14,181 research outputs found
Automatic Fire Detection: A Survey from Wireless Sensor Network Perspective
Automatic fire detection is important for early detection and promptly extinguishing fire. There are ample studies investigating the best sensor combinations and appropriate techniques for early fire detection. In the previous studies fire detection has either been considered as an application of a certain field (e.g., event detection for wireless sensor networks) or the main concern for which techniques have been specifically designed (e.g., fire detection using remote sensing techniques). These different approaches stem from different backgrounds of researchers dealing with fire, such as computer science, geography and earth observation, and fire safety. In this report we survey previous studies from three perspectives: (1) fire detection techniques for residential areas, (2) fire detection techniques for forests, and (3) contributions of sensor networks to early fire detection
A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks
The study of forest fires has been traditionally considered as an important
application due to the inherent danger that this entails. This phenomenon
takes place in hostile regions of difficult access and large areas. Introduction of
new technologies such as Wireless Sensor Networks (WSNs) has allowed us to
monitor such areas. In this paper, an intelligent system for fire prediction based
on wireless sensor networks is presented. This system obtains the probability of
fire and fire behavior in a particular area. This information allows firefighters to
obtain escape paths and determine strategies to fight the fire. A firefighter can
access this information with a portable device on every node of the network. The
system has been evaluated by simulation analysis and its implementation is being
done in a real environment.Junta de Andalucía P07-TIC-02476Junta de Andalucía TIC-570
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
Target Tracking in Confined Environments with Uncertain Sensor Positions
To ensure safety in confined environments such as mines or subway tunnels, a
(wireless) sensor network can be deployed to monitor various environmental
conditions. One of its most important applications is to track personnel,
mobile equipment and vehicles. However, the state-of-the-art algorithms assume
that the positions of the sensors are perfectly known, which is not necessarily
true due to imprecise placement and/or dropping of sensors. Therefore, we
propose an automatic approach for simultaneous refinement of sensors' positions
and target tracking. We divide the considered area in a finite number of cells,
define dynamic and measurement models, and apply a discrete variant of belief
propagation which can efficiently solve this high-dimensional problem, and
handle all non-Gaussian uncertainties expected in this kind of environments.
Finally, we use ray-tracing simulation to generate an artificial mine-like
environment and generate synthetic measurement data. According to our extensive
simulation study, the proposed approach performs significantly better than
standard Bayesian target tracking and localization algorithms, and provides
robustness against outliers.Comment: IEEE Transactions on Vehicular Technology, 201
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
- …