7,911 research outputs found
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Adaptive Hierarchical Data Aggregation using Compressive Sensing (A-HDACS) for Non-smooth Data Field
Compressive Sensing (CS) has been applied successfully in a wide variety of
applications in recent years, including photography, shortwave infrared
cameras, optical system research, facial recognition, MRI, etc. In wireless
sensor networks (WSNs), significant research work has been pursued to
investigate the use of CS to reduce the amount of data communicated,
particularly in data aggregation applications and thereby improving energy
efficiency. However, most of the previous work in WSN has used CS under the
assumption that data field is smooth with negligible white Gaussian noise. In
these schemes signal sparsity is estimated globally based on the entire data
field, which is then used to determine the CS parameters. In more realistic
scenarios, where data field may have regional fluctuations or it is piecewise
smooth, existing CS based data aggregation schemes yield poor compression
efficiency. In order to take full advantage of CS in WSNs, we propose an
Adaptive Hierarchical Data Aggregation using Compressive Sensing (A-HDACS)
scheme. The proposed schemes dynamically chooses sparsity values based on
signal variations in local regions. We prove that A-HDACS enables more sensor
nodes to employ CS compared to the schemes that do not adapt to the changing
field. The simulation results also demonstrate the improvement in energy
efficiency as well as accurate signal recovery
From carbon nanotubes and silicate layers to graphene platelets for polymer nanocomposites
In spite of extensive studies conducted on carbon nanotubes and silicate layers for their polymer-based nanocomposites, the rise of graphene now provides a more promising candidate due to its exceptionally high mechanical performance and electrical and thermal conductivities. The present study developed a facile approach to fabricate epoxy–graphene nanocomposites by thermally expanding a commercial product followed by ultrasonication and solution-compounding with epoxy, and investigated their morphologies, mechanical properties, electrical conductivity and thermal mechanical behaviour. Graphene platelets (GnPs) of 3.5
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
This chapter discusses the need of security and privacy protection mechanisms
in aggregation protocols used in wireless sensor networks (WSN). It presents a
comprehensive state of the art discussion on the various privacy protection
mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed
by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA
protocol and proposes a mechanism to plug that vulnerability. To demonstrate
the need of security in aggregation process, the chapter further presents
various threats in WSN aggregation mechanisms. A large number of existing
protocols for secure aggregation in WSN are discussed briefly and a protocol is
proposed for secure aggregation which can detect false data injected by
malicious nodes in a WSN. The performance of the protocol is also presented.
The chapter concludes while highlighting some future directions of research in
secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table
- …