5 research outputs found

    Redes de Sensores sem Fio Aplicadas à Fisioterapia: Implementação e Validação de um Sistema de Monitoramento de Amplitude de Movimento

    Get PDF
    A amplitude de movimento é um parâmetro importante utilizado na avaliação e durante o tratamento fisioterapêutico. Sistemas disponíveis e utilizados atualmente possuem atuação limitada. A principal contribuição deste trabalho é a especificação, implementação e validação de um sistema de monitoramento, em tempo real, de ângulos articulares baseado em redes de sensores sem fio: FlexMeter. Os nós sensores utilizam acelerômetros para obter as informações de ângulos articulares, e a rede sem fio dá mobilidade ao paciente e ao fisioterapeuta. A validação do sistema incluiu três etapas: validação das medidas com os sensores, validação de usabilidade, e validação de medidas em articulação de joelho. Os resultados da validação demonstraram como o uso do sistema pode facilitar o trabalho do fisioterapeuta

    Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

    Get PDF
    The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system. Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or operating systems versions which had significant progress. Herein, we provide time and energy benchmarks of reference implementations for different platforms and operating systems and analyze their impact. Moreover, we not only give the first benchmark results of symmetric cryptography for the Intel Edison IoT platform but also describe a methodology of how to measure energy consumption on that platform

    Energy consumption tradeoffs in visual sensor networks

    No full text
    Abstract. Visual sensor networks are being increasingly employed as a tool for monitoring and surveillance of wide areas. Due to the relatively high power consumption characteristics of cameras, as well as their more stringent processing, storage, and communication requirements, it is important to carefully evaluate the different modes of operation of these systems, in order to devise energy–aware resource management policies. The ultimate goal is to deliver adequate application–level performance (e.g., maximize the probability of detecting events), yet maximally prolonging the system’s operational lifetime. In this paper we present an accurate power consumption analysis for the different elementary tasks forming the duty cycle of a visual sensor node in a wireless camera network testbed. We also present a number of different duty cycle configurations, and provide direct energy consumption measurements for each one of them. Based on the energy consumption characterization we conducted for the elementary visual sensing tasks, we explore the possibility of predicting the lifetime of a visual sensor network system. 1

    WS3N: Wireless Secure SDN-Based Communication for Sensor Networks

    No full text
    The Software Defined Networking (SDN) paradigm can provide flexible routing and potentially support the different communication patterns that exist in Wireless Sensor Networks (WSN). However applying this paradigm to resource-constrained networks is not straightforward, especially if security services are a requirement. Existing SDN-based approaches for WSN evolved over time, addressing resource-constrained requirements. However, they do not integrate security services into their design and implementation. This work’s main contribution is a secure-by-design SDN-based framework for Wireless Sensors Networks. Secure node admission and end-to-end key distribution to support secure communication are considered key services, which the framework must provide. We describe its specification, design, implementation, and experiments considering device and protocol constraints. The results indicate that our approach has achieved such goals with acceptable overheads up to medium sized networks
    corecore