8,979 research outputs found
Efficient Data Collection in Multimedia Vehicular Sensing Platforms
Vehicles provide an ideal platform for urban sensing applications, as they
can be equipped with all kinds of sensing devices that can continuously monitor
the environment around the travelling vehicle. In this work we are particularly
concerned with the use of vehicles as building blocks of a multimedia mobile
sensor system able to capture camera snapshots of the streets to support
traffic monitoring and urban surveillance tasks. However, cameras are high
data-rate sensors while wireless infrastructures used for vehicular
communications may face performance constraints. Thus, data redundancy
mitigation is of paramount importance in such systems. To address this issue in
this paper we exploit sub-modular optimisation techniques to design efficient
and robust data collection schemes for multimedia vehicular sensor networks. We
also explore an alternative approach for data collection that operates on
longer time scales and relies only on localised decisions rather than
centralised computations. We use network simulations with realistic vehicular
mobility patterns to verify the performance gains of our proposed schemes
compared to a baseline solution that ignores data redundancy. Simulation
results show that our data collection techniques can ensure a more accurate
coverage of the road network while significantly reducing the amount of
transferred data
AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability
Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs)
equipped with wireless transceivers (access points (APs)) are increasingly
being touted as being able to provide a flexible "on-the-fly" communications
infrastructure that can collect and transmit sensor data from sensors in
remote, wilderness, or disaster-hit areas. Recent advances in the mechanical
automation of UAVs have resulted in separable APs and replaceable batteries
that can be carried by UAVs and placed at arbitrary locations in the field.
These advanced mechanized UAV mesh networks pose interesting questions in terms
of the design of the network architecture and the optimal UAV scheduling
algorithms. This paper studies a range of network architectures that depend on
the mechanized automation (AP separation and battery replacement) capabilities
of UAVs and proposes heuristic UAV scheduling algorithms for each network
architecture, which are benchmarked against optimal designs.Comment: 12 page
- …