6 research outputs found

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes� resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012

    Full text link

    IPv6 tactical network management

    Get PDF
    Current and emerging technologies and equipment, such as unmanned aerial vehicles, ground sensors, networked radios, operator-worn sensor vests, and nanotechnology applications offer warfighters unprecedented command and control and information detection capabilities, yet the use of this technology has not been fully realized. The current protocol, IPv4, is incapable of providing enough addresses due to a depletion of IPv4 address space. IPv6, however, offers unprecedented network support for tactical-level sensor and communications assets in terms of increased address space, Quality of Service (QoS), flexibility, and security. The Department of Defense is transitioning from IPv4 to IPv6 in order to capitalize on IPv6's expanded capabilities. However, one unresolved area is proper IPv6 network management. Currently, the majority of the configuration and operational knowledge is in the mind of a very few individuals. The expertise currently available must be developed for application by the tactical network manager operating out on the edge of the network, in order to properly administer both an IPv4/IPv6 dual stacked network during the phased protocol transition and a purely native IPv6 network. Second, IPv6 features a robust Quality of Service (QoS) capability previously unavailable through IPv4, which requires research to determine the optimum configuration to support the warfighter's diverse requirements.http://archive.org/details/ipvtacticalnetwo109454574Outstanding ThesisUS Marine Corps (USMC) author.Approved for public release; distribution is unlimited
    corecore