{"title":"Improved wireless sensor networks durability through efficient sink motion strategy","authors":"M. Aliouat, Z. Aliouat","doi":"10.1109/ICWISE.2014.7042662","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042662","url":null,"abstract":"Over more than one decade, Wireless Sensor Networks (WSN) continue to draw more and more researchers attention because of the enormous benefit potential they may provide for industrial and socio-economical domains. Increasingly, lots of WSN applications are developed for many strategic, vital and comfort purpose areas. However, the prediction of WSNs widespread development has not yet reached the expected satisfactory level because of many obstacles slowing down their maturity. So, the limited energy budget the nodes have to use is the most decisive factor on which a WSN relies on. Knowing that the mainspring of a WSN is to provide end user with surroundings information gathered by sink from cluster heads, and the energy dissipation is proportional to distance between sender and receiver, so moving sink near clusterheads to collect sensed data is more advantageous. In this paper, we propose a new sink moving strategy and new clusters formation algorithm for which performance evaluation results obtained through NS2 simulator in terms of energy saving and WSN life time improvement are very convincing.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127633077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RF and battery performance study for WSN in palm oil plantation applications","authors":"I. Yusoff, A. N. Harun, Siti Sarah Ramli","doi":"10.1109/ICWISE.2014.7042666","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042666","url":null,"abstract":"This paper presents the architecture of Wireless Sensor Network (WSN) for Precision Agriculture application particularly on RF and battery performance of the mote. The WSN consists of energy-efficient and scalable communication protocols and low power hardware platforms. The architecture comprises of four main parts- (a) the sensor tip, (b) the mote, (c) the router and (d) the gateway to address the needs of wireless sensor networks. The sensor node (mote and tip) powered by 2xAA-size batteries and can sleep at a very low current. This paper discussed on the RF performance by doing two type of test; transmit power and receiver sensitivity. A power management test was also carried out to identify maximum current during mote transmitting and minimum current during sleep mode. Details of the test and conclusion are described in this paper.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating TOA/TDOA packet based localization methods","authors":"Amin Gholoobi, S. Stavrou","doi":"10.1109/ICWISE.2014.7042657","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042657","url":null,"abstract":"Time-based localization methods can be especially useful in dynamic environments, where the usefulness of Received Signal Strength (RSS) fingerprint based methods can be limited. Typical `off the shelf' 802.11 network packet time-based methods, tend to collect a large number of packets and apply statistical analysis in order to localize a user. This packet collection process typically lies in the range of minutes, thus turning this type of localization into a non-real time process. This paper presents a method to accelerate network packet time based methods. By accelerating packet capturing in conjunction with packet validation, it has been shown that the localization process time can be shortened without reducing positioning accuracy.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wi-Fi intruder detection","authors":"Rui Fernandes, J. N. Matos, T. Varum, P. Pinho","doi":"10.1109/ICWISE.2014.7042668","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042668","url":null,"abstract":"Nowadays, people are always concerned about security, not only about their own but also of their goods. Trying to solve this problem, this system presents itself as a convenient and interesting low-cost solution for intruder detection. Based on only Wi-Fi routers and laptops, widely spread infrastructures, we proposed an innovative alternative, capable of detecting intruders by sensing the different electromagnetic perturbation caused. These interference are sensed by the system through the changes in the acquired Wi-Fi Received Signal Strength Indicator (RSSI) data, trigged by the presence of obstacles/targets between the transmitter and receiver. Additionally, to enhance the detection capacity of the system, was evaluated the usage of Wavelet coefficient analysis of the RSSI results.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing Wireless Sensor Networks durability through fault nodes resilience capability","authors":"M. Aliouat, Z. Aliouat","doi":"10.1109/ICWISE.2014.7042660","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042660","url":null,"abstract":"A Wireless Sensor Network (WSN) is mission dependent and deployed in an interesting area in order to collect information describing an observable phenomenon. In a clustering configuration approach, nodes are organized in clusters, within one ClusterHead (CH) node is responsible for managing and scheduling sensed data communications among standard nodes and sink. So, the success of a WSN mission is tightly relied on the robustness of indispensable nodes: CH and sink. Since WSNs are generally deployed in harsh environments, CHs and Sink are prone to failures so, the survival of a WSN depends strictly on survival of its sink and CHs. In this paper, we investigate the ability to render CHs and sink more resilient to failure. To this end, we propose a protocol avoiding sink and CHs to be central point of failure and making them more faults tolerant. Simulation carried out via PowerTOSSIM/TinyOS showed attracting and convincing results.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RF-MIMO for smart metering communication under harsh conditions","authors":"Leszek Koschel, Kim Mahler, R. Felbecker, M. Frey","doi":"10.1109/ICWISE.2014.7042661","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042661","url":null,"abstract":"The utilities that want to remotely access their smart meters face a serious problem when it comes to the basement-to-dwelling or basement-to-concentrator barrier. In this paper, we design and implement a wireless communication system able to provide communication to the smart meters mounted in basements. Firstly, we analyze measurements of wireless channels in 100-1200 MHz frequency range, including 2×2 MIMO configuration. The measurements base on different propagation environments typical for big European cities. After the channel characterization, we propose a radio-frequency multiple-input multiple-output (RF-MIMO) extension for small-scale-fading compensation. Moreover, we study several RF-MIMO algorithms for spatial diversity gain. Subsequently, we identify the most suitable frequency bands - 169 and 869 MHz, and calculate a link budget for coverage estimation. Finally, we implement a proof-of-concept prototype.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133062243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for Artificial Neural controllers on wireless sensor network","authors":"D. Clement, Bertelle Cyrille","doi":"10.1109/ICWISE.2014.7042663","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042663","url":null,"abstract":"Wireless Sensor Network (WSN) is composed of autonomous devices which collaborate to manage an environment. In this paper, distributed Artificial Neural Network (ANN) learning process methodology is investigated to control such environments. After studying ANN complexity to learn several functioning scenarios, a distributed Neural Voting Procedure is proposed to select the most adapted ANN according to decision-making of all nodes. Finally, the use of several Artificial Neural Controller (ANC) with an arbitration procedure is prefered to the use of one single ANC regarding to execution and deployment costs on the WSN.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ad hoc mobility model based on realistic human interactions","authors":"He Ren, Qinlong Wang","doi":"10.1109/ICWISE.2014.7042654","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042654","url":null,"abstract":"Simulation is important for the validation of mobile ad hoc network protocols, and the effectiveness of simulation relies largely on what mobility model is used and how realistic the model is. Although there is an increasing amount of real traces in the public domain like CRAWDAD, the availability of them is still so limited that synthetic models are necessary for simulations. In order to simplify real movement patterns, most of the existing synthetic models generate movements with great randomness, and thus the initiative of people is not sufficiently reflected. Besides, instead of moving randomly, city residents or workers tend to regard only one location as more important than any other locations in many cases. For an individual, such a place may be his home in the neighborhood or his own desk in the office, and we call it a most important place (MIP), which is distinguished from other places. According to these real scenarios, we propose a new mobility model based on human interactions, taking into consideration human relationships, the distances of moving and the effect of MIPs. In the model, we quantify these factors in matrices and integrate them to calculate the probabilities of individuals selecting every possible destination. With the transfer-probability matrix determined, movements of each individual are equal to a Markov process, in which one location is viewed as one state of the Markov chain. Then we implement our model and give a dynamic demonstration of the moving nodes. To evaluate the reliability of our model, we use a CRAWDAD real trace as the baseline for comparison, and the result shows that our trace is close to reality.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model","authors":"Biswajit Panja, Z. Scott, Priyanka Meharia","doi":"10.1109/ICWISE.2014.7042664","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042664","url":null,"abstract":"Litigation faced by the NFL has called for better prevention and understanding of concussions and other sports injuries. To achieve this, sports officials have turned to wireless sensor networks, or WSNs, in the form of helmet sensors that automatically report any harmful injuries to attendants on the sidelines. While this approach provides players with a greater assurance of safety and a faster response to their injuries, the security weaknesses of WSNs must be addressed. These systems, being not only recently developed but also highly resource-constrained, may be easily manipulated by those looking to gain information about players (a form of passive attack) or even attempting to remove them from the game through the sending of false reports (a form of active attack). To prevent attacks such as these, we propose a system that uses a modification of the AES-CCM protocol as well as a novel attack detection system that uses probabilistic methods to report any harmful behavior to the user. The system's power usage due to injury reports is compared to a probability model that is based on past research that recorded the likelihood of injury for the positions played in professional football. This system offers many advantages over conventional cryptography as it is a lightweight approach that costs few resources; individual helmet sensors need only send simple power reports to a central base station which uses on-the-grid power to conduct security analysis. Provided below is detail of the paper which describes the problem in greater detail, a section that details the system architecture, a section that explains the AES-CCM protocol, and an explanation of the probabilistic approach. This is followed by a security analysis that compares the approach to several other approaches found in the literature, and finally a conclusion.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Target coverage management in wireless sensor networks","authors":"B. Diop, Dame Diongue, Ousmane Thiaré","doi":"10.1109/ICWISE.2014.7042656","DOIUrl":"https://doi.org/10.1109/ICWISE.2014.7042656","url":null,"abstract":"As an important issue reflecting the QoS of the sensing task, coverage problem impacts widely on the performance of wireless sensor networks. The target coverage lifetime maximization problem is yet a challenging problem, which tries to settle a compromise between managing the coverage of a set of targets and maximizing the lifetime of the network. This problem becomes more accurate when targets detection is distance dependent. In this paper, we address the target coverage lifetime maximization problem by considering a probabilistic coverage model, which takes into account the distance parameter. We propose an algorithm based on a modified version of the classical well-known weighed set cover which organizes sensors in disjoint and non-disjoint set covers. Performance evaluation of our solution indicated good performance in managing coverage of targets while extending the network lifetime.","PeriodicalId":202159,"journal":{"name":"2014 IEEE Conference on Wireless Sensors (ICWiSE)","volume":"112 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}