The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency...
Monitoring the progress or deterioration of the elder's life activities is vital for a medical assistant or care helper to provide an early alert when an unusual activity may be happening in other days. In this study, we have considered a technique for monitoring and identifying abnormal behavior of health data collected from a smart home to help an elderly person to live safely in his/her home longer...
Currently, the limitation of battery has become a serious obstacle for the development of Internet of things (IoTs). Therefore, a new network architecture, named as battery-free network, were proposed. In a typical battery-free network, the battery-free nodes are equipped with any battery and can only gain energy from the environment. Such network extremely expands the scope of the IoT applications,...
Wireless devices such as sensors have increasingly more processing, storage, and networking capabilities, making wireless sensor networks (WSNs) get lots of attentions in recent years. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of important applications in environmental, military, commercial, health care,...
The Routing applications are popular in Wireless Sensor Networks (WSNs). For a practical monitoring environment, the monitoring events may be varied, and so do the data sinks. Most of known applications deal with the monitoring without varied data. The varied event and different sinks are regarded as different monitoring systems. We propose a distributed mechanism to arrange the routing for transmitting...
Internet of things (IoT) integrate the technologies such as sensing, communication, networking and cloud computing in wide range monitoring zone. For applications of IoT, the most appropriate monitoring network is wireless sensor networks (WSN). It is most important to develop energy efficient cluster head (CH) selection scheme to increase the network lifetime of WSNs. It is most crucial to save the...
The conventional positioning systems require the users to carry an electronic device, which helps in the localization process. Device-free Passive Localization (DfPL) techniques are used to position the users in a passive manner such that they do not engage in the process. A typical DfPL setup comprises of Wi-Fi Access Points (APs) that transmit periodic signals to Monitoring Points (MPs). Any intrusion...
This paper presents algorithms that find the optimal number of sensor nodes and the optimal location of nodes to achieve more efficient estimation in a wireless sensor network under power constraints. The network consists of sensors that are optimally placed over an area. Sensors' observations are noisy measurements of an underlying field. Each sensor processes its observation prior to transmitting...
Critical Infrastructure Security had always been an issue. With the technological advancements, there has been a continuous inflow of novel methods for critical infrastructure security. In this paper, design, implementation, and field tests of a novel critical infrastructure security system based on wireless sensor networks is presented.
The energy harvesting is the branch of the energy management, where the energy is being originated from the multiple sources. The energy harvesting is usually done from the sources such as wind mills, solar cells, piezoelectric and other similar power generation modules. In this paper, the energy harvesting methods are discussed for the wireless sensor networks. The wireless sensor networks are the...
Wireless sensor network (WSN) is commonly used for localization analysis. Through sniffing receive signal strength indication (RSSI) in WSN system, localization of higher RSSI is connected automatically. This paper proposes the Raspberry-Pi (RasPi) based sensor node to sniffing RSSI and automatically connect the device to strongest RSSI. The RasPi brings the advantages of a personal computer (PC)...
In this paper, we discuss wireless sensor and networking technologies for swarms of inexpensive aquatic surface drones in the context of the HANCAD project. The goal is to enable the swarm to perform maritime tasks such as sea-border patrolling and environmental monitoring, while keeping the cost of each drone low. Communication between drones is essential for the success of the project. Preliminary...
Modern people are to spend a lot of time living and working in sedentary postures. But the maintenance of wrong posture causes a lot of strain on the body. So diseases of the musculoskeletal system causes. Wrong habits of sedentary posture are neck and spine, pelvis to influence. And initially it accompanied by simply discomfort or pain But wrong posture that has persisted for a long time can lead...
The need of monitoring the water level of troughs is increasing. This is parallel with the growing of Wireless Sensor Network and Internet of Thing. By combining both approach, cattlemen can monitoring their troughs ubiquitous using their own personal device. This paper develop such system by using LoRa™ as the media between sensor hub and nodes, while Raspberry Pi is used as the gateway to push data...
Due to the lack of physical protections and security requirements of the network routing protocols, Wireless Sensor Networks (WSNs) are vulnerable to Denial-of-Service (DoS) attacks. Inherent resource constraints also hinder WSNs from deploying conventional encryption schemes and secure routing protocols. In this paper, we investigate a counter selective forwarding attack to efficiently detect the...
The paper discusses the deployment of wireless sensor networks for intra-car monitoring and control in various automotive application scenarios. Major challenges consist of enabling robust radio communication protocols for challenging environments like the car body and offering high confidence guarantees on timely data collection and quality. Simulation results are introduced and discussed for radio...
How to accurately and rapidly detect traffic attack is an important security problem in wireless sensor networks. An energy-saving ARMA-based traffic attack detection protocol is proposed in this paper. The detection protocol uses linear prediction to establish easy ARMA(2,1) model for sensor nodes. In the detection protocol, different nodes play different roles, and use different monitor schemes...
Secure data transmission is a critical issue for Clustering (WSNs). Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited...
Wireless sensor networks (WSNs) are generally used to monitor, in an area, certain phenomena which can be events or targets that users are interested. To extend the system lifetime, a widely used technique is ‘Energy-Efficient Coverage-Preserving Scheduling(EECPS)’, in which at any time, only part of the nodes are activated to fulfill the function. To determine which nodes should be activated at a...
This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScript-based objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.