The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the problem of enabling a passive sensor to communicate, by integrating wireless power transfer and ambient backscatter transmission. The passive sensor collects energy from the radio-frequency signal emitted by an existing (legacy) transmitter, and uses such an energy to modulate its information by reflecting the legacy signal. In particular, we study the case when the intended receiver...
A Wireless Sensor Network (WSN) is a wireless network that contains several low cost tiny devices such as sensors to senses environmental circumstances. In many situations, each node of the WSN has to know its location in the real world. Several cost effective localization techniques can be used to locate each sensor. Among various techniques, the range based techniques are known for their accurate...
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram...
Node compromising is still the most hard attack in Wireless Sensor Networks (WSNs). It affects key distribution which is a building block in securing communications in any network. The weak point of several roposed key distribution schemes in WSNs is their lack of resilience to node compromising attacks. When a node is compromised, all its key material is revealed leading to insecure communication...
In our previous work, a simulation framework was proposed to focus on imitating the behavior of wireless charging vehicles (WCVs) and wireless sensor networks (WSNs) because current mainstream simulators have very limited support on simulation of WCVs. The WCV is an integration of a mobile vehicle and a wireless power transfer broadcaster, which is used to recharge sensors wirelessly to prolong the...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
Parameter estimation in wireless sensor networks (WSN) using encrypted non-binary quantized data is studied. In a WSN, sensors transmit their observations to a fusion center through a wireless medium where the observations are susceptible to unauthorized eavesdropping. Encryption approaches for WSNs with fixed threshold binary quantization were previously explored. However, fixed threshold binary...
Because of the limited energies of sensors, efficient data gathering in wireless sensor network has been received a great deal of attention recently. To prolong the network lifetime, in this paper, we study the problem of scheduling a mobile sink to some specific nodes, termed anchor nodes in this paper, for data collection and reducing the energy consumption of data transmission. While considering...
Online education is evolving at a fast pace thanks to novel technology-mediated learning environments: Massive Open Online Courses (MOOCs), gamified learning, intelligent tutoring systems, citizen-science communities, informal learning groups are blossoming everywhere as novel opportunities for teachers and learners. However, the educational effectiveness of these solutions has to be proved and technological...
It is currently a key issue in crop prevention to give a precaution of the disease and insect pests. With the continuous development of wireless sensor network (WSN), the traditional methods of the monitoring and precaution of the diseases and insect pests of the crop are gradually being changed. The paper illustrates a system based on the WSN that is able to acquire the information of the environmental...
This article proposes a novel data gathering scheme for wireless sensor networks to reduce energy consumption for a prolonged network lifetime. Data gathering is modeled as random node sampling method, where fusion center collects data from arbitrarily deployed randomly selected nodes and takes the global decision. We evaluate performance of our method with metrics: energy consumption and error performance...
In this paper we present a low-cost distributed embedded system for Structural Health Monitoring (SHM) that uses very cost-effective MEMS accelerometers, instead of more expensive piezoelectric analog transducers. The proposed platform provides online filtering and fusion of the collected data directly on-board. Data are transmitted after processing using a WiFi transceiver. Low-cost and synchronized...
This article reports the findings of a radio received signal strength (RSS) based biometric sensing approach for lightweight walker recognition. A vertically deployed radio sensing network is designed to obtain the movement of walker at seven different heights. The sequential RSS at each height contributes weak distinguished feature to walker's identify. The human subjects are recognized by vector...
A variety of constraints exist on the design of a wireless tele-monitoring system of bio-signals. In order to reduce on-chip energy consumption or extend sensor life, recorded signals are usually compressed before transmission. Compressed sensing (CS) is promising to as a low-power compression framework to improve energy efficiency. Its performance is largely determined by the characteristic of sensing...
The steadily growing use of license-free frequency bands requires reliable coexistence management for deterministic medium utilization. For interference avoidance, proper wireless interference identification (WII) is essential. In this work we propose the first WII approach based upon deep convolutional neural networks (CNNs). The CNN naively learns its features through self-optimization during an...
Current Nyiragongo Volcano observatory systems yield poor monitoring quality due to unpredictable dynamics of volcanic activities and limited sensing capability of existing sensors (seismometers, acoustic microphones, GPS, tilt-meter, optical thermal, and gas flux).The sensor node has limited processing capacity and memory. So if some tasks from the sensor nodes can be uploaded to the server of cloud...
This paper from the existing stm32 gateway, pointed out that the existing design of the lack of monitoring the environment to take pictures. Aiming at this problem, this paper presents a set of design and implementation based on stm32f103zet6 wireless gateway. This paper first gives the gateway hardware design, elaborated its working mechanism. In the software design to give the specific process of...
The paper presents an exhaustive visualization of different problems encountered in efficient utilization of spectrum for advanced wireless communication. It is a well known fact that there is a crisis for available radio spectrum due to incredible expansion and advancement of the communication systems and technologies. But in reality, there is no shortage of available spectrum but only lack of advance...
With the increasing development of industrial wireless technologies and standards, the scarce spectrum in the industrial, scientific, and medical (ISM) band has been extremely overcrowded, which can be mitigated by harvesting more spectrum in licensed bands with the emerging cognitive radio technology. In industrial cognitive radio networks (ICRNs), security is one of the most important problems....
The paper is concerned with the target tracking in range-only wireless sensor networks (WSNs). To integrate the separated measurements from the WSN, a sequential fusion estimation method is presented in the sense of linear minimum mean squared error (LMMSE). Moreover, the un-scented transformation is used to implement the recursion of means and covariances, and this kind estimator is termed as sequential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.