145 research outputs found

    A Light on Physiological Sensors for Efficient Driver Drowsiness Detection System

    Get PDF
    International audienceThe significant advance in bio-sensor technologies hold promise to monitor human physiologicalsignals in real time. In the context of public safety, such technology knows notable research investigations toobjectively detect early stage of driver drowsiness that impairs driver performance under various conditions.Seeking for low-cost, compact yet reliable sensing technology that can provide a solution to drowsy stateproblem is challenging. While some enduring solutions have been available as prototypes for a while, many ofthese technologies are now in the development, validation testing, or even commercialization stages. Thecontribution of this paper is to assess current progress in the development of bio-sensors based driver drowsinessdetection technologies and study their fundamental specifications to achieve accuracy requirements. Existingmarket and research products are then ranked following the discussed specifications. The finding of this work isto provide a methodology to facilitate making the appropriate hardware choice to implement efficient yet lowcostdrowsiness detection system using existing market physiological based sensors

    Adaptive Reliable Routing Protocol for Wireless Sensor Networks

    Get PDF
    International audienceMany Wireless Sensor Networks (WSN) applications success is contingent upon the reliable delivery of high-priority events from many scattered sensors to one or more sink nodes. In particular, WSN has to be self-adaptive and resilient to errors by providing efficient mechanisms for information distribution especially in the multi-hop scenario. To meet the stringent requirement of reliably transmitting data, we propose a lightweight and energy-efficient joint mechanism for packet loss recovery and route quality awareness in WSNs. In this protocol, we use the overhearing feature characterizing the wireless channels as an implicit acknowledgment (ACK) mechanism. In addition, the protocol allows for an adaptive selection of the routing path, based on a collective cooperation within neighborhood

    IP Multicast Security

    Get PDF
    Support de cours.With emerging of new cooperative applications, the group communication is clearly become a very important concept within the network architecture. The multicast transmission is appeared as the most efficient way to send some data to a specific group composed of several participants like used in multimedia applications (audio and video conferences, video diffusion,...) But today, we can see that commercial multicast deployment is not a reality yet. This model presents some limits such as: scalable routing problems, address allocation problems and mainly security issues because any host can send data to IP multicast address and any host can join Nowadays the increasing interest in network communication through the using of the Internet requires some services such as authentication, integrity and confidentiality to transport securely data. The lack of security in multicast communications is essentially due to the difficulty to develop solutions which are efficient and fault tolerant. In our tutorial, we present : * Security issues within group communications and why the approaches to secure the unicast communications cannot be directly applied to group communications. * Research work related to key management and key distribution. * Research work related to source authentication. * Fault tolerance within group communications

    Fast restoration of Connectivity for Wireless Sensor Networks

    Get PDF
    International audienceNode failures represent a fundamental problem in wireless sensor networks. Such failures may result in partitioned networks and lose of sensed information. A network recovery approach is thus necessary in order to ensure continuous network operations. In this paper, we propose CoMN2 a scalable and distributed approach for network recovery from node failures in wireless sensor networks. CoMN2 relies on a new concept called network mapping which consists in partitioning the network into several regions of increasing criticality. The criticality is set according to the energy, the traffic distribution and the deployment of nodes. Using this network mapping, our solution CoMN2 ensures the continuous network activity by efficiently swapping nodes from low critical area to highly critical area when required. Simulation results prove the effectiveness of our approach and show that the obtained improve-ment in terms of lifetime is in the order of 40%

    Reliability for Emergency Applications in Internet of Things

    Get PDF
    International audienceThis paper addresses the Internet of Things (IoT) paradigm, which is gaining substantial ground in modern wireless telecommunications. The IoT describes a vision where heterogeneous objects like computers, sensors, Radio-Frequency IDentification (RFID)tags or mobile phones are able to communicate and cooperate efficiently to achieve common goals thanks to a common IP addressing scheme. This paper focuses on the reliability of emergency applications under IoT technology. These applications' success is contingent upon the delivery of high-priority events from many scattered objects to one or more objects without packet loss. Thus, the network has to be selfadaptiveand resilient to errors by providing efficient mechanisms for information distribution especially in the multi-hop scenario. As future perspective, we propose a lightweight and energy efficientjoint mechanism, called AJIA (Adaptive Joint protocol based on Implicit ACK), for packet loss recovery and route quality evaluation in theIoT. In this protocol, we use the overhearing feature, characterizing the wireless channels, as an implicit ACK mechanism. In addition, the protocol allows for an adaptive selection of the routing path based on the link quality

    Internet of things security: A top-down survey

    Get PDF
    International audienceInternet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims to integrate seamlessly both physical and digital worlds in one single ecosystem that makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. However, as new emergent technology, IoT suffers from several security issues which are most challenging than those from other fields regarding its complex environment and resources-constrained IoT devices. A lot of researches have been initiated in order to provide efficient security solutions in IoT, particularly to address resources constraints and scalability issues. Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are revolutionizing the world of the Internet of Things thanks to their efficiency and scalability. In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT. We discuss particularly the benefits that new approaches such as blockchain and Software Defined Networking can bring to the security and the privacy in IoT in terms of flexibility and scalability. Finally, we give a general classification of existing solutions and comparison based on important parameters

    Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks

    Get PDF
    International audienceTemperature variations have a significant effect on low power wireless sensor networks as wireless communication links drastically deteriorate when temperature increases. A reliable deployment should take temperature into account to avoid network connectivity problems resulting from poor wireless links when temperature increases. A good deployment needs also to adapt its operation and save resources when temperature decreases and wireless links improve. Taking into account the probabilistic nature of the wireless communication channel, we develop a mathematical model that provides the most energy efficient deployment in function of temperature without compromising the correct operation of the network by preserving both connectivity and coverage. We use our model to design three temperature-aware algorithms that seek to save energy (i) by putting some nodes in hibernate mode as in the SO (Stop-Operate) algorithm, or (ii) by using transmission power control as in PC (Power-Control), or (iii) by doing both techniques as in SOPC (Stop-Operate Power-Control). All proposed algorithms are fully distributed and solely rely on temperature readings without any information exchange between neighbors, which makes them low overhead and robust. Our results identify the optimal operation of each algorithm and show that a significant amount of energy can be saved by taking temperature into account

    Game theory framework for MAC parameter optimization in energy-delay constrained sensor networks

    Get PDF
    Optimizing energy consumption and end-to-end (e2e) packet delay in energy-constrained, delay-sensitive wireless sensor networks is a conflicting multiobjective optimization problem. We investigate the problem from a game theory perspective, where the two optimization objectives are considered as game players. The cost model of each player is mapped through a generalized optimization framework onto protocol-specific MAC parameters. From the optimization framework, a game is first defined by the Nash bargaining solution (NBS) to assure energy consumption and e2e delay balancing. Secondy, the Kalai-Smorodinsky bargaining solution (KSBS) is used to find an equal proportion of gain between players. Both methods offer a bargaining solution to the duty-cycle MAC protocol under different axioms. As a result, given the two performance requirements (i.e., the maximum latency tolerated by the application and the initial energy budget of nodes), the proposed framework allows to set tunable system parameters to reach a fair equilibrium point that dually minimizes the system latency and energy consumption. For illustration, this formulation is applied to six state-of-the-art wireless sensor network (WSN) MAC protocols: B-MAC, X-MAC, RI-MAC, SMAC, DMAC, and LMAC. The article shows the effectiveness and scalability of such a framework in optimizing protocol parameters that achieve a fair energy-delay performance trade-off under the application requirements

    Problemes lies aux systemes paralleles et distribues

    No full text
    SIGLEAvailable from INIST (FR), Document Supply Service, under shelf-number : TD 81064 / INIST-CNRS - Institut de l'Information Scientifique et TechniqueFRFranc
    • …
    corecore