95,298 research outputs found
Adding Network Coding Capabilities to the WSNet Simulator
This technical report presents the implementation of a Network Coding module
in WSNet - a Wireless Sensor Network simulator. This implementation provides a
generic programming interface to allow an easy specialization of different
coding strategies: random, source/destination-oriented, intra/inter-flow, etc
Recommended from our members
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN is application specific and ensures large scale real-time data processing in complex environment. Both these wireless networks have some common vulnerable features which may increase the chances of different sorts of security attacks. Wireless sensor nodes have computation, memory and power limitations, which do not allow for implementation of complex security mechanism. In this paper, we discuss the common limitations and vulnerable features of WMN and WSN, along with the associated security threats and possible countermeasures. We also propose security mechanisms keeping in view the architecture and limitations of both. This article will serve as a baseline guide for the new researchers who are concern with the security aspects of WMN and WSN
Cross-level sensor network simulation with COOJA
Simulators for wireless sensor networks are a valuable tool for
system development. However, current simulators
can only simulate a single level of a system at once. This makes
system development and evolution difficult since developers
cannot use the same simulator for both high-level algorithm
development and low-level development such as device-driver implementations.
We propose cross-level simulation, a novel type of wireless
sensor network simulation that enables holistic simultaneous
simulation at different levels. We present an implementation of such a
simulator, COOJA, a simulator for the Contiki sensor node operating
system. COOJA allows for simultaneous simulation at the
network level, the operating system level, and the machine code
instruction set level. With COOJA, we show the feasibility of the
cross-level simulation approach
VLIT NODE Sensor Technology and Prefarm
Precision farming systems are based on a detailed monitoring of information and data that are necessary for successful decision-making in crop production. The system is designed for data collection from several resources. In past years an extensive research and development work has been done in the field of wireless sensor networks (WSN) in the world. When a wireless sensor network (WSN) is used for agricultural purposes, it has to provide first of all a long-reach signal. The present paper describes new long distance RFID based technology implementation - VLIT NODE.Wireless Sensor Network, Precision Agriculture, RFID., Research and Development/Tech Change/Emerging Technologies, Research Methods/ Statistical Methods, GA, IN,
Decentralized event-triggered control over wireless sensor/actuator networks
In recent years we have witnessed a move of the major industrial automation
providers into the wireless domain. While most of these companies already offer
wireless products for measurement and monitoring purposes, the ultimate goal is
to be able to close feedback loops over wireless networks interconnecting
sensors, computation devices, and actuators. In this paper we present a
decentralized event-triggered implementation, over sensor/actuator networks, of
centralized nonlinear controllers. Event-triggered control has been recently
proposed as an alternative to the more traditional periodic execution of
control tasks. In a typical event-triggered implementation, the control signals
are kept constant until the violation of a condition on the state of the plant
triggers the re-computation of the control signals. The possibility of reducing
the number of re-computations, and thus of transmissions, while guaranteeing
desired levels of performance makes event-triggered control very appealing in
the context of sensor/actuator networks. In these systems the communication
network is a shared resource and event-triggered implementations of control
laws offer a flexible way to reduce network utilization. Moreover reducing the
number of times that a feedback control law is executed implies a reduction in
transmissions and thus a reduction in energy expenditures of battery powered
wireless sensor nodes.Comment: 13 pages, 3 figures, journal submissio
Wireless and Physical Security via Embedded Sensor Networks
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.National Science Foundation (CISE/CSR 0720604, ENG/EFRI 0735974, CIES/CNS 0520166, CNS/ITR 0205294, CISE/ERA RI 0202067
Analysis of Energy Consumption Performance towards Optimal Radioplanning of Wireless Sensor Networks in Heterogeneous Indoor Environments
In this paper the impact of complex indoor environment in the deployment and energy consumption of a wireless sensor network infrastructure is analyzed. The variable nature of the radio channel is analyzed by means of deterministic in-house 3D ray launching simulation of an indoor scenario, in which wireless sensors, based on an in-house CyFi implementation, typically used for environmental monitoring, are located. Received signal power and current consumption measurement results of the in-house designed wireless motes have been obtained, stating that adequate consideration of the network topology and morphology lead to optimal performance and power consumption reduction. The use of radioplanning techniques therefore aid in the deployment of more energy efficient elements, optimizing the overall performance of the variety of deployed wireless systems within the indoor scenario
THAWS: automated wireless sensor network development and deployment
This research focuses on the design and implementation of a tool to speed-up the development and deployment of heterogeneous wireless sensor networks. The THAWS (Tyndall Heterogeneous Automated Wireless Sensors) tool can be used to quickly create and configure application-specific sensor networks. THAWS presents the user with a choice of options, in order to characterise the desired functionality of the network. With this information, THAWS generates the necessary code from pre-written templates and well-tested, optimized software modules. This is then automatically compiled to form binary files for each node in the network. Wireless programming of the network completes the task of targeting the wireless network towards a specific sensing application. THAWS is an adaptable tool that works with both homogeneous and heterogeneous networks built from wireless sensor nodes that have been developed in the Tyndall National Institute
Transmission Power Scheduling for Energy Harvesting Sensor in Remote State Estimation
We study remote estimation in a wireless sensor network. Instead of using a
conventional battery-powered sensor, a sensor equipped with an energy harvester
which can obtain energy from the external environment is utilized. We formulate
this problem into an infinite time-horizon Markov decision process and provide
the optimal sensor transmission power control strategy. In addition, a
sub-optimal strategy which is easier to implement and requires less computation
is presented. A numerical example is provided to illustrate the implementation
of the sub-optimal policy and evaluation of its estimation performance.Comment: Extended version of article to be published in the Proceedings of the
19th IFAC World Congress, 201
- âŠ