Academic literature on the topic 'Resource-constrained wireless sensor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Resource-constrained wireless sensor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Resource-constrained wireless sensor"
Wójcikowski, Marek. "Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network." Metrology and Measurement Systems 22, no. 2 (June 1, 2015): 221–28. http://dx.doi.org/10.1515/mms-2015-0019.
Full textYuan, Xiao Guang, Dong Zhu Feng, Jian Deng, and Yuan Jie Bai. "Resource-Constrained Wireless Sensor Network Information Decision Fusion in Ocean Environment." Applied Mechanics and Materials 433-435 (October 2013): 229–32. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.229.
Full textAlves, Renan C. A., Doriedson A. G. Oliveira, Geovandro C. C. F. Pereira, Bruno C. Albertini, and Cíntia B. Margi. "WS3N: Wireless Secure SDN-Based Communication for Sensor Networks." Security and Communication Networks 2018 (August 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/8734389.
Full textShankaramma and Nagaraj G. S. "Survey on WSN Network Lifetime Through Leach Clustering Schemes." International Journal of Engineering and Advanced Technology 11, no. 3 (February 28, 2022): 58–61. http://dx.doi.org/10.35940/ijeat.c3366.0211322.
Full textWang, Yuehai, Weidong Wang, Shiying Cao, Shiju Li, Li Xie, and Baocang Ding. "Self-Similarity Superresolution for Resource-Constrained Image Sensor Node in Wireless Sensor Networks." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/719408.
Full textZoumboulakis, Michael, and George Roussos. "Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks." Mobile Networks and Applications 16, no. 2 (October 9, 2010): 194–213. http://dx.doi.org/10.1007/s11036-010-0268-0.
Full textLi, Kuan, and Xiaoquan Xu. "A Resource Scheduling Strategy for WSN with Communication Constrained." MATEC Web of Conferences 175 (2018): 03032. http://dx.doi.org/10.1051/matecconf/20181750100103032.
Full textZivanov, Zarko, Predrag Rakic, and Miroslav Hajdukovic. "Wireless sensor network application programming and simulation system." Computer Science and Information Systems 5, no. 1 (2008): 109–26. http://dx.doi.org/10.2298/csis0801110z.
Full textLiu, Chuanyi, and Xiaoyong Li. "Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks." Sensors 20, no. 6 (March 12, 2020): 1592. http://dx.doi.org/10.3390/s20061592.
Full textRamya, E., and R. Gobinath. "Performance metrics in wireless sensor networks :a survey and outlook." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 25. http://dx.doi.org/10.14419/ijet.v7i2.26.12527.
Full textDissertations / Theses on the topic "Resource-constrained wireless sensor"
Li, Junlin. "Distributed estimation in resource-constrained wireless sensor networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26633.
Full textCommittee Chair: Ghassan AlRegib; Committee Member: Elliot Moore; Committee Member: Monson H. Hayes; Committee Member: Paul A. Work; Committee Member: Ying Zhang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Daabaj, Khaled. "Reliable load-balancing routing for resource-constrained wireless sensor networks." Thesis, Daabaj, Khaled (2012) Reliable load-balancing routing for resource-constrained wireless sensor networks. PhD thesis, Murdoch University, 2012. https://researchrepository.murdoch.edu.au/id/eprint/6906/.
Full textWacker, Arno Rüdiger. "Key distribution schemes for resource constrained devices in wireless sensor networks." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-34332.
Full textLin, Ying. "Optimal decision rules for decentralized detection in resource-constrained wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1375537831&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.
Full textBolisetti, Siva Karteek. "Target detection architecture for resource constrained wireless sensor networks within Internet of Things." Thesis, Staffordshire University, 2017. http://eprints.staffs.ac.uk/3886/.
Full textRoseveare, Nicholas. "Optimization and resource management in wireless sensor networks." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15730.
Full textDepartment of Electrical and Computer Engineering
Balasubramaniam Natarajan
In recent years, there has been a rapid expansion in the development and use of low-power, low-cost wireless modules with sensing, computing, and communication functionality. A wireless sensor network (WSN) is a group of these devices networked together wirelessly. Wireless sensor networks have found widespread application in infrastructure, environmental, and human health monitoring, surveillance, and disaster management. While there are many interesting problems within the WSN framework, we address the challenge of energy availability in a WSN tasked with a cooperative objective. We develop approximation algorithms and execute an analysis of concave utility maximization in resource constrained systems. Our analysis motivates a unique algorithm which we apply to resource management in WSNs. We also investigate energy harvesting as a way of improving system lifetime. We then analyze the effect of using these limited and stochastically available communication resources on the convergence of decentralized optimization techniques. The main contributions of this research are: (1) new optimization formulations which explicitly consider the energy states of a WSN executing a cooperative task; (2) several analytical insights regarding the distributed optimization of resource constrained systems; (3) a varied set of algorithmic solutions, some novel to this work and others based on extensions of existing techniques; and (4) an analysis of the effect of using stochastic resources (e.g., energy harvesting) on the performance of decentralized optimization methods. Throughout this work, we apply our developments to distribution estimation and rate maximization. The simulation results obtained help to provide verification of algorithm performance. This research provides valuable intuition concerning the trade-offs between energy-conservation and system performance in WSNs.
Liu, Xing. "Hybrid real-time operating system integrated with middleware for resource-constrained wireless sensor nodes." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22472/document.
Full textWith the recent advances in microelectronic, computing and communication technologies, wireless sensor network (WSN) nodes have become physically smaller and more inexpensive. As a result, WSN technology has become increasingly popular in widespread application domains. Since WSN nodes are minimized in physical size and cost, they are mostly restricted to platform resources such as processor computation ability, memory resources and energy supply. The constrained platform resources and diverse application requirements make software development on the WSN platform complicated. On the one hand, the software running on the WSN platform should be small in the memory footprint, low in energy consumption and high in execution efficiency. On the other hand, the diverse application development requirements, such as the real-time guarantee and the high reprogramming performance, should be met by the WSN software. The operating system (OS) technology is significant for the WSN proliferation. An outstanding WSN OS can not only utilize the constrained WSN platform resources efficiently, but also serve the WSN applications soundly. Currently, a set of WSN OSes have been developed, such as the TinyOS, the Contiki, the SOS, the openWSN and the mantisOS. However, many OS development challenges still exist, such as the development of a WSN OS which is high in real-time performance yet low in memory footprint; the improvement of the utilization efficiency to the memory and energy resources on the WSN platforms, and the providing of a user-friendly application development environment to the WSN users. In this thesis, a new hybrid, real-time, energy-efficient, memory-efficient, fault-tolerant and user-friendly WSN OS MIROS is developed. MIROS uses the hybrid scheduling to combine the advantages of the event-driven system's low memory consumption and the multithreaded system's high real-time performance. By so doing, the real-time scheduling can be achieved on the severely resource-constrained WSN platforms. In addition to the hybrid scheduling, the dynamic memory allocators are also realized in MIROS. Differing from the other dynamic allocation approaches, the memory heap in MIROS can be extended and the memory fragments in the MIROS can be defragmented. As a result, MIROS allocators become flexible and the memory resources can be utilized more efficiently. Besides the above mechanisms, the energy conservation mechanism is also implemented in MIROS. Different from most other WSN OSes in which the energy resource is conserved only from the software aspect, the energy conservation in MIROS is achieved from both the software aspect and the multi-core hardware aspect. With this conservation mechanism, the energy cost reduced significantly, and the lifetime of the WSN nodes prolonged. Furthermore, MIROS implements the new middleware software EMIDE in order to provide a user-friendly application development environment to the WSN users. With EMIDE, the WSN application space can be decoupled from the low-level system space. Consequently, the application programming can be simplified as the users only need to focus on the application space. Moreover, the application reprogramming performance can be improved as only the application image other than the monolithic image needs to be updated during the reprogramming process. The performance evaluation works to the MIROS prove that MIROS is a real-time OS which has small memory footprint, low energy cost and high execution efficiency. Thus, it is suitable to be used on many WSN platforms including the BTnode, IMote, SenseNode, TelosB, T-Mote Sky, etc. The performance evaluation to EMIDE proves that EMIDE has less memory cost and low energy consumption. Moreover, it supports small-size application code. Therefore, it can be used on the high resource-constrained WSN platforms to provide a user-friendly development environment to the WSN users
Tsiftes, Nicolas. "Storage-Centric System Architectures for Networked, Resource-Constrained Devices." Doctoral thesis, Uppsala universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267628.
Full textPorambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.
Full textTiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
Houssain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.
Full textElliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
Book chapters on the topic "Resource-constrained wireless sensor"
Shin, Hyojeong, and Hojung Cha. "Supporting Application-Oriented Kernel Functionality for Resource Constrained Wireless Sensor Nodes." In Lecture Notes in Computer Science, 748–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_63.
Full textKibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." In Sensor Technology, 1215–32. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch058.
Full textPrusty, Alok R., Srinivas Sethi, and Ajit Kumar Nayak. "Energy Aware Optimized Routing Protocols for Wireless Ad Hoc Sensor Network." In Sensor Technology, 1494–521. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch070.
Full textKibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." In Network Security Attacks and Countermeasures, 157–75. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch005.
Full textKesavan, Sujatha, Bhavani N. P. G., Kirubakaran D., Janaki N., Kavitha T., and Su-Qun Cao. "The Role of Wireless Sensor Networks in Detecting and Predicting COVID-19 Using ML Algorithms." In Advances in Information Security, Privacy, and Ethics, 95–126. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5250-9.ch006.
Full textGarg, Sneh, and Ram Bahadur Patel. "Self-Managed System for Distributed Wireless Sensor Networks." In Handling Priority Inversion in Time-Constrained Distributed Databases, 189–210. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2491-6.ch011.
Full textTripathi, Meenakshi, M. S. Gaur, and V.Laxmi. "Security Challenges in Wireless Sensor Network." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 334–59. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch014.
Full textKorkmaz, Ilker, Orhan Dagdeviren, Fatih Tekbacak, and Mehmet Emin Dalkilic. "A Survey on Security in Wireless Sensor Networks." In Theory and Practice of Cryptography Solutions for Secure Information Systems, 223–51. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch010.
Full textSharma, Gaurav, Shilpi Harnal, Neha Miglani, and Savita Khurana. "Relaibility in Underwater Wireless Sensor Networks." In Energy-Efficient Underwater Wireless Communications and Networking, 224–46. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3640-7.ch015.
Full textHughes, Daniel, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier Del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen, and Jó Ueyama. "Building Wireless Sensor Network Applications with LooCI." In Advancing the Next-Generation of Mobile Computing, 61–85. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch005.
Full textConference papers on the topic "Resource-constrained wireless sensor"
"SEMANTIC INTERFACE FOR RESOURCE CONSTRAINED WIRELESS SENSORS." In Special Session on Semantic Sensor Web. SciTePress - Science and and Technology Publications, 2011. http://dx.doi.org/10.5220/0003698905050511.
Full textDaabaj, Khaled, Mike Dixon, Terry Koziniec, and Kevin Lee. "Trusted Routing for Resource-Constrained Wireless Sensor Networks." In 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC) (Co-Located with CSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/euc.2010.106.
Full textPathan, Al-Sakib Khan, and Choong Seon Hong. "Feasibility of PKC in resource-constrained wireless sensor networks." In 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803120.
Full textTalebi, Mohammad S., Ahmad Khonsari, and Reyhaneh Jabarvand. "Cost-Aware Reactive Monitoring in Resource-Constrained Wireless Sensor Networks." In 2009 IEEE Wireless Communications and Networking Conference. IEEE, 2009. http://dx.doi.org/10.1109/wcnc.2009.4917647.
Full textUsman, Muhammad. "Agent-enabled anomaly detection in resource constrained wireless sensor networks." In 2014 IEEE 15th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2014. http://dx.doi.org/10.1109/wowmom.2014.6918934.
Full textLiang, Weifa. "Constrained resource optimization in wireless sensor networks with mobile sinks." In 2012 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2012. http://dx.doi.org/10.1109/iccnc.2012.6167493.
Full textPrasad, Sonia, Shubham Jaiswal, N. S. V. Shet, and P. Sarwesh. "Energy Aware Routing Protocol for Resource Constrained Wireless Sensor Networks." In ICIA-16: International Conference on Informatics and Analytics. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2980258.2982113.
Full textKaseva, Ville, Timo D. Hamalainen, and Marko Hannikainen. "Positioning in resource-constrained ultra low-power Wireless Sensor Networks." In 2010 Ubiquitous Positioning Indoor Navigation and Location Based Service (UPINLBS). IEEE, 2010. http://dx.doi.org/10.1109/upinlbs.2010.5654345.
Full textBechkit, Walid. "New key management schemes for resource constrained wireless sensor networks." In 2011 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2011. http://dx.doi.org/10.1109/wowmom.2011.5986200.
Full textSinha, Sourendra, and Zenon Chaczko. "MAGNA: Middleware for dynamic and resource constrained sensor networks." In The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007). IEEE, 2007. http://dx.doi.org/10.1109/auswireless.2007.43.
Full text