4,332 research outputs found
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
An evaluation of break-the-glass access control model for medical data in wireless sensor networks
Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. The collected data from sensor nodes can vary based on what kind of application is used for WSNs. Data confidentiality and access control to that collected data are the most challenging issues in WSNs because the users are able to access data from the different location via ad-hoc manner. Access control is one of the critical requirements to prevent unauthorised access from users. The current access control models in information systems cannot be applied straightforwardly because of some limitations namely limited energy, resource and memory, and low computation capability. Based on the requirements of WSNs, we proposed the Break-The-Glass Access Control (BTG-AC) model which is the modified and redesigned version of Break-The-Glass Role-Based Access Control (BTG-RBAC) model. The several changes within the access control engine are made in BTG-RBAC to apply and fit in WSNs. We developed the BTG-AC model in Ponder2 package. Also a medical scenario was developed to evaluate the BTG-AC model for medical data in WSNs. In this paper, detail design, implementation phase, evaluation result and policies evaluation for the BTG-AC model are presented. Based on the evaluation result, the BTG-AC model can be used in WSNs after several modifications have been made under Ponder2 Package
Building Programmable Wireless Networks: An Architectural Survey
In recent times, there have been a lot of efforts for improving the ossified
Internet architecture in a bid to sustain unstinted growth and innovation. A
major reason for the perceived architectural ossification is the lack of
ability to program the network as a system. This situation has resulted partly
from historical decisions in the original Internet design which emphasized
decentralized network operations through co-located data and control planes on
each network device. The situation for wireless networks is no different
resulting in a lot of complexity and a plethora of largely incompatible
wireless technologies. The emergence of "programmable wireless networks", that
allow greater flexibility, ease of management and configurability, is a step in
the right direction to overcome the aforementioned shortcomings of the wireless
networks. In this paper, we provide a broad overview of the architectures
proposed in literature for building programmable wireless networks focusing
primarily on three popular techniques, i.e., software defined networks,
cognitive radio networks, and virtualized networks. This survey is a
self-contained tutorial on these techniques and its applications. We also
discuss the opportunities and challenges in building next-generation
programmable wireless networks and identify open research issues and future
research directions.Comment: 19 page
Data storage solutions for the federation of sensor networks
In the near future, most of our everyday devices will be accessible via some
network and uniquely identified for interconnection over the Internet. This
new paradigm, called Internet of Things (IoT), is already starting to influence
our society and is now driving developments in many areas.
There will be thousands, or even millions, of constrained devices that will
be connected using standard protocols, such as Constrained Application Protocol
(CoAP), that have been developed under certain specifications appropriate
for this type of devices. In addition, there will be a need to interconnect
networks of constrained devices in a reliable and scalable way, and federations
of sensor networks using the Internet as a medium will be formed.
To make the federation of geographically distributed CoAP based sensor
networks possible, a CoAP Usage for REsource LOcation And Discovery (RELOAD)
was recently proposed. RELOAD is a peer-to-peer (P2P) protocol that
ensures an abstract storage and messaging service to its clients, and it relies
on a set of cooperating peers that form a P2P overlay network for this purpose.
This protocol allows to define so-called Usages for applications to work
on top of this overlay network. The CoAP Usage for RELOAD is, therefore,
a way for CoAP based devices to store their resources in a distributed P2P
overlay. Although CoAP Usage for RELOAD is an important step towards
the federation of sensor networks, in the particular case of IoT there will be
consistency and efficiency problems. This happens because the resources of
CoAP devices/Things can be in multiple data objects stored at the overlay network,
called P2P resources. Thus, Thing resource updates can end up being
consuming, as multiple P2P resources will have to be modified. Mechanisms
to ensure consistency become, therefore, necessary.
This thesis contributes to advances in the federation of sensor networks by
proposing mechanisms for RELOAD/CoAP architectures that will allow consistency
to be ensured. An overlay network service, required for such mechanisms
to operate, is also proposed.Num futuro prĂłximo, a maioria dos nossos dispositivos do dia-a-dia estarĂŁo
acessĂveis atravĂ©s de uma rede e serĂŁo identificados de forma Ășnica para
poderem interligar-se através da Internet. Este novo paradigma, conhecido
hoje por Internet das Coisas (IoT), jå estå a começar a influenciar a nossa
sociedade e estĂĄ agora a impulsionar desenvolvimentos em inĂșmeras ĂĄreas.
Teremos milhares, ou mesmo milhÔes, de dispositivos restritos que utilizarão protocolos padrão que foram desenvolvidos de forma a cumprir determinadas
especificaçÔes associadas a este tipo de dispositivos, especificaçÔes essas
que tĂȘm a ver com o facto destes dispositivos terem normalmente restriçÔes
de memória, pouca capacidade de processamento e muitos possuirem limitaçÔes
energéticas. Surgirå ainda a necessidade de interligar, de forma fiåvel e
escalonĂĄvel, redes de dispositivos restritos.(âŠ
Department of Computer Science Activity 1998-2004
This report summarizes much of the research and teaching activity of the Department of Computer Science at Dartmouth College between late 1998 and late 2004. The material for this report was collected as part of the final report for NSF Institutional Infrastructure award EIA-9802068, which funded equipment and technical staff during that six-year period. This equipment and staff supported essentially all of the department\u27s research activity during that period
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by âopen networksâ, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings
Optimization of Energy Aware Path Routing Protocol in Wireless Sensor Networks
Strength conservation is one of the biggest challenges to the successful WSNs since the tiny very limited resource nodes such as energy, memory space| as well as communication and computation capabilities. the sensors are unattended Implemented and battery recharge is almost impossible. So many investigations have be done in redirecting energy efficient algorithms or protocols for WSNs. Our reasons behinds the study of number is based on the following three aspects. Initially of all First, we see That immediate transmittal is employed under small scale while multi-hop network transmittal network is employed under mass. All of us want to find the Which factors influence the transmittal manner. Second, it is Commonly That multi-hop agree transmitting more energy efficient than Usually transmitting When the average solitary source to destination distance is large. Yet ,}how to look for the optimal hop number in order That the overall energy consumption is nominal is not well tackled. Third, the hot location phenomenon the networking lifetime influences directly. After that all of us recommend to Optimization of energy aware routing path (OEAPR) algorithm, Which incorporate the overall routing mechanism With hop-based direction-finding nature During process in WSNs
Runtime variability for dynamic reconfiguration in wireless sensor network product lines
Runtime variability is a key technique for the success of Dynamic Software Product Lines (DSPLs), as certain application demand reconfiguration of system features and execution plans at runtime. In this emerging research work we address the problem of dynamic changes in feature models in sensor networks product families, where nodes of the network demand dynamic reconfiguration at post-deployment time
- âŠ