394 research outputs found
Multi-channel Distributed MAC protocol for WSN-based wildlife monitoring
International audienceSeveral wild animal species are endangered by poaching. As a solution, deploying wireless sensors on animals able to send regular messages and also alert messages has been envisaged recently by several authorities and foundations. In that context, this paper proposes WildMAC, a multichannel, multihop wireless communication protocol for these specific wireless sensor networks that have to collect data from unknown large areas with different QoS requirements. WildMAC is a TDMA based MAC protocol that leverages long range communication properties to propose an efficient data collection mean. Its performance evaluation shows it meets QoS requirements
A Comprehensive Survey on Networking over TV White Spaces
The 2008 Federal Communication Commission (FCC) ruling in the United States
opened up new opportunities for unlicensed operation in the TV white space
spectrum. Networking protocols over the TV white spaces promise to subdue the
shortcomings of existing short-range multi-hop wireless architectures and
protocols by offering more availability, wider bandwidth, and longer-range
communication. The TV white space protocols are the enabling technologies for
sensing and monitoring, Internet-of-Things (IoT), wireless broadband access,
real-time, smart and connected community, and smart utility applications. In
this paper, we perform a retrospective review of the protocols that have been
built over the last decade and also the new challenges and the directions for
future work. To the best of our knowledge, this is the first comprehensive
survey to present and compare existing networking protocols over the TV white
spaces.Comment: 19 page
Keberkesanan program simulasi penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan elektrik
Kefahaman merupakan aset bagi setiap pelajar. Ini kerana melalui
kefahaman pelajar dapat mengaplikasikan konsep yang dipelajari di dalam dan di
luar kelas. Kajian ini dijalankan bertujuan menilai keberkesanan program simulasi
penapis sambutan dedenyut terhingga (FIR) terhadap kefahaman pelajar kejuruteraan
elektrik FKEE, UTHM dalam mata pelajaran Pemprosesan Isyarat Digital (DSP)
bagi topik penapis FIR. Metodologi kajian ini berbentuk kaedah reka bentuk kuasi�eksperimental ujian pra-pasca bagi kumpulan-kumpulan tidak seimbang. Seramai 40
responden kajian telah dipilih dan dibahagi secara rawak kepada dua kllmpulan iaitu
kumpulan rawatan yang menggunakan program simulasi penapis FIR dan kumpulan
kawalan yang menggunakan kaedah pembelajaran berorientasikan modul
pembelajaran DSP UTHM. Setiap responden menduduki dua ujian pencapaian iaitu
ujian pra dan ujian pasca yang berbentuk kuiz. Analisis data berbentuk deskriptif
dan inferens dilakllkan dengan menggunakan Peri sian Statistical Package for Social
Science (SPSS) versi 11.0. Dapatan kajian menunjukkan kedua-dua kumpulan
pelajar telah mengalami peningkatan dari segi kefahaman iaitu daripada tahap tidak
memuaskan kepada tahap kepujian selepas menggunakan kaedah pembelajaran yang
telah ditetapkan bagi kumpulan masing-masing. Walaubagaimanapun, pelajar
kumpulan rawatan menunjukkan peningkatan yang lebih tinggi sedikit berbanding
pelajar kumpulan kawalan. Namun begitu, dapatan kajian secara ujian statistik
menunjukkan tidak terdapat perbezaan yang signifikan dari segi pencapaian markah
ujian pasca di antara pelajar kumpulan rawatan dengan pelajar kumpulan kawalan.
Sungguhpun begitu, penggunaan program simulasi penapis FIR telah membantu
dalam peningkatan kefahaman pelajar mengenai topik penapis FIR
DESIGN OF MOBILE DATA COLLECTOR BASED CLUSTERING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSNs) consisting of hundreds or even thousands of
nodes, canbe used for a multitude of applications such as warfare intelligence or to
monitor the environment. A typical WSN node has a limited and usually an
irreplaceable power source and the efficient use of the available power is of utmost
importance to ensure maximum lifetime of eachWSNapplication. Each of the nodes
needs to transmit and communicate sensed data to an aggregation point for use by
higher layer systems. Data and message transmission among nodes collectively
consume the largest amount of energy available in WSNs. The network routing
protocols ensure that every message reaches thedestination and has a direct impact on
the amount of transmissions to deliver messages successfully. To this end, the
transmission protocol within the WSNs should be scalable, adaptable and optimized
to consume the least possible amount of energy to suite different network
architectures and application domains. The inclusion of mobile nodes in the WSNs
deployment proves to be detrimental to protocol performance in terms of nodes
energy efficiency and reliable message delivery. This thesis which proposes a novel
Mobile Data Collector based clustering routing protocol for WSNs is designed that
combines cluster based hierarchical architecture and utilizes three-tier multi-hop
routing strategy between cluster heads to base station by the help of Mobile Data
Collector (MDC) for inter-cluster communication. In addition, a Mobile Data
Collector based routing protocol is compared with Low Energy Adaptive Clustering
Hierarchy and A Novel Application Specific Network Protocol for Wireless Sensor
Networks routing protocol. The protocol is designed with the following in mind:
minimize the energy consumption of sensor nodes, resolve communication holes
issues, maintain data reliability, finally reach tradeoff between energy efficiency and
latency in terms of End-to-End, and channel access delays. Simulation results have
shown that the Mobile Data Collector based clustering routing protocol for WSNs
could be easily implemented in environmental applications where energy efficiency of
sensor nodes, network lifetime and data reliability are major concerns
Security in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) pose a new challenge to network designers in the area of developing better and secure routing protocols. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design time. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. The security issues posed by sensor networks represent a rich field of research problems. Improving network hardware and software may address many of the issues, but others will require new supporting technologies. With the recent surge in the use of sensor networks, for example, in ubiquitous computing and body sensor networks (BSNs) the need for security mechanisms has a more important role. Recently proposed solutions address but a small subset of current sensor network attacks. Also because of the special battery requirements for such networks, normal cryptographic network solutions are irrelevant. New mechanisms need to be developed to address this type of network
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
Energy efficient wireless sensor network communications based on computational intelligent data fusion for environmental monitoring
The study presents a novel computational intelligence algorithm designed to optimise energy consumption in an
environmental monitoring process: specifically, water level measurements in flooded areas. This algorithm aims to obtain a tradeoff
between accuracy and power consumption. The implementation constitutes a data aggregation and fusion in itself. A harsh
environment can make the direct measurement of flood levels a difficult task. This study proposes a flood level estimation,
inferred through the measurement of other common environmental variables. The benefit of this algorithm is tested both with
simulations and real experiments conducted in Donñana, a national park in southern Spain where flood level measurements have
traditionally been done manually.Junta de AndalucÃa P07-TIC-0247
- …