379 research outputs found
Bibliographic Review on Distributed Kalman Filtering
In recent years, a compelling need has arisen to understand the effects of distributed information structures on estimation and filtering. In this paper, a bibliographical review on distributed Kalman filtering (DKF) is provided.\ud
The paper contains a classification of different approaches and methods involved to DKF. The applications of DKF are also discussed and explained separately. A comparison of different approaches is briefly carried out. Focuses on the contemporary research are also addressed with emphasis on the practical applications of the techniques. An exhaustive list of publications, linked directly or indirectly to DKF in the open literature, is compiled to provide an overall picture of different developing aspects of this area
Synchronization protocols and implementation issues in wireless sensor networks: A review
Time synchronization in wireless sensor networks (WSNs) is a topic that has been attracting the research community in the last decade. Most performance evaluations of the proposed solutions have been limited to theoretical analysis and simulation. They consequently ignored several practical aspects, e.g., packet handling jitters, clock drifting, packet loss, and mote limitations, which affect real implementation on sensor motes. Authors of some pragmatic solutions followed empirical approaches for the evaluation, where the proposed solutions have been implemented on real motes and evaluated in testbed experiments. This paper gives an insight on issues related to the implementation of synchronization protocols in WSN. The challenges related to WSN environment are presented; the importance of real implementation and testbed evaluation are motivated by some experiments we conducted. The most relevant implementations of the literature are then reviewed, discussed, and qualitatively compared. While there are several survey papers that present and compare the protocols from the conception perspectives, as well as others that deal with mathematical and signal processing issues of the estimators, a survey on practical aspects related to the implementation is missing. To our knowledge, this paper is the first one that takes into account the practical aspect of existing solutions
Safety and Security oriented design for reliable Industrial IoT applications based on WSNs
[EN] Internet of Things based technologies are enabling the digital transformation in many sectors. However, in order to use this type of solutions, such as wireless sensor networks, in scenarios like transport, industry or smart cities, the deployed networks must meet sensible safety and security requirements. This article describes a Wireless Sensor Network design that applies multi-layered mechanisms and tools to ensure security, safety and reliability while maintaining usability in Rail and Industrial IoT scenarios. The proposed solution provides guidelines for choosing the best implementations given usual restrictions, offering a modular stack so it can be combined with other solutions.This work has been supported by the SCOTT project (Secure
COnnected Trustable Things) (www.scottproject.eu), which has
received funding from the Electronic Component Systems for
European Leadership Joint Undertaking under grant agreement
No 737422. This Joint Undertaking receives support from the
European Union's Horizon 2020 research and innovation
programme, and from Austria, Spain, Finland, Ireland, Sweden,
Germany, Poland, Portugal, Netherlands, Belgium and Norway.
It has also been funded by Generalitat Valenciana through the
ÂżInstituto Valenciano de Competitividad Empresarial Âż
IVACEÂż, and by the MCyU (Spanish Ministry of Science and
Universities) under the project ATLAS (PGC2018-094151-BI00), which is partially funded by AEI, FEDER and EU.Vera-PĂ©rez, J.; Todoli Ferrandis, D.; Sempere Paya, VM.; Ponce Tortajada, R.; Mujica, G.; Portilla, J. (2019). Safety and Security oriented design for reliable Industrial IoT applications based on WSNs. IEEE. 1774-1781. https://doi.org/10.1109/ETFA.2019.8869204S1774178
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
- …