4 research outputs found

    Cloud-IO: Cloud Computing Platform for the Fast Deployment of Services over Wireless Sensor Networks

    Get PDF
    In the recent years, a new computing model, known as Cloud Computing, has emerged to react to the explosive growth of the number of devices connected to Internet. Cloud Computing is centered on the user and offers an efficient, secure and elastically scalable way of providing and acquiring services. Likewise, Ambient Intelligence (AmI) is also an emerging paradigm based on ubiquitous computing that proposes new ways of interaction between humans and machines, making technology adapt to the users’ necessities. One of the most important aspects in AmI is the use of context-aware technologies such as Wireless Sensor Networks (WSN) to perceive stimuli from both the users and the environment. In this regard, this paper presents Cloud-IO, a Cloud Computing platform for the fast integration and deployment of services over WSN

    A game theory approach for cooperative control to improve data quality and false data detection in WSN

    Get PDF
    [EN] New solutions are required for the management of heterogeneous distributed sensor networks in order to address the problem of data quality and false data detection in wireless sensor networks (WSNs). In this paper, we present a nonlinear cooperative control algorithm based on game theory. Here, a new model is proposed for the automatic processing and management of information in heterogeneous distributed WSNs. We apply our algorithm to a case study with the aim of improving the quality of temperature data collected from indoor surfaces by a WSN. Unlike the classic unsupervised methods, in the proposed algorithm, it is not necessary to define the number of clusters beforehand. Once the game reaches the game equilibrium, the resulting number of clusters can be used as input for the unsupervised classification analysis. Anomalous temperature values are corrected according to their neighborhood, without modifying the temperature clusters

    A Highly Accurate Deep Learning Based Approach For Developing Wireless Sensor Network Middleware

    Get PDF
    Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, the security problems associated with WSNs have not been completely resolved. Since these applications deal with the transfer of sensitive data, protection from various attacks and intrusions is essential. From the current literature, we observed that existing security algorithms are not suitable for large-scale WSNs due to limitations in energy consumption, throughput, and overhead. Middleware is generally introduced as an intermediate layer between WSNs and the end user to address security challenges. However, literature suggests that most existing middleware only cater to intrusions and malicious attacks at the application level rather than during data transmission. This results in loss of nodes during data transmission, increased energy consumption, and increased overhead. In this research, we introduce an intelligent middleware based on an unsupervised learning technique called the Generative Adversarial Networks (GANs) algorithm. GANs contain two networks: a generator (G) network and a discriminator (D) network. The G network generates fake data that is identical to the data from the sensor nodes; it combines fake and real data to confuse the adversary and stop them from differentiating between the two. This technique completely eliminates the need for fake sensor nodes, which consume more power and reduce both throughput and the lifetime of the network. The D network contains multiple layers that have the ability to differentiate between real and fake data. The output intended for this algorithm shows an actual interpretation of the data that is securely communicated through the WSN. The framework is implemented in Python with experiments performed using Keras. The results illustrate that the suggested algorithm not only improves the accuracy of the data but also enhances its security by protecting it from attacks. Data transmission from the WSN to the end user then becomes much more secure and accurate compared to conventional techniques. Simulation results show that the proposed technique provides higher throughput and increases successful data rates while keeping the energy consumption low
    corecore