51 research outputs found
Connecting Soil to the Cloud: A Wireless Underground Sensor Network Testbed
In this demo, a novel underground communication system and an online underground sensor network testbed is demonstrated. The underground communication system, developed in the Cyber-physical Networking (CPN) Laboratory at the University of Nebraska-Lincoln, includes an underground antenna that is tailored to mitigate the adverse effects of soil on underground communication. An online connection is established with the CPN underground sensor network testbed that is located at Clay Center, Nebraska. The underground sensor network testbed consists of a network of underground communication systems equipped with soil moisture sensors and a mobile data harvesting unit equipped with cellular communication capabilities. Real-time soil moisture data delivery from Nebraska to Korea is demonstrated
Connecting Soil to the Cloud: A Wireless Underground Sensor Network Testbed
In this demo, a novel underground communication system and an online underground sensor network testbed is demonstrated. The underground communication system, developed in the Cyber-physical Networking (CPN) Laboratory at the University of Nebraska-Lincoln, includes an underground antenna that is tailored to mitigate the adverse effects of soil on underground communication. An online connection is established with the CPN underground sensor network testbed that is located at Clay Center, Nebraska. The underground sensor network testbed consists of a network of underground communication systems equipped with soil moisture sensors and a mobile data harvesting unit equipped with cellular communication capabilities. Real-time soil moisture data delivery from Nebraska to Korea is demonstrated
Recommended from our members
Research Findings on Wormhole Attack Detection in Mobile Ad Hoc Networks
The Internet is moving from the traditional desktop network paradigm to a ubiquitous paradigm where a multitude of small computing devices such as computer chips and smart sensors are involved in daily activities and routines. This means that a rapidly growing amount of devices are connected to the Internet. At the same time, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity since they provide a possibility for mobile devices to share information with each other without being dependent on a core infrastructure. Routing security in MANETs is, however, a significant challenge to wide scale adoption. One of the most severe security threats to MANET routing is the wormhole attack due to its ability to disrupt a significant proportion of network traffic, while simultaneously being difficult to detect. This paper provides an overview of recent research findings on wormhole attack detection in MANETs collected from a joint research project with Arcada University of Applied Sciences in Finland and The Open University, UK
An Automatic Indirect Immunofluorescence Cell Segmentation System
Indirect immunofluorescence (IIF) with HEp-2 cells has been used for the detection of antinuclear autoantibodies (ANA) in systemic autoimmune diseases. The ANA testing allows us to scan a broad range of autoantibody entities and to describe them by distinct fluorescence patterns. Automatic inspection for fluorescence patterns in an IIF image can assist physicians, without relevant experience, in making correct diagnosis. How to segment the cells from an IIF image is essential in developing an automatic inspection system for ANA testing. This paper focuses on the cell detection and segmentation; an efficient method is proposed for automatically detecting the cells with fluorescence pattern in an IIF image. Cell culture is a process in which cells grow under control. Cell counting technology plays an important role in measuring the cell density in a culture tank. Moreover, assessing medium suitability, determining population doubling times, and monitoring cell growth in cultures all require a means of quantifying cell population. The proposed method also can be used to count the cells from an image taken under a fluorescence microscope
MORA: an Energy-Aware Slack Reclamation Scheme for Scheduling Sporadic Real-Time Tasks upon Multiprocessor Platforms
In this paper, we address the global and preemptive energy-aware scheduling
problem of sporadic constrained-deadline tasks on DVFS-identical multiprocessor
platforms. We propose an online slack reclamation scheme which profits from the
discrepancy between the worst- and actual-case execution time of the tasks by
slowing down the speed of the processors in order to save energy. Our algorithm
called MORA takes into account the application-specific consumption profile of
the tasks. We demonstrate that MORA does not jeopardize the system
schedulability and we show by performing simulations that it can save up to 32%
of energy (in average) compared to execution without using any energy-aware
algorithm.Comment: 11 page
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. More recently, biometric information has been used for authentication schemes. Das proposed a biometric-based authentication scheme, but it has various vulnerabilities. Jiping et al. improved Dasâs scheme, but some vulnerabilities remain. In this paper, we analyze the cryptanalysis of Jiping et al.âs authentication scheme and propose the security enhanced biometric-based user authentication scheme for the C/S System
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
A wireless medical sensor network (WMSN) can sense humansâ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionalsâ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patientsâ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs
A Novel Design of an Automatic Lighting Control System for a Wireless Sensor Network with Increased Sensor Lifetime and Reduced Sensor Numbers
Wireless sensor networks (WSN) are currently being applied to energy conservation applications such as light control. We propose a design for such a system called a Lighting Automatic Control System (LACS). The LACS system contains a centralized or distributed architecture determined by application requirements and space usage. The system optimizes the calculations and communications for lighting intensity, incorporates user illumination requirements according to their activities and performs adjustments based on external lighting effects in external sensor and external sensor-less architectures. Methods are proposed for reducing the number of sensors required and increasing the lifetime of those used, for considerably reduced energy consumption. Additionally we suggest methods for improving uniformity of illuminance distribution on a workplaneâs surface, which improves user satisfaction. Finally simulation results are presented to verify the effectiveness of our design
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals
- âŠ