14,181 research outputs found

    Automatic Fire Detection: A Survey from Wireless Sensor Network Perspective

    Get PDF
    Automatic fire detection is important for early detection and promptly extinguishing fire. There are ample studies investigating the best sensor combinations and appropriate techniques for early fire detection. In the previous studies fire detection has either been considered as an application of a certain field (e.g., event detection for wireless sensor networks) or the main concern for which techniques have been specifically designed (e.g., fire detection using remote sensing techniques). These different approaches stem from different backgrounds of researchers dealing with fire, such as computer science, geography and earth observation, and fire safety. In this report we survey previous studies from three perspectives: (1) fire detection techniques for residential areas, (2) fire detection techniques for forests, and (3) contributions of sensor networks to early fire detection

    A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks

    Get PDF
    The study of forest fires has been traditionally considered as an important application due to the inherent danger that this entails. This phenomenon takes place in hostile regions of difficult access and large areas. Introduction of new technologies such as Wireless Sensor Networks (WSNs) has allowed us to monitor such areas. In this paper, an intelligent system for fire prediction based on wireless sensor networks is presented. This system obtains the probability of fire and fire behavior in a particular area. This information allows firefighters to obtain escape paths and determine strategies to fight the fire. A firefighter can access this information with a portable device on every node of the network. The system has been evaluated by simulation analysis and its implementation is being done in a real environment.Junta de Andalucía P07-TIC-02476Junta de Andalucía TIC-570

    Intrusion Detection System for Platooning Connected Autonomous Vehicles

    Get PDF
    The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks

    Target Tracking in Confined Environments with Uncertain Sensor Positions

    Get PDF
    To ensure safety in confined environments such as mines or subway tunnels, a (wireless) sensor network can be deployed to monitor various environmental conditions. One of its most important applications is to track personnel, mobile equipment and vehicles. However, the state-of-the-art algorithms assume that the positions of the sensors are perfectly known, which is not necessarily true due to imprecise placement and/or dropping of sensors. Therefore, we propose an automatic approach for simultaneous refinement of sensors' positions and target tracking. We divide the considered area in a finite number of cells, define dynamic and measurement models, and apply a discrete variant of belief propagation which can efficiently solve this high-dimensional problem, and handle all non-Gaussian uncertainties expected in this kind of environments. Finally, we use ray-tracing simulation to generate an artificial mine-like environment and generate synthetic measurement data. According to our extensive simulation study, the proposed approach performs significantly better than standard Bayesian target tracking and localization algorithms, and provides robustness against outliers.Comment: IEEE Transactions on Vehicular Technology, 201

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Full text link
    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.Comment: Survey, 22 Pages, 21 Figure
    corecore