Search results for "Sensor Networks"

showing 10 items of 174 documents

Practical considerations for acoustic source localization in the IoT era: Platforms, energy efficiency, and performance

2019

The rapid development of the Internet of Things (IoT) has posed important changes in the way emerging acoustic signal processing applications are conceived. While traditional acoustic processing applications have been developed taking into account high-throughput computing platforms equipped with expensive multichannel audio interfaces, the IoT paradigm is demanding the use of more flexible and energy-efficient systems. In this context, algorithms for source localization and ranging in wireless acoustic sensor networks can be considered an enabling technology for many IoT-based environments, including security, industrial, and health-care applications. This paper is aimed at evaluating impo…

Computer Networks and CommunicationsComputer scienceDistributed computingContext (language use)02 engineering and technologyParallel architectures0202 electrical engineering electronic engineering information engineeringParallel processingWirelessSignal processingMulti-core processorHeterogeneous (hybrid) systemsbusiness.industry020206 networking & telecommunicationsAcoustic source localizationWireless acoustic sensor networks (WASNs)Computer Science ApplicationsEnergy efficiencyHardware and ArchitectureSignal Processing020201 artificial intelligence & image processingElectrónicabusinessWireless sensor networkSource localizationInformation SystemsEfficient energy useAcoustic signal processing
researchProduct

A Battery-Free Smart Sensor Powered with RF Energy

2018

The development of Internet of Things (IoT) infrastructure and applications is stimulating advanced and innovative ideas and solutions, some of which are pushing the limits of state-of-the-art technology. The increasing demand for Wireless Sensor Network (WSN) that must be capable of collecting and sharing data wirelessly while often positioned in places hard to reach and service, motivates engineers to look for innovative energy harvesting and wireless power transfer solutions to implement battery-free sensor nodes. Due to the pervasiveness of RF (Radio Frequency) energy, RF harvesting that can reach out-of-sight places could be a key technology to wirelessly power IoT sensor devices, whic…

Computer Networks and CommunicationsComputer scienceInternet of ThingsEnergy Engineering and Power TechnologyRadio Frequency HarvestingIndustrial and Manufacturing EngineeringArtificial IntelligenceWireless Battery ChargerWirelessRenewable EnergyWireless power transferInstrumentationSustainability and the Environmentbusiness.industryRF power amplifierTransmitterElectrical engineeringComputer Science Applications1707 Computer Vision and Pattern RecognitionInternet of Things; Litium Ion Battery; Radio Frequency Harvesting; Wireless Battery Charger; Wireless Power Transfer; Wireless Sensor Networks; Artificial Intelligence; Computer Networks and Communications; Computer Science Applications1707 Computer Vision and Pattern Recognition; Energy Engineering and Power Technology; Renewable Energy Sustainability and the Environment; Industrial and Manufacturing Engineering; InstrumentationSensor nodeLitium Ion BatteryWireless Power TransferRadio frequencyInternet of ThingWireless Sensor NetworksbusinessEnergy harvestingWireless sensor network2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct

Secure random number generation in wireless sensor networks

2014

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…

Computer Networks and CommunicationsComputer scienceRandom number generationNetwork securitybusiness.industryDistributed computingRangingComputer Science ApplicationsTheoretical Computer ScienceKey distribution in wireless sensor networksComputational Theory and MathematicsRobustness (computer science)Home automationWirelessbusinessWireless sensor networkSoftwareConcurrency and Computation: Practice and Experience
researchProduct

A group-based wireless body sensors network using energy harvesting for soccer team monitoring

2016

[EN] In team-based sports, it is difficult to monitor physical state of each athlete during the match. Wearable body sensors with wireless connections allow having low-power and low-size devices, that may use energy harvesting, but with low radio coverage area but the main issue comes from the mobility. This paper presents a wireless body sensors network for soccer team players' monitoring. Each player has a body sensor network that use energy harvesting and each player will be a node in the wireless sensor network. This proposal is based on the zone mobility of the players and their dynamism. It allows knowing the physical state of each player during the whole match. Having fast updates an…

Computer Networks and CommunicationsComputer scienceWearable computer02 engineering and technologyGroup-based wireless sensor networkTEORIA DE LA SEÑAL Y COMUNICACIONES0202 electrical engineering electronic engineering information engineeringWirelessDynamismElectrical and Electronic Engineeringbusiness.industryNode (networking)020206 networking & telecommunicationsINGENIERIA TELEMATICAWSNComputer Science ApplicationsKey distribution in wireless sensor networksControl and Systems EngineeringEmbedded system020201 artificial intelligence & image processingState (computer science)Wireless body sensor networkMobilitysoccerbusinessEnergy harvestingWireless sensor networkComputer network
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Computation of Psycho-Acoustic Annoyance Using Deep Neural Networks

2019

Psycho-acoustic parameters have been extensively used to evaluate the discomfort or pleasure produced by the sounds in our environment. In this context, wireless acoustic sensor networks (WASNs) can be an interesting solution for monitoring subjective annoyance in certain soundscapes, since they can be used to register the evolution of such parameters in time and space. Unfortunately, the calculation of the psycho-acoustic parameters involved in common annoyance models implies a significant computational cost, and makes difficult the acquisition and transmission of these parameters at the nodes. As a result, monitoring psycho-acoustic annoyance becomes an expensive and inefficient task. Thi…

Computer scienceComputationsubjective annoyanceContext (language use)Annoyance02 engineering and technologycomputer.software_genre01 natural sciencesConvolutional neural networklcsh:TechnologyReduction (complexity)lcsh:Chemistryconvolutional neural networks0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials Sciencewireless acoustic sensor networksInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processesbusiness.industrylcsh:TProcess Chemistry and Technology010401 analytical chemistryGeneral EngineeringRegression analysislcsh:QC1-9990104 chemical sciencesComputer Science Applicationspsycho-acoustic parametersTransmission (telecommunications)lcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040020201 artificial intelligence & image processingData miningbusinesslcsh:Engineering (General). Civil engineering (General)Zwicker modelcomputerlcsh:PhysicsApplied Sciences
researchProduct

Constraint Hubs Deployment for efficient Machine-Type-Communications

2018

Massive Internet of Things (mIoT) is an important use case of 5G. The main challenge for mIoT is the huge amount of uplink traffic as it dramatically overloads the radio access network (RAN). To mitigate this shortcoming, a new RAN technology has been suggested, where small cells are used for interconnecting different devices to the network. The use of small cells will alleviate congestion at the RAN, reduce the end-to-end (E2E) delay, and increase the link capacity for communications. In this paper, we devise three solutions for deploying and interconnecting small cells that would handle mIoT traffic. A realistic physical model is considered in these solutions. The physical model is based …

Computer scienceReliability (computer networking)Wireless communication050801 communication & media studies02 engineering and technology0508 media and communicationsSINR modelTelecommunications link5G mobile communication0202 electrical engineering electronic engineering information engineeringWirelessPath lossFadingElectrical and Electronic EngineeringDelaysRadio access networkConnectivityta213business.industryApplied Mathematics05 social sciences020206 networking & telecommunicationsRelay Node PlacementReliabilityWireless sensor networksComputer Science ApplicationsBackhaul (telecommunications)businessInterferenceWireless sensor network5GWireless Sensor NetworkComputer networkIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct