The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an underwater positioning system (UPS) for remotely operated underwater vehicle (ROV). The system uses two underwater speakers as anchor nodes and a hydrophone as a receiver node. Time-of-arrival (ToA) is locally measured by sensors to identify distances from the hydrophone to the two anchor nodes. Then, using 2-D trilateration algorithm and depth from a pressure sensor, the position...
Any decentralized, distributed network isvulnerable to the Sybil attack wherein a malicious node masquerade as several different nodes, called Sybil nodes disrupting the proper functioning of the network. A Sybil attacker can create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process,...
In wireless sensor networks, communication cost is higher as compared to computational cost, so it is important to minimize the amount of data transmission to extend the network lifetime. To minimize the volume of data to be transmitted, data aggregation is mostly used. As sensor nodes are being deployed in remote and unattented environments, they are prone to node compromise attacks and various other...
Peer-to-Peer Network consisting of nodes with limited power that are deployed to gather useful information from the field. In P2P it is critical to collect the information in an efficient manner, sometimes Single point failure can be occurred, and also congestion can be occurred in the network. In order to avoid those problems we proposed a new technique called Bio-Inspired mechanism for caching....
Two power saving schemes namely power management and power control have been investigated in isolation for addressing power constraint of wireless sensor networks, which is known to be the most prominent limitation in road to successful deployment of wireless sensor networks. However, combining the power saving schemes is yet to be investigated in the literature. Therefore, in this paper, we propose...
The Wireless Sensor Network (WSN) is a distributed wireless micro-electronic-mechanical system which is deployed in hostile environment, has inherent insecure communication medium and resource constraints. This makes security of Wireless Sensor Network challenging. The blackhole attack is a security threat which manipulates sequence number to degrade the performance of the WSN by increasing packet...
The development of a wearable recording system to acquire L-glutamate (L-Glu) neurotransmitter signals from the central nervous system (CNS) was reported. The system utilized miniature (50×100 μm2) implantable amperometric sensors fabricated on a flexible polyimide substrate to minimize in vivo tissue damage. Selectivity to L-Glu was improved through implementation of self-referencing electrode and...
The Internet of Things (IoT) has the strong potential to support a human society interacting more symbiotically with its physical environment. Indeed, the emergence of tiny devices that sense environmental cues and trigger actuators after consulting logic and human preferences promises a more environmentally aware and less wasteful society. However, the IoT inherently challenges software development...
Recently more and more sensor networks are powered by diverse environmental energy surrounding the deployment field. The charging process of such nodes results in intermittent network topology, through which it is very hard to deliver packets efficiently. CTP is a de facto routing protocol for wireless sensor network applications driven by the TinyOS. It constructs and maintains a routing tree by...
Generally, estrus of cow can be observed from its body such as swollen vagina, slime and mydriasis or its behaviors such as bellow out, ride piggyback with the other or let the other rides piggyback. These symptoms will only occur within 18 hours. To access the best result, therefore, the insemination should be processed during on 9–18 hours of that period time. Therefore, this project proposes the...
Positioning is the foundation of wireless sensor applications. An attack method of multiple counterfeit identities in sensor network localization is proposed. At different times, attack nodes counterfeit different identities nodes, sending false reference coordinates, which leads to the failure of positioning. In the paper, we establish a normal localization system, which can accurately calculate...
Message authentication codes (MACs) are classically used for preventing unauthorized and corrupted messages from being forwarded in a network. However, inherent energy limitations of wireless sensor networks (WSNs) make the application of most of the state-of-the art MACs unaffordable due to their large computation overhead. Therefore in this paper, in order to cope with this challenging concern,...
This paper proposes a low energy-consuming cluster-based algorithm to protect data integrity and privacy named ILCCPDA, which can dynamically elect cluster head by LEACH clustering protocol and take the simple cluster fusion approach to reduce the data transmission, thus reducing energy consumption. ILCCPDA can detect data integrity by adding homomorphic message authentication code and take the random...
The Agents of Things (AoT) is a novel concept that unites the physical and cyber worlds and enables things to intelligently interact and communicate with each other. The concept opens new areas for researchers to develop or improve applications for value-added services to humans. It entails analyzing the hardware and software spectrum of computing resources' specifications to implement a comprehensive...
The use of Wireless Sensor Network (WSN) has been widely used in many fields, especially for environmental monitoring. This present study attempts to apply the WSN technology into the retail industry or the modern market. Utilizing barcode scanning technology as a medium of sensors that are commonly used, combined with a microcontroller and XBee modules as data transmission module. This study adds...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
To achieve security in wireless sensor networks, it is needed to encrypt and authenticate message sent between sensor nodes. Key management is a very critical problem. However, as sensor nodes are resource-constrained, achieving key agreement is nontrivial. In this paper, we propose a key pre-distribution scheme based on multiple key spaces. The scheme combines the advantages of BIBD and Blom. Detailed...
Distance education that is supported traditionally through technology has transitioned from e-learning to mobile learning because of the ubiquitous presence of the Internet, as well as rapid advancements in Information and Communication Technology (ICT) and recent improvements in learning technology. With the coming and popularization of mobile devices and ubiquitous computing, the idea of e-learning...
The end-to-end packet delay is important for the application of wireless sensor networks. Reducing unnecessary and redundant handshake frame is considered as a promising way to minimize the end-to-end delay. Here, a protocol named compressed handshake media access control (CH-MAC) is p-resented by control frame compression with implicit RTS to improve delay performance. Simulation results show that...
Current methods in treating chronic wounds have had limited success in large part due to the open loop nature of the treatment. In turn, we have created a localized smart wound dressing platform that will allow for real time data acquisition of oxygen concentration at the wound site. This will serve as the first leg of a feedback loop for a fully optimized treatment mechanism tailored to the individual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.