{"title":"无线传感器网络在无处不在的家庭环境中的语音捕获","authors":"Luis E. Palafox, J. A. García-Macías","doi":"10.1109/ISWPC.2009.4800614","DOIUrl":null,"url":null,"abstract":"In this paper we introduce a voice capture application using a wireless sensor network; our main contribution is the integration of a novel capture technique specifically designed for hierarchical wireless sensor networks. Furthermore, we show the challenges involved in the implementation of our experimental prototype which is oriented towards a secure ubiquitous home environment but could be extended to other similar scenarios. We performed a series of experiments on our prototype implementation, the results of those experiments showed that our approach consumes less energy than the traditional capture and send approach. Additionally, our technique provides basic security services such as authentication and confidentiality for control messages without incurring in additional energy consumption.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Wireless Sensor Networks for Voice Capture in Ubiquitous Home Environments\",\"authors\":\"Luis E. Palafox, J. A. García-Macías\",\"doi\":\"10.1109/ISWPC.2009.4800614\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we introduce a voice capture application using a wireless sensor network; our main contribution is the integration of a novel capture technique specifically designed for hierarchical wireless sensor networks. Furthermore, we show the challenges involved in the implementation of our experimental prototype which is oriented towards a secure ubiquitous home environment but could be extended to other similar scenarios. We performed a series of experiments on our prototype implementation, the results of those experiments showed that our approach consumes less energy than the traditional capture and send approach. Additionally, our technique provides basic security services such as authentication and confidentiality for control messages without incurring in additional energy consumption.\",\"PeriodicalId\":383593,\"journal\":{\"name\":\"2009 4th International Symposium on Wireless Pervasive Computing\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 4th International Symposium on Wireless Pervasive Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISWPC.2009.4800614\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 4th International Symposium on Wireless Pervasive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWPC.2009.4800614","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless Sensor Networks for Voice Capture in Ubiquitous Home Environments
In this paper we introduce a voice capture application using a wireless sensor network; our main contribution is the integration of a novel capture technique specifically designed for hierarchical wireless sensor networks. Furthermore, we show the challenges involved in the implementation of our experimental prototype which is oriented towards a secure ubiquitous home environment but could be extended to other similar scenarios. We performed a series of experiments on our prototype implementation, the results of those experiments showed that our approach consumes less energy than the traditional capture and send approach. Additionally, our technique provides basic security services such as authentication and confidentiality for control messages without incurring in additional energy consumption.