Дисертації з теми "Resource-constrained wireless sensor"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-21 дисертацій для дослідження на тему "Resource-constrained wireless sensor".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Li, Junlin. "Distributed estimation in resource-constrained wireless sensor networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26633.
Повний текст джерелаCommittee Chair: Ghassan AlRegib; Committee Member: Elliot Moore; Committee Member: Monson H. Hayes; Committee Member: Paul A. Work; Committee Member: Ying Zhang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Daabaj, Khaled. "Reliable load-balancing routing for resource-constrained wireless sensor networks." Thesis, Daabaj, Khaled (2012) Reliable load-balancing routing for resource-constrained wireless sensor networks. PhD thesis, Murdoch University, 2012. https://researchrepository.murdoch.edu.au/id/eprint/6906/.
Повний текст джерелаWacker, Arno Rüdiger. "Key distribution schemes for resource constrained devices in wireless sensor networks." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-34332.
Повний текст джерелаLin, Ying. "Optimal decision rules for decentralized detection in resource-constrained wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1375537831&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.
Повний текст джерелаBolisetti, Siva Karteek. "Target detection architecture for resource constrained wireless sensor networks within Internet of Things." Thesis, Staffordshire University, 2017. http://eprints.staffs.ac.uk/3886/.
Повний текст джерелаRoseveare, Nicholas. "Optimization and resource management in wireless sensor networks." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/15730.
Повний текст джерелаDepartment of Electrical and Computer Engineering
Balasubramaniam Natarajan
In recent years, there has been a rapid expansion in the development and use of low-power, low-cost wireless modules with sensing, computing, and communication functionality. A wireless sensor network (WSN) is a group of these devices networked together wirelessly. Wireless sensor networks have found widespread application in infrastructure, environmental, and human health monitoring, surveillance, and disaster management. While there are many interesting problems within the WSN framework, we address the challenge of energy availability in a WSN tasked with a cooperative objective. We develop approximation algorithms and execute an analysis of concave utility maximization in resource constrained systems. Our analysis motivates a unique algorithm which we apply to resource management in WSNs. We also investigate energy harvesting as a way of improving system lifetime. We then analyze the effect of using these limited and stochastically available communication resources on the convergence of decentralized optimization techniques. The main contributions of this research are: (1) new optimization formulations which explicitly consider the energy states of a WSN executing a cooperative task; (2) several analytical insights regarding the distributed optimization of resource constrained systems; (3) a varied set of algorithmic solutions, some novel to this work and others based on extensions of existing techniques; and (4) an analysis of the effect of using stochastic resources (e.g., energy harvesting) on the performance of decentralized optimization methods. Throughout this work, we apply our developments to distribution estimation and rate maximization. The simulation results obtained help to provide verification of algorithm performance. This research provides valuable intuition concerning the trade-offs between energy-conservation and system performance in WSNs.
Liu, Xing. "Hybrid real-time operating system integrated with middleware for resource-constrained wireless sensor nodes." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22472/document.
Повний текст джерелаWith the recent advances in microelectronic, computing and communication technologies, wireless sensor network (WSN) nodes have become physically smaller and more inexpensive. As a result, WSN technology has become increasingly popular in widespread application domains. Since WSN nodes are minimized in physical size and cost, they are mostly restricted to platform resources such as processor computation ability, memory resources and energy supply. The constrained platform resources and diverse application requirements make software development on the WSN platform complicated. On the one hand, the software running on the WSN platform should be small in the memory footprint, low in energy consumption and high in execution efficiency. On the other hand, the diverse application development requirements, such as the real-time guarantee and the high reprogramming performance, should be met by the WSN software. The operating system (OS) technology is significant for the WSN proliferation. An outstanding WSN OS can not only utilize the constrained WSN platform resources efficiently, but also serve the WSN applications soundly. Currently, a set of WSN OSes have been developed, such as the TinyOS, the Contiki, the SOS, the openWSN and the mantisOS. However, many OS development challenges still exist, such as the development of a WSN OS which is high in real-time performance yet low in memory footprint; the improvement of the utilization efficiency to the memory and energy resources on the WSN platforms, and the providing of a user-friendly application development environment to the WSN users. In this thesis, a new hybrid, real-time, energy-efficient, memory-efficient, fault-tolerant and user-friendly WSN OS MIROS is developed. MIROS uses the hybrid scheduling to combine the advantages of the event-driven system's low memory consumption and the multithreaded system's high real-time performance. By so doing, the real-time scheduling can be achieved on the severely resource-constrained WSN platforms. In addition to the hybrid scheduling, the dynamic memory allocators are also realized in MIROS. Differing from the other dynamic allocation approaches, the memory heap in MIROS can be extended and the memory fragments in the MIROS can be defragmented. As a result, MIROS allocators become flexible and the memory resources can be utilized more efficiently. Besides the above mechanisms, the energy conservation mechanism is also implemented in MIROS. Different from most other WSN OSes in which the energy resource is conserved only from the software aspect, the energy conservation in MIROS is achieved from both the software aspect and the multi-core hardware aspect. With this conservation mechanism, the energy cost reduced significantly, and the lifetime of the WSN nodes prolonged. Furthermore, MIROS implements the new middleware software EMIDE in order to provide a user-friendly application development environment to the WSN users. With EMIDE, the WSN application space can be decoupled from the low-level system space. Consequently, the application programming can be simplified as the users only need to focus on the application space. Moreover, the application reprogramming performance can be improved as only the application image other than the monolithic image needs to be updated during the reprogramming process. The performance evaluation works to the MIROS prove that MIROS is a real-time OS which has small memory footprint, low energy cost and high execution efficiency. Thus, it is suitable to be used on many WSN platforms including the BTnode, IMote, SenseNode, TelosB, T-Mote Sky, etc. The performance evaluation to EMIDE proves that EMIDE has less memory cost and low energy consumption. Moreover, it supports small-size application code. Therefore, it can be used on the high resource-constrained WSN platforms to provide a user-friendly development environment to the WSN users
Tsiftes, Nicolas. "Storage-Centric System Architectures for Networked, Resource-Constrained Devices." Doctoral thesis, Uppsala universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267628.
Повний текст джерелаPorambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.
Повний текст джерелаTiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
Houssain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.
Повний текст джерелаElliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
Oudishu, Ramcin, and Pethrus Gärdborn. "A CoAP Publish-Subscribe Broker for More Resource-Efficient Wireless Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232076.
Повний текст джерелаDen hastiga utvecklingen av Sakernas Internet över hela världen har medfört ett ökat användande av trådlösa sensornätverk vars datainsamling kan bidra till en mer hållbar utveckling. För närvarande använder sig GreenIoT-projektet i Uppsala av trådlösa sensornätverk för att övervaka halterna av luftföroreningar. Resursbegränsningarna för dylika nätverk medför att särskild hänsyn måste tas vid design av såväl kommunikationsmodeller som kommunikationsprotokoll. Modellen Publicera-Prenumerera (pub/pre) passar ypperligt för trådlösa sensornätverk då en mellanhand placeras mellan klient och server en s.k. broker vilket får den positiva effekten att att sensornoderna avlastas. För närvarande är IETF (Internet Engineering Task Force) i färd med att standardisera en pub/pre-utvidgning av det redan standardiserade CoAP (Constrained Application Protocol). Eftersom att utvidgningen är så pass ny finns ytterst få implementationer av den och man vet därmed väldigt lite om hur den faktiskt fungerar i praktiken. GreenIoT-projektet överväger att ersätta sin nuvarande pub/pre-broker med en CoAP pub/pre-broker eftersom att energianvändningen kan antas bli lägre samt att standardiseringsorganisationen bakom CoAP är det välrenommerade IETF. Sett ur ett större perspektiv erbjuder denna rapport en undersökning av de problem och utmaningar man ställs inför vid implementation av CoAP pub/pre-utvidgningen med avseende på designval, implementationsval, och protokolltvetydigheter. Mer konkret implementeras en CoAP pub/pre-broker åt GreenIoT-projektet. Genom att först noggrant analysera CoAP-protokollet, CoAP pub/pre-utkastet, liksom andra nödvändiga protokoll, för att därefter bestämma vilket programmeringsspråk och vilket existerande CoAP-bibliotek som skulle användas, implementerades en broker server som testades iterativt under processens gång. Ett flertal frågor som uppstod rörande pub/pre-utkastet presenteras och diskuteras i rapporten.
Iqbal, Muhammad Aamir. "Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10254391.
Повний текст джерелаThis dissertation addresses new challenges in the Internet of Things (IoT) related to security and privacy. The current transition from legacy internet to Internet of Things leads to multiple changes in its communication paradigms. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy, and autonomy to once uniform and deterministic systems and the issue of scalability within a WSN. Unlike internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources and thus, are unable to support complex security schemes. A direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical unless both endpoints are able to run the required (expensive) cryptographic primitives, thus leaving aside a whole class of resource constrained devices. In this dissertation, we propose novel security solution approaches for key establishments designed to reduce the requirements of existing security protocols in order to be supported by resource-constrained devices and for the scalability of sensors with a WSN in contest of IoT. We have investigated the feasibility of substituting the key management scheme of ZigBee stack by implementing LEAP+ to enhance its security and scalability capabilities in a WSN. LEAP+ is surprisingly well-suited to different types of network topologies, device types, and addressing modes offered by ZigBee stack, resolving the issue of scalability due to ZigBee’s key management centralized approach, and our experimental results and performance evaluation parameters illustrated these facts. We designed new key establishment protocols for the constrained wireless sensors to delegate their heavy cryptographic load to less constrained nodes in their neighborhood, exploiting the spatial heterogeneity of IoT nodes. Allowing cooperation between sensor nodes may open the way to a new class of threats, known as internal attacks, that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a cooperative group. Proposed protocols aim to track nodes behaviors and past performances to detect their trustworthiness and select reliable ones for cooperative assistance. Sensor nodes’ trustworthiness is verified by accompanying them with an accelerometer to detect whether these cooperative sensors are installed on the same body. Based on an extensive analysis and their accelerometers’ data correlations with the base station (mobile phone in this case) accelerometer data, we identify a set of neighboring devices able to provide assistance in performing heavy asymmetric computations effectively without compromising the security of the whole system. Formal security and privacy verifications and performance analyses with respect to the resource-constrained sensor’s energy are also conducted to ensure the security effectiveness and energy efficiency of our proposed protocols.
Soroush, Emad. "Fast data streaming in resource constrained wireless sensor networks." Thesis, 2008. http://hdl.handle.net/1828/1078.
Повний текст джерелаGarimella, Bhavani Jayaweera Sudharman K. "Distributed detection and data fusion in resource constrained wireless sensor networks." Diss., 2005. http://il.proquest.com/products_umi/dissertations.
Повний текст джерела"December 2005." Title from PDF title page (viewed on April 19, 2007). Thesis adviser: Sudharman K. Jayaweera. UMI Number: AAT 1436557 Includes bibliographic references (leaves 39-45).
Garimella, Bhavani. "Distributed detection and data fusion in resource constrained wireless sensor networks." Thesis, 2005. http://hdl.handle.net/10057/740.
Повний текст джерелаThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering.
"December 2005."
Wang, Kuan-Hsun, and 王冠勛. "EcoDB: A Lightweight Debugging Tool for Resource Constrained Wireless Sensor Platforms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67934251719118796087.
Повний текст джерела國立清華大學
資訊工程學系
99
In this thesis, we propose a lightweight debugging tool named EcoDB for resource-constrained wireless sensor platforms. EcoDB runs a simulator and a source-level debugger simultaneously. We use both the simulator and the source-level debugger to provide the information that the developer of the system needs to diagnose the problem, and we provide the option to save the traced output to a Micro-SD card to eliminate the overhead of data communication. EcoDB minimize its side effects on the program being debugged. As a result, EcoDB requires 689 bytes of data memory and 135 bytes of program memory and does not alter functional behavior or energy usage of the original WSN application program.
Pereira, Felisberto Sequeira. "Solutions for resource constrained IoT devices." Doctoral thesis, 2021. http://hdl.handle.net/10773/31504.
Повний текст джерелаA internet das coisas, conhecida pela sigla inglesa IoT (Internet of Things), tem se desenvolvido no sentido de se tornar numa rede de informação com participação e interação de vários dispositivos. Já espalhados por todo o mundo, nas mais diversas formas e aplicações, os dispositivos IoT precisam de se reinventar para responder aos novos desafios e requisitos. Esta tese concentra-se no desenvolvimento de soluções passivas, semi-passivas e ativas para responder aos desafios relacionados com eficiência energética e comunicação. Nesse sentido, vários tópicos como comunicação backscatter, transmissão de energia sem fios, colheita de energia, sensores sem chip, transmissão de energia e informação em simultâneo e comunicação de baixo consumo e longo alcance serão explorados desenvolvendo um conjunto de contribuições. Alem disso, sempre que possível, as soluções desenvolvidas são implementadas e testadas em cenários de aplicações reais contribuindo para um melhor entendimento da sua viabilidade.
Programa Doutoral em Engenharia Eletrotécnica
Wang, Wei. "Quality-driven cross layer design for multimedia security over resource constrained wireless sensor networks." 2009. http://proquest.umi.com/pqdweb?did=1933031681&sid=9&Fmt=2&clientId=14215&RQT=309&VName=PQD.
Повний текст джерелаTitle from title screen (site viewed March 2, 2010). PDF text: ix, 110 p. : ill. (chiefly col.) ; 3 Mb. UMI publication number: AAT 3386564. Includes bibliographical references. Also available in microfilm and microfiche formats.
Arazi, Ortal. "Self-Certified Public Key Cryptographic Methodologies for Resource-Constrained Wireless Sensor Networks." 2007. http://trace.tennessee.edu/utk_graddiss/117.
Повний текст джерелаArazi, Ortal. "Self-certifed public key cryptographic methodologies for resource-constrained wireless sensor networks." 2007. http://etd.utk.edu/2007/AraziOrtal.pdf.
Повний текст джерелаWacker, Arno [Verfasser]. "Key distribution schemes for resource constrained devices in wireless sensor networks / vorgelegt von Arno Rüdiger Wacker." 2008. http://d-nb.info/989092143/34.
Повний текст джерела