The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things is a novel paradigm that combined microcomputer and wireless communication technology. IoT device will be considered as a pervasive and ubiquitous device that able to interact with it user and environment autonomously with minimum human intervention. At present, wireless technology already has pervasive features in the link and the network layer. They able to do the dynamic addressing,...
Positioning is the foundation of wireless sensor applications. An attack method of multiple counterfeit identities in sensor network localization is proposed. At different times, attack nodes counterfeit different identities nodes, sending false reference coordinates, which leads to the failure of positioning. In the paper, we establish a normal localization system, which can accurately calculate...
Wireless sensor networks (WSNs) are expected to be deployed in various areas in the future for monitoring and interacting with the physical environment. The sensors are constraint devices, so 6LoWPAN is proposed by IETF to adapt IPv6 into the WSNs environment. However, due to the use of short address and compression, IPv6/IPv4 enabled devices cannot support the 6LoWPAN adaptation layer as well as...
This paper presents design and implementation of a homecare system that provides home control assistance and fall detection services using a wrist-watch type wireless motion and location sensing device. This user interface device is equipped with a Zigbee radio transceiver to communicate with a home gateway and track location of the user. The user interface device is also equipped with a 3-axis accelerometer...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
Object tracking is an important application in wireless sensor networks. To get the accurate location of a given object timely, designing an efficient routing protocol and incorporating it with the location response is the key. While limits of wireless sensor networks propose challenge for the routing of object tracking. This paper constructs a cluster-based routing tree, which makes balance between...
The wireless ubiquitous network and various communication services are expected to be realized. The wireless ubiquitous network is defined as the converged network to integrate the mobile network with the fixed IP based network. First, the concept of wireless ubiquitous network architecture is shown which is based on IMS standardized by 3GPP. Next, Parlay is described as the solution of Open API approach...
In recent years, wireless communication technologies such as ZigBee have been developed. By constructing a wireless sensor network from infrared sensors with those wireless technologies, it is possible to track moving objects in a wide monitoring region. In this paper, we propose an object tracking method by dividing a wide monitoring region into small multiple regions called "micro cells"...
In this paper, we investigate how packet delays and losses affect the quality of target tracking. Specifically, we use Bayesian information of the posterior distribution of target locations to quantify the quality of target tracking and investigate how network quality and measurement quality affect the value of Bayesian information. We show that improving measurement quality provides diminishing gain...
Numerous applications, ranging from disaster management to smart buildings, have been proposed for sensor networks. The practicality of these applications depends on the ability of users to interact with these networks, in many cases in real time. In this paper we propose that cell phones interact with sensor networks and obtain the relevant information in real time. Cell phones can communicate with...
This paper presents an intelligent solution of wireless monitoring of a computerized city using SafeMobile units. The system is using a wireless network of vehicular units in order to communicate with a central gateway. The final user is accessing a software application for receiving real-time information from the monitored units and send commands. The major achievement of such a system is reducing...
This paper introduces a sensor network testbed, X-sensor, that integrates multiple sensor networks deployed at different sites. X-sensor provides three functionalities: (a) a sensor network search which enables users to find a sensor networks appropriate for experiment and data acquisition, (b) a sensor data archive which provides users with various sensor data acquired by sensor nodes, and (c) an...
We present a generic scheme for estimating the size of a group of nodes affected by the same event in a large-scale network, such as a grid, a sensor network or a wireless broadband access network, while receiving only a small number of feedback messages from this group. Using the proposed scheme, a centralized gateway analyzes the transmission times of these feedback messages, defines a likelihood...
This paper introduces a new sensor network testbed, X-sensor, that integrates multiple sensor networks deployed at different sites. X-sensor provides three functionalities: (a) a sensor network search which enables users to find a sensor networks appropriate for experiment and data acquisition, (b) a sensor data archive which provides users with various sensor data acquired by sensor nodes, and (c)...
This paper describes main features of IQRF wireless communication platform for home automation. This platform was developed and designed for home and industrial automation. Some basic functions of OS, development tools and basic modules are described. A case study is discussed at the end of the paper. This is a case study of a sensor network created around a core coordinator and a set of temperature...
RACNet is a sensor network that monitors a data center's environmental conditions at high temporal and spatial resolutions. The data RACNet collects can improve the energy efficiency of data centers, currently one of the fastest growing energy consumers in the U.S. RACNet overcomes the challenge of reliable and low-latency data gathering from dense networks deployed in harsh RF environments through...
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper,...
Traditional sensor network infrastructures rely heavily on middleware software to interface with various instruments. In the current state, plugin-based middleware software does not offer the flexibility required to achieve ldquoplug & playrdquo, where users can simply connect new sensors and instruments and expect them to work straight away. In this paper, we introduce a low-level software layer...
Due to the limited capacity of the sensors' batteries, energy is a critical resource in wireless sensors networks. Sleep mode operation is an effective approach to prolong the life time of the network. How to determine insomnious (wakeup) node is a critical component of this approach. There are a number of selection methodologies in the literature but all of them except randomized sleeping require...
Wireless sensor network which has more weak security than general network is not considering management principles although it is used in a various part. This paper is concerned with the security management system for sensor network including security function. We design the sensor network management functions and implement the system to manage the security information for detecting an attack from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.