The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distance learning (DL) is an effective technique for person reidentification (PR-ID). DL based methods learn the distance metric by exploiting the discriminative information contained in samples. In PR-ID, different types of negative samples own different amounts of discriminative information, and impostor samples usually own more than other well separable negative samples (WSN-samples). Therefore,...
This paper presents an application for remote control of a mobile robot with XBEE wireless communication. The control of the mobile robot is realized by a PC within a software interface or by using a user mobile remote control. The application is implemented in LabVIEW and can be used for robot control and robot movement tracking.
Wireless sensor networks (WSNs) are currently adopted in a vast variety of domains. Due to practical energy constraints, in this field minimizing sensor energy consumption is a critical challenge. Sleep scheduling approaches give the opportunity of turning off a subset of the nodes of a network— without suspending the monitoring activities performed by the WSN—in order to save energy and increase...
Mobile crowdsensing (MCS) is a new paradigm which takes advantage of pervasive mobile devices to collaboratively collect data and analyze physical phenomenon. As mobile devices are owned and controlled by individuals with various capabilities and intentions, a main challenge MCS applications face is to ensure the credibility of the crowd contributed data. Existed works attempt to increase confidence...
An effective way to reduce the energy consumption of energy constrained wireless sensor networks is reducing the number of collected data, which causes the recovery problem. In this paper, we propose a novel data recovery method based on low-rank tensors for the heterogeneous wireless sensor networks with various sensor types. The proposed method represents the collected high-dimensional data as low-rank...
This paper presents GREP, a highly scalable and efficient group rekeying protocol with the following merits. First, it rekeys the group with only two messages, introducing an overhead which is small, constant, and independent of the group size. Second, GREP considers collusion as a first-class attack. Third, GREP efficiently recovers the group from a collusion attack without recourse to a total member...
Special designs are needed for cryptographic schemes in wireless sensor networks (WSNs). This is because sensor nodes are limited in memory storage and computational power. The existing group key transfer protocols for WSNs using classical secret sharing require that a $t$ -degree interpolating polynomial be computed in order to encrypt and decrypt the secret group key. This approach is too computationally...
In the underwater sensor networks, many of applications need to be aware of the position of the nodes. In the insecure environment, the misleading information can be transmitted in the network and disrupt the functions of the nodes. Thus, the design of the secure localization algorithms that are resistant against attack and able to achieve correct localization is required. In this paper, we consider...
A wireless ad hoc network having a number of resources and a network which organized itself is called as Wireless Sensor Network. In WSN data sending directly to the sink node can raise various problems. Information gathering technique is the center of the Wireless Sensor Network. In WNS data is gathered by sensor nodes and these gathered data is sent to the base station (BS). This is the basic working...
Wireless sensor networks are a large number of sensor nodes that can be deployed to monitor un-attended environment. These sensor networks are responsible to sense, computation and transmission. In certain conditions sensor node cannot able to communicate with its neighbor nodes and may turn to ‘dumb node’. In such situations it can sense its environment but is unable to communicate. Due to this the...
Wireless sensor networks (WSN) used to watch changes in an environment of a given field. Coverage, communication and connectivity of the network are the most fundamental challenges in WSN. Sensor nodes are mostly battery operated and expected to work for a longer time without replacing the batteries. The measure of the efficiency of a network usually defined about how efficient in sensing the given...
This study utilizes a simple model for constructing sensor nodes — master controller combinations in the Internet of Things. The model combines hardware and software for embedded systems which measure a predefined set of parameters. The master controller manages several sensor nodes, collects data from them and provides data for clients. The paper introduces a proof-of-concept implementation based...
Widely used computer systems have always become a target for different type of attacks. With the specifications of easiness in deploying and setting up low cost and low power consumption systems, Wireless Sensor Networks (WSN) have also become a specific target for attackers. The WSNs, which consist of sensor nodes that sends information they perceive and forward to a base station/sink, cannot be...
Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Extending input/output (I/O) bus networks over wireless Ethernet is expected to provide an effective way of achieving communication between multiple hosts and I/O devices. However, because connections on wireless Ethernet are lossy and unreliable, retransmission of I/O packets increases transmission latency that exceeds the limits of the I/O bus protocol. In this paper, we propose an Ethernet transport...
Wireless sensor networks are one of the fast growing technologies in communication field, because of their compact size and ability to work in rugged conditions where human reach is not possible. This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. H-LEACH considers residual and maximum energy of nodes for every round while electing...
Encryption has become a critical need for almost every data communication systems. A huge value of sensitive data is transferred daily via different computer networks such as electronic banking, email applications and file exchange. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications like Ad hoc networks and wireless sensor...
Internet of Things (IoT), an emerging Internet based technical architecture where heterogeneous sensors collaborate for ubiquitous computing based on several technologies and standard communication protocols. With, such an amount of scaling and diverse technologies involved, IoT is susceptible to various threats. Hence, devising an IoT system, providing security through resistance against attacks...
The goal of this paper is to construct an dynamic secure combinatorial keying approach. We focus on heterogeneous mobile wireless sensor network environments. The proposed approach is called dynamic secure combinatorial keying approach (DSCKAD). Most of the previous work on WSN security focuses on homogeneous motes. In homogeneous WSN, sensors have the same resource specifications such as battery...
This approach illustrates that the ENHANCED LEACH is a routing protocol. The proposed research we have used no of connection in a group or cluster. Every cluster has a cluster head and the cluster head directly communicate with the base place. The results of the ENHANCED LEACH protocol are comparison with existing Leach Protocol. Here base connection is located to equal distance of a cluster and it's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.