4,266 research outputs found

    Emerging sensor-cloud technology for pervasive services and applications

    Full text link
    This is an Editorial article for the Special Issue on "Emerging Sensor-Cloud Technology for Pervasive Services and Applications" of the International Journal of Distributed Sensor Networks

    Planning and Deployment of Wireless Sensor Networks

    Get PDF
    Editorial introduction to special issue on Planning and Deployment of Wireless Sensor Networks published in the International Journal of Distributed Sensor Networks, 9(5). 2014

    Bio-inspired mechanisms in wireless sensor networks

    Full text link
    Khan, S.; Lloret, J.; Macias Lopez, EM. (2015). Bio-inspired mechanisms in wireless sensor networks. International Journal of Distributed Sensor Networks. 2015:1-2. doi:10.1155/2015/173419S12201

    Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

    Get PDF
    Khan, S.; Lloret, J.; Loo, J. (2014). Intrusion Detection and Security Mechanisms for Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2014:1-3. doi:10.1155/2014/747483S13201

    Advanced real-time indoor tracking based on the Viterbi algorithm and semantic data

    Get PDF
    A real-time indoor tracking system based on the Viterbi algorithm is developed. This Viterbi principle is used in combination with semantic data to improve the accuracy, that is, the environment of the object that is being tracked and a motion model. The starting point is a fingerprinting technique for which an advanced network planner is used to automatically construct the radio map, avoiding a time consuming measurement campaign. The developed algorithm was verified with simulations and with experiments in a building-wide testbed for sensor experiments, where a median accuracy below 2 m was obtained. Compared to a reference algorithm without Viterbi or semantic data, the results indicated a significant improvement: the mean accuracy and standard deviation improved by, respectively, 26.1% and 65.3%. Thereafter a sensitivity analysis was conducted to estimate the influence of node density, grid size, memory usage, and semantic data on the performance

    Flying ad-hoc network application scenarios and mobility models

    Get PDF
    [EN] Flying ad-hoc networks are becoming a promising solution for different application scenarios involving unmanned aerial vehicles, like urban surveillance or search and rescue missions. However, such networks present various and very specific communication issues. As a consequence, there are several research studies focused on analyzing their performance via simulation. Correctly modeling mobility is crucial in this context and although many mobility models are already available to reproduce the behavior of mobile nodes in an ad-hoc network, most of these models cannot be used to reliably simulate the motion of unmanned aerial vehicles. In this article, we list the existing mobility models and provide guidance to understand whether they could be actually adopted depending on the specific flying ad-hoc network application scenarios, while discussing their advantages and disadvantages.Bujari, A.; Tavares De Araujo Cesariny Calafate, CM.; Cano, J.; Manzoni, P.; Palazzi, CE.; Ronzani, D. (2017). Flying ad-hoc network application scenarios and mobility models. International Journal of Distributed Sensor Networks. 13(10):1-17. doi:10.1177/1550147717738192S117131

    Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things

    Get PDF
    As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking to add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement a wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of which are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple options for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation shows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in service integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management dashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service developers to more easily implement and deploy services that span a wide variety of IoT application domains

    Radiometric Wireless Sensor Network Monitoring of Partial Discharge Sources in Electrical Substations

    Get PDF
    A wireless sensor network (WSN) with the potential to monitor and locate partial discharge (PD) in high-voltage electricity substations using only received signal strength (RSS) is proposed. The advantages of an RSS-based operating principle over more traditional methods (e.g., time-of-arrival and time-difference-of-arrival) are described. Laboratory measurements of PD that emulate the operation of a PD WSN are presented. The hardware architecture of a prototype PD WSN is described and the particular challenges of an RSS-based location approach in an environment with an unknown, and spatially varying, path-loss index are discussed. It is concluded that an RSS-based PD WSN is a plausible solution for the monitoring of insulation integrity in electricity substations

    Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

    Full text link
    [EN] Intrusion detection system (IDS) is regarded as the second line of defense against network anomalies and threats. IDS plays an important role in network security. There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are widely used for threats detection. This paper presents a critical study on genetic algorithm, artificial immune, and artificial neural network (ANN) based IDSs techniques used in wireless sensor network (WSN)The authors extend their appreciation to the Distinguished Scientist Fellowship Program(DSFP) at King Saud University for funding this research.Alrajeh, NA.; Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2013(351047):1-6. https://doi.org/10.1155/2013/351047S16201335104
    corecore