518 research outputs found

    ZigBee(2.4G) Wireless Sensor Network Application on Indoor Intrusion Detection

    Get PDF
    [[sponsorship]]IEEE[[conferencetype]]國際[[conferencedate]]20150606~20150608[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]台灣/台北 國立臺灣科技大

    RSSI Based Indoor Passive Localization for Intrusion Detection and Tracking

    Get PDF
    A real time system for intrusion detection and tracking based on wireless sensor network technology is designed by using the IITH mote which is de- veloped and designed in IIT Hyderabad as the communication module in the network.This paper describes the Device-Free Passive Localization system based on RSSI.The main objective of this paper is to design a DFP Local- ization system that is easily redeployable, recon�gurable, easy to use, and operates in real time. In addition the detection of humans is to be done.The em- bedded intrusion detection algorithm is designed so that it is able to cope with the limited resources, in terms of computational power and available memory space, of the microcontroller unit (MCU) found in the nodes. and various challenges and problem faced during the real test bed deployment and also proposed solutions to overcome them.We presented an alternative algo- rithm based on the minimum Euclidean distance classi�er.our result shows that the localization accuracy of this system is increased when using the proposed algorith

    Channel State Information from pure communication to sense and track human motion: A survey

    Get PDF
    Human motion detection and activity recognition are becoming vital for the applications in smart homes. Traditional Human Activity Recognition (HAR) mechanisms use special devices to track human motions, such as cameras (vision-based) and various types of sensors (sensor-based). These mechanisms are applied in different applications, such as home security, Human–Computer Interaction (HCI), gaming, and healthcare. However, traditional HAR methods require heavy installation, and can only work under strict conditions. Recently, wireless signals have been utilized to track human motion and HAR in indoor environments. The motion of an object in the test environment causes fluctuations and changes in the Wi-Fi signal reflections at the receiver, which result in variations in received signals. These fluctuations can be used to track object (i.e., a human) motion in indoor environments. This phenomenon can be improved and leveraged in the future to improve the internet of things (IoT) and smart home devices. The main Wi-Fi sensing methods can be broadly categorized as Received Signal Strength Indicator (RSSI), Wi-Fi radar (by using Software Defined Radio (SDR)) and Channel State Information (CSI). CSI and RSSI can be considered as device-free mechanisms because they do not require cumbersome installation, whereas the Wi-Fi radar mechanism requires special devices (i.e., Universal Software Radio Peripheral (USRP)). Recent studies demonstrate that CSI outperforms RSSI in sensing accuracy due to its stability and rich information. This paper presents a comprehensive survey of recent advances in the CSI-based sensing mechanism and illustrates the drawbacks, discusses challenges, and presents some suggestions for the future of device-free sensing technology

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis

    Advanced real-time indoor tracking based on the Viterbi algorithm and semantic data

    Get PDF
    A real-time indoor tracking system based on the Viterbi algorithm is developed. This Viterbi principle is used in combination with semantic data to improve the accuracy, that is, the environment of the object that is being tracked and a motion model. The starting point is a fingerprinting technique for which an advanced network planner is used to automatically construct the radio map, avoiding a time consuming measurement campaign. The developed algorithm was verified with simulations and with experiments in a building-wide testbed for sensor experiments, where a median accuracy below 2 m was obtained. Compared to a reference algorithm without Viterbi or semantic data, the results indicated a significant improvement: the mean accuracy and standard deviation improved by, respectively, 26.1% and 65.3%. Thereafter a sensitivity analysis was conducted to estimate the influence of node density, grid size, memory usage, and semantic data on the performance

    Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Get PDF
    Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Traditional bit-layer defenses including encryption keys and MAC address control lists are vulnerable to extraction and identity spoofing, respectively. This dissertation explores three novel strategies to leverage the wireless physical layer to improve security in low-rate wireless personal area networks. The first, physical layer protocol manipulation, identifies true transceiver design within remote devices through analysis of replies in response to packets transmitted with modified physical layer headers. Results herein demonstrate a methodology that correctly differentiates among six IEEE 802.15.4 transceiver classes with greater than 99% accuracy, regardless of claimed bit-layer identity. The second strategy, radio frequency fingerprinting, accurately identifies the true source of every wireless transmission in a network, even among devices of the same design and manufacturer. Results suggest that even low-cost signal collection receivers can achieve greater than 90% authentication accuracy within a defense system based on radio frequency fingerprinting. The third strategy, based on received signal strength quantification, can be leveraged to rapidly locate suspicious transmission sources and to perform physical security audits of critical networks. Results herein reduce mean absolute percentage error of a widely-utilized distance estimation model 20% by examining signal strength measurements from real-world networks in a military hospital and a civilian hospital

    mTOSSIM: A simulator that estimates battery lifetime in wireless sensor networks

    Get PDF
    Knowledge of the battery lifetime of the wireless sensor network is important for many situations, such as in evaluation of the location of nodes or the estimation of the connectivity, along time, between devices. However, experimental evaluation is a very time-consuming task. It depends on many factors, such as the use of the radio transceiver or the distance between nodes. Simulations reduce considerably this time. They allow the evaluation of the network behavior before its deployment. This article presents a simulation tool which helps developers to obtain information about battery state. This simulator extends the well-known TOSSIM simulator. Therefore it is possible to evaluate TinyOS applications using an accurate model of the battery consumption and its relation to the radio power transmission. Although an specific indoor scenario is used in testing of simulation, the simulator is not limited to this environment. It is possible to work in outdoor scenarios too. Experimental results validate the proposed model.Junta de Andalucía P07-TIC-02476Junta de Andalucía TIC-570

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
    corecore