69 research outputs found

    Vorwort

    Get PDF

    Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs

    Get PDF
    Securing communications in wireless sensor networks is increasingly important, as the diversity of applications increases. In this paper, we analyze the performance and power efficiency of bulk user data communications in a simple, secure PKI-based communication scheme employing a hybrid cryptographic approach. Detailed benchmarks of the involved cryptographic primitives are performed. The results are used to determine how the necessary computing ressources can be reduced from the current implementation, without compromising and even increasing security. At the same time, the special circumstances of the PKI-based framework on memory constrained sensor motes, such as IRIS or MICA2 motes, are considered. An improved set of cryptographic primitives is determined and implemented, improving execution speed and thus energy efficiency. © 2013 IEEE

    Smart parking system for vehicles

    Get PDF
    © 2014 IEEE. There are various regions of applications for wireless sensor networks (WSNs). In this demonstration, we are using a WSN to build an efficient and smart parking system for vehicles. Our application will use light sensors to automatically determine the use of parking spaces in a parking area and calculate billable parking time while also providing a useful overview of occupied and free parking spaces to vehicle operators. Such a system can provide increased driver comfort and reduce costs in parking space operation by allowing drivers to easily decide on where to park, while the used components only generate low costs for the operator

    A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation

    Get PDF
    © 2016 IEEE. Bicycle theft is a big problem in places such as university towns, where bicycles offer one of the most costefficient and quick ways for students to move around. For example, 1,200 bicycles are stolen yearly in Göttingen, with more than 300,000 being reported as stolen in the whole of Germany during 2014. We present a power efficient architecture to track the locations of stolen bicycles using opportunistic communication with collection nodes placed in high traffic spots, that can be used to find stolen and lost bicycles. At the same time, the scheme is designed to prevent a loss of privacy for the owners of bicycles that have not been marked as stolen, while also reducing power usage during times where bicycles are under the control of their proper owners.We also show the feasibility of our approach using a simplified implementation using IRIS nodes, with a university campus serving as a testbed

    Secure and authenticated data communication in wireless sensor networks

    Get PDF
    © 2015 by the authors; licensee MDPI, Basel, Switzerland. Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our tested of IRISmotes

    Received signal strength indication for movement detection

    Get PDF
    © 2015 IPSJ. Wireless networks are spreading continuously, filling our homes and the world around us. By using a ZigBee network we will show that a person can be detected by analyzing the fluctuations of signal strength inside the network. The simplicity of our approach means that it could be extended to all wireless networks. This work shows both implications on privacy as well as promising advances in fields like home automation and smart devices by localizing people as they go about their daily lives

    Fuzzy logic election of node for routing in WSNs

    Get PDF
    Sensor nodes of Wireless Sensor Networks (WSNs) are resource constraints in energy, memory, processing and communication bandwidth. Since they are operated by battery, their life span is limited. Specially, energy conservation is very important issue in the WSN, because it directly affects the life of the node as well as the entire network. Here, we develop a new way of electing a node among many trustworthy nodes for routing processes. This method consumes the energies of network nodes based on Fuzzy logic applied on their residual energy, trust level and distance from the Base Station. The proposed method elects one indispensible node for participating in routing among many worthy nodes. Hence, this method of election of node for routing in WSN sees the conservation of nodes energies go by very smooth and justifying, thereby increasing the life of the WSN. © 2012 IEEE

    Calculating the speed of vehicles using Wireless Sensor Networks

    Get PDF
    © 2016 Polish Information Processing Society. Speed measurement is an important issue for some types of Wireless Sensor Networks (WSN), especially for Vehicular Ad-hoc Networks (VANETs). However, calculating this value is error-prone and costly. This report intends to demonstrate the calculation of speed of an object without the use of any additional devices or sensor boards, only using Received Signal Strength Indication (RSSI) for localization of the vehicles and time calculation using synchronization. We implemented these methods in actual IRIS motes, and tested them. The results show that, while not perfectly accurate, our method proved to be reliable and close to the real speed. In addition, the results do not have any linear correlation in divergence of real speed and calculated speed, which means the system avoids systematic errors
    corecore