14,572 research outputs found
Detailed Diagnosis of Performance Anomalies in Sensornets
We address the problem of analysing performance anomalies in sensor networks. In this paper, we propose an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. Our results show not only that this is a feasible method but that the overhead is significantly lower than that of communication-centric methods, and that interesting patterns can be revealed when calculating the correlation of large data sets of separate event types.GINSENGCONE
Recent Advances in Joint Wireless Energy and Information Transfer
In this paper, we provide an overview of the recent advances in
microwave-enabled wireless energy transfer (WET) technologies and their
applications in wireless communications. Specifically, we divide our
discussions into three parts. First, we introduce the state-of-the-art WET
technologies and the signal processing techniques to maximize the energy
transfer efficiency. Then, we discuss an interesting paradigm named
simultaneous wireless information and power transfer (SWIPT), where energy and
information are jointly transmitted using the same radio waveform. At last, we
review the recent progress in wireless powered communication networks (WPCN),
where wireless devices communicate using the power harvested by means of WET.
Extensions and future directions are also discussed in each of these areas.Comment: Conference submission accepted by ITW 201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …