demanding the use of more flexible and energy-efficient systems. In this context, algorithms for source localization and ranging in wireless acoustic sensor networks can be considered an enabling technology for many IoT-based environments, including security, industrial, and health-care applications. This paper is aimed at evaluating impo…
A Battery-Free Smart Sensor Powered with RF Energy
2018
The development of Internet of Things (IoT) infrastructure and applications is stimulating advanced and innovative ideas and solutions, some of which are pushing the limits of state-of-the-art technology. The increasing demand for Wireless Sensor Network (WSN) that must be capable of collecting and sharing data wirelessly while often positioned in places hard to reach and service, motivates engineers to look for innovative energy harvesting and wireless power transfer solutions to implement battery-free sensor nodes. Due to the pervasiveness of RF (Radio Frequency) energy, RF harvesting that can reach out-of-sight places could be a key technology to wirelessly power IoT sensor devices, whic…
Secure random number generation in wireless sensor networks
2014
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…
A group-based wireless body sensors network using energy harvesting for soccer team monitoring
2016
[EN] In team-based sports, it is difficult to monitor physical state of each athlete during the match. Wearable body sensors with wireless connections allow having low-power and low-size devices, that may use energy harvesting, but with low radio coverage area but the main issue comes from the mobility. This paper presents a wireless body sensors network for soccer team players' monitoring. Each player has a body sensor network that use energy harvesting and each player will be a node in the wireless sensor network. This proposal is based on the zone mobility of the players and their dynamism. It allows knowing the physical state of each player during the whole match. Having fast updates an…
SDN@home: A Method for Controlling Future Wireless Home Networks
2016
Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
Computation of Psycho-Acoustic Annoyance Using Deep Neural Networks
2019
Psycho-acoustic parameters have been extensively used to evaluate the discomfort or pleasure produced by the sounds in our environment. In this context, wireless acoustic sensor networks (WASNs) can be an interesting solution for monitoring subjective annoyance in certain soundscapes, since they can be used to register the evolution of such parameters in time and space. Unfortunately, the calculation of the psycho-acoustic parameters involved in common annoyance models implies a significant computational cost, and makes difficult the acquisition and transmission of these parameters at the nodes. As a result, monitoring psycho-acoustic annoyance becomes an expensive and inefficient task. Thi…
Constraint Hubs Deployment for efficient Machine-Type-Communications
2018
Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …
MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis
2018
[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …