26 research outputs found

    Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs.https://doi.org/10.3390/s1703053

    A Highly Accurate Deep Learning Based Approach For Developing Wireless Sensor Network Middleware

    Get PDF
    Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, the security problems associated with WSNs have not been completely resolved. Since these applications deal with the transfer of sensitive data, protection from various attacks and intrusions is essential. From the current literature, we observed that existing security algorithms are not suitable for large-scale WSNs due to limitations in energy consumption, throughput, and overhead. Middleware is generally introduced as an intermediate layer between WSNs and the end user to address security challenges. However, literature suggests that most existing middleware only cater to intrusions and malicious attacks at the application level rather than during data transmission. This results in loss of nodes during data transmission, increased energy consumption, and increased overhead. In this research, we introduce an intelligent middleware based on an unsupervised learning technique called the Generative Adversarial Networks (GANs) algorithm. GANs contain two networks: a generator (G) network and a discriminator (D) network. The G network generates fake data that is identical to the data from the sensor nodes; it combines fake and real data to confuse the adversary and stop them from differentiating between the two. This technique completely eliminates the need for fake sensor nodes, which consume more power and reduce both throughput and the lifetime of the network. The D network contains multiple layers that have the ability to differentiate between real and fake data. The output intended for this algorithm shows an actual interpretation of the data that is securely communicated through the WSN. The framework is implemented in Python with experiments performed using Keras. The results illustrate that the suggested algorithm not only improves the accuracy of the data but also enhances its security by protecting it from attacks. Data transmission from the WSN to the end user then becomes much more secure and accurate compared to conventional techniques. Simulation results show that the proposed technique provides higher throughput and increases successful data rates while keeping the energy consumption low

    Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement

    Get PDF
    The Engineering Doctorate (EngD) was conducted in conjunction with BT Research on state-of-the-art Wireless Sensor Network (WSN) projects. The first area of work is a literature review of WSN project applications, some of which the author worked on as a BT Researcher based at the world renowned Adastral Park Research Labs in Suffolk (2004-09). WSN applications are examined within the context of Machine-to-Machine (M2M); Information Networking (IN); Internet/Web of Things (IoT/WoT); smart home and smart devices; BT’s 21st Century Network (21CN); Cloud Computing; and future trends. In addition, this thesis provides an insight into the capabilities of similar external WSN project applications. Under BT’s Sensor Virtualization project, the second area of work focuses on building a Generic Architecture for WSNs with reusable infrastructure and ‘infostructure’ by identifying and trialling suitable components, in order to realise actual business benefits for BT. The third area of work focuses on the Open Geospatial Consortium (OGC) standards and their Sensor Web Enablement (SWE) initiative. The SWE framework was investigated to ascertain its potential as a component of the Generic Architecture. BT’s SAPHE project served as a use case. BT Research’s experiences of taking this traditional (vertical) stove-piped application and creating SWE compliant services are described. The author’s findings were originally presented in a series of publications and have been incorporated into this thesis along with supplementary WSN material from BT Research projects. SWE 2.0 specifications are outlined to highlight key improvements, since work began at BT with SWE 1.0. The fourth area of work focuses on Complex Event Processing (CEP) which was evaluated to ascertain its potential for aggregating and correlating the shared project sensor data (‘infostructure’) harvested and for enabling data fusion for WSNs in diverse domains. Finally, the conclusions and suggestions for further work are provided

    Wireless Sensor Networks

    Get PDF
    The aim of this book is to present few important issues of WSNs, from the application, design and technology points of view. The book highlights power efficient design issues related to wireless sensor networks, the existing WSN applications, and discusses the research efforts being undertaken in this field which put the reader in good pace to be able to understand more advanced research and make a contribution in this field for themselves. It is believed that this book serves as a comprehensive reference for graduate and undergraduate senior students who seek to learn latest development in wireless sensor networks

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Conception et implémentation de systèmes résilients par une approche à composants

    Get PDF
    L'évolution des systèmes pendant leur vie opérationnelle est incontournable. Les systèmes sûrs de fonctionnement doivent évoluer pour s'adapter à des changements comme la confrontation à de nouveaux types de fautes ou la perte de ressources. L'ajout de cette dimension évolutive à la fiabilité conduit à la notion de résilience informatique. Parmi les différents aspects de la résilience, nous nous concentrons sur l'adaptativité. La sûreté de fonctionnement informatique est basée sur plusieurs moyens, dont la tolérance aux fautes à l'exécution, où l'on attache des mécanismes spécifiques (Fault Tolerance Mechanisms, FTMs) à l'application. A ce titre, l'adaptation des FTMs à l'exécution s'avère un défi pour développer des systèmes résilients. Dans la plupart des travaux de recherche existants, l'adaptation des FTMs à l'exécution est réalisée de manière préprogrammée ou se limite à faire varier quelques paramètres. Tous les FTMs envisageables doivent être connus dès le design du système et déployés et attachés à l'application dès le début. Pourtant, les changements ont des origines variées et, donc, vouloir équiper un système pour le pire scénario est impossible. Selon les observations pendant la vie opérationnelle, de nouveaux FTMs peuvent être développés hors-ligne, mais intégrés pendant l'exécution. On dénote cette capacité comme adaptation agile, par opposition à l'adaptation préprogrammée. Dans cette thèse, nous présentons une approche pour développer des systèmes sûrs de fonctionnement flexibles dont les FTMs peuvent s'adapter à l'exécution de manière agile par des modifications à grain fin pour minimiser l'impact sur l'architecture initiale. D'abord, nous proposons une classification d'un ensemble de FTMs existants basée sur des critères comme le modèle de faute, les caractéristiques de l'application et les ressources nécessaires. Ensuite, nous analysons ces FTMs et extrayons un schéma d'exécution générique identifiant leurs parties communes et leurs points de variabilité. Après, nous démontrons les bénéfices apportés par les outils et les concepts issus du domaine du génie logiciel, comme les intergiciels réflexifs à base de composants, pour développer une librairie de FTMs adaptatifs à grain fin. Nous évaluons l'agilité de l'approche et illustrons son utilité à travers deux exemples d'intégration : premièrement, dans un processus de développement dirigé par le design pour les systèmes ubiquitaires et, deuxièmement, dans un environnement pour le développement d'applications pour des réseaux de capteurs. ABSTRACT : Evolution during service life is mandatory, particularly for long-lived systems. Dependable systems, which continuously deliver trustworthy services, must evolve to accommodate changes e.g., new fault tolerance requirements or variations in available resources. The addition of this evolutionary dimension to dependability leads to the notion of resilient computing. Among the various aspects of resilience, we focus on adaptivity. Dependability relies on fault tolerant computing at runtime, applications being augmented with fault tolerance mechanisms (FTMs). As such, on-line adaptation of FTMs is a key challenge towards resilience. In related work, on-line adaption of FTMs is most often performed in a preprogrammed manner or consists in tuning some parameters. Besides, FTMs are replaced monolithically. All the envisaged FTMs must be known at design time and deployed from the beginning. However, dynamics occurs along multiple dimensions and developing a system for the worst-case scenario is impossible. According to runtime observations, new FTMs can be developed off-line but integrated on-line. We denote this ability as agile adaption, as opposed to the preprogrammed one. In this thesis, we present an approach for developing flexible fault-tolerant systems in which FTMs can be adapted at runtime in an agile manner through fine-grained modifications for minimizing impact on the initial architecture. We first propose a classification of a set of existing FTMs based on criteria such as fault model, application characteristics and necessary resources. Next, we analyze these FTMs and extract a generic execution scheme which pinpoints the common parts and the variable features between them. Then, we demonstrate the use of state-of-the-art tools and concepts from the field of software engineering, such as component-based software engineering and reflective component-based middleware, for developing a library of fine-grained adaptive FTMs. We evaluate the agility of the approach and illustrate its usability throughout two examples of integration of the library: first, in a design-driven development process for applications in pervasive computing and, second, in a toolkit for developing applications for WSNs

    Rule-based semantic sensing platform for activity monitoring

    Get PDF
    Sensors are playing an increasingly important role in our lives, and for these devices to perform to their maximum potential, they need to work together. A single device can provide a single service or a fixed set of services but, when combined with other sensors, different classes of applications become implementable. The vital criterion for this to happen is the ability to bring information from all sensors together, so that all measured physical phenomena can contribute to the solution. Mediation between applications and physical sensors is the responsibility of sensor network middleware (SNM). Rapid growth in the kinds of sensors and applications for sensors/sensor systems, and the consequent importance of sensor network middleware has raised the need to relatively rapidly build engineering applications from those components. A number of SNM exist, each of which attempts to solve the sensor integration problem in a different way. These solutions, based on their ‘closeness’ either to sensors or to applications, can be classified as low-level and high-level. Low-level SNM tends not to focus on making application development easy, while high-level SNM tends to be ‘locked-in’ to a particular set of sensors. We propose a SNM suitable for the task of activity monitoring founded on rules and events, integrated through a semantic event model. The proposed solution is intended to be open at the bottom – to new sensor types; and open at the top – to new applications/user requirements. We show evidence for the effectiveness of this approach in the context of two pilot studies in rehabilitation monitoring – in both hospital and home environment. Moreover, we demonstrate how the semantic event model and rule-based approach promotes verifiability and the ability to validate the system with domain experts

    Harnessing Knowledge, Innovation and Competence in Engineering of Mission Critical Systems

    Get PDF
    This book explores the critical role of acquisition, application, enhancement, and management of knowledge and human competence in the context of the largely digital and data/information dominated modern world. Whilst humanity owes much of its achievements to the distinct capability to learn from observation, analyse data, gain insights, and perceive beyond original realities, the systematic treatment of knowledge as a core capability and driver of success has largely remained the forte of pedagogy. In an increasingly intertwined global community faced with existential challenges and risks, the significance of knowledge creation, innovation, and systematic understanding and treatment of human competence is likely to be humanity's greatest weapon against adversity. This book was conceived to inform the decision makers and practitioners about the best practice pertinent to many disciplines and sectors. The chapters fall into three broad categories to guide the readers to gain insight from generic fundamentals to discipline-specific case studies and of the latest practice in knowledge and competence management
    corecore