1,809 research outputs found
Fly-By-Wireless for Next Generation Aircraft: Challenges and Potential solutions
”Fly-By-Wireless” paradigm based on wireless connectivity in aircraft has the potential to improve efficiency and flexibility, while reducing weight, fuel consumption and maintenance costs. In this paper, first, the opportunities and challenges for wireless technologies in safety-critical avionics context are discussed. Then, the assessment of such technologies versus avionics requirements is provided in order to select the most appropriate one for a wireless aircraft application. As a result, the design of a Wireless Avionics Network based on Ultra WideBand technology is investigated, considering the issues of determinism, reliability and security
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Recommended from our members
Improving multiple broadcasting of multimedia traffic in wireless ad-hoc networks
The increasing use of multimedia streaming applications in addition with advent of internet television and radio, demands from today's wireless networks to handle with reliability multiple broadcasting and multicasting sources. However, the way that 802.11 standard, which is the primary technology in wireless networking, handle this type of traffic raises a series of problems mainly related to the lack of an effective feedback mechanism. This lack in turn, limits the capability of random backoff process to eliminate collisions and reduce reliability and fairness. This inherited drawback of the standard is affecting the way broadcast and multicast traffic is transmitted as well as the overall performance of the network. In this paper initially we are highlighting the drawback of the IEEE 802.11 MAC algorithm in handling multiple stations “media type” data broadcasting in an ad-hoc wireless network. Then, we propose two different approaches in alleviating these problems. The first approach is the simple linear increase of the contention window (CW) while the second propose a linear increase of the CW implementing an exclusive backoff number allocation (EBNA) algorithm. In addition we are modifying the 802.11 medium access control (MAC) algorithm to use the clear to send to self (CTS-to-Self) protection mechanism prior to every transmission. Both the above techniques are simulated and compared with the classic 802.11 MAC. The results show that the overall performance of the network can be improved using these alternative MAC methods
- …