Abdenour Kifouche, G. Baudoin, R. Hamouche, R. Kocik
{"title":"Generic sensor network for building monitoring: design, issues, and methodology","authors":"Abdenour Kifouche, G. Baudoin, R. Hamouche, R. Kocik","doi":"10.1109/ICWISE.2017.8267158","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267158","url":null,"abstract":"In recent years, sensor networks have attracted great interests and have brought solutions in several areas. They can be used in natural disaster management, intrusion detection, pollution control, medical surveillance, etc. This article describes our experiments in development, deployment and data exploitation of sensor network. This network aims to study pollution and increase energy efficiency of several systems located in buildings. We developed and deployed the sensor network in buildings of our school. The network consists of generic and modular sensors. The sensors collect several data such as temperature, humidity, ambient light, carbon monoxide, etc. Subsequently, these data are transmitted to a base station. By using a human machine interface, these data can be visualized and processed in real time. During and after the development and implementation of this network, we identified issues related to energy constraints, network scale, increased complexity, physical environment, and financial and temporal costs. To solve these issues, we propose to explore new development methods based on model driven approach that reduce costs and efforts and ensure consistency.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on software defined network approaches for achieving energy efficiency in wireless sensor network","authors":"N. F. Ali, A. Said, K. Nisar, I. Aziz","doi":"10.1109/ICWISE.2017.8267157","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267157","url":null,"abstract":"The proliferation of sensor technology in many areas have gained more attention on Wireless Sensor Network (WSN) from both research community and actual user. However, energy consumption continues to be a constrained resource and remains a crucial issue of this technology. Since data transmission and communication in the network consumed a lot of energy in WSN, the activity of the sensor nodes should be altered to prolong the lifetime of the network. To this end, this paper provides the survey on how Software-Defined Networks (SDN) approach has been used to reduce the energy consumption in WSN. Software-defined network is developed with the purpose to facilitate the emergence of the centralized control of the network data-path in which resulted in compliance by decoupling the control and forwarding planes. With this paper, readers can be more understanding better of how software-defined network works and the effectiveness of using software-defined network in handling the shortcomings in WSN.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. F. Olanrewaju, Ku Afiza Ku Zahir, A. L. Asnawi, M. Sanni, Abdulkadir Adekunle Ahmed
{"title":"Modelling of intelligent intrusion detection system: making a case for snort","authors":"R. F. Olanrewaju, Ku Afiza Ku Zahir, A. L. Asnawi, M. Sanni, Abdulkadir Adekunle Ahmed","doi":"10.1109/ICWISE.2017.8267152","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267152","url":null,"abstract":"Intrusion Detection System (IDS) is a dynamic network security defense technology that can help to provide realtime detection of internal and external attacks on a computer network and alerting the administration for necessary action. However, the inconsistent nature of networks has resulted in a high number of false positives which makes many network administrators thought IDS to be unreliable for today’s network security system. Nowadays, hackers and attackers have created many new viruses and malware to invade one’s computer network system. Hence, this study proposes a method for early detection of an intrusion by using Snort software. The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). Preprocessing was done to classify the output data into normal and attack. Performance evaluation was done using confusion matrix on the data. The results showed that network-based intrusion detection system could be employed for early detection of intrusion due to the excellent performance recorded which were 94.92% of accuracy, 97.97% for sensitivity, and 0.69% for FPR.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saffiyah Doolan, Nicholas Hoseiny, Patrick Hosein, D. Bhagwandin
{"title":"Constant time, fixed memory, zero false negative error logging for low power wearable devices","authors":"Saffiyah Doolan, Nicholas Hoseiny, Patrick Hosein, D. Bhagwandin","doi":"10.1109/ICWISE.2017.8267156","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267156","url":null,"abstract":"Wireless wearable embedded devices dominate the Internet of Things (IoT) due to their ability to provide useful information about the body and its local environment. The constrained resources of low power processors, however, pose a significant challenge to run-time error logging and hence, product reliability. Error logs classify error type and often system state following the occurrence of an error. Traditional error logging algorithms attempt to balance storage and accuracy by selectively overwriting past log entries. Since a specific combination of firmware faults may result in system instability, preserving all error occurrences becomes increasingly beneficial as IOT systems become more complex. In this paper, a novel hash-based error logging algorithm is presented which has both constant insertion time and constant memory while also exhibiting no false negatives and an acceptable false positive error rate. Both theoretical analysis and simulations are used to compare the performance of the hash-based and traditional approaches.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127606954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
German Shein, Sankar Sathynaryanan, A. Sagahyroon, Michel Pasquier
{"title":"Sensors equipped mattress for assessing sleep apnea symptoms","authors":"German Shein, Sankar Sathynaryanan, A. Sagahyroon, Michel Pasquier","doi":"10.1109/ICWISE.2017.8267159","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267159","url":null,"abstract":"Sleep apnea is a sleep disorder characterized mainly by episodes of cessation of breathing or shallow breathing. Around 20 million adult Americans are reported to suffer from this disease and often times it is detected too late by subjecting the individual to an expensive procedure of polysomnography that can be completed only in a fully equipped sleep lab within a medical facility. In this work, we propose a novel solution that assists in detecting the symptoms at an early stage. The idea is to convert the sleeping mattress to a monitoring platform in a nonintrusive manner. The mattress is embedded with sensory devices that reads physiological parameters related to apnea detection and transmit it to a server where residing algorithms analyses the collected data and generate an informed decision of whether the person might be suffering from the apnea sleep disorder. The implemented system is tested on few subjects with promising results.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eliya Fariha Rusli, I. Aziz, J. Jaafar, N. Haron, S. Qaiyum, N. F. Ali
{"title":"Pipeline leakage alert system with water displacement detection","authors":"Eliya Fariha Rusli, I. Aziz, J. Jaafar, N. Haron, S. Qaiyum, N. F. Ali","doi":"10.1109/ICWISE.2017.8267154","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267154","url":null,"abstract":"This study examined the issues of pipeline leakage of non-revenue water which is caused by pipe burst, pipe leakage and meter inaccuracy. In England and Wales, 3, 108, 000 liters of water from treatment plant are wasted daily through the pipeline leakages due it was never arrived to the taps. The existing system are still lacking abilities to detect accurate estimation of water pressure along the pipe and give immediate and real time warning. The aims are to perform a small-scale study of existing pipeline leakage detection system, to develop a real-time prototype pipeline leakage alert system and to validate the proposed prototype through experimentation. Mobile phone can be configured as the alerts transmitter of the system to the user in cases water leaks.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel method of detecting stairs for the blind","authors":"Jahan Razavi, Ted Shinta","doi":"10.1109/ICWISE.2017.8267155","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267155","url":null,"abstract":"This paper proposes a device that helps the blind detect stairs. A simple, efficient approach based on ultrasound sensing measures the distance from the user’s head to the ground and detects changes that represent a step up or a step down. Our system is built on a pair of sunglasses and employs an ultrasound sensor, a gyroscope, an Arduino Nano, and two buzzers. The wearer uses calibration to store a reference distance, which is later utilized to determine the presence of steps. Measured results indicate that the rate of false alarms depends on numerous factors, such as the width of the passageway, proximity of other objects, the subject’s height, and his/her walking gait.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security challenges in internet of things: survey","authors":"H. Ghorbani, M. Hossein Ahmadzadegan","doi":"10.1109/ICWISE.2017.8267153","DOIUrl":"https://doi.org/10.1109/ICWISE.2017.8267153","url":null,"abstract":"The Internet of Things is part of our everyday life, which applies to all aspects of human life; from smart phones and environmental sensors to smart devices used in the industry. Although the Internet of Things has many advantages, there are risks and dangers as well that need to be addressed. The information used and transmitted on Internet of Things contain important info about the daily lives of people, banking information, location and geographical information, environmental and medical information, together with many other sensitive data. Therefore, it is critical to identify and address the security issues and challenges of Internet of Things. In this article, considering the broad scope of this field and its literature, we are going to express some comprehensive information on security challenges of the Internet of Things.","PeriodicalId":414964,"journal":{"name":"2017 IEEE Conference on Wireless Sensors (ICWiSe)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}