392 research outputs found
Underground Mining Monitoring and Communication Systems based on ZigBee and GIS
ZigBee as a wireless sensor network (WSN) was developed for underground mine monitoring and communication systems. The radio wave attenuations between ZigBee nodes were investigated to measure underground communication distances. Various sensor node arrangements of ZigBee topologies were evaluated. A system integration of a WSN-assisted GIS for underground mining monitoring and communication from a surface office was proposed. The controllable and uncontrollable parameters of underground environments were assessed to establish a reliable ZigBee network
Wireless Sensor Networks Formation: Approaches and Techniques
Nowadays, wireless sensor networks (WSNs) emerge as an active research area in which challenging topics involve energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, efficiency, and so forth. Despite the open problems in WSNs, there are already a high number of applications available. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. A key factor in this is the way the network is formed. This survey presents most recent formation techniques and mechanisms for the WSNs. In this paper, the reviewed works are classified into distributed and centralized techniques. The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not. We focus on recent works and present a discussion of their advantages and drawbacks. Finally, the paper overviews a series of open issues which drive further research in the area
A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks
In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
Dynamic cluster scheduling for cluster-tree WSNs
While Cluster-Tree network topologies look promising for WSN applications with timeliness and energy-efficiency requirements, we are yet to witness its adoption in commercial and academic solutions. One of the arguments that hinder the use of these topologies concerns the lack of flexibility in adapting to changes in the network, such as in traffic flows.
This paper presents a solution to enable these networks with the ability to self-adapt their clusters’ duty-cycle and scheduling, to provide increased quality of service to multiple traffic flows. Importantly, our approach enables a network to change its cluster scheduling without requiring long inaccessibility times or the re-association of the nodes. We show how to apply our methodology to the case of IEEE 802.15.4/ZigBee cluster-tree WSNs without significant changes to the protocol. Finally, we analyze and demonstrate the validity of our methodology through a comprehensive simulation and experimental validation using commercially available technology on a Structural Health Monitoring application scenario
Multi-channel TDMA scheduling in wireless sensor networks
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science of Bilkent Univ., 2013.Thesis (Master's) -- Bilkent University, 2013.Includes bibliographical references leaves 55-61.The Multiple Instance Learning (MIL) paradigm arises to be useful in many application
domains, whereas it is particularly suitable for computer vision problems
due to the difficulty of obtaining manual labeling. Multiple Instance Learning
methods have large applicability to a variety of challenging learning problems
in computer vision, including object recognition and detection, tracking, image
classification, scene classification and more.
As opposed to working with single instances as in standard supervised learning,
Multiple Instance Learning operates over bags of instances. A bag is labeled
as positive if it is known to contain at least one positive instance; otherwise it
is labeled as negative. The overall learning task is to learn a model for some
concept using a training set that is formed of bags. A vital component of using
Multiple Instance Learning in computer vision is its design for abstracting the
visual problem to multi-instance representation, which involves determining what
the bag is and what are the instances in the bag.
In this context, we consider three different computer vision problems and
propose solutions for each of them via novel representations. The first problem
is image retrieval and re-ranking; we propose a method that automatically
constructs multiple candidate Multi-instance bags, which are likely to contain
relevant images. The second problem we look into is recognizing actions from
still images, where we extract several candidate object regions and approach the
problem of identifying related objects from a weakly supervised point of view.
Finally, we address the recognition of human interactions in videos within a MIL
framework. In human interaction recognition, videos may be composed of frames
of different activities, and the task is to identify the interaction in spite of irrelevant
activities that are scattered through the video. To overcome this problem,
we use the idea of Multiple Instance Learning to tackle irrelevant actions in the
whole video sequence classification. Each of the outlined problems are tested
on benchmark datasets of the problems and compared with the state-of-the-art.
The experimental results verify the advantages of the proposed MIL approaches
to these vision problems.Uyanık, ÖzgeM.S
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful
energy awareness is essential when working with these devices.
Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features.
This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols.
The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and
has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference
publications in IEEE Explore and one workshop paper
- …