Search results for "wireless sensor"

showing 10 items of 375 documents

A group-based wireless body sensors network using energy harvesting for soccer team monitoring

2016

[EN] In team-based sports, it is difficult to monitor physical state of each athlete during the match. Wearable body sensors with wireless connections allow having low-power and low-size devices, that may use energy harvesting, but with low radio coverage area but the main issue comes from the mobility. This paper presents a wireless body sensors network for soccer team players' monitoring. Each player has a body sensor network that use energy harvesting and each player will be a node in the wireless sensor network. This proposal is based on the zone mobility of the players and their dynamism. It allows knowing the physical state of each player during the whole match. Having fast updates an…

Computer Networks and CommunicationsComputer scienceWearable computer02 engineering and technologyGroup-based wireless sensor networkTEORIA DE LA SEÑAL Y COMUNICACIONES0202 electrical engineering electronic engineering information engineeringWirelessDynamismElectrical and Electronic Engineeringbusiness.industryNode (networking)020206 networking & telecommunicationsINGENIERIA TELEMATICAWSNComputer Science ApplicationsKey distribution in wireless sensor networksControl and Systems EngineeringEmbedded system020201 artificial intelligence & image processingState (computer science)Wireless body sensor networkMobilitysoccerbusinessEnergy harvestingWireless sensor networkComputer network
researchProduct

Adaptive Medium Access Control for Distributed Processing in Wireless Sensor Networks

2019

Signal and information processing tasks over Wireless Sensor Networks can be successfully accomplished by means of a distributed implementation among the nodes. Existing distributed schemes are commonly based on iterative strategies that imply a huge demand of one-hop transmissions, which must be efficiently processed by the lower layers of the nodes. At the link layer, general purpose medium access (MAC) policies for wireless communications usually focus on avoiding collisions. These existing approaches result in a reduction of the number of simultaneous transmissions, and an underutilization of the channel as a consequence. This leads to a decrease in the performance of the distributed ta…

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computingReliability (computer networking)020208 electrical & electronic engineeringInformation processing020206 networking & telecommunicationsAccess control02 engineering and technologySignal Processing0202 electrical engineering electronic engineering information engineeringWirelessLink layerUnicastbusinessWireless sensor networkInformation SystemsCommunication channel
researchProduct

Adaptive time window linear regression algorithm for accurate time synchronization in wireless sensor networks

2015

In this article we propose a new algorithm for time synchronization in wireless sensor networks. The algorithm is based on linear regression to achieve long-term synchronization between the clocks of different network motes. Since motes are built using low-cost hardware components, usually their internal local clocks are not very accurate. In addition, there are other effects that affect the clock precision, such as: environmental conditions, supply voltage, aging, manufacturing process. Because some of these causes are external and unpredictable, the clock drift between two motes can change in a random way. Due to these changes, the optimum time window used for performing the linear regres…

Computer Networks and CommunicationsHardware and ArchitectureComputer scienceWork (physics)Clock driftLinear regressionReal-time computingWindow (computing)Wireless sensor networkAlgorithmSoftwareClock synchronizationSynchronizationAd Hoc Networks
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Efficient information gathering from large wireless sensor networks

2018

Abstract Considering large WSNs and comparing data aggregation approaches in terms of scalability, robustness, completeness, and time/energy effectiveness, recent research has asserted the superiority of serial structure-free approaches over serial structure-based ones, and over both parallel structure-free and parallel structure-based techniques. But, in spite of the fact that serial structure-free approaches excel in large and medium-scale networks, their underlying path-construction algorithms are not optimal and can be improved by reducing the involved communications and further shortening the visiting path. To respond to this need, this paper presents Geometric Serial Search (GSS); a n…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer science020206 networking & telecommunications02 engineering and technology020202 computer hardware & architectureRobustness (computer science)Scalability0202 electrical engineering electronic engineering information engineeringWirelessbusinessWireless sensor networkComputer networkComputer Communications
researchProduct

Performance of frame transmissions and event-triggered sleeping in duty-cycled WSNs with error-prone wireless links

2018

Abstract Two types of packet transmission schemes are prevalent in duty-cycled wireless sensor networks, i.e., single packet transmission and aggregated packet transmission which integrates multiple packets in one frame. While most existing models are developed based on an error-free channel assumption, this paper evaluates the performance of both transmission schemes under error-prone channel conditions. We develop a four-dimensional discrete-time Markov chain model to investigate the impact of channel impairments on the performance of frame transmissions. Together with tracking the number of packets in the queue, number of retransmissions and number of active nodes, the fourth dimension o…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryFrame (networking)020206 networking & telecommunicationsThroughput02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)Packet lossComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWirelessNetwork performancebusinessQueueWireless sensor networkComputer networkEfficient energy useCommunication channelComputer Networks
researchProduct

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

2019

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLatency (audio)020206 networking & telecommunications02 engineering and technologyEnergy consumptionTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingbusinessWireless sensor networkVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer networkData transmission
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct