The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a server-centric system used to gather and analyze the data coming from sensor nodes. We propose a general, easy-to-extend architecture that can be used in a seamless manner on any types of data, helping to mitigate failure and detect abnormal behavior. In order to decrease risks, the server side will analyze the data, modify trust values for each node and notify an administrator...
This article presents partial results of the development and evaluation of an architecture based on Wireless Sensor Network (WSN), which allows monitoring of physiological variables in patients who develop daily activities both at home as at a hospital. The variables measured are: temperature, oxygen saturation and heart rate, also includes the measurement of contextual variables (lighting, temperature...
To achieve security in wireless sensor networks (WSNs), pairwise key establishment between two sensor nodes is important. Public key cryptography based key establishment mechanisms are not suitable for WSN, due to their more energy consumption and complex hardware requirements. On the other hand, a different class of key establishment scheme that stores key or key related information are computationally...
User authentication in classical networks is deeply addressed, but few results are related to Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide mutual authentication or session-key agreement between the server and the user. Therefore, we present in this paper a lightweight user authentication scheme adapted to WSNs that provides mutual authentication and session-key...
To prolong the lifetime of sensor nodes, most research works have focused on how to tune the duty cycling schemes among nodes to save the communication cost using multifarious wake-up strategies. To this aim, we propose a novel design strategy for mitigating average power consumption of sensor node using the Min(N, T) policy M/G/1 queuing theory. There is a heavy overhead for packet collisions and...
Structural Health Monitoring (SHM) system is a promising technology to determine the health condition of a structure and localize its damage. SHM system is widely used, especially in gigantic structures for its strong requirements of safety. Many researches about SHM system have been conducting. However, conventional SHM system did not take account of an accidental collapse caused by earthquake. As...
Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes...
Due to the sensitive nature of the data gathered by many wireless sensor networks (WSNs) it is becoming critical that this data be protected. However, due to the constrained nature of the resources available on sensor nodes, traditional wireless networking security solutions are not viable because of their processing and memory requirements, power consumption, speed and communications overhead. In...
Many applications require the privacy of the sampled data while they travel from the source sensor nodes to data collecting device, say data sink. Providing an efficient data aggregation scheme with preserving data privacy is a challenging problem in the research of wireless sensor networks (WSNs). Although the secure data aggregation in WSNs has been well studied in the recent years, there exists...
Sensor nodes in ubiquitous sensor network (USN) environments are composed of many sensors and hardware components for various purposes and applications, such as service in the industrial field, the public administration sector, and in life services. A middleware is required for wireless sensors to treat a huge amount of information from sensor nodes. However, the use of a middleware and specialized...
With the development of wireless network, more and more cities have deployed or have planned to deploy wireless city network based on WLAN technology. Since low-cost WiFi-enabled sensor nodes had been launched, much more value-added service based on sensors can be created in the wireless city network. Wireless Intelligent Service Highway is proposed to break the border of independent fixed access...
We extend the probabilistic key-based approach for wireless sensor networks concerning the slow rekeying and path key reestablishment processes. By introducing a novel, energy efficient, distributed, and faster scheme, we attempt to replace the existing ordinary rekeying method of probabilistic key management scheme through a deterministic algorithm that works on both the base station and on each...
This paper introduces a sensor network testbed, X-sensor, that integrates multiple sensor networks deployed at different sites. X-sensor provides three functionalities: (a) a sensor network search which enables users to find a sensor networks appropriate for experiment and data acquisition, (b) a sensor data archive which provides users with various sensor data acquired by sensor nodes, and (c) an...
This project presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomedical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which are created and simulated using QualNet...
This paper introduces a new sensor network testbed, X-sensor, that integrates multiple sensor networks deployed at different sites. X-sensor provides three functionalities: (a) a sensor network search which enables users to find a sensor networks appropriate for experiment and data acquisition, (b) a sensor data archive which provides users with various sensor data acquired by sensor nodes, and (c)...
We describe an improved version of simple polling protocol employed in a wireless sensor network proposed. Although this simple wireless sensor network works efficiently, it is very limited in computing capability. Simple polling protocol works well in situation where every sensor node shares heavy traffic. However, when a few sensor nodes contribute to the traffic, most of the time slots allocated...
Key management is a decisive part for security in wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the number of sensor node is huge. Recently, a random key pre-distribution scheme is proposed as an efficient solution for sharing keys among sensor nodes to reduce the length of shared key and avoid unnecessary...
A remote real time AMR (automatic meter reading) system based on wireless sensor networks is presented in this paper. The useful remote AMR sensors were analyzed and efficient wireless network was suggested. The remote measurement system for water supply is taken as a typical example in experiments. The structure of system employs distributed structure based on wireless sensor networks, which consists...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.