Academic literature on the topic 'Resource-constrained wireless sensor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Resource-constrained wireless sensor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Resource-constrained wireless sensor"

1

Wójcikowski, Marek. "Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network." Metrology and Measurement Systems 22, no. 2 (June 1, 2015): 221–28. http://dx.doi.org/10.1515/mms-2015-0019.

Full text
Abstract:
Abstract In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating a model of the sensor network node, the same software is used in real sensor network nodes and in the simulation framework. Operation of the framework is illustrated with examples of simulations of selected transactions in the sensor network.
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Xiao Guang, Dong Zhu Feng, Jian Deng, and Yuan Jie Bai. "Resource-Constrained Wireless Sensor Network Information Decision Fusion in Ocean Environment." Applied Mechanics and Materials 433-435 (October 2013): 229–32. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.229.

Full text
Abstract:
In order to solve the decision information fusion issues of resource-constrained wireless sensor network, several decision information fusion rules under exponential distribution fading channel are investigated in this paper. At first, optimal likelihood ratio rule is given. The detection performance of this fusion rule is best, however, this rule acquires channel information which is too costly for resource constrained sensor networks. To solve this problem, suboptimal likelihood ratio fusion rule is proposed which requires only the knowledge of channel statistics. In addition, the reduced forms of the suboptimal are also derived, in the case of extreme channel signal-to-noise ratio (SNR). Theoretical analysis and simulations show that suboptimal fusion rule needs much less computation and information, yet exhibits only slight performance degradation. Suboptimal fusion rules are practicable for resource constrained wireless sensor networks decision information fusion system working in ocean environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Alves, Renan C. A., Doriedson A. G. Oliveira, Geovandro C. C. F. Pereira, Bruno C. Albertini, and Cíntia B. Margi. "WS3N: Wireless Secure SDN-Based Communication for Sensor Networks." Security and Communication Networks 2018 (August 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/8734389.

Full text
Abstract:
The Software Defined Networking (SDN) paradigm can provide flexible routing and potentially support the different communication patterns that exist in Wireless Sensor Networks (WSN). However applying this paradigm to resource-constrained networks is not straightforward, especially if security services are a requirement. Existing SDN-based approaches for WSN evolved over time, addressing resource-constrained requirements. However, they do not integrate security services into their design and implementation. This work’s main contribution is a secure-by-design SDN-based framework for Wireless Sensors Networks. Secure node admission and end-to-end key distribution to support secure communication are considered key services, which the framework must provide. We describe its specification, design, implementation, and experiments considering device and protocol constraints. The results indicate that our approach has achieved such goals with acceptable overheads up to medium sized networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Shankaramma and Nagaraj G. S. "Survey on WSN Network Lifetime Through Leach Clustering Schemes." International Journal of Engineering and Advanced Technology 11, no. 3 (February 28, 2022): 58–61. http://dx.doi.org/10.35940/ijeat.c3366.0211322.

Full text
Abstract:
Sensor nodes deployed in wireless sensor networks (WSN) are resource constrained, battery operated and have a restricted energy resource. The significant number of wireless sensor network applications aim to extend the longevity of the network by using various strategies. Clustering algorithms were proven to be among the best efficient ways for increasing wireless sensor network reliability. In a wireless sensor network, clustering-based solutions control the network operations to manage the restricted energy in the optimal effective way to extend the network lifetime. Reviews in related subject could assist in gathering thorough and timely information about wireless sensor networks lifetime study through different clustering protocols. This research review study paper presents an extensive study of existing low energy adaptive clustering hierarchy (LEACH) homogeneous clustering procedures and analysis.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yuehai, Weidong Wang, Shiying Cao, Shiju Li, Li Xie, and Baocang Ding. "Self-Similarity Superresolution for Resource-Constrained Image Sensor Node in Wireless Sensor Networks." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/719408.

Full text
Abstract:
Wireless sensor networks, in combination with image sensors, open up a grand sensing application field. It is a challenging problem to recover a high resolution(HR)image from its low resolution(LR)counterpart, especially for low-cost resource-constrained image sensors with limited resolution. Sparse representation-based techniques have been developed recently and increasingly to solve this ill-posed inverse problem. Most of these solutions are based on an external dictionary learned from huge image gallery, consequently needing tremendous iteration and long time to match. In this paper, we explore the self-similarity inside the image itself, and propose a new combined self-similarity superresolution(SR)solution, with low computation cost and high recover performance. In the self-similarity image super resolution model(SSIR), a small size sparse dictionary is learned from the image itself by the methods such asKSVD. The most similar patch is searched and specially combined during the sparse regulation iteration. Detailed information, such as edge sharpness, is preserved more faithfully and clearly. Experiment results confirm the effectiveness and efficiency of this double self-learning method in the image super resolution.
APA, Harvard, Vancouver, ISO, and other styles
6

Zoumboulakis, Michael, and George Roussos. "Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks." Mobile Networks and Applications 16, no. 2 (October 9, 2010): 194–213. http://dx.doi.org/10.1007/s11036-010-0268-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Kuan, and Xiaoquan Xu. "A Resource Scheduling Strategy for WSN with Communication Constrained." MATEC Web of Conferences 175 (2018): 03032. http://dx.doi.org/10.1051/matecconf/20181750100103032.

Full text
Abstract:
Due to the loss of wireless communication link, the remote estimator in the wireless sensor network can only receive part of the observation information or can not be completely received, which reduces the accuracy of the state estimation. Focusing on the above problems, a strategy based on network resource scheduling is proposed to improve the impact of link loss on state estimation. The strategy considers the quantization process of sensor observations and the limited transmission bandwidth. The objective of optimization is to minimize the estimated error covariance and the expected energy consumption of the data packet. The data rate and the time slot are allocated to each communication link. The simulation results show that the optimal state estimation of the physical process can be obtained under a small transmission bandwidth and simple BPSK modulation, and the energy consumption of the transmitted data packet can be effectively reduced.
APA, Harvard, Vancouver, ISO, and other styles
8

Zivanov, Zarko, Predrag Rakic, and Miroslav Hajdukovic. "Wireless sensor network application programming and simulation system." Computer Science and Information Systems 5, no. 1 (2008): 109–26. http://dx.doi.org/10.2298/csis0801110z.

Full text
Abstract:
We present, a wireless sensor network application programming and simulation system, suitable for wireless sensor network application development for both resource constrained and unconstrained hardware. Developed programs can be tested inside simulator, or (with source unchanged) executed directly on hardware. Main contribution of our project is uniform object oriented programming model with predefined basic concurrency abstractions.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Chuanyi, and Xiaoyong Li. "Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks." Sensors 20, no. 6 (March 12, 2020): 1592. http://dx.doi.org/10.3390/s20061592.

Full text
Abstract:
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified.
APA, Harvard, Vancouver, ISO, and other styles
10

Ramya, E., and R. Gobinath. "Performance metrics in wireless sensor networks :a survey and outlook." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 25. http://dx.doi.org/10.14419/ijet.v7i2.26.12527.

Full text
Abstract:
Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Resource-constrained wireless sensor"

1

Li, Junlin. "Distributed estimation in resource-constrained wireless sensor networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26633.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Ghassan AlRegib; Committee Member: Elliot Moore; Committee Member: Monson H. Hayes; Committee Member: Paul A. Work; Committee Member: Ying Zhang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
2

Daabaj, Khaled. "Reliable load-balancing routing for resource-constrained wireless sensor networks." Thesis, Daabaj, Khaled (2012) Reliable load-balancing routing for resource-constrained wireless sensor networks. PhD thesis, Murdoch University, 2012. https://researchrepository.murdoch.edu.au/id/eprint/6906/.

Full text
Abstract:
Wireless sensor networks (WSNs) are energy and resource constrained. Energy limitations make it advantageous to balance radio transmissions across multiple sensor nodes. Thus, load balanced routing is highly desirable and has motivated a significant volume of research. Multihop sensor network architecture can also provide greater coverage, but requires a highly reliable and adaptive routing scheme to accommodate frequent topology changes. Current reliability-oriented protocols degrade energy efficiency and increase network latency. This thesis develops and evaluates a novel solution to provide energy-efficient routing while enhancing packet delivery reliability. This solution, a reliable load-balancing routing (RLBR), makes four contributions in the area of reliability, resiliency and load balancing in support of the primary objective of network lifetime maximisation. The results are captured using real world testbeds as well as simulations. The first contribution uses sensor node emulation, at the instruction cycle level, to characterise the additional processing and computation overhead required by the routing scheme. The second contribution is based on real world testbeds which comprises two different TinyOS-enabled senor platforms under different scenarios. The third contribution extends and evaluates RLBR using large-scale simulations. It is shown that RLBR consumes less energy while reducing topology repair latency and supports various aggregation weights by redistributing packet relaying loads. It also shows a balanced energy usage and a significant lifetime gain. Finally, the forth contribution is a novel variable transmission power control scheme which is created based on the experience gained from prior practical and simulated studies. This power control scheme operates at the data link layer to dynamically reduce unnecessarily high transmission power while maintaining acceptable link reliability.
APA, Harvard, Vancouver, ISO, and other styles
3

Wacker, Arno Rüdiger. "Key distribution schemes for resource constrained devices in wireless sensor networks." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-34332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Ying. "Optimal decision rules for decentralized detection in resource-constrained wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1375537831&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bolisetti, Siva Karteek. "Target detection architecture for resource constrained wireless sensor networks within Internet of Things." Thesis, Staffordshire University, 2017. http://eprints.staffs.ac.uk/3886/.

Full text
Abstract:
Wireless sensor networks (WSN) within Internet of Things (IoT) have the potential to address the growing detection and classification requirements among many surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional passive means of sensing such as acoustic and seismic which are used for surveillance and target detection applications of WSN. RF sensing based WSN within IoT detect the presence of designated targets by transmitting RF signals into the sensing environment and observing the reflected echoes. In this thesis, an RF sensing based target detection architecture for surveillance applications of WSN has been proposed to detect the presence of stationary targets within the sensing environment. With multiple sensing nodes operating simultaneously within the sensing region, diversity among the sensing nodes in the choice of transmit waveforms is required. Existing multiple access techniques to accommodate multiple sensing nodes within the sensing environment are not suitable for RF sensing based WSN. In this thesis, a diversity in the choice of the transmit waveforms has been proposed and transmit waveforms which are suitable for RF sensing based WSN have been discussed. A criterion have been defined to quantify the ease of detecting the signal and energy efficiency of the signal based on which ease of detection index and energy efficiency index respectively have been generated. The waveform selection criterion proposed in this thesis takes the WSN sensing conditions into account and identifies the optimum transmit waveform within the available choices of transmit waveforms based on their respective ease of detection and energy efficiency indexes. A target detector analyses the received RF signals to make a decision regarding the existence or absence of targets within the sensing region. Existing target detectors which are discussed in the context of WSN do not take the factors such as interference and nature of the sensing environment into account. Depending on the nature of the sensing environment, in this thesis the sensing environments are classified as homogeneous and heterogeneous sensing environments. Within homogeneous sensing environments the presence of interference from the neighbouring sensing nodes is assumed. A target detector has been proposed for WSN within homogeneous sensing environments which can reliably detect the presence of targets. Within heterogeneous sensing environments the presence of clutter and interfering waveforms is assumed. A target detector has been proposed for WSN within heterogeneous sensing environments to detect targets in the presence of clutter and interfering waveforms. A clutter estimation technique has been proposed to assist the proposed target detector to achieve increased target detection reliability in the presence of clutter. A combination of compressive and two-step target detection architectures has been proposed to reduce the transmission costs. Finally, a 2-stage target detection architecture has been proposed to reduce the computational complexity of the proposed target detection architecture.
APA, Harvard, Vancouver, ISO, and other styles
6

Roseveare, Nicholas. "Optimization and resource management in wireless sensor networks." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15730.

Full text
Abstract:
Doctor of Philosophy
Department of Electrical and Computer Engineering
Balasubramaniam Natarajan
In recent years, there has been a rapid expansion in the development and use of low-power, low-cost wireless modules with sensing, computing, and communication functionality. A wireless sensor network (WSN) is a group of these devices networked together wirelessly. Wireless sensor networks have found widespread application in infrastructure, environmental, and human health monitoring, surveillance, and disaster management. While there are many interesting problems within the WSN framework, we address the challenge of energy availability in a WSN tasked with a cooperative objective. We develop approximation algorithms and execute an analysis of concave utility maximization in resource constrained systems. Our analysis motivates a unique algorithm which we apply to resource management in WSNs. We also investigate energy harvesting as a way of improving system lifetime. We then analyze the effect of using these limited and stochastically available communication resources on the convergence of decentralized optimization techniques. The main contributions of this research are: (1) new optimization formulations which explicitly consider the energy states of a WSN executing a cooperative task; (2) several analytical insights regarding the distributed optimization of resource constrained systems; (3) a varied set of algorithmic solutions, some novel to this work and others based on extensions of existing techniques; and (4) an analysis of the effect of using stochastic resources (e.g., energy harvesting) on the performance of decentralized optimization methods. Throughout this work, we apply our developments to distribution estimation and rate maximization. The simulation results obtained help to provide verification of algorithm performance. This research provides valuable intuition concerning the trade-offs between energy-conservation and system performance in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Xing. "Hybrid real-time operating system integrated with middleware for resource-constrained wireless sensor nodes." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22472/document.

Full text
Abstract:
Avec les avancées récentes en microélectronique, en traitement numérique et en technologie de communication, les noeuds de réseau de capteurs sans fil (noeud RCSF) deviennent de moins en moins encombrants et coûteux. De ce fait la technologie de RCSF est utilisée dans de larges domaines d’application. Comme les noeuds RCSF sont limités en taille et en coût, ils sont en général équipés d’un petit microcontrôleur de faible puissance de calcul et de mémoire etc. De plus ils sont alimentés par une batterie donc son énergie disponible est limitée. A cause de ces contraintes, la plateforme logicielle d’un RCSF doit consommer peu de mémoire, d’énergie, et doit être efficace en calcul. Toutes ces contraintes rendent les développements de logiciels dédiés au RCSF très compliqués. Aujourd’hui le développement d’un système d’exploitation dédié à la technologie RCSF est un sujet important. En effet avec un système d’exploitation efficient, les ressources matérielles d’une plateforme RCSF peuvent être utilisées efficacement. De plus, un ensemble de services système disponibles permet de simplifier le développement d’une application. Actuellement beaucoup de travaux de recherche ont été menés pour développer des systèmes d’exploitation pour le RCSF tels que TinyOS, Contiki, SOS, openWSN, mantisOS et simpleRTJ. Cependant plusieurs défis restent à relever dans le domaine de système d’exploitation pour le RCSF. Le premier des défis est le développement d’un système d’exploitation temps réel à faible empreinte mémoire dédié au RCSF. Le second défi est de développer un mécanisme permettant d’utiliser efficacement la mémoire et l’énergie disponible d’un RCSF. De plus, comment fournir un développement d’application pour le RCSF reste une question ouverte. Dans cette thèse, un nouveau système d’exploitation hybride, temps réel à énergie efficiente et à faible empreinte mémoire nommé MIROS dédié au RCSF a été développé. Dans MIROS, un ordonnanceur hybride a été adopté ; les deux ordonnanceurs évènementiel et multithread ont été implémentés. Avec cet ordonnanceur hybride, le nombre de threads de MIROS peut être diminué d’une façon importante. En conséquence, les avantages d’un système d’exploitation évènementiel qui consomme peu de ressource mémoire et la performance temps réel d’un système d’exploitation multithread ont été obtenues. De plus, l’allocation dynamique de la mémoire a été aussi réalisée dans MIROS. La technique d’allocation mémoire de MIROS permet l’augmentation de la zone mémoire allouée et le réassemblage des fragments de mémoire. De ce fait, l’allocation de mémoire de MIROS devient plus flexible et la ressource mémoire d’un noeud RCSF peut être utilisée efficacement. Comme l’énergie d’un noeud RCSF est une ressource à forte contrainte, le mécanisme de conservation d’énergie a été implanté dans MIROS. Contrairement aux autres systèmes d’exploitation pour RCSF où la conservation d’énergie a été prise en compte seulement en logiciel, dans MIROS la conservation d’énergie a été prise en compte à la fois en logiciel et en matériel. Enfin, pour fournir un environnement de développement convivial aux utilisateurs, un nouveau intergiciel nommé EMIDE a été développé et intégré dans MIROS. EMIDE permet le découplage d’une application de système. Donc le programme d’application est plus simple et la reprogrammation à distance est plus performante, car seulement les codes de l’application seront reprogrammés. Les évaluations de performance de MIROS montrent que MIROS est un système temps réel à faible empreinte mémoire et efficace pour son exécution. De ce fait, MIROS peut être utilisé dans plusieurs plateformes telles que BTnode, IMote, SenseNode, TelosB et T-Mote Sky. Enfin, MIROS peut être utilisé pour les plateformes RCSF à fortes contraintes de ressources
With the recent advances in microelectronic, computing and communication technologies, wireless sensor network (WSN) nodes have become physically smaller and more inexpensive. As a result, WSN technology has become increasingly popular in widespread application domains. Since WSN nodes are minimized in physical size and cost, they are mostly restricted to platform resources such as processor computation ability, memory resources and energy supply. The constrained platform resources and diverse application requirements make software development on the WSN platform complicated. On the one hand, the software running on the WSN platform should be small in the memory footprint, low in energy consumption and high in execution efficiency. On the other hand, the diverse application development requirements, such as the real-time guarantee and the high reprogramming performance, should be met by the WSN software. The operating system (OS) technology is significant for the WSN proliferation. An outstanding WSN OS can not only utilize the constrained WSN platform resources efficiently, but also serve the WSN applications soundly. Currently, a set of WSN OSes have been developed, such as the TinyOS, the Contiki, the SOS, the openWSN and the mantisOS. However, many OS development challenges still exist, such as the development of a WSN OS which is high in real-time performance yet low in memory footprint; the improvement of the utilization efficiency to the memory and energy resources on the WSN platforms, and the providing of a user-friendly application development environment to the WSN users. In this thesis, a new hybrid, real-time, energy-efficient, memory-efficient, fault-tolerant and user-friendly WSN OS MIROS is developed. MIROS uses the hybrid scheduling to combine the advantages of the event-driven system's low memory consumption and the multithreaded system's high real-time performance. By so doing, the real-time scheduling can be achieved on the severely resource-constrained WSN platforms. In addition to the hybrid scheduling, the dynamic memory allocators are also realized in MIROS. Differing from the other dynamic allocation approaches, the memory heap in MIROS can be extended and the memory fragments in the MIROS can be defragmented. As a result, MIROS allocators become flexible and the memory resources can be utilized more efficiently. Besides the above mechanisms, the energy conservation mechanism is also implemented in MIROS. Different from most other WSN OSes in which the energy resource is conserved only from the software aspect, the energy conservation in MIROS is achieved from both the software aspect and the multi-core hardware aspect. With this conservation mechanism, the energy cost reduced significantly, and the lifetime of the WSN nodes prolonged. Furthermore, MIROS implements the new middleware software EMIDE in order to provide a user-friendly application development environment to the WSN users. With EMIDE, the WSN application space can be decoupled from the low-level system space. Consequently, the application programming can be simplified as the users only need to focus on the application space. Moreover, the application reprogramming performance can be improved as only the application image other than the monolithic image needs to be updated during the reprogramming process. The performance evaluation works to the MIROS prove that MIROS is a real-time OS which has small memory footprint, low energy cost and high execution efficiency. Thus, it is suitable to be used on many WSN platforms including the BTnode, IMote, SenseNode, TelosB, T-Mote Sky, etc. The performance evaluation to EMIDE proves that EMIDE has less memory cost and low energy consumption. Moreover, it supports small-size application code. Therefore, it can be used on the high resource-constrained WSN platforms to provide a user-friendly development environment to the WSN users
APA, Harvard, Vancouver, ISO, and other styles
8

Tsiftes, Nicolas. "Storage-Centric System Architectures for Networked, Resource-Constrained Devices." Doctoral thesis, Uppsala universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267628.

Full text
Abstract:
The emergence of the Internet of Things (IoT) has increased the demand for networked, resource-constrained devices tremendously. Many of the devices used for IoT applications are designed to be resource-constrained, as they typically must be small, inexpensive, and powered by batteries. In this dissertation, we consider a number of challenges pertaining to these constraints: system support for energy efficiency; flash-based storage systems; programming, testing, and debugging; and safe and secure application execution. The contributions of this dissertation are made through five research papers addressing these challenges. Firstly, to enhance the system support for energy-efficient storage in resource-constrained devices, we present the design, implementation, and evaluation of the Coffee file system and the Antelope DBMS. Coffee provides a sequential write throughput that is over 92% of the attainable flash driver throughput, and has a constant memory footprint for open files. Antelope is the first full-fledged relational DBMS for sensor networks, and it provides two novel indexing algorithms to enable fast and energy-efficient database queries. Secondly, we contribute a framework that extends the functionality and increases the performance of sensornet checkpointing, a debugging and testing technique. Furthermore, we evaluate how different data compression algorithms can be used to decrease the energy consumption and data dissemination time when reprogramming sensor networks. Lastly, we present Velox, a virtual machine for IoT applications. Velox can enforce application-specific resource policies. Through its policy framework and its support for high-level programming languages, Velox helps to secure IoT applications. Our experiments show that Velox monitors applications' resource usage and enforces policies with an energy overhead below 3%. The experimental systems research conducted in this dissertation has had a substantial impact both in the academic community and the open-source software community. Several of the produced software systems and components are included in Contiki, one of the premier open-source operating systems for the IoT and sensor networks, and they are being used both in research projects and commercial products.
APA, Harvard, Vancouver, ISO, and other styles
9

Porambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.

Full text
Abstract:
Abstract The concept of the Internet of Things (IoT) is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. Among many underlying networking technologies for the IoT, Wireless Sensor Network (WSN) technology has become an integral building block. IoT enabled sensor networks provide a wide range of application areas such as smart homes, connected healthcare, smart cities and various solutions for the manufacturing industry. The integration of WSNs in IoT will also create new security challenges for establishing secure channels between low power sensor nodes and Internet hosts. This will lead to many challenges in designing new key establishment and authentication protocols and redefining the existing ones. This dissertation addresses how to integrate lightweight key management and authentication solutions in the resource constrained sensor networks deployed in IoT domains. Firstly, this thesis elaborates how to exploit the implicit certificates to initiate secure End-to-End (E2E) communication channels between the resource constrained sensor nodes in IoT networks. Implicit certificates are used for authentication and key establishment purposes. The compliance of the security schemes is proven through performance evaluations and by discussing the security properties. Secondly, this dissertation presents the design of two lightweight group key establishment protocols for securing group communications between resource-constrained IoT devices. Finally, the thesis explores promising approaches on how to tailor the existing security protocols in accordance with IoT device and network characteristics. In particular, variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections between the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. A solutions called Collaborative HIP (CHIP) is proposed with an efficient key establishment component for the high resource-constrained devices on the IoT. The applicability of the keying mechanism is demonstrated with the implementation and the performance measurements results
Tiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
APA, Harvard, Vancouver, ISO, and other styles
10

Houssain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.

Full text
Abstract:
Les systèmes de cryptographie à base de courbe elliptique (ECC) ont été adoptés comme des systèmes standardisés de cryptographie à clé publique (PKC) par l'IEEE, ANSI, NIST, SEC et WTLS. En comparaison avec la PKC traditionnelle, comme RSA et ElGamal, l'ECC offre le même niveau de sécurité avec des clés de plus petites tailles. Cela signifie des calculs plus rapides et une consommation d'énergie plus faible ainsi que des économies de mémoire et de bande passante. Par conséquent, ECC est devenue une technologie indispensable, plus populaire et considérée comme particulièrement adaptée à l’implémentation sur les dispositifs à ressources restreintes tels que les réseaux de capteurs sans fil (WSN). Le problème majeur avec les noeuds de capteurs chez les WSN, dès qu'il s'agit d’opérations cryptographiques, est les limitations de leurs ressources en termes de puissance, d'espace et de temps de réponse, ce qui limite la capacité du capteur à gérer les calculs supplémentaires nécessaires aux opérations cryptographiques. En outre, les mises en oeuvre actuelles de l’ECC sur WSN sont particulièrement vulnérables aux attaques par canaux auxiliaires (SCA), en particulier aux attaques par analyse de consommation (PAA), en raison de l'absence de la sécurité physique par blindage, leur déploiement dans les régions éloignées et le fait qu’elles soient laissées sans surveillance. Ainsi, les concepteurs de crypto-processeurs ECC sur WSN s'efforcent d'introduire des algorithmes et des architectures qui ne sont pas seulement résistants PAA, mais également efficaces sans aucun supplément en termes de temps, puissance et espace. Cette thèse présente plusieurs contributions dans le domaine des cryptoprocesseurs ECC conscientisés aux PAA, pour les dispositifs à ressources limitées comme le WSN. Premièrement, nous proposons deux architectures robustes et efficaces pour les ECC conscientisées au PAA. Ces architectures sont basées sur des algorithmes innovants qui assurent le fonctionnement de base des ECC et qui prévoient une sécurisation de l’ECC contre les PAA simples (SPA) sur les dispositifs à ressources limitées tels que les WSN. Deuxièmement, nous proposons deux architectures additionnelles qui prévoient une sécurisation des ECC contre les PAA différentiels (DPA). Troisièmement, un total de huit architectures qui incluent, en plus des quatre architectures citées ci-dessus pour SPA et DPA, deux autres architectures dérivées de l’architecture DPA conscientisée, ainsi que deux architectures PAA conscientisées. Les huit architectures proposées sont synthétisées en utilisant la technologie des réseaux de portes programmables in situ (FPGA). Quatrièmement, les huit architectures sont analysées et évaluées, et leurs performances comparées. En plus, une comparaison plus avancée effectuée sur le niveau de la complexité du coût (temps, puissance, et espace), fournit un cadre pour les concepteurs d'architecture pour sélectionner la conception la plus appropriée. Nos résultats montrent un avantage significatif de nos architectures proposées par rapport à la complexité du coût, en comparaison à d'autres solutions proposées récemment dans le domaine de la recherche
Elliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Resource-constrained wireless sensor"

1

Shin, Hyojeong, and Hojung Cha. "Supporting Application-Oriented Kernel Functionality for Resource Constrained Wireless Sensor Nodes." In Lecture Notes in Computer Science, 748–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." In Sensor Technology, 1215–32. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch058.

Full text
Abstract:
Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
3

Prusty, Alok R., Srinivas Sethi, and Ajit Kumar Nayak. "Energy Aware Optimized Routing Protocols for Wireless Ad Hoc Sensor Network." In Sensor Technology, 1494–521. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch070.

Full text
Abstract:
Advancement in wireless technology made human life become simple and easy going. Wireless Ad Hoc Sensor Network (WASN) is one of the friendly wireless networks used to monitor the most unfriendly and ever changing dynamic environment that restricts continuous human attention. WASN has drawn significant attentions due to its unique capabilities to deal with complex network operation in highly resource constrained network construct. This ad hoc and unstructured deployment of tiny sensor nodes operate with controlled transmission range, processing capabilities, as well as very limited battery backup. The severe power depletion affects the existence of active nodes. Hence, data forwarding and reliable packet routing in such phenomenon oriented network becoming a challenge. In this chapter the clustering and hierarchical routing approaches for WASN environment has been briefly presented followed by some optimization strategies applicable to cluster routing process. This chapter can help researchers to think fresh dimensions of ongoing research in WASN cluster routing.
APA, Harvard, Vancouver, ISO, and other styles
4

Kibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." In Network Security Attacks and Countermeasures, 157–75. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch005.

Full text
Abstract:
Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Kesavan, Sujatha, Bhavani N. P. G., Kirubakaran D., Janaki N., Kavitha T., and Su-Qun Cao. "The Role of Wireless Sensor Networks in Detecting and Predicting COVID-19 Using ML Algorithms." In Advances in Information Security, Privacy, and Ethics, 95–126. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5250-9.ch006.

Full text
Abstract:
An embedded system is a specialized computer that is resource constrained to sense and controls its environment. Embedded systems usually consist of hardware and software. The most used hardware materials are processors, peripheral communication devices, actuators, sensors, power supplies, and memory storage. The application-specific algorithms, device drivers, and operating systems are typically used in software section. Normally there is a standard protocol to communicate the particular type of embedded system; for example, nodes in sensor networks are the specialized embedded systems for detecting COVID-19. Sensor nodes with wireless communication capabilities can form wireless sensor networks (WSN).
APA, Harvard, Vancouver, ISO, and other styles
6

Garg, Sneh, and Ram Bahadur Patel. "Self-Managed System for Distributed Wireless Sensor Networks." In Handling Priority Inversion in Time-Constrained Distributed Databases, 189–210. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2491-6.ch011.

Full text
Abstract:
With the advancements in technology, wireless sensor networks (WSNs) are used almost in all applications. These sensor network systems are sometimes used to monitor hostile environments where human intervention is not possible. When sensing is required to be done in areas that are hostile, there is need for autonomous/self-managing systems as it is very difficult for the human to intervene within such hostile environmental conditions. Therefore, in such systems, each node is required to do all functionalities and act like autonomous decision taking node that performs both data forwarding and network control. Therefore, introducing a self-management for large-scale distributed wireless system is a highly tedious task due to resource constrained nature of these nodes. It is very difficult to achieve required quality of service by large systems as a huge amount of energy is dissipated by systems in radio communication. Owing to resource constraint as well as vulnerable nature, developing a self-managing system for distributed WSN is a very challenging and demanding task.
APA, Harvard, Vancouver, ISO, and other styles
7

Tripathi, Meenakshi, M. S. Gaur, and V.Laxmi. "Security Challenges in Wireless Sensor Network." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 334–59. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch014.

Full text
Abstract:
Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing, and energy constraint make it difficult to incorporate compute-intensive security solutions in these networks. Existing solutions for developing cost and energy efficient algorithms do not fit the security parameters for these resource constrained networks. As a result, these networks remain vulnerable to several types of attacks. This chapter presents a survey of various attacks at the different layers of WSN protocol stack, their detection, and countermeasures. Although every layer of the stack has its own security challenges, the network layer is most vulnerable to many security attacks because it provides an excellent basis for traffic monitoring activities, which helps the attacker form a strategy to perform the attack. The most common attacks on this layer are the Sybil attack, selective forwarding attack, wormhole attack, sinkhole attack, etc. This survey provides a comprehensive view of present attacking strategies to disrupt the normal functioning of WSN.
APA, Harvard, Vancouver, ISO, and other styles
8

Korkmaz, Ilker, Orhan Dagdeviren, Fatih Tekbacak, and Mehmet Emin Dalkilic. "A Survey on Security in Wireless Sensor Networks." In Theory and Practice of Cryptography Solutions for Secure Information Systems, 223–51. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch010.

Full text
Abstract:
Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Gaurav, Shilpi Harnal, Neha Miglani, and Savita Khurana. "Relaibility in Underwater Wireless Sensor Networks." In Energy-Efficient Underwater Wireless Communications and Networking, 224–46. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3640-7.ch015.

Full text
Abstract:
Underwater wireless sensor networks (UWSNs) have gained importance as well as diverted attention of many researchers, domain experts to a great extent in recent past. The devices used for UWSN deployment are resource-constrained like storage issue, low processing speed, as well are vulnerable to a wide class of security threats and malicious attacks, which affect reliable communication. For reliable data delivery, a system should include packet delivery ratio, battery life, delays incurred, and energy consumption, etc. Numerous reliability models for underwater networks have been designed to incorporate the parameters and performance metrics in optimized manner. The chapter deals with focusing on such models and their efficiency in terms of battery life, packet loss, error handling mechanism, and network delays. Further, it is also explained how and why the error-controlled schemes should be designed and implemented in order to incorporate reliable data delivery in limited resources-constraints of UWSN along with the consideration of efficiency and performance concerns.
APA, Harvard, Vancouver, ISO, and other styles
10

Hughes, Daniel, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier Del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen, and Jó Ueyama. "Building Wireless Sensor Network Applications with LooCI." In Advancing the Next-Generation of Mobile Computing, 61–85. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch005.

Full text
Abstract:
Considerable research has been performed in applying run-time reconfigurable component models to the domain of wireless sensor networks. The ability to dynamically deploy and reconfigure software components has clear advantages in sensor networks, which are typically large in scale and expected to operate for long periods in the face of node mobility, dynamic environmental conditions, and changing application requirements. LooCI is a component and binding model that is optimized for use in resource-constrained environments such as Wireless Sensor Networks. LooCI components use a novel event-based binding model that allows developers to model rich component interactions, while providing support for run-time reconfiguration, reflection, and policy-based management. This paper reports on the design of LooCI and describes a prototype implementation for the Sun SPOT. This platform is then evaluated in context of a real-world river monitoring and warning scenario in the city of São Carlos, Brazil.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Resource-constrained wireless sensor"

1

"SEMANTIC INTERFACE FOR RESOURCE CONSTRAINED WIRELESS SENSORS." In Special Session on Semantic Sensor Web. SciTePress - Science and and Technology Publications, 2011. http://dx.doi.org/10.5220/0003698905050511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daabaj, Khaled, Mike Dixon, Terry Koziniec, and Kevin Lee. "Trusted Routing for Resource-Constrained Wireless Sensor Networks." In 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC) (Co-Located with CSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/euc.2010.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pathan, Al-Sakib Khan, and Choong Seon Hong. "Feasibility of PKC in resource-constrained wireless sensor networks." In 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talebi, Mohammad S., Ahmad Khonsari, and Reyhaneh Jabarvand. "Cost-Aware Reactive Monitoring in Resource-Constrained Wireless Sensor Networks." In 2009 IEEE Wireless Communications and Networking Conference. IEEE, 2009. http://dx.doi.org/10.1109/wcnc.2009.4917647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Usman, Muhammad. "Agent-enabled anomaly detection in resource constrained wireless sensor networks." In 2014 IEEE 15th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2014. http://dx.doi.org/10.1109/wowmom.2014.6918934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liang, Weifa. "Constrained resource optimization in wireless sensor networks with mobile sinks." In 2012 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2012. http://dx.doi.org/10.1109/iccnc.2012.6167493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasad, Sonia, Shubham Jaiswal, N. S. V. Shet, and P. Sarwesh. "Energy Aware Routing Protocol for Resource Constrained Wireless Sensor Networks." In ICIA-16: International Conference on Informatics and Analytics. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2980258.2982113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaseva, Ville, Timo D. Hamalainen, and Marko Hannikainen. "Positioning in resource-constrained ultra low-power Wireless Sensor Networks." In 2010 Ubiquitous Positioning Indoor Navigation and Location Based Service (UPINLBS). IEEE, 2010. http://dx.doi.org/10.1109/upinlbs.2010.5654345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bechkit, Walid. "New key management schemes for resource constrained wireless sensor networks." In 2011 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2011. http://dx.doi.org/10.1109/wowmom.2011.5986200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sinha, Sourendra, and Zenon Chaczko. "MAGNA: Middleware for dynamic and resource constrained sensor networks." In The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007). IEEE, 2007. http://dx.doi.org/10.1109/auswireless.2007.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography