The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there has been an increasing interest in the adoption of emerging sensing technologies for instrumentation within a variety of structural systems. Structural health monitoring systems are widely adopted to monitor the behavior of structures during forced vibration testing or natural excitation (e.g. earthquakes, winds, live loading). They can be found in a number of civil structures,...
The majority of routing protocols for wireless sensor networks attempt to obtain optimal or shortest paths that lead to target resources. It is energy inefficient to search and establish those paths. CZQueen, a Small World-based resource query mechanism, is presented to reduce energy overhead of resource queries in large-scale and location-free sensor networks. Based on the Small World Model, CZQueen...
This paper investigates the impact of realistic antennas on joint anchor-less localization and indoor characterization based on Impulse Radio (IR) Ultra Wideband (UWB) communications. In this frame, the Maximum Averaged Likelihood (MAL) algorithm and its extended version are considered, both relying on a tree approach consisting in two stages. The first part of the process, which is common to both...
In this paper, we propose an innovative low-cost biometric authentication scheme based on uniformed Gaussian mixture model (GMM) for secure communications within wireless body area sensor networks (WBASNs), to obviate the cost-prohibitive key exchange problem. In this approach, the sender Inter Pulse Interval (IPI) information is selected as the biometric key for authentication, and a statistical...
We are witnessing pervasive use of wireless sensor networks (WSN)s in a wide variety of applications such as monitoring of road infrastructure. As they are expected to be deployed in harsh environments for long durations, the research community have turned their attention to tapping on ambient energy to power such networks. However, since energy harvesting rates are still significantly lower than...
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed. We introduce the concept of XORed key, which is the bitwise XOR of two regular (a.k.a. single) keys. Sensor nodes are preloaded with a mixture of single and XORed keys. Nodes establish secure links by using...
To enable the evolving trend of ubiquitous computing and multi-service support of next generation ad hoc and sensor networks this paper proposes a new concept of static and dynamic application-based heterogeneity and introduces STEPS; a mathematically-based distributed multi-rate storage and data management mechanism that dynamically responds to the stochastic temporal networks' disconnectivity pattern...
Selective decode and forward (SDF) based cooperative relaying protocol can provide full diversity. But SDF protocol requires bandwidth consuming cyclic redundancy check (CRC) bits to prevent error propagation from the relay. Link adaptive regenerative relaying (LAR) scheme avoids the need for CRC bits to reduce the error propagation from relay and can provide full diversity. But in the conventional...
The border region monitoring task can be achieved using surveillance wireless sensor networks. The network detects trespassers and inform the sink node. There are many mobility models proposed for users within an ad hoc network. On the other hand, the behavior of trespassers are generally different than mobile users and does not follow a random pattern. Observations from previous security related...
In this paper, we investigate the use of explicit disjoint for the multipath routing to achieve cost-efficient operation of wireless sensor networks. The focus is on constructing completely disjointed multiple paths between the source of sensing stimulus and the destination of gathered sensor data. We propose simple schemes for multipath construction based on explicit multiple anchor nodes. For the...
We present the design criteria and specifications of a novel Open-Source hardware channel sounder and Open-Source data sets for measurements of the Body Area Channel at the 2400MHz ISM band and 2360MHz band. We outline a need for open hardware and measurement data to facilitate robust standardization of the new Body Area Networks. We demonstrate typical analyses on a public data set, with reference...
Wireless Body Sensor Networks (WBSNs) have recently received a lot of research interests due to their wide applications in healthcare, security, sports and entertainment. Accurate WBSNs localization is a fundamental problem to be overcome to enable the development of effective location-aware applications. This paper introduces and investigates the performance of WBSN localization algorithms using...
This paper focuses on wireless body area networks (WBAN) targeted for medical ICT applications. The studied network follows a typical IEEE 802.15.4 beacon-enabled star topology. We simulate the collection of medical data from patients using wireless sensors. Impulse radio ultra wideband (IR-UWB) is chosen as a physical layer technology, in compliance with the IEEE 802.15.4a standard. Two random access...
Many duty cycling MAC protocols exploit preamble sampling technique to improve the energy efficiency. In this technique, all the devices periodically listen to the medium for a short duration and then go back to sleep if medium is found idle. When a device wants to send data it transmits a long preamble followed by data bits. When the receiver wakes up and detects the preamble it stays awake until...
In densely deployed wireless sensor networks, observations of the sensor nodes are spatially correlated. In this paper, we study a joint channel decoding scheme utilizing bit correlation of the sensor observations according to bit levels of analog-digital converter (ADC). If sensor ADC output is interpreted as natural binary numeral, carry propagation may occur between adjacent ADC output values....
We propose a simple yet effective non-line-of-sight (NLOS) mitigation method that is incorporated into our earlier-developed iterative parallel projection method (IPPM) for collaborative position location. The proposed method handles NLOS range estimates based on the available a priori knowledge about NLOS condition and is demonstrated to significantly improve the localization accuracy in NLOS-dense...
This paper presents the types and classes of sensing related information to be exchanged among the entities in cognitive radio systems. The information was extracted by analyzing distributed spectrum sensing use cases and has been checked for the consistence with available sensing techniques and sensors' capability. This paper also introduces IEEE P1900.6 WG recent activities on standardizing the...
The problem of positioning a target node is studied for wireless sensor networks with cooperative active and passive sensors. Two-way time-of-arrival and time-difference-of-arrival measurements made by both active and passive nodes are used to estimate the position of the target node. A maximum likelihood estimator (MLE) can be employed to solve the problem. Due to the nonlinear nature of the cost...
A managed wireless mesh for infrastructure-level, stable regional mesh network has been studied. NerveNet, which we have been proposing, is a concept of future regional platform network that covers local regions and provides various context-aware services with the shared use of sensors and actuators. The managed wireless mesh developed for materializing NerveNet features auto-configuration of multiple,...
In distributed detection for wireless sensor networks, multiple access schemes and channel conditions affect the performance of data fusion at a fusion center together with communication constraints (bandwidth and transmission energy). For an efficient channel use, the type-based multiple access (TBMA) has been proposed by Mergen et al. Since the performance of TBMA is not satisfactory for zero-mean...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.