WorldWideScience

Sample records for wireless solutions key

  1. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  2. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  3. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  4. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  5. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  6. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  7. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  8. Characteristics of Key Update Strategies for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys...... is one of the essential points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we investigate key update methods that may be used in wireless sensor networks, and benefiting from stochastic model checking we derive characteristics...... of these methods in security perspective....

  9. Implementation of diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography

    DEFF Research Database (Denmark)

    Khajuria, Samant; Tange, Henrik

    2009-01-01

    This work describes a low-cost public key cryptography (PKC) based solution for security services such as authentication as required for wireless sensor networks. We have implemented a software approach using elliptic curve cryptography (ECC) over GF (2m) in order to obtain stronger cryptography...

  10. Final Scientific Report - Wireless and Sensing Solutions Advancing Industrial Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Budampati, Rama; McBrady, Adam; Nusseibeh, Fouad

    2009-09-28

    The project team's goal for the Wireless and Sensing Solution Advancing Industrial Efficiency award (DE-FC36-04GO14002) was to develop, demonstrate, and test a number of leading edge technologies that could enable the emergence of wireless sensor and sampling systems for the industrial market space. This effort combined initiatives in advanced sensor development, configurable sampling and deployment platforms, and robust wireless communications to address critical obstacles in enabling enhanced industrial efficiency.

  11. Implementation of diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography

    DEFF Research Database (Denmark)

    Khajuria, Samant; Tange, Henrik

    2009-01-01

    This work describes a low-cost public key cryptography (PKC) based solution for security services such as authentication as required for wireless sensor networks. We have implemented a software approach using elliptic curve cryptography (ECC) over GF (2m) in order to obtain stronger cryptography....... In our approach we are using Koblitz curves and TNAF (pi-adic non-adjacent form) with partial reduction modulo. A Diffie-Hellman key exchange is implemented. This public key exchange is done between two participants in the network. The actual implementation is done at an 8-bit ATmega128L Micaz platform...

  12. Wireless device connection problems and design solutions

    Science.gov (United States)

    Song, Ji-Won; Norman, Donald; Nam, Tek-Jin; Qin, Shengfeng

    2016-09-01

    Users, especially the non-expert users, commonly experience problems when connecting multiple devices with interoperability. While studies on multiple device connections are mostly concentrated on spontaneous device association techniques with a focus on security aspects, the research on user interaction for device connection is still limited. More research into understanding people is needed for designers to devise usable techniques. This research applies the Research-through-Design method and studies the non-expert users' interactions in establishing wireless connections between devices. The "Learning from Examples" concept is adopted to develop a study focus line by learning from the expert users' interaction with devices. This focus line is then used for guiding researchers to explore the non-expert users' difficulties at each stage of the focus line. Finally, the Research-through-Design approach is used to understand the users' difficulties, gain insights to design problems and suggest usable solutions. When connecting a device, the user is required to manage not only the device's functionality but also the interaction between devices. Based on learning from failures, an important insight is found that the existing design approach to improve single-device interaction issues, such as improvements to graphical user interfaces or computer guidance, cannot help users to handle problems between multiple devices. This study finally proposes a desirable user-device interaction in which images of two devices function together with a system image to provide the user with feedback on the status of the connection, which allows them to infer any required actions.

  13. A key technology for standardizing outdoor optical wireless communications

    Directory of Open Access Journals (Sweden)

    Yuwei Su

    2017-06-01

    Full Text Available In this paper, we introduce a key technology, polarization modulation (PM, which should be taken into account when standardizing outdoor optical wireless communications (OWC, also known as free-space optical communications (FSO. We analyze the distortion of the polarization state when a laser beam propagates through the atmospheric channel. The floating range of the optical polarization was estimated and the necessity of researching the proposed technology was discussed. Moreover, we conducted a comparison between the PM-based FSO system and intensity modulation-based FSO system. The conclusions will be helpful in establishing the FSO standard architectures.

  14. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  15. Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Dragoni, Nicola

    2015-01-01

    Energy Harvesting - Wireless Sensor Networks (EH-WSNs) constitute systems of networked sensing nodes that are capable of extracting energy from the environment and that use the harvested energy to operate in a sustainable state. Sustainability, seen as design goal, has a significant impact...... on the design of the security protocols for such networks, as the nodes have to adapt and optimize their behaviour according to the available energy. Traditional key management schemes do not take energy into account, making them not suitable for EH-WSNs. In this paper we propose a new multipath key...... reinforcement scheme specifically designed for EH-WSNs. The proposed scheme allows each node to take into consideration and adapt to the amount of energy available in the system. In particular, we present two approaches, one static and one fully dynamic, and we discuss some experimental results....

  16. Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks

    Directory of Open Access Journals (Sweden)

    AtaUllah Ghafoor

    2016-01-01

    Full Text Available Key distribution is essential for providing secure communication between commercial and sensitive applications of wireless sensor and actor networks (WSANs. It becomes more challenging when any of the intermediate sensor nodes is compromised by the adversaries as the messages carrying secure keys will be exposed and links will be unreliable. This paper presents a Disjoint Key Establishment Protocol (DKEP that does not require transmitting keys across the nodes. In DKEP, each node is preloaded with one row and one column from a matrix. After the deployment, indices for row and column are exchanged between the two nodes and values at intersection of row and column index will be used to calculate the key on each node. DKEP is verified by performing formal analysis using Rubin Logic and validated using simulations in NS-2. Simulation results demonstrate the effectiveness and efficiency of DKEP compared to contemporary schemes in terms of reducing storage and communication cost and improving resilience against node compromise attacks. Moreover, the proposed scheme is implemented in a group-based mobile application scenario for secure message exchange.

  17. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wenchao Liu

    2014-06-01

    Full Text Available Secret key leakage in wireless sensor networks (WSNs is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM storage. Physically Unclonable Function (PUF is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3 memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications.

  18. The theories and key technologies for the new generation mine wireless information system

    Energy Technology Data Exchange (ETDEWEB)

    Yang, W.; Feng, X.; Cheng, S.; Sun, J. [Beijing Jiaotong University, Beijing (China). Key Laboratory of ARP Optical Network and Advanced Telecommunication Network

    2004-07-01

    Breaking through the traditional mine wireless communication theories and technologies, combining advanced wireless communication technologies, wireless network technologies with optical fiber communication technologies have been proposed to construct a new generation mine wireless information system. This has a full range of functions such as managing mobile communications, vehicle positioning and navigation, personnel positioning and tracing, wireless multimedia surveillance, mobile computing and mine environment parameters monitoring. The relevant theories and key technologies were proposed. The urgency to do research work for China is stressed. 10 refs., 2 figs.

  19. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    Science.gov (United States)

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  20. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring

    Science.gov (United States)

    Darwish, Ashraf; Hassanien, Aboul Ella

    2011-01-01

    Wireless sensor network (WSN) technologies are considered one of the key research areas in computer science and the healthcare application industries for improving the quality of life. The purpose of this paper is to provide a snapshot of current developments and future direction of research on wearable and implantable body area network systems for continuous monitoring of patients. This paper explains the important role of body sensor networks in medicine to minimize the need for caregivers and help the chronically ill and elderly people live an independent life, besides providing people with quality care. The paper provides several examples of state of the art technology together with the design considerations like unobtrusiveness, scalability, energy efficiency, security and also provides a comprehensive analysis of the various benefits and drawbacks of these systems. Although offering significant benefits, the field of wearable and implantable body sensor networks still faces major challenges and open research problems which are investigated and covered, along with some proposed solutions, in this paper. PMID:22163914

  1. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring

    Directory of Open Access Journals (Sweden)

    Ashraf Darwish

    2011-05-01

    Full Text Available Wireless sensor network (WSN technologies are considered one of the key research areas in computer science and the healthcare application industries for improving the quality of life. The purpose of this paper is to provide a snapshot of current developments and future direction of research on wearable and implantable body area network systems for continuous monitoring of patients. This paper explains the important role of body sensor networks in medicine to minimize the need for caregivers and help the chronically ill and elderly people live an independent life, besides providing people with quality care. The paper provides several examples of state of the art technology together with the design considerations like unobtrusiveness, scalability, energy efficiency, security and also provides a comprehensive analysis of the various benefits and drawbacks of these systems. Although offering significant benefits, the field of wearable and implantable body sensor networks still faces major challenges and open research problems which are investigated and covered, along with some proposed solutions, in this paper.

  2. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    NARCIS (Netherlands)

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  3. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.

    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by

  4. Bandwidth Management in Wireless Home Networks for IPTV Solutions

    Directory of Open Access Journals (Sweden)

    Tamás Jursonovics

    2013-01-01

    Full Text Available The optimal allocation of the retransmission bandwidth is essential for IPTV service providers to ensure maximal service quality. This paper highlights the relevance of the wireless transport in today’s IPTV solution and discusses how this new media affects the existing broadcast technologies. A new Markovian channel model is developed to address the optimization issues of the retransmission throughput, and a new method is presented which is evaluated by empirical measurements followed by mathematical analysis.

  5. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring

    OpenAIRE

    Darwish, Ashraf; Hassanien, Aboul Ella

    2011-01-01

    Wireless sensor network (WSN) technologies are considered one of the key research areas in computer science and the healthcare application industries for improving the quality of life. The purpose of this paper is to provide a snapshot of current developments and future direction of research on wearable and implantable body area network systems for continuous monitoring of patients. This paper explains the important role of body sensor networks in medicine to minimize the need for caregivers ...

  6. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  7. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  8. Feasibility analysis of AP1000 wireless communication system and selection of technical solutions

    International Nuclear Information System (INIS)

    Zhao Xin

    2012-01-01

    This article expatiates the rationality and feasibility of AP1000 nuclear power plant adopts wireless communication system as the first choice in routine and emergency operations, compares and analysed. 5 major wireless communication technology solutions, and introduces the Wi-Fi based wireless communication system architecture. (author)

  9. A Practical Solution for Time Synchronization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    COCA, E.

    2012-11-01

    Full Text Available Time synchronization in wireless sensor node networks is a hot topic. Many papers present various software algorithms and hardware solutions to keep accurate time information on mobile nodes. In terms of real life applications wireless sensor nodes are preferred in many domains, starting with simple room monitoring and finishing with pipeline surveillance projects. Positioning applications are far more restrictive on timekeeping accuracy, as for the velocity of nodes calculations precise time or time difference values are needed. The accuracy of time information on nodes has to be always correlated with the application requirements. In this paper, we present some considerations regarding time synchronization linked with specific needs for individual practical applications. A practical low energy method of time keeping at node level is proposed and tested. The performances of the proposed solution in terms of short and long term stability and energy requirements are analyzed and compared with existing solutions. Simulation and experimental results, some advantages and disadvantages of the method are presented at the end of the paper.

  10. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  11. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  12. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  13. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    Science.gov (United States)

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  14. Key agreement in peer-to-peer wireless networks

    DEFF Research Database (Denmark)

    Cagalj, Mario; Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any ...

  15. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  16. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  17. Buffer Sizing in Wireless Networks: Challenges, Solutions, and Opportunities

    KAUST Repository

    Showail, Ahmad

    2016-04-01

    Buffer sizing is an important network configuration parameter that impacts the Quality of Service (QoS) characteristics of data traffic. With falling memory costs and the fallacy that \\'more is better\\', network devices are being overprovisioned with large bu ers. This may increase queueing delays experienced by a packet and subsequently impact stability of core protocols such as TCP. The problem has been studied extensively for wired networks. However, there is little work addressing the unique challenges of wireless environment such as time-varying channel capacity, variable packet inter-service time, and packet aggregation, among others. In this paper we discuss these challenges, classify the current state-of-the-art solutions, discuss their limitations, and provide directions for future research in the area.

  18. Hybrid algorithm: A cost efficient solution for ONU placement in Fiber-Wireless (FiWi) network

    Science.gov (United States)

    Bhatt, Uma Rathore; Chouhan, Nitin; Upadhyay, Raksha

    2015-03-01

    Fiber-Wireless (FiWi) network is a promising access technology as it integrates the technical merits of optical and wireless access networks. FiWi provides large bandwidth and high stability of optical network and lower cost of wireless network respectively. Therefore, FiWi gives users to access broadband services in an "anywhere-anytime" way. One of the key issues in FiWi network is its deployment cost, which depends on the number of ONUs in the network. Therefore optimal placement of ONUs is desirable to design a cost effective network. In this paper, we propose an algorithm for optimal placement of ONUs. First we place an ONU in the center of each grid then we form a set of wireless routers associated with each ONU according to wireless hop number. The number of ONUs are minimized in such a way, that all the wireless routers can communicate to at least one of the ONUs. The number of ONUs in the network further reduced by using genetic algorithm. The effectiveness of the proposed algorithm is tested by considering Internet traffic as well as peer-to-peer (p2p) traffic in the network, which is a current need. Simulation results show that the proposed algorithm is better than existing algorithms in minimizing number of ONUs in the network for both types of traffics. Hence proposed algorithm offers cost effective solution to design the FiWi network.

  19. Wireless Sensor Network for Advanced Energy Management Solutions

    Energy Technology Data Exchange (ETDEWEB)

    Peter J. Theisen; Bin Lu, Charles J. Luebke

    2009-09-23

    Eaton has developed an advanced energy management solution that has been deployed to several Industries of the Future (IoF) sites. This demonstrated energy savings and reduced unscheduled downtime through an improved means for performing predictive diagnostics and energy efficiency estimation. Eaton has developed a suite of online, continuous, and inferential algorithms that utilize motor current signature analysis (MCSA) and motor power signature analysis (MPSA) techniques to detect and predict the health condition and energy usage condition of motors and their connect loads. Eaton has also developed a hardware and software platform that provided a means to develop and test these advanced algorithms in the field. Results from lab validation and field trials have demonstrated that the developed advanced algorithms are able to detect motor and load inefficiency and performance degradation. Eaton investigated the performance of Wireless Sensor Networks (WSN) within various industrial facilities to understand concerns about topology and environmental conditions that have precluded broad adoption by the industry to date. A Wireless Link Assessment System (WLAS), was used to validate wireless performance under a variety of conditions. Results demonstrated that wireless networks can provide adequate performance in most facilities when properly specified and deployed. Customers from various IoF expressed interest in applying wireless more broadly for selected applications, but continue to prefer utilizing existing, wired field bus networks for most sensor based applications that will tie into their existing Computerized Motor Maintenance Systems (CMMS). As a result, wireless technology was de-emphasized within the project, and a greater focus placed on energy efficiency/predictive diagnostics. Commercially available wireless networks were only utilized in field test sites to facilitate collection of motor wellness information, and no wireless sensor network products were

  20. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  1. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) Wireless sensor networks provide a low-signature communications system that can be used for a... serve as the basis for our research. Then, we review existing research in key management for secure neighbor discovery. A. NEIGHBOR DISCOVERY...against Common Forms of Attack Our research served as a proof-of-concept for our key management scheme as applied to neighbor discovery; however, the

  2. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  3. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular, we show that the end-to-end application key establishment protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  4. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  5. Random Keying Technique for Security in Wireless Sensor Networks Based on Memetics

    OpenAIRE

    Sandeep Kumar, E

    2014-01-01

    International audience; Wireless Sensor Networks (WSNs) are often prone to risk of security attacks and vulnerabilities. This is because of the less human intervention in their operations. Hence, novel security mechanisms and techniques are of a prime importance in these types of networks. In this context, we propose a unique security scheme, which coalesce the random keying technique with memetics. The application of these kinds of bio-inspired computation in WSNs provides robust security in...

  6. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  7. Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ostry Diethelm

    2011-01-01

    Full Text Available Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management require not only authentication of broadcast messages, but also secrecy against eavesdroppers. In this paper we design, implement, and evaluate a novel scheme that meets the requirements of secrecy, authenticity, integrity, and freshness of broadcast messages in the context of a single-hop wireless sensor network. Our contributions are three-fold: first, we propose the use of time-varying keys (based on a key-chain for broadcast encryption, emphasising advantages such as non-forgeability, protection against old-key compromise, and allowance for dynamic data. Second, we extend the basic key-chain mechanism to incorporate limited protection against key loss, allowing legitimate receivers to recover even if they have lost a small number of keys. Third, we prototype our scheme by incorporating it into Deluge, the network programming protocol distributed with TinyOS, and quantify its cost in terms of time, space, and power consumption on a TelosB mote platform. Our scheme represents a practical, efficient and scalable means of delivering broadcast data secretly to a large number of low-power sensor nodes.

  8. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  9. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC to establish the session key and the hash message authentication code (HMAC to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.

  10. Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Azarderskhsh Reza

    2011-01-01

    Full Text Available Information security in infrastructureless wireless sensor networks (WSNs is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.

  11. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  12. Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

    Directory of Open Access Journals (Sweden)

    Longwang Cheng

    2017-01-01

    Full Text Available Exploiting the inherent physical properties of wireless channels to complement or enhance the traditional security mechanisms has attracted prominent attention recently. However, the existing secret key generation schemes suffer from miscellaneous extracting procedure. Many PHY-layer authentication schemes assume that the knowledge of the shared key is preknown. In this paper, we propose PHY-layer secret key generation and authentication schemes for orthogonal frequency-division multiplexing (OFDM systems. In the secret key generation scheme, to simplify the extracting procedure, only one legitimate party is chosen to probe the channel and quantize the measurements to obtain the preliminary key. The preliminary key is masked by the channel-phase after the mapping and before equalization and distributed to the other party. The final shared key is used for the PHY-layer authentication scheme in which random signals and the shared key masked by the channel-phase are exchanged at the PHY-layer. Then, a binary hypothesis test is formulated for authentication. Simulation results show that the proposed secret key generation scheme outperforms the existing schemes. For the PHY-layer authentication scheme, it is immune to various passive and active attacks and a high successful authentication rate is acquired even at low signal-to-noise ratio region.

  13. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  14. Two-round contributory group key exchange protocol for wireless network environments

    Directory of Open Access Journals (Sweden)

    Wu Tsu-Yang

    2011-01-01

    Full Text Available Abstract With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A group key exchange (GKE protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group communication over a public network channel. However, most of the previously proposed GKE protocols deployed in wired networks are not fully suitable for wireless network environments with low-power computing devices. Subsequently, several GKE protocols suitable for mobile or wireless networks have been proposed. In this article, we will propose a more efficient group key exchange protocol with dynamic joining and leaving. Under the decision Diffie-Hellman (DDH, the computation Diffie-Hellman (CDH, and the hash function assumptions, we demonstrate that the proposed protocol is secure against passive attack and provides forward/backward secrecy for dynamic member joining/leaving. As compared with the recently proposed GKE protocols, our protocol provides better performance in terms of computational cost, round number, and communication cost.

  15. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Pin Chang

    2015-11-01

    Full Text Available Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs. Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  16. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  17. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  18. Optimal Analytical Solution for a Capacitive Wireless Power Transfer System with One Transmitter and Two Receivers

    Directory of Open Access Journals (Sweden)

    Ben Minnaert

    2017-09-01

    Full Text Available Wireless power transfer from one transmitter to multiple receivers through inductive coupling is slowly entering the market. However, for certain applications, capacitive wireless power transfer (CWPT using electric coupling might be preferable. In this work, we determine closed-form expressions for a CWPT system with one transmitter and two receivers. We determine the optimal solution for two design requirements: (i maximum power transfer, and (ii maximum system efficiency. We derive the optimal loads and provide the analytical expressions for the efficiency and power. We show that the optimal load conductances for the maximum power configuration are always larger than for the maximum efficiency configuration. Furthermore, it is demonstrated that if the receivers are coupled, this can be compensated for by introducing susceptances that have the same value for both configurations. Finally, we numerically verify our results. We illustrate the similarities to the inductive wireless power transfer (IWPT solution and find that the same, but dual, expressions apply.

  19. An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Muhammad, K.; Jan, Z.; Khan, Z

    2015-01-01

    Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, different techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and distributed WSNs' environments. This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military networks. The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the fusion center. At the fusion center, the received encrypted data is decrypted for taking further necessary actions. The experimental results with complexity analysis, validate the effectiveness and feasibility of the proposed method in terms of security in WSNs. (author)

  20. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  1. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    Science.gov (United States)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  2. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  3. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities.

    Science.gov (United States)

    Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-11-03

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  4. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  5. Key common determinants for adoption of wireless technology in healthcare for India and Pakistan: development of a conceptual model.

    Science.gov (United States)

    Hafeez-Baig, Abdul; Gururajan, Raj

    2010-01-01

    This study explores the perception and views of healthcare professionals in the subcontinent (India and Pakistan) towards the wireless handheld technology in the healthcare setting. A mixed methodology was adopted to explore the determinants of the wireless handheld devices in the healthcare setting. Interviews were conducted with 30 healthcare professionals to explore the initial themes. This was followed up with a survey instrument, specifically developed for this study, and distributed to 300 healthcare professionals in Pakistan and India. 200 usable surveys from India and 97 from Pakistan were received. The results of the study indicate that healthcare professionals felt that to use the wireless technology, the integration of the clinical and operational process is essential. Factor analysis through SPSS showed that any development of technological solutions for handheld devices would benefit, by considering the clinical, technological, and operational influences of the wireless technology in addition to clinical influences, clinical preference, training, and technical support. The study culminated in the development of an initial conceptual framework. The scope of this study is restricted to wireless handheld devices such as the smart phones, handheld PCs and PDAs.

  6. Wearable, wireless EEG solutions in daily life applications: what are we missing?

    Science.gov (United States)

    Mihajlovic, Vojkan; Grundlehner, Bernard; Vullers, Ruud; Penders, Julien

    2015-01-01

    Monitoring human brain activity has great potential in helping us understand the functioning of our brain, as well as in preventing mental disorders and cognitive decline and improve our quality of life. Noninvasive surface EEG is the dominant modality for studying brain dynamics and performance in real-life interaction of humans with their environment. To take full advantage of surface EEG recordings, EEG technology has to be advanced to a level that it can be used in daily life activities. Furthermore, users have to see it as an unobtrusive option to monitor and improve their health. To achieve this, EEG systems have to be transformed from stationary, wired, and cumbersome systems used mostly in clinical practice today, to intelligent wearable, wireless, convenient, and comfortable lifestyle solutions that provide high signal quality. Here, we discuss state-of-the-art in wireless and wearable EEG solutions and a number of aspects where such solutions require improvements when handling electrical activity of the brain. We address personal traits and sensory inputs, brain signal generation and acquisition, brain signal analysis, and feedback generation. We provide guidelines on how these aspects can be advanced further such that we can develop intelligent wearable, wireless, lifestyle EEG solutions. We recognized the following aspects as the ones that need rapid research progress: application driven design, end-user driven development, standardization and sharing of EEG data, and development of sophisticated approaches to handle EEG artifacts.

  7. Energy efficient wireless sensor networks by using a fuzzy-based solution

    Science.gov (United States)

    Tirrito, Salvatore; Nicolosi, Giuseppina

    2016-12-01

    Wireless Sensor Networks are characterized by a distributed architecture realized by a set of autonomous electronic devices able to sense data from the surrounding environment and to communicate among them. These devices are battery powered since they may be used even to monitor hazardous events in inaccessible areas. As a consequence, it is preferable to assure the adoption of energy management solutions in order to extend the WSN lifetime, as far as possible. Moreover, it is crucial to guarantee that the nodes receive the transmitted data correctly. It is clear that trading off power optimization and quality of service has become one the most important concerns when dealing with modern systems based on WSNs. This paper introduces a solution based on a Fuzzy Logic Controller (FLC) focusing on the minimization of energy consumption of wireless sensor nodes. This is made possible because the sleeping time of these nodes is dynamically regulated by a FLC.

  8. Suboptimal maximum likelihood detection of on-off keying for a wireless optical communication system.

    Science.gov (United States)

    Li, Ruijie; Ding, Shengli; Dang, Anhong

    2017-05-01

    This paper investigates a detection scheme without channel state information for wireless optical communication systems. Employing conventional on-off keying signals, we supposed that conditional probability density function P(r|0) is much bigger than P(r|1) when r<0. Under this assumption, the suboptimal maximum likelihood scheme is obtained by utilizing the probability density function without channel information. Theoretical analysis shows the performance of the proposed scheme is close to the maximum likelihood symbol-by-symbol detection. Compared with the maximum likelihood symbol by symbol detection, Monte Carlo simulations show that the performance of the proposed scheme is about 0.62 dB loss for a gamma-gamma channel with a Rytov variance of 1 at the signal-to-noise ratio of 2 dB, but the efficient algorithm makes the real-time implementation of detection based on maximum likelihood feasible. Besides, the experiment is set up under 2 Gbps, and the experimental results match well with that of the theory and simulation.

  9. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities

    Directory of Open Access Journals (Sweden)

    Paolo Bellavista

    2017-11-01

    Full Text Available The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA, a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  10. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    Science.gov (United States)

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  11. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  12. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    Science.gov (United States)

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  13. Cost-effective hybrid RF/FSO backhaul solution for next generation wireless systems

    KAUST Repository

    Dahrouj, Hayssam

    2015-10-28

    The rapid pace of demand for mobile data services and the limited supply of capacity in the current wireless access networks infrastructure are leading network operators to increase the density of base station deployments to improve network performance. This densification, made possible by small-cell deployment, also brings a novel set of challenges, specifically related to the cost of ownership, in which backhaul is of primary concern. This article proposes a cost-effective hybrid RF/free-space optical (FSO) solution to combine the advantages of RF backhauls (low cost, NLOS applications) and FSO backhauls (high-rate, low latency). To first illustrate the cost advantages of the RF backhaul solution, the first part of this article presents a business case of NLOS wireless RF backhaul, which has a low cost of ownership as compared to other backhaul candidates. RF backhaul, however, is limited by latency problems. On the other side, an FSO solution, which offers better latency and higher data rate than RF backhauls, remains sensitive to weather and nature conditions (e.g., rain, fog). To combine RF and FSO advantages, the second part of this article proposes a lowcost hybrid RF/FSO solution, wherein base stations are connected to each other using either optical fiber or hybrid RF/FSO links. This part addresses the problem of minimizing the cost of backhaul planning under reliability, connectivity, and data rate constraints, and proposes choosing the appropriate cost-effective backhaul connection between BSs (i.e., either OF or hybrid RF/FSO) using graph theory techniques.

  14. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    Science.gov (United States)

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  15. A key distribution scheme using elliptic curve cryptography in wireless sensor networks

    CSIR Research Space (South Africa)

    Louw, J

    2016-12-01

    Full Text Available protocol was designed to securely provide authenticated motes with secret system keys using ECC based cryptographic functions. The designed scheme met the minimum requirements for a key distribution scheme to be considered secure and efficient in WSNs....

  16. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  17. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  18. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  19. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  20. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  1. HVDC: A key solution in future transmission systems

    Energy Technology Data Exchange (ETDEWEB)

    Heyman, Olof H.; Weimers, Lars; Bohl, Mie-Lotte

    2010-09-15

    With the transition of power grids, based on sustainable generation, HVDC is a key technology with new applications. This includes connection of remote wind parks and strengthening of existing AC grids. In addition, traditional applications, such as bulk hydropower transfer and interconnections between regions, play a major role in our transition to sustainable generation and the associated grids. The technology for regional grids with a limited number of nodes is already in place and commercial projects are commissioned. For extensive grids, development and verification are ongoing in parallel to industry standards being discussed in groups such as ENTSO-E and CIGRE.

  2. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    Energy Technology Data Exchange (ETDEWEB)

    Bonior, Jason D [ORNL; Evans, Philip G [ORNL; Sheets, Gregory S [ORNL; Jones, John P [ORNL; Flynn, Toby H [ORNL; O' Neil, Lori Ross [Pacific Northwest National Laboratory (PNNL); Hutton, William [Pacific Northwest National Laboratory (PNNL); Pratt, Richard [Pacific Northwest National Laboratory (PNNL); Carroll, Thomas E. [Pacific Northwest National Laboratory (PNNL)

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  3. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  4. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2014-04-01

    Full Text Available User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks. In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  5. A Decentralized Wireless Solution to Monitor and Diagnose PV Solar Module Performance Based on Symmetrized-Shifted Gompertz Functions

    OpenAIRE

    Molina-García, Angel; Campelo, José; Blanc, Sara; Serrano, Juan; García-Sánchez, Tania; Bueso, María

    2015-01-01

    This paper proposes and assesses an integrated solution to monitor and diagnose photovoltaic (PV) solar modules based on a decentralized wireless sensor acquisition system. Both DC electrical variables and environmental data are collected at PV module level using low-cost and high-energy efficiency node sensors. Data is real-time processed locally and compared with expected PV module performances obtained by a PV module model based on symmetrized-shifted Gompertz functions (as previously deve...

  6. Wireless Power Supply via Coupled Magnetic Resonance for on-line Monitoring Wireless Sensor of High-voltage Electrical Equipment

    DEFF Research Database (Denmark)

    Xingkui, Mao; Qisheng, Huang; Yudi, Xiao

    2016-01-01

    On-line monitoring of high-voltage electrical equipment (HV-EE) aiming to detect faults effectively has become crucial to avoid serious accidents. Moreover, highly reliable power supplies are the key component for the wireless sensors equipped in such on-line monitoring systems. Therefore......, in this paper, the wireless power supply via coupled magnetic resonance (MR-WPS) is proposed for powering the wireless sensor and the associated wireless sensor solution is also proposed. The key specifications of the MR-WPS working in switchgear cabinet with a harsh operation environment are analyzed...

  7. Two-scale cost efficiency optimization of 5G wireless backhaul networks

    OpenAIRE

    Ge, Xiaohu; Tu, Song; Mao, Guoqiang; Lau, Vincent K. N.; Pan, Linghui

    2016-01-01

    To cater for the demands of future fifth generation (5G) ultra-dense small cell networks, the wireless backhaul network is an attractive solution for the urban deployment of 5G wireless networks. Optimization of 5G wireless backhaul networks is a key issue. In this paper we propose a two-scale optimization solution to maximize the cost efficiency of 5G wireless backhaul networks. Specifically, the number and positions of gateways are optimized in the long time scale of 5G wireless backhaul ne...

  8. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2014-12-01

    Full Text Available Self-healing group key distribution (SGKD aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC and the revocation polynomial (RP, the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked.

  9. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Walid Elgenaidi

    2016-12-01

    Full Text Available There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  10. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.

    Science.gov (United States)

    Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-12-21

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  11. GHz wireless On-off-Keying link employing all photonic RF carrier generation and digital coherent detection

    DEFF Research Database (Denmark)

    Sambaraju, Rakesh; Zibar, Darko; Caballero Jambrina, Antonio

    2010-01-01

    Gb/s wireless signals at 82, 88 and 100 GHz carrier frequencies are successfully generated by heterodyne mixing of two optical carriers. A photonic detection technique with optical coherent receiver and digital signal processing is implemented for signal demodulation....

  12. Security in software-defined wireless sensor networks: threats, challenges and potential solutions

    CSIR Research Space (South Africa)

    Pritchard, SW

    2017-07-01

    Full Text Available water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most of the inherent issues surrounding WSNs. One of the most important aspects of any network, is security...

  13. Ubiquitous Monitoring Solution for Wireless Sensor Networks with Push Notifications and End-to-End Connectivity

    Directory of Open Access Journals (Sweden)

    Luis M. L. Oliveira

    2014-01-01

    Full Text Available Wireless Sensor Networks (WSNs belongs to a new trend in technology in which tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data such as temperature and humidity. Recently, due to the huge growth in the use of mobile devices with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks. Interconnecting WSNs with smartphones and the Internet is a big challenge and new architectures are required due to the heterogeneity of these devices. Taking into account that people are using smartphones with Internet connection, there is a good opportunity to propose a new architecture for wireless sensors monitoring using push notifications and smartphones. Then, this paper proposes a ubiquitous approach for WSN monitoring based on a REST Web Service, a relational database, and an Android mobile application. Real-time data sensed by WSNs are sent directly to a smartphone or stored in a database and requested by the mobile application using a well-defined RESTful interface. A push notification system was created in order to alert mobile users when a sensor parameter overcomes a given threshold. The proposed architecture and mobile application were evaluated and validated using a laboratory WSN testbed and are ready for use.

  14. An analytic Study of the Key Factors In uencing the Design and Routing Techniques of a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yogita Bahuguna

    2017-03-01

    Full Text Available A wireless sensor network contains various nodes having certain sensing, processing and communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size and battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security and military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity and coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network.

  15. TCP NCE: A unified solution for non-congestion events to improve the performance of TCP over wireless networks

    Directory of Open Access Journals (Sweden)

    Sreekumari Prasanthi

    2011-01-01

    Full Text Available Abstract In this article, we propose a unified solution called Transmission Control Protocol (TCP for Non-Congestion Events (TCP NCE, to overcome the performance degradation of TCP due to non-congestion events over wireless networks. TCP NCE is capable to reduce the unnecessary reduction of congestion window size and retransmissions caused by non-congestion events such as random loss and packet reordering. TCP NCE consists of three schemes. Detection of non-congestion events (NCE-Detection, Differentiation of non-congestion events (NCE-Differentiation and Reaction to non-congestion events (NCE-Reaction. For NCE-Detection, we compute the queue length of the bottleneck link using TCP timestamp and for NCE-Differentiation, we utilize the flightsize information of the network with a dynamic delay threshold value. We introduce a new retransmission algorithm called 'Retransmission Delay' for NCE-Reaction which guides the TCP sender to react to non-congestion events by properly triggering the congestion control mechanism. According to the extensive simulation results using qualnet network simulator, TCP NCE acheives more than 70% throughput gain over TCP CERL and more than 95% throughput improvement as compared to TCP NewReno, TCP PR, RR TCP, TCP Veno, and TCP DOOR when the network coexisted with congestion and non-congestion events. Also, we compared the accuracy and fairness of TCP NCE and the result shows significant improvement over existing algorithms in wireless networks.

  16. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    Science.gov (United States)

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  17. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Luis Parrilla

    2018-01-01

    Full Text Available Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  18. A Harsh Environment Wireless Pressure Sensing Solution Utilizing High Temperature Electronics

    Directory of Open Access Journals (Sweden)

    Jie Yang

    2013-02-01

    Full Text Available Pressure measurement under harsh environments, especially at high temperatures, is of great interest to many industries. The applicability of current pressure sensing technologies in extreme environments is limited by the embedded electronics which cannot survive beyond 300 °C ambient temperature as of today. In this paper, a pressure signal processing and wireless transmission module based on the cutting-edge Silicon Carbide (SiC devices is designed and developed, for a commercial piezoresistive MEMS pressure sensor from Kulite Semiconductor Products, Inc. Equipped with this advanced high-temperature SiC electronics, not only the sensor head, but the entire pressure sensor suite is capable of operating at 450 °C. The addition of wireless functionality also makes the pressure sensor more flexible in harsh environments by eliminating the costly and fragile cable connections. The proposed approach was verified through prototype fabrication and high temperature bench testing from room temperature up to 450 °C. This novel high-temperature pressure sensing technology can be applied in real-time health monitoring of many systems involving harsh environments, such as military and commercial turbine engines.

  19. Precision farming solution in Egypt using the wireless sensor network technology

    Directory of Open Access Journals (Sweden)

    Sherine M. Abd El-kader

    2013-11-01

    Full Text Available This paper gives an overview of the wireless sensor network, studies its application in precision farming, and its importance for improving the agriculture in Egypt. An example for using wireless sensor network in cultivating the potato crop in Egypt is given, and it is shown that the cost of the system with respect to the yearly benefit from exporting potato crop after recovering the loss from its export preventing (this loss is estimated to be 2 billion pounds which is the value of the potato export to Russia annually, after the expected consequence of increasing the yield size and quality, after the expected savings in the resources used in cultivation such as the fertilizer and irrigation water, and after recovering the monetary loss results from the harms caused by excessive use of pesticides, is acceptable, and it can be said that this cost can be recovered in one year. It is concluded that the APTEEN protocol is the most suitable routing strategy to precision farming and its network lifetime can reach 6.5 month which is a period more than the maximum value of the potato crop lifetime that estimated to be 120 day, but it is greater than the yearly cultivation period of potato in Egypt which reaches 6 month.

  20. A Harsh Environment Wireless Pressure Sensing Solution Utilizing High Temperature Electronics

    Science.gov (United States)

    Yang, Jie

    2013-01-01

    Pressure measurement under harsh environments, especially at high temperatures, is of great interest to many industries. The applicability of current pressure sensing technologies in extreme environments is limited by the embedded electronics which cannot survive beyond 300 °C ambient temperature as of today. In this paper, a pressure signal processing and wireless transmission module based on the cutting-edge Silicon Carbide (SiC) devices is designed and developed, for a commercial piezoresistive MEMS pressure sensor from Kulite Semiconductor Products, Inc. Equipped with this advanced high-temperature SiC electronics, not only the sensor head, but the entire pressure sensor suite is capable of operating at 450 °C. The addition of wireless functionality also makes the pressure sensor more flexible in harsh environments by eliminating the costly and fragile cable connections. The proposed approach was verified through prototype fabrication and high temperature bench testing from room temperature up to 450 °C. This novel high-temperature pressure sensing technology can be applied in real-time health monitoring of many systems involving harsh environments, such as military and commercial turbine engines. PMID:23447006

  1. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  2. Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... without any needs for battery recharge or replacement. However, energy harvesting introduces a change to the fundamental principles based on which WSNs are designed and realized. In this poster we sketch some of the key research challenges as well as our ongoing work in designing and realizing Wireless...... Sensor Networks with energy harvesting capability....

  3. Optimal non-coherent data detection for massive SIMO wireless systems: A polynomial complexity solution

    KAUST Repository

    Alshamary, Haider Ali Jasim

    2016-01-04

    © 2015 IEEE. This paper considers the joint maximum likelihood (ML) channel estimation and data detection problem for massive SIMO (single input multiple output) wireless systems. We propose efficient algorithms achieving the exact ML non-coherent data detection, for both constant-modulus constellations and nonconstant-modulus constellations. Despite a large number of unknown channel coefficients in massive SIMO systems, we show that the expected computational complexity is linear in the number of receive antennas and polynomial in channel coherence time. To the best of our knowledge, our algorithms are the first efficient algorithms to achieve the exact joint ML channel estimation and data detection performance for massive SIMO systems with general constellations. Simulation results show our algorithms achieve considerable performance gains at a low computational complexity.

  4. Identification of key target markets for intermodal freight transport solutions in South Africa

    Directory of Open Access Journals (Sweden)

    Joubert van Eeden

    2010-11-01

    Full Text Available The Accelerated and Shared Growth Initiative for South Africa (AsgiSA identified South Africa's freight logistics challenges as among the key binding constraints on the country's growth aspirations. The research presented here points to the structural imbalance between road and rail freight transport as one of the key contributors to this state of affairs. Most long-distance corridor transport has been captured by road. However, long-distance transport is a market segment that is very suitable for intermodal transportation : rail is utilised for the high-density, long-distance component and road for the feeder and distribution services at the corridor end points. A market segmentation approach is developed to identify the corridors and industries that are natural candidates for such solutions, thereby paving the way for role-players and stakeholders to initiate a dialogue on the development of appropriate solutions.

  5. E-referral Solutions: Successful Experiences, Key Features and Challenges- a Systematic Review.

    Science.gov (United States)

    Naseriasl, Mansour; Adham, Davoud; Janati, Ali

    2015-06-01

    around the world health systems constantly face increasing pressures which arise from many factors, such as an ageing population, patients and providers demands for equipment's and services. In order to respond these challenges and reduction of health system's transactional costs, referral solutions are considered as a key factor. This study was carried out to identify referral solutions that have had successes. relevant studies identified using keywords of referrals, consultation, referral system, referral model, referral project, electronic referral, electronic booking, health system, healthcare, health service and medical care. These searches were conducted using PubMed, ProQuest, Google Scholar, Scopus, Emerald, Web of Knowledge, Springer, Science direct, Mosby's index, SID, Medlib and Iran Doc data bases. 4306 initial articles were obtained and refined step by step. Finally, 27 articles met the inclusion criteria. we identified seventeen e-referral systems developed in UK, Norway, Finland, Netherlands, Denmark, Scotland, New Zealand, Canada, Australia, and U.S. Implemented solutions had variant degrees of successes such as improved access to specialist care, reduced wait times, timeliness and quality of referral communication, accurate health information transfer and integration of health centers and services. each one of referral solutions has both positive and changeable aspects that should be addressed according to sociotechnical conditions. These solutions are mainly formed in a small and localized manner.

  6. Kalai-Smorodinsky bargaining solution for optimal resource allocation over wireless DS-CDMA visual sensor networks

    Science.gov (United States)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2012-01-01

    Surveillance applications usually require high levels of video quality, resulting in high power consumption. The existence of a well-behaved scheme to balance video quality and power consumption is crucial for the system's performance. In the present work, we adopt the game-theoretic approach of Kalai-Smorodinsky Bargaining Solution (KSBS) to deal with the problem of optimal resource allocation in a multi-node wireless visual sensor network (VSN). In our setting, the Direct Sequence Code Division Multiple Access (DS-CDMA) method is used for channel access, while a cross-layer optimization design, which employs a central processing server, accounts for the overall system efficacy through all network layers. The task assigned to the central server is the communication with the nodes and the joint determination of their transmission parameters. The KSBS is applied to non-convex utility spaces, efficiently distributing the source coding rate, channel coding rate and transmission powers among the nodes. In the underlying model, the transmission powers assume continuous values, whereas the source and channel coding rates can take only discrete values. Experimental results are reported and discussed to demonstrate the merits of KSBS over competing policies.

  7. Scaling up a Mobile Telemedicine Solution in Botswana: Keys to Sustainability.

    Science.gov (United States)

    Ndlovu, Kagiso; Littman-Quinn, Ryan; Park, Elizabeth; Dikai, Zambo; Kovarik, Carrie L

    2014-01-01

    Effective health care delivery is significantly compromised in an environment where resources, both human and technical, are limited. Botswana's health care system is one of the many in the African continent with few specialized medical doctors, thereby posing a barrier to patients' access to health care services. In addition, the traditional landline and non-robust Information Technology (IT) network infrastructure characterized by slow bandwidth still dominates the health care system in Botswana. Upgrading of the landline IT infrastructure to meet today's health care demands is a tedious, long, and expensive process. Despite these challenges, there still lies hope in health care delivery utilizing wireless telecommunication services. Botswana has recently experienced tremendous growth in the mobile telecommunication industry coupled with an increase in the number of individually owned mobile devices. This growth inspired the Botswana-UPenn Partnership (BUP) to collaborate with local partners to explore using mobile devices as tools to improve access to specialized health care delivery. Pilot studies were conducted across four medical specialties, including radiology, oral medicine, dermatology, and cervical cancer screening. Findings from the studies became vital evidence in support of the first scale-up project of a mobile telemedicine solution in Botswana, also known as "Kgonafalo." Some technical and social challenges were encountered during the initial studies, such as malfunctioning of mobile devices, accidental damage of devices, and cultural misalignment between IT and healthcare providers. These challenges brought about lessons learnt, including a strong need for unwavering senior management support, establishment of solid local public-private partnerships, and efficient project sustainability plans. Sustainability milestones included the development and signing of a Memorandum of Understanding (MOU) between the Botswana government and a private

  8. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  9. Site-Specific Study of In-Building Wireless Solutions with Poisson Traffic

    DEFF Research Database (Denmark)

    Liu, Zhen; Sørensen, Troels Bundgaard; Mogensen, Preben

    2011-01-01

    traffic model with fixed buffer size and Poisson arrival. Our new results show better performance for Femto cells with frequency reuse 1 at light to medium load, although the intelligent distributed system still obtains considerable better cell edge user throughput for the same number of access points....... system - together with another multi-cell system using our proposed centralized scheduling scheme. In our previous work, their performance is evaluated and compared in the LTE downlink context with full buffer traffic. Compared to real mobile networks, the full buffer traffic model is usually a worst......-case estimation of traffic load which causes severe interference conditions. Especially for Femto cells with universal frequency reuse it degrades system performance and may lead to biased conclusions on the relative performance of the different in-building solutions. In this study, we use a more realistic...

  10. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  11. KEY TECHNOLOGICAL SOLUTIONS FROM THE SESAR PROGRAMME TO IMPROVE AIR TRAFFIC SAFETY

    Directory of Open Access Journals (Sweden)

    Jan LASKOWSKI

    2017-03-01

    Full Text Available The dynamic development of the air transport market has led to a significant increase in air traffic in a highly fragmented and relatively small European airspace. This situation could, in the near future, render the currently functioning European air traffic management (ATM system obsolete and incapable of providing the high safety standards demanded by the ICAO and Eurocontrol. Recognizing the urgency in finding a solution to this problem, the EU gas launched the Single European Sky (SES initiative, along with its technological pillar, the Single European Sky ATM Research (SESAR programme, which seeks to enhance air traffic safety, support the sustainable development of the air transport system and improve the overall performance of ATM and air navigation services, so that they meet the requirements of all airspace users. This paper presents a selection of the SESAR programme’s key technological solutions, such as approaches based on area navigation (RNAV/Global Navigation Satellite Systems (GNSS, and the “remote tower” concept, which have been developed to maximize the safety and efficiency of the new European ATM system.

  12. Scheduling and congestion control for wireless internet

    CERN Document Server

    Wang, Xin

    2014-01-01

    This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wireless links. Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

  13. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  14. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    Science.gov (United States)

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  15. Localization and Communication for UWB-based Wireless Sensor Networks

    NARCIS (Netherlands)

    Wang, Y.

    2011-01-01

    The great demand for location-aware wireless sensor networks (WSNs) motivates the research in this thesis. The unique characteristics of WSNs impose numerous challenges on localization and communication. In this thesis, we handle some key challenges and provide affordable solutions. Impulse radio

  16. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  17. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  18. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  19. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    NASA's Aeronautics Research Mission Directorate (ARMD) collaborates with the FAA and industry to provide concepts and technologies that enhance the transition to the next-generation air-traffic management system (NextGen). To facilitate this collaboration, ARMD has a series of Airspace Technology Demonstration (ATD) sub-projects that develop, demonstrate, and transitions NASA technologies and concepts for implementation in the National Airspace System (NAS). The second of these sub-projects, ATD-2, is focused on the potential benefits to NAS stakeholders of integrated arrival, departure, surface (IADS) operations. To determine the project objectives and assess the benefits of a potential solution, NASA surveyed NAS stakeholders to understand the existing issues in arrival, departure, and surface operations, and the perceived benefits of better integrating these operations. NASA surveyed a broad cross-section of stakeholders representing the airlines, airports, air-navigation service providers, and industry providers of NAS tools. The survey indicated that improving the predictability of flight times (schedules) could improve efficiency in arrival, departure, and surface operations. Stakeholders also mentioned the need for better strategic and tactical information on traffic constraints as well as better information sharing and a coupled collaborative planning process that allows stakeholders to coordinate IADS operations. To assess the impact of a potential solution, NASA sketched an initial departure scheduling concept and assessed its viability by surveying a select group of stakeholders for a second time. The objective of the departure scheduler was to enable flights to move continuously from gate to cruise with minimal interruption in a busy metroplex airspace environment using strategic and tactical scheduling enhanced by collaborative planning between airlines and service providers. The stakeholders agreed that this departure concept could improve schedule

  20. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  1. The Design of Wireless Data Acquisition and Remote Transmission Interface in Micro-seismic Signals

    Directory of Open Access Journals (Sweden)

    Huan-Huan BIAN

    2014-02-01

    Full Text Available The micro-seismic signal acquisition and transmission is an important key part in geological prospecting. This paper describes a bran-new solution of micro-seismic signal acquisition and remote transmission using Zigbee technique and wireless data transmission technique. The hardware such as front-end data acquisition interface made up by Zigbee wireless networking technique, remote data transmission solution composed of general packet radio service (or GPRS for short technique and interface between Zigbee and GPRS is designed in detail. Meanwhile the corresponding software of the system is given out. The solution solves the numerous practical problems nagged by complex and terrible environment faced using micro-seismic prospecting. The experimental results demonstrate that the method using Zigbee wireless network communication technique GPRS wireless packet switching technique is efficient, reliable and flexible.

  2. A Solution Based on Bluetooth Low Energy for Smart Home Energy Management

    OpenAIRE

    Collotta, Mario; Pau, Giovanni

    2015-01-01

    The research and the implementation of home automation are getting more popular because the Internet of Things holds promise for making homes smarter through wireless technologies. The installation of systems based on wireless networks can play a key role also in the extension of the smart grid towards smart homes, that can be deemed as one of the most important components of smart grids. This paper proposes a fuzzy-based solution for smart energy management in a home automation wireless netw...

  3. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  4. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  5. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  6. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Mohammed S. Taboun

    2017-09-01

    Full Text Available With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  7. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  8. Key parameters of the sediment surface morphodynamics in an estuary - An assessment of model solutions

    Science.gov (United States)

    Sampath, D. M. R.; Boski, T.

    2018-05-01

    Large-scale geomorphological evolution of an estuarine system was simulated by means of a hybrid estuarine sedimentation model (HESM) applied to the Guadiana Estuary, in Southwest Iberia. The model simulates the decadal-scale morphodynamics of the system under environmental forcing, using a set of analytical solutions to simplified equations of tidal wave propagation in shallow waters, constrained by empirical knowledge of estuarine sedimentary dynamics and topography. The key controlling parameters of the model are bed friction (f), current velocity power of the erosion rate function (N), and sea-level rise rate. An assessment of sensitivity of the simulated sediment surface elevation (SSE) change to these controlling parameters was performed. The model predicted the spatial differentiation of accretion and erosion, the latter especially marked in the mudflats within mean sea level and low tide level and accretion was mainly in a subtidal channel. The average SSE change mutually depended on both the friction coefficient and power of the current velocity. Analysis of the average annual SSE change suggests that the state of intertidal and subtidal compartments of the estuarine system vary differently according to the dominant processes (erosion and accretion). As the Guadiana estuarine system shows dominant erosional behaviour in the context of sea-level rise and sediment supply reduction after the closure of the Alqueva Dam, the most plausible sets of parameter values for the Guadiana Estuary are N = 1.8 and f = 0.8f0, or N = 2 and f = f0, where f0 is the empirically estimated value. For these sets of parameter values, the relative errors in SSE change did not exceed ±20% in 73% of simulation cells in the studied area. Such a limit of accuracy can be acceptable for an idealized modelling of coastal evolution in response to uncertain sea-level rise scenarios in the context of reduced sediment supply due to flow regulation. Therefore, the idealized but cost

  9. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  10. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  11. Wireless Communications in Reverberant Environments

    Science.gov (United States)

    2015-01-01

    solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs [27] and GNURadio [28]. For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios [27] “Ettus research.” [Online]. Available: http://www.ettus.com [28] “ Gnuradio .” [Online]. Available: http

  12. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  13. New Solutions Based On Wireless Networks For Dynamic Traffic Lights Management: A Comparison Between IEEE 802.15.4 And Bluetooth

    Directory of Open Access Journals (Sweden)

    Collotta Mario

    2015-09-01

    Full Text Available The Wireless Sensor Networks are widely used to detect and exchange information and in recent years they have been increasingly involved in Intelligent Transportation System applications, especially in dynamic management of signalized intersections. In fact, the real-time knowledge of information concerning traffic light junctions represents a valid solution to congestion problems. In this paper, a wireless network architecture, based on IEEE 802.15.4 or Bluetooth, in order to monitor vehicular traffic flows near to traffic lights, is introduced. Moreover, an innovative algorithm is proposed in order to determine dynamically green times and phase sequence of traffic lights, based on measured values of traffic flows. Several simulations compare IEEE 802.15.4 and Bluetooth protocols in order to identify the more suitable communication protocol for ITS applications. Furthermore, in order to confirm the validity of the proposed algorithm for the dynamic management of traffic lights, some case studies have been considered and several simulations have been performed.

  14. A closed-form solution of the bit-error rate for optical wireless communication systems over atmospheric turbulence channels.

    Science.gov (United States)

    Dang, Anhong

    2011-02-14

    Atmospheric turbulence is a major limiting factor in an optical wireless communication (OWC) link. The turbulence distorts the phase of the propagating optical fields and limits the focusing capabilities of the telescope antennas. Hence, a detector array is required to capture the widespread signal energy in the focal-plane. This paper addresses the bit-error rate (BER) performance of optical wireless communication (OWC) systems employing a detector array in the presence of turbulence. Here, considering the gamma-gamma turbulence model, we propose a blind estimation scheme that provides the closed-form expression of the BER by exploiting the information of the data output of each pixel, which is based on the singular value decomposition of the sample matrix of the received signals after the code-matched filter. Instead of assuming spatially white additive noise, we consider the case where the noise spatial covariance matrix is unknown. The new method can be applied to either the single transmitter or the multi-transmitter cases. Simulation results for different Rytov variances are presented, which conform closely to the results of the proposed model.

  15. Key stakeholder perspectives on the barriers and solutions to pharmacy practice towards complementary medicines: an Australian experience.

    Science.gov (United States)

    Ung, Carolina Oi Lam; Harnett, Joanna; Hu, Hao

    2017-08-09

    Although pharmacists are entrusted to play a role in ensuring the safe and appropriate use of all medicines, in general, the inclusion of complementary medicines (CMs) into their professional practice has not been observed. The purpose of this study was to explore the perceptions and opinions of pharmacists and 8 key stakeholder leaders regarding the barriers that hinder pharmacists from providing care related to the use of CMs by patients/consumers and to identify solutions that would support pharmacists' in extending their role in this area. Semi-structured key informant interviews were conducted with 2 practicing pharmacists, 1 pharmacy owner, 1 key representative of a pharmacist professional organization, 1 key representative of a consumer advocacy group, 1 key representative of a medical professional organization, 1 key representative from a complementary medicine practitioner professional organization, 1 leader within a pharmacy school, 2 senior staff from a regulatory authority, and 1 key representative of the complementary medicine industry in Australia. A total of 9 barriers were identified in this study. Barriers including a lack of CMs knowledge, doubts about the evidence-base, a lack of research skills and access to reliable and reputable information dominated the discussions. A total of 7 solutions were proposed. Of those, the integration of CMs curricula into under-graduate and professional pharmacy education, and defining a clearer role for pharmacists' standard of practice were considered the most important. Apposing opinions about the role of naturopaths in pharmacies were identified.. It is anticipated that pharmacists will be required to formalise a role in ensuring the safe and appropriate use of complementary medicines to fulfil their professional and ethical responsibilities. However, pharmacists in general are not ready to take up this extended role. Individual key stakeholder groups have considered the existing barriers and have proposed

  16. Compatible solutes: the key to Listeria's success as a versatile gastrointestinal pathogen?

    LENUS (Irish Health Repository)

    Sleator, Roy D

    2010-12-10

    Abstract Recently we reported a role for compatible solute uptake in mediating bile tolerance and increased gastrointestinal persistence in the foodborne pathogen Listeria monocytogenes 1 . Herein, we review the evolution in our understanding of how these low molecular weight molecules contribute to growth and survival of the pathogen both inside and outside the body, and how this stress survival mechanism may ultimately be used to target and kill the pathogen.

  17. Conformational disorder and solvation properties of the key-residues of a protein in water-ethanol mixed solutions.

    Science.gov (United States)

    Mohanta, Dayanidhi; Santra, Santanu; Jana, Madhurima

    2017-12-13

    A small number of key-residues in a protein sequence play vital roles in the function, stability, and folding of the protein. The nonuniform conformational disorder of a small protein Chymotrypsin Inhibitor 2 (CI2) and its secondary segments has been quantified in the ethanol governed temperature induced unfolding process by estimating its change in configurational entropy in several water-ethanol mixed solutions. Such calculations further assist us in identifying the key-residues, from where the unfolding of the protein was initiated. Our findings match well with the reported experimental results. We then make an attempt to explore the properties of the solvent water and ethanol around the key-residues of the protein in its folded and unfolded forms at ambient temperature to identify the individual role of ethanol and water in the protein unfolding. We find that the key-residues of the unfolded protein are in good contact with both water and ethanol as compared to those of the folded protein. In the presence of ethanol, water molecules are noticed to form a rigid structurally bound solvation layer around the key-residues of the protein, irrespective of its conformational state. The restricted translational motion and prominent caging effect of the water and ethanol molecules present around the key-residues of the unfolded protein are a signature of the existence of a rigid mixed water-ethanol layer as compared to that around the folded protein. Furthermore, comparable restricted structural relaxation of the key-residue-water and key-residue-ethanol hydrogen bonds in the unfolded protein as compared to that in the folded one implies that the formation of a strong long-lived hydrogen bonding environment nourishes the unfolding process. We believe that our findings will shed light to several co-solvent governed unfolding processes of a protein in general.

  18. SOLID SOLUTION CARBIDES ARE THE KEY FUELS FOR FUTURE NUCLEAR THERMAL PROPULSION

    Science.gov (United States)

    Panda, Binayak; Hickman, Robert R.; Shah, Sandeep

    2005-01-01

    Nuclear thermal propulsion uses nuclear energy to directly heat a propellant (such as liquid hydrogen) to generate thrust for space transportation. In the 1960 s, the early Rover/Nuclear Engine for Rocket Propulsion Application (NERVA) program showed very encouraging test results for space nuclear propulsion but, in recent years, fuel research has been dismal. With NASA s renewed interest in long-term space exploration, fuel researchers are now revisiting the RoverMERVA findings, which indicated several problems with such fuels (such as erosion, chemical reaction of the fuel with propellant, fuel cracking, and cladding issues) that must be addressed. It is also well known that the higher the temperature reached by a propellant, the larger the thrust generated from the same weight of propellant. Better use of fuel and propellant requires development of fuels capable of reaching very high temperatures. Carbides have the highest melting points of any known material. Efforts are underway to develop carbide mixtures and solid solutions that contain uranium carbide, in order to achieve very high fuel temperatures. Binary solid solution carbides (U, Zr)C have proven to be very effective in this regard. Ternary carbides such as (U, Zr, X) carbides (where X represents Nb, Ta, W, and Hf) also hold great promise as fuel material, since the carbide mixtures in solid solution generate a very hard and tough compact material. This paper highlights past experience with early fuel materials and bi-carbides, technical problems associated with consolidation of the ingredients, and current techniques being developed to consolidate ternary carbides as fuel materials.

  19. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  20. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  1. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  2. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  3. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  4. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  5. Network performance and fault analytics for LTE wireless service providers

    CERN Document Server

    Kakadia, Deepak; Gilgur, Alexander

    2017-01-01

     This book is intended to describe how to leverage emerging technologies big data analytics and SDN, to address challenges specific to LTE and IP network performance and fault management data in order to more efficiently manage and operate an LTE wireless networks. The proposed integrated solutions permit the LTE network service provider to operate entire integrated network, from RAN to Core , from UE to application service, as one unified system and correspondingly collect and align disparate key metrics and data, using an integrated and holistic approach to network analysis. The LTE wireless network performance and fault involves the network performance and management of network elements in EUTRAN, EPC and IP transport components, not only as individual components, but also as nuances of inter-working of these components. The key metrics for EUTRAN include radio access network accessibility, retainability, integrity, availability and mobility. The key metrics for EPC include MME accessibility, mobility and...

  6. Wireless, Passive Encoded Saw Sensors and Communication Links - Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation proposed here is a complete, wireless remote sensing solution using passive SAW Orthogonal Frequency Coded (OFC) sensors and a wireless interrogation...

  7. A Survey of Wireless Communications for the Electric Power System

    Energy Technology Data Exchange (ETDEWEB)

    Akyol, Bora A.; Kirkham, Harold; Clements, Samuel L.; Hadley, Mark D.

    2010-01-27

    A key mission of the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the security and reliability of the nation’s energy infrastructure. Improving the security of control systems, which enable the automated control of our energy production and distribution, is critical for protecting the energy infrastructure and the integral function that it serves in our lives. The DOE-OE Control Systems Security Program provides research and development to help the energy industry actively pursue advanced security solutions for control systems. The focus of this report is analyzing how, where, and what type of wireless communications are suitable for deployment in the electric power system and to inform implementers of their options in wireless technologies. The discussions in this report are applicable to enhancing both the communications infrastructure of the current electric power system and new smart system deployments. The work described in this report includes a survey of the following wireless technologies: • IEEE 802.16 d and e (WiMAX) • IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s • Wireless sensor protocols that use parts of the IEEE 802.15.4 specification: WirelessHART, International Society of Automation (ISA) 100.11a, and Zigbee • The 2, 3, and 4 generation (G )cellular technologies of GPRS/EDGE/1xRTT, HSPA/EVDO, and Long-Term Evolution (LTE)/HSPA+UMTS.

  8. Limitations and Extensions of the Lock-and-Key Principle: Differences between Gas State, Solution and Solid State Structures

    Directory of Open Access Journals (Sweden)

    Hans-Jörg Schneider

    2015-03-01

    Full Text Available The lock-and-key concept is discussed with respect to necessary extensions. Formation of supramolecular complexes depends not only, and often not even primarily on an optimal geometric fit between host and guest. Induced fit and allosteric interactions have long been known as important modifications. Different binding mechanisms, the medium used and pH effects can exert a major influence on the affinity. Stereoelectronic effects due to lone pair orientation can lead to variation of binding constants by orders of magnitude. Hydrophobic interactions due to high-energy water inside cavities modify the mechanical lock-and-key picture. That optimal affinities are observed if the cavity is only partially filled by the ligand can be in conflict with the lock-and-key principle. In crystals other forces than those between host and guest often dominate, leading to differences between solid state and solution structures. This is exemplified in particular with calixarene complexes, which by X-ray analysis more often than other hosts show guest molecules outside their cavity. In view of this the particular problems with the identification of weak interactions in crystals is discussed.

  9. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  10. Design and security of small wireless network

    OpenAIRE

    Žižka, Ladislav

    2012-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  11. 28 GHz Wireless Backhaul Transceiver Characterization and Radio Link Budget

    Directory of Open Access Journals (Sweden)

    Marko E. Leinonen

    2018-02-01

    Full Text Available Millimeter wave communication is one of the main disruptive technologies in upcoming 5G mobile networks. One of the first candidate applications, which will be commercially ready by 2020, is wireless backhaul links or wireless last mile communication. This paper provides an analysis of this use‐case from radio engineering and implementation perspectives. Furthermore, preliminary experimental results are shown for a proof‐of‐concept wireless backhaul solution developed within the EU‐KR 5GCHAMPION project, which will be showcased during the 2018 Winter Olympic Games in Korea. In this paper, we verify system level calculations and a theoretical link budget analysis with conductive and radiated over‐the‐air measurements. The results indicate that the implemented radio solution is able to achieve the target key performance indicator, namely, a 2.5 Gbps data rate on average, over a range of up to 200 m.

  12. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  13. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  14. When evolution is the solution to pollution: Key principles, and lessons from rapid repeated adaptation of killifish (Fundulus heteroclitus) populations.

    Science.gov (United States)

    Whitehead, Andrew; Clark, Bryan W; Reid, Noah M; Hahn, Mark E; Nacci, Diane

    2017-09-01

    For most species, evolutionary adaptation is not expected to be sufficiently rapid to buffer the effects of human-mediated environmental changes, including environmental pollution. Here we review how key features of populations, the characteristics of environmental pollution, and the genetic architecture underlying adaptive traits, may interact to shape the likelihood of evolutionary rescue from pollution. Large populations of Atlantic killifish (Fundulus heteroclitus) persist in some of the most contaminated estuaries of the United States, and killifish studies have provided some of the first insights into the types of genomic changes that enable rapid evolutionary rescue from complexly degraded environments. We describe how selection by industrial pollutants and other stressors has acted on multiple populations of killifish and posit that extreme nucleotide diversity uniquely positions this species for successful evolutionary adaptation. Mechanistic studies have identified some of the genetic underpinnings of adaptation to a well-studied class of toxic pollutants; however, multiple genetic regions under selection in wild populations seem to reflect more complex responses to diverse native stressors and/or compensatory responses to primary adaptation. The discovery of these pollution-adapted killifish populations suggests that the evolutionary influence of anthropogenic stressors as selective agents occurs widely. Yet adaptation to chemical pollution in terrestrial and aquatic vertebrate wildlife may rarely be a successful "solution to pollution" because potentially adaptive phenotypes may be complex and incur fitness costs, and therefore be unlikely to evolve quickly enough, especially in species with small population sizes.

  15. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  16. Node clustering for wireless sensor networks

    International Nuclear Information System (INIS)

    Bhatti, S.; Qureshi, I.A.; Memon, S.

    2012-01-01

    Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network) and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted. Keywords: Clustering, Sensor Network, Static, Dynamic

  17. A Millimeter-Wave Digital Link for Wireless MRI.

    Science.gov (United States)

    Aggarwal, Kamal; Joshi, Kiran R; Rajavi, Yashar; Taghivand, Mazhareddin; Pauly, John M; Poon, Ada S Y; Scott, Greig

    2017-02-01

    A millimeter (mm) wave radio is presented in this work to support wireless MRI data transmission. High path loss and availability of wide bandwidth make mm-waves an ideal candidate for short range, high data rata communication required for wireless MRI. The proposed system uses a custom designed integrated chip (IC) mm-wave radio with 60 GHz as radio frequency carrier. In this work, we assess performance in a 1.5 T MRI field, with the addition of optical links between the console room and magnet. The system uses ON-OFF keying (OOK) modulation for data transmission and supports data rates from 200 Mb/s to 2.5 Gb/s for distances up-to 65 cm. The presence of highly directional, linearly polarized, on-chip dipole antennas on the mm-wave radio along with the time division multiplexing (TDM) circuitry allows multiple wireless links to be created simultaneously with minimal inter-channel interference. This leads to a highly scalable solution for wireless MRI.

  18. Miniaturised wireless smart tag for optical chemical analysis applications.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  19. SOLUTIONING

    Directory of Open Access Journals (Sweden)

    Maria de Hoyos Guajardo, Ph.D. Candidate, M.Sc., B.Eng.

    2004-11-01

    Full Text Available The theory that is presented below aims to conceptualise how a group of undergraduate students tackle non-routine mathematical problems during a problem-solving course. The aim of the course is to allow students to experience mathematics as a creative process and to reflect on their own experience. During the course, students are required to produce a written ‘rubric’ of their work, i.e., to document their thoughts as they occur as well as their emotionsduring the process. These ‘rubrics’ were used as the main source of data.Students’ problem-solving processes can be explained as a three-stage process that has been called ‘solutioning’. This process is presented in the six sections below. The first three refer to a common area of concern that can be called‘generating knowledge’. In this way, generating knowledge also includes issues related to ‘key ideas’ and ‘gaining understanding’. The third and the fourth sections refer to ‘generating’ and ‘validating a solution’, respectively. Finally, once solutions are generated and validated, students usually try to improve them further before presenting them as final results. Thus, the last section deals with‘improving a solution’. Although not all students go through all of the stages, it may be said that ‘solutioning’ considers students’ main concerns as they tackle non-routine mathematical problems.

  20. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  1. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  2. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  3. WirelessHART vs. ISA100.11a: The Format War Hits the Factory Floor

    OpenAIRE

    Petersen, Stig; Carlsen, Simon

    2011-01-01

    The first decade of the new millennium has been a stage for the rapid development of wireless communication technologies for low-cost, low-power wireless solutions capable of robust and reliable communication [1]. IEEE Standard 802.15.4 for low-rate wireless personal area networks (WPANs) [2] has been the enabling technology for numerous applications within the field of wireless sensor networks (WSNs) [3], and more recently, wireless instrumentation. Although WSNs quickly found their way into...

  4. Challenges and Ideas to Achieve Wireless 100 Gb/s Transmission: An Overview of Challenges and Solutions within the German Research Foundation (DFG) Special Priority Program SPP1655

    Science.gov (United States)

    Kraemer, Rolf

    2017-09-01

    Wireless communications is one of the fastest growing technology fields, driving numerous other innovations in electronics. One challenging research area within the wireless field is to achieve much higher transmission rates. First products with up to 3 Gb/s are in the market. In the coming years we predict this speed growing quickly up to and beyond 100 Gb/s. Today it is an open question how we can realize a wireless system at this speed. If we intend to use such systems in a mobile environment, we can only afford to spend approximately 1-10 pW/b for the end-to-end communication. This includes RF-transmission and all processing and protocol steps. The SPP1655 of the DFG was set up to investigate new paradigms for achieving the 100 Gb/s wireless transmission goal. Within 11 coordinated projects researchers from all over Germany are addressing several relevant issues ranging from the antennas and RF-Frontend, baseband-processing and error correction to protocol processing. A number of limitations of current approaches have to be investigated and new algorithms must be found in order to achieve the intended goal. One of the big challenges is finding the correct balance between analog and digital signal processing to achieve an extremely high performance at very low energy consumption. Another challenge is to find a good balance between bandwidth and bandwidth efficiency to achieve the 100 Gbps goal. Finally, protocol processing will need new approaches to decouple the central processor of a computer from the high-end input/output operations. Within this editorial we will address the main challenges and briefly outline the approaches of the running projects. The rest of this special issue will be devoted to more detailed descriptions and achievements of the individual projects of SPP1655.

  5. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  6. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  7. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. wireless networked systems for communication and control applications, the bo...

  8. Wireless traffic steering for green cellular networks

    CERN Document Server

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  9. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  10. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  11. Wireless Industrial Monitoring and Control Networks: The Journey So Far and the Road Ahead

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2012-08-01

    Full Text Available While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks.

  12. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  13. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection...... channel. Second, secure communication is implemented with an efficient secure group communication suite including a low-overhead group key distribution scheme, distributing group keys according to the needs of the sensor nodes. Third, data collection is implemented with selective transmission which saves...

  14. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  15. Solution scanning as a key policy tool: identifying management interventions to help maintain and enhance regulating ecosystem services

    Directory of Open Access Journals (Sweden)

    William J. Sutherland

    2014-06-01

    Full Text Available The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We

  16. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  17. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  18. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  19. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  20. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  1. Design and implementation of a secure wireless mote-based medical sensor network.

    Science.gov (United States)

    Malasri, Kriangsiri; Wang, Lan

    2009-01-01

    A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.

  2. Design and Implementation of a SecureWireless Mote-Based Medical Sensor Network

    Directory of Open Access Journals (Sweden)

    Lan Wang

    2009-08-01

    Full Text Available A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1 a novel two-tier scheme for verifying the authenticity of patient data, (2 a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3 symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.

  3. Service discovery in heterogeneous wireless networks

    NARCIS (Netherlands)

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible

  4. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  5. Energy efficiency in future wireless broadband networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2012-10-01

    Full Text Available , and will require unique energy efficient solutions. For instance, an MS may be battery-powered, and the relevant energy efficient solution would include switching-off the display and minimizing signalling overhead (e.g. sleep mode). Meanwhile energy efficient... solution for the BS may include the intelligent sleep mode policies when the number of users and the traffic load decreases [3]. Due to the growing demand for advanced broadband wireless technologies and services, research in green radio solutions...

  6. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  7. Underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  8. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  9. Power Control and Coding Formulation for State Estimation with Wireless Sensors

    DEFF Research Database (Denmark)

    Quevedo, Daniel; Østergaard, Jan; Ahlen, Anders

    2014-01-01

    Technological advances made wireless sensors cheap and reliable enough to be brought into industrial use. A major challenge arises from the fact that wireless channels introduce random packet dropouts. Power control and coding are key enabling technologies in wireless communications to ensure eff...

  10. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  11. An exploration of key issues and potential solutions that impact physician wellbeing and professional fulfillment at an academic center.

    Science.gov (United States)

    Schrijver, Iris; Brady, Keri J S; Trockel, Mickey

    2016-01-01

    Background. Physician wellness is a vital element of a well-functioning health care system. Not only is physician wellness empirically associated with quality and patient outcomes, but its ramifications span individual, interpersonal, organizational, and societal levels. The purpose of this study was to explore academic physicians' perceptions about their work-related wellness, including the following questions: (a) What are the workplace barriers and facilitators to their wellness? (b) What workplace solutions do theythinkwouldimprove their wellness? (c)What motivates their work? and (d) What existing wellness programs are they aware of? Methods. A multi-method design was applied to conduct a total of 19 focus group sessions in 17 clinical departments. All academic faculty ranks and career lines were represented in the 64 participating physicians, who began the sessions with five open-ended survey questions pertaining to physician wellness in their work environment. Participants entered their answers into a web-based survey program that enabled anonymous data collection. The initial survey component was followed by semi-structured focus group discussion. Data analysis of this qualitative study was informed by the general inductive approach as well as a review of extant literature through September 2015 on physician wellness, professional fulfillment, satisfaction, dissatisfaction, burnout and work-life. Results. Factors intrinsic to the work of physicians dominated the expressed reasons for work motivation. These factors all related to the theme of overall contribution, with categories of meaningful work, patient care, teaching, scientific discovery, self-motivation and matching of career interests. Extrinsic factors such as perceptions of suboptimal goal alignment, inadequate support, restricted autonomy, lack of appreciation, and suboptimal compensation and benefits dominated the risk of professional dissatisfaction. Discussion. Our findings indicate that the

  12. An exploration of key issues and potential solutions that impact physician wellbeing and professional fulfillment at an academic center

    Directory of Open Access Journals (Sweden)

    Iris Schrijver

    2016-03-01

    Full Text Available Background. Physician wellness is a vital element of a well-functioning health care system. Not only is physician wellness empirically associated with quality and patient outcomes, but its ramifications span individual, interpersonal, organizational, and societal levels. The purpose of this study was to explore academic physicians’ perceptions about their work-related wellness, including the following questions: (a What are the workplace barriers and facilitators to their wellness? (b What workplace solutions do theythinkwouldimprove their wellness? (cWhat motivates their work? and (d What existing wellness programs are they aware of? Methods. A multi-method design was applied to conduct a total of 19 focus group sessions in 17 clinical departments. All academic faculty ranks and career lines were represented in the 64 participating physicians, who began the sessions with five open-ended survey questions pertaining to physician wellness in their work environment. Participants entered their answers into a web-based survey program that enabled anonymous data collection. The initial survey component was followed by semi-structured focus group discussion. Data analysis of this qualitative study was informed by the general inductive approach as well as a review of extant literature through September 2015 on physician wellness, professional fulfillment, satisfaction, dissatisfaction, burnout and work-life. Results. Factors intrinsic to the work of physicians dominated the expressed reasons for work motivation. These factors all related to the theme of overall contribution, with categories of meaningful work, patient care, teaching, scientific discovery, self-motivation and matching of career interests. Extrinsic factors such as perceptions of suboptimal goal alignment, inadequate support, restricted autonomy, lack of appreciation, and suboptimal compensation and benefits dominated the risk of professional dissatisfaction. Discussion. Our findings

  13. Wireless Monitoring of Automobile Tires for Intelligent Tires

    Directory of Open Access Journals (Sweden)

    Akira Todoroki

    2008-12-01

    Full Text Available This review discusses key technologies of intelligent tires focusing on sensors and wireless data transmission. Intelligent automobile tires, which monitor their pressure, deformation, wheel loading, friction, or tread wear, are expected to improve the reliability of tires and tire control systems. However, in installing sensors in a tire, many problems have to be considered, such as compatibility of the sensors with tire rubber, wireless transmission, and battery installments. As regards sensing, this review discusses indirect methods using existing sensors, such as that for wheel speed, and direct methods, such as surface acoustic wave sensors and piezoelectric sensors. For wireless transmission, passive wireless methods and energy harvesting are also discussed.

  14. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  15. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  16. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  17. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  18. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  19. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  20. Wireless Hybrid Identification and Sensing Platform for Equipment Recovery (WHISPER), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced Systems & Technologies proposed WHISPER (Wireless Hybrid Identification and Sensing Platform for Equipment Recovery) solution to NASA's need for...

  1. Wireless Hybrid Identification and Sensing Platform for Equipment Recovery (WHISPER), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced Systems & Technologies proposed WHISPER (Wireless Hybrid Identification and Sensing Platform for Equipment Recovery) solution to NASA's need for...

  2. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  3. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-05-01

    Full Text Available In recent years, wireless sensor networks (WSNs have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  4. Public-key management in mobile ad hoc networks

    Science.gov (United States)

    Lin, Haifeng; Jiang, Anna; Bai, Di; Liu, Yunfei

    A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public -key management model which does not need the third trusted authority.

  5. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    Science.gov (United States)

    Pan, Guobing; Xin, Wenhui; Yan, Guozheng; Chen, Jiaoliao

    2011-06-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic.

  6. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  7. A General Framework for Flow Control in Wireless Networks

    National Research Council Canada - National Science Library

    Chen, Minghua

    2006-01-01

    .... Current widely accepted solutions assume that congestion is the only cause of packet loss and are not applicable to wireless networks in which the bulk of packet loss is due to errors at the physical layer...

  8. Secure Broadcast in Energy-Aware Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2002-01-01

    .... The authors show that existing efficient key distribution techniques for wired networks that rely on logical hierarchies are extremely energy inefficient for energy-constrained wireless ad-hoc networks...

  9. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  10. Steerable pencil beams for multi-Gbps indoor optical wireless communication.

    Science.gov (United States)

    Oh, C W; Tangdiongga, E; Koonen, A M J

    2014-09-15

    We report a novel optical wireless communication (OWC) system solution that supports multi-Gbps (Gigabit-per-second) capacity for indoors. Narrow beams, termed as pencil beams, are directed to wireless users using a tunable laser and a passive diffractive optical element. This enables a wide coverage of ultra-high-capacity communication links to serve multiple network users simultaneously. Experimental results demonstrating data rates of up to 10 Gbps, with on-off keying modulation format, over a distance of more than 2.5 m, are reported. Error-free links beam-steered over a total wavelength range of 130 nm, with steering angle of 17.16°, have been achieved. This system is proposed for short-range OWC and is promising for seamless integration in in-building optical networks.

  11. Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches

    Directory of Open Access Journals (Sweden)

    Omar M. Zakaria

    2016-01-01

    Full Text Available Multiradio wireless mesh network is a promising architecture that improves the network capacity by exploiting multiple radio channels concurrently. Channel assignment and routing are underlying challenges in multiradio architectures since both determine the traffic distribution over links and channels. The interdependency between channel assignments and routing promotes toward the joint solutions for efficient configurations. This paper presents an in-depth review of the joint approaches of channel assignment and routing in multiradio wireless mesh networks. First, the key design issues, modeling, and approaches are identified and discussed. Second, existing algorithms for joint channel assignment and routing are presented and classified based on the channel assignment types. Furthermore, the set of reconfiguration algorithms to adapt the network traffic dynamics is also discussed. Finally, the paper presents some multiradio practical implementations and test-beds and points out the future research directions.

  12. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  13. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  14. The security energy encryption in wireless power transfer

    Science.gov (United States)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  15. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  16. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  17. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  18. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  19. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  20. OIT Wireless Telemetry for Industrial Applications

    Energy Technology Data Exchange (ETDEWEB)

    Manges, WW

    2002-09-03

    The need for advanced wireless technology has been identified in the National Research Council publication (1) ''Manufacturing Process Controls for the Industries of the Future as a Critical Technology for the Future''. The deployment challenges to be overcome in order for wireless to be a viable option include: (1) eliminating interference (assuring reliable communications); (2) easing the deployment of intelligent, wireless sensors; (3) developing reliable networks (robust architectures); (4) developing remote power (long-lasting and reliable); and (5) developing standardized communication protocols. This project demonstrated the feasibility of robust wireless sensor networks that could meet these requirements for the harsh environments common to the DOE/OIT Industries of the Future. It resulted in a wireless test bed that was demonstrated in a paper mill and a steel plant. The test bed illustrated key protocols and components that would be required in a real-life, wireless network. The technologies for low power connectivity developed and demonstrated at the plant eased fears that the radios would interfere with existing control equipment. The same direct sequence, spread spectrum (DSSS) technology that helped assure the reliability of the connection also demonstrated that wireless communication was feasible in these plants without boosting the transmitted power to dangerous levels. Our experience and research have indicated that two key parameters are of ultimate importance: (1) reliability and (2) inter-system compatibility. Reliability is the key to immediate acceptance among industrial users. The importance cannot be overstated, because users will not tolerate an unreliable information network. A longer term issue that is at least as important as the reliability of a single system is the inter-system compatibility between these wireless sensor networks and other wireless systems that are part of our industries. In the long run, the

  1. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  2. Wireless Medical Devices for MRI-Guided Interventions

    Science.gov (United States)

    Venkateswaran, Madhav

    Wireless techniques can play an important role in next-generation, image-guided surgical techniques with integration strategies being the key. We present our investigations on three wireless applications. First, we validate a position and orientation independent method to noninvasively monitor wireless power delivery using current perturbation measurements of switched load modulation of the RF carrier. This is important for safe and efficient powering without using bulky batteries or invasive cables. Use of MRI transmit RF pulses for simultaneous powering is investigated in the second part. We develop system models for the MRI transmit chain, wireless powering circuits and a typical load. Detailed analysis and validation of nonlinear and cascaded modeling strategies are performed, useful for decoupled optimization of the harvester coil and RF-DC converter. MRI pulse sequences are investigated for suitability for simultaneous powering. Simulations indicate that a 1.8V, 2 mA load can be powered with a 100% duty cycle using a 30° fGRE sequence, despite the RF duty cycle being 44 mW for a 30° flip angle, consistent with model predictions. Investigations on imaging artifacts indicates that distortion is mostly restricted to within the physical span of the harvester coil in the imaging volume, with the homogeneous B1+ transmit field providing positioning flexibility to minimize this for simultaneous powering. The models are potentially valuable in designing wireless powering solutions for implantable devices with simultaneous real-time imaging in MRI-guided surgical suites. Finally in the last section, we model endovascular MRI coil coupling during RF transmit. FEM models for a series-resonant multimode coil and quadrature birdcage coil fields are developed and computationally efficient, circuit and full-wave simulations are used to model inductive coupling. The Bloch Siegert B1 mapping sequence is used for validating at 24, 28 and 34 microT background excitation

  3. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey.

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-12-16

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.

  4. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey

    Directory of Open Access Journals (Sweden)

    Ruisong Han

    2016-12-01

    Full Text Available Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs, enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.

  5. RF microwave circuit design for wireless applications

    CERN Document Server

    Rohde, Ulrich L

    2012-01-01

    Provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling the newest IC technologies Revised and completely updated, RF/Microwave Circuit Design for Wireless Applications, Second Edition is a unique, state-of-the-art guide to wireless integrated circuit design that provides researchers and engineers with a complete set of modeling, design, and implementation tools for tackling even the newest IC technologies. It emphasizes practical design solutions for high-performance devices and circuitry, incorporating ample exa

  6. Stochastic petri nets for wireless networks

    CERN Document Server

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  7. Wireless world widens nurse call options.

    Science.gov (United States)

    Baillie, Jonathan

    2014-01-01

    With wireless technology now an integral part of all our lives, and miniaturisation of computing power having made even hand-held portable devices such as mobile phones powerful tools in their own right, HEJ editor, Jonathan Baillie, spoke to specialist in wireless nurse call systems, Courtney-Thorne, to discuss some of its key recent product innovations, and see what impact it feels developments such as 'cloud' technology will have on the bringing of more technology into the nurse call sector as 'nurse and carer tools'.

  8. RF & wireless technologies know it all

    CERN Document Server

    Fette, Bruce A; Chandra, Praphul; Dobkin, Daniel M; Bensky, Dan; Miron, Douglas B; Lide, David; Dowla, Farid; Olexa, Ron

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined R

  9. Modeling, Simulation and Analysis of Public Key Infrastructure

    Science.gov (United States)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  10. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  11. Energy and bandwidth-efficient wireless transmission

    CERN Document Server

    Gao, Wei

    2017-01-01

    This book introduces key modulation and predistortion techniques for approaching energy and spectrum-efficient transmission for wireless communication systems. The book presents a combination of theoretical principles, practical implementations, and actual tests. It focuses on spectrum-efficient modulation and energy-efficient transmission techniques in the portable wireless communication systems, and introduces currently developed and designed RF transceivers in the latest wireless markets. Most materials, design examples, and design strategies used are based on the author’s two decades of work in the digital communication fields, especially in the areas of the digital modulations, demodulations, digital signal processing, and linearization of power amplifiers. The applications of these practical products and equipment cover the satellite communications on earth station systems, microwave communication systems, 2G GSM and 3G WCDMA mobile communication systems, and 802.11 WLAN systems.

  12. Converged Wireless Networking and Optimization for Next Generation Services

    Directory of Open Access Journals (Sweden)

    J. Rodriguez

    2010-01-01

    Full Text Available The Next Generation Network (NGN vision is tending towards the convergence of internet and mobile services providing the impetus for new market opportunities in combining the appealing services of internet with the roaming capability of mobile networks. However, this convergence does not go far enough, and with the emergence of new coexistence scenarios, there is a clear need to evolve the current architecture to provide cost-effective end-to-end communication. The LOOP project, a EUREKA-CELTIC driven initiative, is one piece in the jigsaw by helping European industry to sustain a leading role in telecommunications and manufacturing of high-value products and machinery by delivering pioneering converged wireless networking solutions that can be successfully demonstrated. This paper provides an overview of the LOOP project and the key achievements that have been tunneled into first prototypes for showcasing next generation services for operators and process manufacturers.

  13. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  14. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  15. Bluetooth wireless database for scoliosis clinics.

    Science.gov (United States)

    Lou, E; Fedorak, M V; Hill, D L; Raso, J V; Moreau, M J; Mahood, J K

    2003-05-01

    A database system with Bluetooth wireless connectivity has been developed so that scoliosis clinics can be run more efficiently and data can be mined for research studies without significant increases in equipment cost. The wireless database system consists of a Bluetooth-enabled laptop or PC and a Bluetooth-enabled handheld personal data assistant (PDA). Each patient has a profile in the database, which has all of his or her clinical history. Immediately prior to the examination, the orthopaedic surgeon selects a patient's profile from the database and uploads that data to the PDA over a Bluetooth wireless connection. The surgeon can view the entire clinical history of the patient while in the examination room and, at the same time, enter in any new measurements and comments from the current examination. After seeing the patient, the surgeon synchronises the newly entered information with the database wirelessly and prints a record for the chart. This combination of the database and the PDA both improves efficiency and accuracy and can save significant time, as there is less duplication of work, and no dictation is required. The equipment required to implement this solution is a Bluetooth-enabled PDA and a Bluetooth wireless transceiver for the PC or laptop.

  16. Shed a light of wireless technology on portable mobile design of NIRS

    Science.gov (United States)

    Sun, Yunlong; Li, Ting

    2016-03-01

    Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.

  17. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  18. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  19. Study for wireless power transmission of nuclear robot system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jongseog [Central Research Institute of Korea Hydro and Nuclear Power Co., Daejeon (Korea, Republic of)

    2013-05-15

    Gasoline engine or electric motor is generally used for driving power of working. Gasoline tank is uncomfortable to carry. Battery capacity does not sustain long time working. Frequent moving back of robot to power charger or refueling tank is inconvenient. Long power cable connection occur winding problem if there are complex structures in walking way. We need some solution for continuous supply of robot energy at the free moving condition of robot. 'Wireless power transmission' is one of the solutions. Some experiment result to transmit wireless power to moving robot is described herein. To find possible wireless power transmission method for nuclear robot, wireless power transmission tests were performed. As result of these tests, it was confirmed that wireless power transmission by using dipole and mat type magnetic induction were possible. As result of flying robot experiment, it was realized that development of light weight core for receiver and wave reflection device for high directional transmitter are necessary for practical use of the dipole type wireless power transmission. Small size core and high directional transmitter will be next target. Mat type wireless power transmission is regarded as useful for robot power charging station in the inside containment.

  20. Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Burnette, John R.; Thibodeau, Christopher C.; Greitzer, Frank L.

    2002-02-28

    As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data between the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.

  1. Study for wireless power transmission of nuclear robot system

    International Nuclear Information System (INIS)

    Kim, Jongseog

    2013-01-01

    Gasoline engine or electric motor is generally used for driving power of working. Gasoline tank is uncomfortable to carry. Battery capacity does not sustain long time working. Frequent moving back of robot to power charger or refueling tank is inconvenient. Long power cable connection occur winding problem if there are complex structures in walking way. We need some solution for continuous supply of robot energy at the free moving condition of robot. 'Wireless power transmission' is one of the solutions. Some experiment result to transmit wireless power to moving robot is described herein. To find possible wireless power transmission method for nuclear robot, wireless power transmission tests were performed. As result of these tests, it was confirmed that wireless power transmission by using dipole and mat type magnetic induction were possible. As result of flying robot experiment, it was realized that development of light weight core for receiver and wave reflection device for high directional transmitter are necessary for practical use of the dipole type wireless power transmission. Small size core and high directional transmitter will be next target. Mat type wireless power transmission is regarded as useful for robot power charging station in the inside containment

  2. Routing and Scheduling Algorithms for WirelessHARTNetworks: A Survey

    Directory of Open Access Journals (Sweden)

    Marcelo Nobre

    2015-04-01

    Full Text Available Wireless communication is a trend nowadays for the industrial environment. A number of different technologies have emerged as solutions satisfying strict industrial requirements (e.g., WirelessHART, ISA100.11a, WIA-PA. As the industrial environment presents a vast range of applications, adopting an adequate solution for each case is vital to obtain good performance of the system. In this context, the routing and scheduling schemes associated with these technologies have a direct impact on important features, like latency and energy consumption. This situation has led to the development of a vast number of routing and scheduling schemes. In the present paper, we focus on the WirelessHART technology, emphasizing its most important routing and scheduling aspects in order to guide both end users and the developers of new algorithms. Furthermore, we provide a detailed literature review of the newest routing and scheduling techniques forWirelessHART, discussing each of their features. These routing algorithms have been evaluated in terms of their objectives, metrics, the usage of theWirelessHART structures and validation method. In addition, the scheduling algorithms were also evaluated by metrics, validation, objectives and, in addition, by multiple superframe support, as well as by the redundancy method used. Moreover, this paper briefly presents some insights into the main WirelessHART simulation modules available, in order to provide viable test platforms for the routing and scheduling algorithms. Finally, some open issues in WirelessHART routing and scheduling algorithms are discussed.

  3. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  4. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  5. Optical and wireless technologies

    CERN Document Server

    Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo

    2018-01-01

    This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.

  6. Integration of a prototype wireless communication system with micro-electromechanical temperature and humidity sensor for concrete pavement health monitoring

    Directory of Open Access Journals (Sweden)

    Shuo Yang

    2015-12-01

    Full Text Available In recent years, structural health monitoring and management (SHMM has become a popular approach and is considered essential for achieving well-performing, long-lasting, sustainable transportation infrastructure systems. Key requirements in ideal SHMM of road infrastructure include long-term, continuous, and real-time monitoring of pavement response and performance under various pavement geometry-materials-loading configurations and environmental conditions. With advancements in wireless technologies, integration of wireless communications into sensing device is considered an alternate and superior solution to existing time- and labor-intensive wired sensing systems in meeting the requirements of an ideal SHMM. This study explored the development and integration of a wireless communications sub-system into a commercial off-the-shelf micro-electromechanical sensor-based concrete pavement monitoring system. A success-rate test was performed after the wireless transmission system was buried in the concrete slab, and the test results indicated that the system was able to provide reliable communications at a distance of more than 46 m (150 feet. This will be a useful feature for highway engineers performing routine pavement scans from the pavement shoulder without the need for traffic control or road closure.

  7. Key factors leading to reduced recruitment and retention of health professionals in remote areas of Ghana: a qualitative study and proposed policy solutions

    Directory of Open Access Journals (Sweden)

    Dzodzomenyo Mawuli

    2011-05-01

    Full Text Available Abstract Background The ability of many countries to achieve national health goals such as the Millennium Development Goals remains hindered by inadequate and poorly distributed health personnel, including doctors. The distribution of doctors in Ghana is highly skewed, with a majority serving in two major metropolitan areas (Accra and Kumasi, and inadequate numbers in remote and rural districts. Recent policies increasing health worker salaries have reduced migration of doctors out of Ghana, but made little difference to distribution within the country. This qualitative study was undertaken to understand how practicing doctors and medical leaders in Ghana describe the key factors reducing recruitment and retention of health professionals into remote areas, and to document their proposed policy solutions. Methods In-depth interviews were carried out with 84 doctors and medical leaders, including 17 regional medical directors and deputy directors from across Ghana, and 67 doctors currently practicing in 3 regions (Greater Accra, Brong Ahafo, and Upper West; these 3 regions were chosen to represent progressively more remote distances from the capital of Accra. Results and discussion All participants felt that rural postings must have special career or monetary incentives given the loss of locum (i.e. moonlighting income, the higher workload, and professional isolation of remote assignments. Career 'death' and prolonged rural appointments were a common fear, and proposed policy solutions focused considerably on career incentives, such as guaranteed promotion or a study opportunity after some fixed term of service in a remote or hardship area. There was considerable stress placed on the need for rural doctors to have periodic contact with mentors through rural rotation of specialists, or remote learning centers, and reliable terms of appointment with fixed end-points. Also raised, but given less emphasis, were concerns about the adequacy of clinical

  8. Key factors leading to reduced recruitment and retention of health professionals in remote areas of Ghana: a qualitative study and proposed policy solutions.

    Science.gov (United States)

    Snow, Rachel C; Asabir, Kwesi; Mutumba, Massy; Koomson, Elizabeth; Gyan, Kofi; Dzodzomenyo, Mawuli; Kruk, Margaret; Kwansah, Janet

    2011-05-21

    The ability of many countries to achieve national health goals such as the Millennium Development Goals remains hindered by inadequate and poorly distributed health personnel, including doctors. The distribution of doctors in Ghana is highly skewed, with a majority serving in two major metropolitan areas (Accra and Kumasi), and inadequate numbers in remote and rural districts. Recent policies increasing health worker salaries have reduced migration of doctors out of Ghana, but made little difference to distribution within the country. This qualitative study was undertaken to understand how practicing doctors and medical leaders in Ghana describe the key factors reducing recruitment and retention of health professionals into remote areas, and to document their proposed policy solutions. In-depth interviews were carried out with 84 doctors and medical leaders, including 17 regional medical directors and deputy directors from across Ghana, and 67 doctors currently practicing in 3 regions (Greater Accra, Brong Ahafo, and Upper West); these 3 regions were chosen to represent progressively more remote distances from the capital of Accra. All participants felt that rural postings must have special career or monetary incentives given the loss of locum (i.e. moonlighting income), the higher workload, and professional isolation of remote assignments. Career 'death' and prolonged rural appointments were a common fear, and proposed policy solutions focused considerably on career incentives, such as guaranteed promotion or a study opportunity after some fixed term of service in a remote or hardship area. There was considerable stress placed on the need for rural doctors to have periodic contact with mentors through rural rotation of specialists, or remote learning centers, and reliable terms of appointment with fixed end-points. Also raised, but given less emphasis, were concerns about the adequacy of clinical equipment in remote facilities, and remote accommodations. In

  9. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    Directory of Open Access Journals (Sweden)

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  10. Multichannel magnetic resonance sounding with wirelessly operated coils

    DEFF Research Database (Denmark)

    Bahner, Klaus Günter; Larsen, Jakob Juul; Auken, Esben

    of interest. To further improve on noise reduction, better methods for dealing with complex noise fields are needed. In available systems the reference channels are connected to a base station by wires. In this paper we argue that by using reference channels with wireless connections to the base station...... improvements in noise reduction can be expected. We present and discuss a design study of an MRS receiver system using wireless reference channels. The design is based on using as many standard components as possible e.g. GPS disciplined oscillators for time synchronization and WiFi for communication between...... units. Key words: Multichannel MRS, noise reduction techniques, wireless sensors, geophysics instrumentation....

  11. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  12. The Challenge of Wireless Connectivity to Support Intelligent Mines

    DEFF Research Database (Denmark)

    Barbosa, Viviane S. B.; Garcia, Luis G. U.; Caldwell, George

    2016-01-01

    and increase productivity, from extraction all the way to the delivery of a processed product to the customer. In this context, one of the key enablers is wireless connectivity since it allows mining equipment to be remotely monitored and controlled. Simply put, dependable wireless connectivity is essential...... mining paradigm. By means of simulations, we analyze the effects on the wireless network along 7 years of constant topographic changes in an open-pit mine coupled with much higher data requirements. The authors also present a new network topology that is able to partially meet the requirements posed...

  13. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  14. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  15. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-11-01

    Wireless power transfer (WPT) is the key enabler for a myriad of applications, from low-power RFIDs, and wireless sensors, to wirelessly charged electric vehicles, and even massive power transmission from space solar cells. One of the major challenges in designing implantable biomedical devices is the size and lifetime of the battery. Thus, replacing the battery with a miniaturized wireless power receiver (WPRx) facilitates designing sustainable biomedical implants in smaller volumes for sentient medical applications. In the first part of this dissertation, we propose a miniaturized, fully integrated, wirelessly powered implantable sensor with on-chip antenna, designed and implemented in a standard 0.18μm CMOS process. As a batteryless device, it can be implanted once inside the body with no need for further invasive surgeries to replace batteries. The proposed single-chip solution is designed for intraocular pressure monitoring (IOPM), and can serve as a sustainable platform for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W transmitter 3cm away from the chip. In the second part, we propose a self-biased, differential rectifier with enhanced efficiency over an extended range of input power. A prototype is designed for the medical implant communication service (MICS) band at 433MHz. It demonstrates an efficiency improvement of more than 40% in the rectifier power conversion efficiency (PCE) and a dynamic range extension of more than 50% relative to the conventional cross-coupled rectifier. A sensitivity of -15.2dBm input power for 1V output voltage and a peak PCE of 65% are achieved for a 50k load. In the third part, we propose a wide-range, differential RF-to-DC power converter using an adaptive, self-biasing technique. The proposed architecture doubles

  16. Wireless capsule endoscopy

    Science.gov (United States)

    Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul

    2000-05-01

    We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.

  17. Wireless Competition in Canada: An Assessment

    Directory of Open Access Journals (Sweden)

    Jeffrey Church

    2013-08-01

    the number of wireless carriers. The key issue in terms of competition is whether prices track long run average costs, namely, whether wireless providers make monopoly profits. An examination of the leading firm’s cash flow over the life cycle of the wireless industry suggests internal rates of return well below the likely ex ante, pre-tax, cost of capital that reflects the risk of its investments. This is not consistent with either the inefficient exercise of market power or monopoly profits. Moreover, international comparisons of structural indicators of competition indicate that, if anything, wireless services in Canada are more competitive than in many of its peers. There is no evidence that there is a competition problem in wireless services in Canada. Efforts to create competition in the short run, that increase the number of carriers, will simply squeeze margins in the short run and likely will not be sustained in the long run, as carriers exit and consolidate to reduce competition and restore margins consistent with profitability and the natural limit. And, while consumers might gain in the short run from lower prices, everyone is likely made worse off in the long run from the misallocation of spectrum, reduction in scale of carriers, and reduction in incentives to invest from such intervention. The AWS set asides allocated spectrum to carriers whose focus was on talk and text, not carriers whose focus is on data, resulting in an inefficient mix of networks and a suboptimal allocation of spectrum.

  18. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  19. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  20. High Fidelity Simulations of Large-Scale Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Onunkwo, Uzoma [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Benz, Zachary [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.

  1. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  2. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  3. Wireless Communications for Monitoring Nuclear Material Processes Part 2: Wireless In-plant Data Transmission

    International Nuclear Information System (INIS)

    Braina, F.; Goncalves, J.M.C.; Versino, C.; Heppleston, M.; Ottesen, C.; Schoeneman, B.; Tolk, K.

    2008-01-01

    The wireless transmission of data from sensors, monitoring both static and dynamic safeguards processes, is highly appealing for the simple fact that there are no wires. In a nuclear safeguards regime, this has the implied benefits of low-cost installations, versatile configurations, and the elimination of conduits to inspect. However, with the implied solutions of wireless, we are presented with a new set of problems for system implementation and operation management, in particular (1) Radio Frequency (RF) interference and (2) security in information transmission. These problems are addressable. This paper looks at the clear benefits of wireless technologies and the cautions regarding the possible pitfalls of poorly applied technology, discusses the integration of radio frequency in existing and new facilities, provides high-level considerations for information security, and reviews prospects for the future

  4. Fully Passive Wireless Acquisition of Neuropotentials

    Science.gov (United States)

    Schwerdt, Helen N.

    The ability to monitor electrophysiological signals from the sentient brain is requisite to decipher its enormously complex workings and initiate remedial solutions for the vast amount of neurologically-based disorders. Despite immense advancements in creating a variety of instruments to record signals from the brain, the translation of such neurorecording instrumentation to real clinical domains places heavy demands on their safety and reliability, both of which are not entirely portrayed by presently existing implantable recording solutions. In an attempt to lower these barriers, alternative wireless radar backscattering techniques are proposed to render the technical burdens of the implant chip to entirely passive neurorecording processes that transpire in the absence of formal integrated power sources or powering schemes along with any active circuitry. These radar-like wireless backscattering mechanisms are used to conceive of fully passive neurorecording operations of an implantable microsystem. The fully passive device potentially manifests inherent advantages over current wireless implantable and wired recording systems: negligible heat dissipation to reduce risks of brain tissue damage and minimal circuitry for long term reliability as a chronic implant. Fully passive neurorecording operations are realized via intrinsic nonlinear mixing properties of the varactor diode. These mixing and recording operations are directly activated by wirelessly interrogating the fully passive device with a microwave carrier signal. This fundamental carrier signal, acquired by the implant antenna, mixes through the varactor diode along with the internal targeted neuropotential brain signals to produce higher frequency harmonics containing the targeted neuropotential signals. These harmonics are backscattered wirelessly to the external interrogator that retrieves and recovers the original neuropotential brain signal. The passive approach removes the need for internal power

  5. A Wildlife Monitoring System Based on Wireless Image Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junguo Zhang

    2014-10-01

    Full Text Available Survival and development of wildlife sustains the balance and stability of the entire ecosystem. Wildlife monitoring can provide lots of information such as wildlife species, quantity, habits, quality of life and habitat conditions, to help researchers grasp the status and dynamics of wildlife resources, and to provide basis for the effective protection, sustainable use, and scientific management of wildlife resources. Wildlife monitoring is the foundation of wildlife protection and management. Wireless Sensor Networks (WSN technology has become the most popular technology in the field of information. With advance of the CMOS image sensor technology, wireless sensor networks combined with image sensors, namely Wireless Image Sensor Networks (WISN technology, has emerged as an alternative in monitoring applications. Monitoring wildlife is one of its most promising applications. In this paper, system architecture of the wildlife monitoring system based on the wireless image sensor networks was presented to overcome the shortcomings of the traditional monitoring methods. Specifically, some key issues including design of wireless image sensor nodes and software process design have been studied and presented. A self-powered rotatable wireless infrared image sensor node based on ARM and an aggregation node designed for large amounts of data were developed. In addition, their corresponding software was designed. The proposed system is able to monitor wildlife accurately, automatically, and remotely in all-weather condition, which lays foundations for applications of wireless image sensor networks in wildlife monitoring.

  6. Troubleshooting Assistance Services in Community Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Kriz

    2012-01-01

    Full Text Available We have identified new services intended for users and administrators of community wireless networks. Troubleshooting assistance services will assist the users during solution of communication problems, gathering data for expert analysis, informing the user about the state of the network (including outages, and so forth. Network administrators will be provided with a unique tool supporting the network analysis, operation, and development. We have mainly focused on the use cases and prerequirements—the problem of topology discovery.

  7. FireFly: reconfigurable optical wireless networking data centers

    Science.gov (United States)

    Kavehrad, Mohsen; Deng, Peng; Gupta, H.; Longtin, J.; Das, S. R.; Sekar, V.

    2017-01-01

    We explore a novel, free-space optics based approach for building data center interconnects. Data centers (DCs) are a critical piece of today's networked applications in both private and public sectors. The key factors that have driven this trend are economies of scale, reduced management costs, better utilization of hardware via statistical multiplexing, and the ability to elastically scale applications in response to changing workload patterns. A robust DC network fabric is fundamental to the success of DCs and to ensure that the network does not become a bottleneck for high-performance applications. In this context, DC network design must satisfy several goals: high performance (e.g., high throughput and low latency), low equipment and management cost, robustness to dynamic traffic patterns, incremental expandability to add new servers or racks, and other practical concerns such as cabling complexity, and power and cooling costs. Current DC network architectures do not seem to provide a satisfactory solution, with respect to the above requirements. In particular, traditional static (wired) networks are either overprovisioned or oversubscribed. Recent works have tried to overcome the above limitations by augmenting a static (wired) "core" with some flexible links (RF-wireless or optical). These augmented architectures show promise, but offer only incremental improvement in performance. Specifically, RFwireless based augmented solutions also offer only limited performance improvement, due to inherent interference and range constraints of RF links. This paper explores an alternative design point—a fully flexible and all-wireless DC interrack network based on free-space optical (FSO) links. We call this FireFly as in; Free-space optical Inter-Rack nEtwork with high FLexibilitY. We will present our designs and tests using various configurations that can help the performance and reliability of the FSO links.

  8. Improved timing recovery in wireless mobile receivers

    CSIR Research Space (South Africa)

    Olwal, TO

    2007-06-01

    Full Text Available is critical. This is partly because timing recovery functions must follow rapid parameter changes inherent in mobile systems and partly because both bandwidth and power must be conserved in low signal to noise ratio communication channels. The ultimate goal... in low signal to noise ratios. In order to develop a bandwidth and power efficient timing recovery method for wireless mobile receivers, a raised cosine filter and a multilevel phase shift keying modulation scheme are implemented and no clock signals...

  9. A Solution Based on Bluetooth Low Energy for Smart Home Energy Management

    Directory of Open Access Journals (Sweden)

    Mario Collotta

    2015-10-01

    Full Text Available The research and the implementation of home automation are getting more popular because the Internet of Things holds promise for making homes smarter through wireless technologies. The installation of systems based on wireless networks can play a key role also in the extension of the smart grid towards smart homes, that can be deemed as one of the most important components of smart grids. This paper proposes a fuzzy-based solution for smart energy management in a home automation wireless network. The approach, by using Bluetooth Low Energy (BLE, introduces a Fuzzy Logic Controller (FLC in order to improve a Home Energy Management (HEM scheme, addressing the power load of standby appliances and their loads in different hours of the day. Since the consumer is involved in the choice of switching on/off of home appliances, the approach introduced in this work proposes a fuzzy-based solution in order to manage the consumer feedbacks. Simulation results show that the proposed solution is efficient in terms of reducing peak load demand, electricity consumption charges with an increase comfort level of consumers. The performance of the proposed BLE-based wireless network scenario are validated in terms of packet delivery ratio, delay, and jitter and are compared to IEEE 802.15.4 technology.

  10. REAL TIME WIRELESS AIR POLLUTION MONITORING SYSTEM

    Directory of Open Access Journals (Sweden)

    Raja Vara Prasad Y

    2011-06-01

    Full Text Available Air pollution has significant influence on the concentration of constituents in the atmosphere leading to effects like global warming and acid rains. To avoid such adverse imbalances in the nature, an air pollution monitoring system is utmost important. This paper attempts to develop an effective solution for pollution monitoring using wireless sensor networks (WSN on a real time basis namely real time wireless air pollution monitoring system. Commercially available discrete gas sensors for sensing concentration of gases like CO2, NO2, CO and O2 are calibrated using appropriate calibration technologies. These pre-calibrated gas sensors are then integrated with the wireless sensor motes for field deployment at the campus and the Hyderabad city using multi hop data aggregation algorithm. A light weight middleware and a web interface to view the live pollution data in the form of numbers and charts from the test beds was developed and made available from anywhere on the internet. Other parameters like temperature and humidity were also sensed along with gas concentrations to enable data analysis through data fusion techniques. Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine-grain pollution data.

  11. An underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2009-08-01

    The growing need for underwater observation and sub-sea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, bio-geochemical, evolutionary and ecological changes in the sea, ocean and lake environments and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. We present models of three kinds of optical wireless communication links a) a line-of-sight link, b) a modulating retro-reflector link and c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered lighted it was possible to mitigate this decrease in some cases. We conclude from the analysis that a high data rate underwater optical wireless network is a feasible solution for emerging applications such as UUV to UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  12. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  13. EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS ...

    African Journals Online (AJOL)

    ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...

  14. Multichannel wireless ECoG array ASIC devices.

    Science.gov (United States)

    DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe

    2014-01-01

    Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy [1], [2], [3]. Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate[4]. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.

  15. A Prototype Design of a Wireless Capsule Endoscope

    Directory of Open Access Journals (Sweden)

    Y. Chan

    2006-01-01

    Full Text Available Diseases of the gastrointestinal tract, such as intestinal bleeding and ulceration, are very common. To determine the location of the disease, as well as to diagnose the problem, endoscopy is performed. A wireless capsule endoscope is a pill-sized device that is easily swallowed by the patient. It is equipped with a camera and a wireless transmitter so that as it travels through the patient's gastrointestinal tract, it takes pictures or video images of the tract and transmits the information out of the patient's body. This article discusses the possible solutions and challenges of a wireless capsule endoscope in terms of the choice of wireless frequency and circuit components. A prototype is built with commercially available components to demonstrate the concept of the device.

  16. Wireless Underwater Monitoring Systems Based on Energy Harvestings

    Directory of Open Access Journals (Sweden)

    Sea-Hee HWANGBO

    2013-01-01

    Full Text Available One of the important research fields for aquatic exploitation and conservation is underwater wireless sensor network. Since limited energy source for underwater nodes and devices is a main open problem, in this paper, we propose wireless underwater monitoring systems powered by energy harvester which resolves the energy constraint. The target system generates renewable energy from energy harvester and shares the energy with underwater sensor nodes. For the realization of the system, key components to be investigated are discriminated as follows: acoustic modem, actuator, smart battery charge controller, energy harvester and wireless power transfer module. By developing acoustic modem, actuator and smart battery charge controller and utilizing off-the-shelf energy harvester and wireless power transfer module, we design and implement a prototype of the system. Also, we verify the feasibility of concept of target system by conducting indoor and outdoor experiments.

  17. Wireless data transmission for high energy physics applications

    Directory of Open Access Journals (Sweden)

    Dittmeier Sebastian

    2017-01-01

    The WADAPT group (Wireless Allowing Data and Power Transmission has been formed to study the feasibility of wireless data transmission for future tracking detectors. These proceedings cover current developments focused on communication in the 60 GHz band. This frequency band offers a high bandwidth, a small form factor and an already mature technology. Motivation for wireless data transmission for high energy physics application and the developments towards a demonstrator prototype are summarized. Feasibility studies concerning the construction and operation of a wireless transceiver system have been performed. Data transmission tests with a transceiver prototype operating at even higher frequencies in the 240 GHz band are described. Data transmission at rates up to 10 Gb/s have been obtained successfully using binary phase shift keying.

  18. Collaboration in a Wireless Grid Innovation Testbed by Virtual Consortium

    Science.gov (United States)

    Treglia, Joseph; Ramnarine-Rieks, Angela; McKnight, Lee

    This paper describes the formation of the Wireless Grid Innovation Testbed (WGiT) coordinated by a virtual consortium involving academic and non-academic entities. Syracuse University and Virginia Tech are primary university partners with several other academic, government, and corporate partners. Objectives include: 1) coordinating knowledge sharing, 2) defining key parameters for wireless grids network applications, 3) dynamically connecting wired and wireless devices, content and users, 4) linking to VT-CORNET, Virginia Tech Cognitive Radio Network Testbed, 5) forming ad hoc networks or grids of mobile and fixed devices without a dedicated server, 6) deepening understanding of wireless grid application, device, network, user and market behavior through academic, trade and popular publications including online media, 7) identifying policy that may enable evaluated innovations to enter US and international markets and 8) implementation and evaluation of the international virtual collaborative process.

  19. Overlapping coalition formation games in wireless communication networks

    CERN Document Server

    Wang, Tianyu; Saad, Walid; Han, Zhu

    2017-01-01

    This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...

  20. Quantum-classical access networks with embedded optical wireless links

    Science.gov (United States)

    Elmabrok, Osama; Ghalaii, Masoud; Razavi, Mohsen

    2018-03-01

    We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals, sent through wireless indoor channels, are combined with classical ones and sent over shared fiber links to the remote user. Dense wavelengthdivision multiplexing would enable the simultaneous transmission of quantum and classical signals over the same fiber. We consider the adverse effects of the background noise induced by Raman scattered light on the QKD receivers due to such an integration. In addition, we consider the loss and the background noise that arise from indoor environments. We consider a number of discrete and continuous-variable QKD protocols and study their performance in different scenarios.

  1. A Novel Situation Specific Network Security for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Al-Rousan

    2015-03-01

    Full Text Available Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time. In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks.

  2. Propagation engineering in wireless communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2016-01-01

    This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

  3. Fiber wireless networks

    Science.gov (United States)

    Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.

    2005-11-01

    Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.

  4. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  5. Reliability of Wireless Sensor Networks

    Science.gov (United States)

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  6. A Security Solution for IEEE 802.11's Ad-hoc Mode: Password-Authentication and Group Diffie-Hellman Key Exchange

    OpenAIRE

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-01-01

    The IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while traveling. These standards provide two modes of communication called infrastructure and ad-hoc modes. A security solution for the IEEE 802.11's infrastructure mode took several years to reach maturity and firmware are still been upgraded, yet a solution for the ad-hoc mode needs to be specified. The present paper is a first attempt in this direction. It leverag...

  7. A Low-Cost Wireless Multi-Presentation on Single Screen in Classroom Using Raspberry Pi

    Science.gov (United States)

    Yulianto, Budi; Layona, Rita; Dewi, Lusiana Citra

    2017-01-01

    Smartphone has become a daily necessity in supporting the mobility of users, including teachers and students. The need of users to make multi-presentation via a smartphone wirelessly does not fit with the cost and multiplatform support. This study aims to produce a solution by using Raspberry Pi as a wireless digital media player that will be…

  8. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  9. Energy optimization based path selection algorithm for IEEE 802.11s wireless mesh networks

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2011-09-01

    Full Text Available It is everyone’s dream to have network connectivity anywhere at all times. This dream can only be realized provided there are feasible solutions that are put in place for the next generation of wireless works. Wireless Mesh Networks (WMNs...

  10. Wireless Occupancy Sensors for Lighting Controls: An Applications Guide for Federal Facility Managers

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-03-15

    This guide provides federal facility managers with an overview of the energy savings potential of wireless lighting occupancy sensors for various room types, cost considerations, key steps to successful installation of wireless sensors, pros and cons of various technology options, light source considerations, and codes and standards.

  11. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  12. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  13. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  14. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  15. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  16. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  17. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  18. Awareness of Emerging Wireless Technologies: Ad-hoc and Personal Area Networks Standards and Emerging Technologies (Sensibilisation a l'emergence des technologies sans fil: technologies emergeantes et normes de reseaux personnels et ad-hoc)

    National Research Council Canada - National Science Library

    Stassinopoulos, George; Boucher, L; Churavy, M; Plesse, T; Marquart, D; Kyriazakos, S; Papaoulakis, N; Nikitopoulos, D; Maseng, T

    2007-01-01

    .... The report starts with ad-hoc networking concepts and maturing technological solutions. Ad-hoc networking is a necessary companion to wireless communication, due to the inherent lack of reliability of any wireless based link level protocol...

  19. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  20. Relay Selection for Cooperative Relaying in Wireless Energy Harvesting Networks

    Science.gov (United States)

    Zhu, Kaiyan; Wang, Fei; Li, Songsong; Jiang, Fengjiao; Cao, Lijie

    2018-01-01

    Energy harvesting from the surroundings is a promising solution to provide energy supply and extend the life of wireless sensor networks. Recently, energy harvesting has been shown as an attractive solution to prolong the operation of cooperative networks. In this paper, we propose a relay selection scheme to optimize the amplify-and-forward (AF) cooperative transmission in wireless energy harvesting cooperative networks. The harvesting energy and channel conditions are considered to select the optimal relay as cooperative relay to minimize the outage probability of the system. Simulation results show that our proposed relay selection scheme achieves better outage performance than other strategies.

  1. Frequency-agile antennas for wireless communications

    CERN Document Server

    Petosa, Aldo

    2013-01-01

    Mobile data subscriptions are expected to more than double and mobile wireless traffic to increase by more than tenfold over the next few years. Proliferation of smart phones, tablets, and other portable devices are placing greater demands for services such as web browsing, global positioning, video streaming, and video telephony. Many of the proposed solutions to deal with these demands will have a significant impact on antenna designs. Antennas with frequency agility are considered a promising technology to help implement these new solutions.This book provides readers with a sense of the cap

  2. Digital signal processing for wireless communication using Matlab

    CERN Document Server

    Gopi, E S

    2016-01-01

    This book examines signal processing techniques used in wireless communication illustrated by using the Matlab program. The author discusses these techniques as they relate to Doppler spread; delay spread; Rayleigh and Rician channel modeling; rake receiver; diversity techniques; MIMO and OFDM -based transmission techniques; and array signal processing. Related topics such as detection theory, link budget, multiple access techniques, and spread spectrum are also covered.   ·         Illustrates signal processing techniques involved in wireless communication using Matlab ·         Discusses multiple access techniques such as Frequency division multiple access, Time division multiple access, and Code division multiple access ·         Covers band pass modulation techniques such as Binary phase shift keying, Differential phase shift keying, Quadrature phase shift keying, Binary frequency shift keying, Minimum shift keying, and Gaussian minimum shift keying.

  3. Feasibility of retroreflective transdermal optical wireless communication.

    Science.gov (United States)

    Gil, Yotam; Rotter, Nadav; Arnon, Shlomi

    2012-06-20

    There is an increasing demand for transdermal high-data-rate communication for use with in-body devices, such as pacemakers, smart prostheses, neural signals processors at the brain interface, and cameras acting as artificial eyes as well as for collecting signals generated within the human body. Prominent requirements of these communication systems include (1) wireless modality, (2) noise immunity and (3) ultra-low-power consumption for the in-body device. Today, the common wireless methods for transdermal communication are based on communication at radio frequencies, electrical induction, or acoustic waves. In this paper, we will explore another alternative to these methods--optical wireless communication (OWC)--for which modulated light carries the information. The main advantages of OWC in transdermal communication, by comparison to the other methods, are the high data rates and immunity to external interference availed, which combine to make it a promising technology for next-generation systems. In this paper, we present a mathematical model and experimental results of measurements from direct link and retroreflection link configurations with Gallus gallus domesticus derma as the transdermal channel. The main conclusion from this work is that an OWC link is an attractive communication solution in medical applications. For a modulating retroreflective link to become a competitive solution in comparison with a direct link, low-energy-consumption modulating retroreflectors should be developed.

  4. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...

  5. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  6. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  7. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  8. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  9. Analyzing Options for Airborne Emergency Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Michael Schmitt; Juan Deaton; Curt Papke; Shane Cherry

    2008-03-01

    In the event of large-scale natural or manmade catastrophic events, access to reliable and enduring commercial communication systems is critical. Hurricane Katrina provided a recent example of the need to ensure communications during a national emergency. To ensure that communication demands are met during these critical times, Idaho National Laboratory (INL) under the guidance of United States Strategic Command has studied infrastructure issues, concerns, and vulnerabilities associated with an airborne wireless communications capability. Such a capability could provide emergency wireless communications until public/commercial nodes can be systematically restored. This report focuses on the airborne cellular restoration concept; analyzing basic infrastructure requirements; identifying related infrastructure issues, concerns, and vulnerabilities and offers recommended solutions.

  10. Wireless data over RAM's Mobitex network

    Science.gov (United States)

    Khan, M. Mobeen

    1995-12-01

    Mobitex is a mobile data technology standard created by Eritel, now a wholly owned subsidiary of Ericsson, that has been in existence for about a decade. Originally designed as a low speed (1.2 kbps) data system with a voice dispatch overlay, it was significantly enhanced in 1990 for use in North America and the UK. The enhanced system is a data-only system using cellular architecture and multi-channel frequency reuse, store-and-forward capability, and an 8 kbps over-the-air data rate. The mission of RAM Mobile Data USA Limited Partnership ('RAM') is to provide high quality, cost efficient, wireless data communications solutions in its targeted market segments. RAM's Mobitex network is currently one of the two networks providing two way wireless data services nationwide using a long distance service provider of the customer's choice.

  11. RF Transceiver Design for MIMO Wireless Communications

    CERN Document Server

    Mohammadi, Abbas

    2012-01-01

    This practical resource offers a thorough examination of RF transceiver design for MIMO communications.  Offering a practical view on MIMO wireless systems, this book extends fundamental concepts on classic wireless transceiver design techniques to MIMO transceivers. This helps reader gain a very comprehensive understanding of the subject. This in-depth volume describes many theoretical and implementation challenges on MIMO transceivers and provides the practical solutions for these issues. This comprehensive book provides thorough descriptions of MIMO theoretical concepts, MIMO single carrier and OFDM modulation, RF transceiver design concepts, power amplifier, MIMO transmitter design techniques and their RF impairments, MIMO receiver design methods, RF impairments study including nonlinearity, DC-offset, I/Q imbalance and phase noise and their compensation in OFDM and MIMO techniques. In addition, it provides the most practical techniques to realize RF front-ends in MIMO systems. This book is supported wit...

  12. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  13. Cognitive Wireless Communications - A paradigm shift in dealing with radio resources as a prerequisite for the wireless network of the future - An overview on the topic of cognitive wireless technologies

    Science.gov (United States)

    Haustein, Thomas; Stanczak, Slawomir; Wolisz, Adam; Jondral, Friedrich; Schotten, Hans; Kraemer, Rolf; Mück, Markus; Mennenga, Horst; Bender, Paul

    2016-07-01

    Wireless radio communications systems form the basis for mobile network connections in the digital society. A limited amount of radio spectrum and a spatially densified use of wireless communications systems require a resource-efficient use of the spectrum. Mechanisms of cognitive radio may hold the key to a more efficient use of the available spectrum under consideration of quality of service requirements. These mechanisms take advantage of location-specific knowledge of the wireless channel occupation in the dimensions of frequency, time, location and direction in space and therefore enable co-existent and reliable wireless communication. The authors give an introduction to the status of cognitive wireless communication technology, which represents the starting point of a series of research projects promoted by BMBF during 2012-2014.

  14. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  15. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  16. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Directory of Open Access Journals (Sweden)

    Zeeshan Abbas

    2015-09-01

    Full Text Available The Internet of Things (IoT is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE, and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  17. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  18. Congestion Prediction Modeling for Quality of Service Improvement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ga-Won Lee

    2014-04-01

    Full Text Available Information technology (IT is pushing ahead with drastic reforms of modern life for improvement of human welfare. Objects constitute “Information Networks” through smart, self-regulated information gathering that also recognizes and controls current information states in Wireless Sensor Networks (WSNs. Information observed from sensor networks in real-time is used to increase quality of life (QoL in various industries and daily life. One of the key challenges of the WSNs is how to achieve lossless data transmission. Although nowadays sensor nodes have enhanced capacities, it is hard to assure lossless and reliable end-to-end data transmission in WSNs due to the unstable wireless links and low hard ware resources to satisfy high quality of service (QoS requirements. We propose a node and path traffic prediction model to predict and minimize the congestion. This solution includes prediction of packet generation due to network congestion from both periodic and event data generation. Simulation using NS-2 and Matlab is used to demonstrate the effectiveness of the proposed solution.

  19. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  20. On the Optimization of a Probabilistic Data Aggregation Framework for Energy Efficiency in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Stella Kafetzoglou

    2015-08-01

    Full Text Available Among the key aspects of the Internet of Things (IoT is the integration of heterogeneous sensors in a distributed system that performs actions on the physical world based on environmental information gathered by sensors and application-related constraints and requirements. Numerous applications of Wireless Sensor Networks (WSNs have appeared in various fields, from environmental monitoring, to tactical fields, and healthcare at home, promising to change our quality of life and facilitating the vision of sensor network enabled smart cities. Given the enormous requirements that emerge in such a setting—both in terms of data and energy—data aggregation appears as a key element in reducing the amount of traffic in wireless sensor networks and achieving energy conservation. Probabilistic frameworks have been introduced as operational efficient and performance effective solutions for data aggregation in distributed sensor networks. In this work, we introduce an overall optimization approach that improves and complements such frameworks towards identifying the optimal probability for a node to aggregate packets as well as the optimal aggregation period that a node should wait for performing aggregation, so as to minimize the overall energy consumption, while satisfying certain imposed delay constraints. Primal dual decomposition is employed to solve the corresponding optimization problem while simulation results demonstrate the operational efficiency of the proposed approach under different traffic and topology scenarios.

  1. On the Optimization of a Probabilistic Data Aggregation Framework for Energy Efficiency in Wireless Sensor Networks.

    Science.gov (United States)

    Kafetzoglou, Stella; Aristomenopoulos, Giorgos; Papavassiliou, Symeon

    2015-08-11

    Among the key aspects of the Internet of Things (IoT) is the integration of heterogeneous sensors in a distributed system that performs actions on the physical world based on environmental information gathered by sensors and application-related constraints and requirements. Numerous applications of Wireless Sensor Networks (WSNs) have appeared in various fields, from environmental monitoring, to tactical fields, and healthcare at home, promising to change our quality of life and facilitating the vision of sensor network enabled smart cities. Given the enormous requirements that emerge in such a setting-both in terms of data and energy-data aggregation appears as a key element in reducing the amount of traffic in wireless sensor networks and achieving energy conservation. Probabilistic frameworks have been introduced as operational efficient and performance effective solutions for data aggregation in distributed sensor networks. In this work, we introduce an overall optimization approach that improves and complements such frameworks towards identifying the optimal probability for a node to aggregate packets as well as the optimal aggregation period that a node should wait for performing aggregation, so as to minimize the overall energy consumption, while satisfying certain imposed delay constraints. Primal dual decomposition is employed to solve the corresponding optimization problem while simulation results demonstrate the operational efficiency of the proposed approach under different traffic and topology scenarios.

  2. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  3. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  4. Intelligent Wireless Sensor Networks for System Health Monitoring

    Science.gov (United States)

    Alena, Rick

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network (PAN) standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. WSNs provide the inherent fault tolerance required for aerospace applications. The Discovery and Systems Health Group at NASA Ames Research Center has been developing WSN technology for use aboard aircraft and spacecraft for System Health Monitoring of structures and life support systems using funding from the NASA Engineering and Safety Center and Exploration Technology Development and Demonstration Program. This technology provides key advantages for low-power, low-cost ancillary sensing systems particularly across pressure interfaces and in areas where it is difficult to run wires. Intelligence for sensor networks could be defined as the capability of forming dynamic sensor networks, allowing high-level application software to identify and address any sensor that joined the network without the use of any centralized database defining the sensors characteristics. The IEEE 1451 Standard defines methods for the management of intelligent sensor systems and the IEEE 1451.4 section defines Transducer Electronic Datasheets (TEDS), which contain key information regarding the sensor characteristics such as name, description, serial number, calibration information and user information such as location within a vehicle. By locating the TEDS information on the wireless sensor itself and enabling access to this information base from the application software, the application can identify the sensor unambiguously and interpret and present the sensor data stream without reference to any other information. The application software is able to read the status of each sensor module, responding in real-time to changes of

  5. Wireless data transmission for high energy physics applications

    Science.gov (United States)

    Dittmeier, Sebastian; Brenner, Richard; Dancila, Dragos; Dehos, Cedric; De Lurgio, Patrick; Djurcic, Zelimir; Drake, Gary; Gonzalez Gimenez, Jose Luis; Gustafsson, Leif; Kim, Do-Won; Locci, Elizabeth; Pfeiffer, Ullrich; Röhrich, Dieter; Rydberg, Anders; Schöning, André; Siligaris, Alexandre; Soltveit, Hans Kristian; Ullaland, Kjetil; Vincent, Pierre; Rodriguez Vazquez, Pedro; Wiedner, Dirk; Yang, Shiming

    2017-08-01

    Silicon tracking detectors operated at high luminosity collider experiments pose a challenge for current and future readout systems regarding bandwidth, radiation, space and power constraints. With the latest developments in wireless communications, wireless readout systems might be an attractive alternative to commonly used wired optical and copper based readout architectures. The WADAPT group (Wireless Allowing Data and Power Transmission) has been formed to study the feasibility of wireless data transmission for future tracking detectors. These proceedings cover current developments focused on communication in the 60 GHz band. This frequency band offers a high bandwidth, a small form factor and an already mature technology. Motivation for wireless data transmission for high energy physics application and the developments towards a demonstrator prototype are summarized. Feasibility studies concerning the construction and operation of a wireless transceiver system have been performed. Data transmission tests with a transceiver prototype operating at even higher frequencies in the 240 GHz band are described. Data transmission at rates up to 10 Gb/s have been obtained successfully using binary phase shift keying.

  6. Developmental problems and their solution for the Space Shuttle main engine alternate liquid oxygen high-pressure turbopump: Anomaly or failure investigation the key

    Science.gov (United States)

    Ryan, R.; Gross, L. A.

    1995-01-01

    The Space Shuttle main engine (SSME) alternate high-pressure liquid oxygen pump experienced synchronous vibration and ball bearing life problems that were program threatening. The success of the program hinged on the ability to solve these development problems. The design and solutions to these problems are engirded in the lessons learned and experiences from prior programs, technology programs, and the ability to properly conduct failure or anomaly investigations. The failure investigation determines the problem cause and is the basis for recommending design solutions. For a complex problem, a comprehensive solution requires that formal investigation procedures be used, including fault trees, resolution logic, and action items worked through a concurrent engineering-multidiscipline team. The normal tendency to use an intuitive, cut-and-try approach will usually prove to be costly, both in money and time and will reach a less than optimum, poorly understood answer. The SSME alternate high-pressure oxidizer turbopump development has had two complex problems critical to program success: (1) high synchronous vibrations and (2) excessive ball bearing wear. This paper will use these two problems as examples of this formal failure investigation approach. The results of the team's investigation provides insight into the complexity of the turbomachinery technical discipline interacting/sensitivities and the fine balance of competing investigations required to solve problems and guarantee program success. It is very important to the solution process that maximum use be made of the resources that both the contractor and Government can bring to the problem in a supporting and noncompeting way. There is no place for the not-invented-here attitude. The resources include, but are not limited to: (1) specially skilled professionals; (2) supporting technologies; (3) computational codes and capabilities; and (4) test and manufacturing facilities.

  7. Analysis of Radio communication solutions in small and isolated communities under the IEEE 802.22 standard

    OpenAIRE

    Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena

    2013-01-01

    In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.

  8. Energy harvesting for wireless sensors by using piezoelectric transducers

    Energy Technology Data Exchange (ETDEWEB)

    Duerager, Christian [Empa, Swiss Federal Laboratories for Materials Science and Technology, Duebendorf (Switzerland)

    2012-07-01

    Wireless sensor technology, which integrates transducers, measurement electronics and wireless communication, has become increasingly vital in structural health monitoring (SHM) applications. Compared to traditional wired systems, wireless solutions reduce the installation time and costs and are not subjected to breakage caused by harsh weather conditions or other extreme events. Because of the low installation costs, wireless sensor networks allow the deployment of a big number of wireless sensor nodes on the structures. Moreover, the nodes can be placed on particularly critical components of the structure difficult to reach by wires. In most of the cases the power supply are conventional batteries, which could be a problem because of their finite life span. Furthermore, in the case of wireless sensor nodes located on structures, it is often advantageous to embed them, which makes an access impossible. Therefore, if a method of obtaining the untapped energy surrounding these sensors was implemented, significant life could be added to the power supply. Various approaches to energy harvesting and energy storage are discussed and limitations associated with the current technology are addressed. In this paper we first discuss the research that has been performed in the area of energy harvesting for wireless sensor technologies by using the ambient vibration energy. In many cases the energy produced by the ambient vibrations is far too small to directly power a wireless sensor node. Therefore, in a second step we discuss the development process for an electronic energy harvesting circuit optimized for piezoelectric transducers. In the last part of this paper an experiment with different piezoelectric transducers and their applicability for energy harvesting applications on vibrating structures will be discussed. (orig.)

  9. Low complexity wireless sensors for power-efficient communiation and energy harvesting

    DEFF Research Database (Denmark)

    Bo, Han

    The modern communication goes towards the direction of green, sustainable solutions; this raises many issues such as better usage of spectrum, lower system complexity, or lower energy consumption. MIMO transmission provides a promising solution with better spectral efficiency, but the required la...... savings, energy harvesting was considered for wireless sensor networks, applied to structural monitoring applications. The analysis shows how this approach can further increase the lifetime of wireless sensor networks.......The modern communication goes towards the direction of green, sustainable solutions; this raises many issues such as better usage of spectrum, lower system complexity, or lower energy consumption. MIMO transmission provides a promising solution with better spectral efficiency, but the required...... large antenna spacing and additional RF chains hinder its application to compact and battery powered devices. Wireless sensor networks are composed of such battery-powered devices, which require better energy efficiency in order to have a longer lifetime. Thus low complexity wireless sensors for power...

  10. Survey on the cryptanalysis of wireless sensor networks using side-channel analysis

    CSIR Research Space (South Africa)

    Moabalobelo, T

    2012-09-01

    Full Text Available obtain confidential information such as secret keys by simply observing the side channel information leakage (such as the power consumption, timing, and electromagnetic emanations). Wireless sensor networks are particularly vulnerable to these attacks...

  11. Reliable and Efficient Communications in Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Abdelhakim, M.M.

    2014-01-01

    Wireless sensor network (WSN) is a key technology for a wide range of military and civilian applications. Limited by the energy resources and processing capabilities of the sensor nodes, reliable and efficient communications in wireless sensor networks are challenging, especially when the sensors are deployed in hostile environments. This research aims to improve the reliability and efficiency of time-critical communications in WSNs, under both benign and hostile environments. We start with wireless sensor network with mobile access points (SENMA), where the mobile access points traverse the network to collect information from individual sensors. Due to its routing simplicity and energy efficiency, SENMA has attracted lots of attention from the research community. Here, we study reliable distributed detection in SENMA under Byzantine attacks, where some authenticated sensors are compromised to report fictitious information. The q-out-of-m rule is considered. It is popular in distributed detection and can achieve a good trade-off between the miss detection probability and the false alarm rate. However, a major limitation with this rule is that the optimal scheme parameters can only be obtained through exhaustive search. By exploiting the linear relationship between the scheme parameters and the network size, we propose simple but effective sub-optimal linear approaches. Then, for better flexibility and scalability, we derive a near-optimal closed-form solution based on the central limit theorem. It is proved that the false alarm rate of the q-out-of-m scheme diminishes exponentially as the network size increases, even if the percentage of malicious nodes remains fixed. This implies that large-scale sensor networks are more reliable under malicious attacks. To further improve the performance under time varying attacks, we propose an effective malicious node detection scheme for adaptive data fusion; the proposed scheme is analyzed using the entropy-based trust model

  12. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  13. Wireless Sensor Network Optimization: Multi-Objective Paradigm.

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-07-20

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks.

  14. Wireless Sensor Network Optimization: Multi-Objective Paradigm

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-01-01

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks. PMID:26205271

  15. Isochronous wireless network for real-time communication in industrial automation

    CERN Document Server

    Trsek, Henning

    2016-01-01

    This dissertation proposes and investigates an isochronous wireless network for industrial control applications with guaranteed latencies and jitter. Based on a requirements analysis of real industrial applications and the characterisation of the wireless channel, the solution approach is developed. It consists of a TDMA-based medium access control, a dynamic resource allocation and the provision of a global time base for the wired and the wireless network. Due to the global time base, the solution approach allows a seamless and synchronous integration into existing wired Real-time Ethernet systems.

  16. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  17. Wireless Sensor Portal Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...

  18. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  19. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  20. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  1. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  2. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  3. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  4. Human++: Wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, R. de; Pflug, H.; Santana, J.; Visser, H.; Vullers, R.; Groot, H. de; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  5. Energy Aware GPSR Routing Protocol in a Wireless Sensor Network ...

    African Journals Online (AJOL)

    Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their ...

  6. Wireless Communication onboard Spacecraft : Draadloze Communicatie aan boord van Ruimtevaartuigen

    NARCIS (Netherlands)

    Amini, R.

    2016-01-01

    This dissertation focuses on intra-spacecraft wireless communication as a solution for reducing the spacecraft onboard harness. Despite outstanding advances in aerospace industry, the cost of accessing space is still very high and the amount of engineering work required for spacecraft design and

  7. light-weight digital signature algorithm for wireless sensor networks

    Indian Academy of Sciences (India)

    M LAVANYA

    Abstract. The essential security mechanism in wireless sensor networks (WSNs) is authentication, where nodes can authenticate each other before transmitting a valid data to a sink. There are a number of public key authentication procedures available for WSN in recent years. Due to constraints in WSN environment there ...

  8. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    African Journals Online (AJOL)

    ... number of nodes (n) in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network. Key words: Wireless mesh network (WMN), Adhoc network, Network capacity analysis, Bottleneck collision domain, Medium access control ...

  9. Wireless power transfer for electric vehicles and mobile devices

    CERN Document Server

    Rim, Chun T

    2017-01-01

    From mobile, cable-free re-charging of electric vehicles, smart phones and laptops to collecting solar electricity from orbiting solar farms, wireless power transfer (WPT) technologies offer consumers and society enormous benefits. Written by innovators in the field, this comprehensive resource explains the fundamental principles and latest advances in WPT and illustrates key applications of this emergent technology.

  10. Security in Wireless Sensor Networks Employing MACGSP6

    Science.gov (United States)

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  11. light-weight digital signature algorithm for wireless sensor networks

    Indian Academy of Sciences (India)

    M LAVANYA

    2017-09-14

    Sep 14, 2017 ... Abstract. The essential security mechanism in wireless sensor networks (WSNs) is authentication, where nodes can authenticate each other before transmitting a valid data to a sink. There are a number of public key authentication procedures available for WSN in recent years. Due to constraints in WSN ...

  12. Apollo management: A key to the solution of the social-economical dilemma - The transferability of space-travel managerial techniques to the civil sector

    Science.gov (United States)

    Puttkamer, J. V.

    1973-01-01

    An analysis has been conducted to find out whether the management techniques developed in connection with the Apollo project could be used for dealing with such urgent problems of modern society as the crisis of the cities, the increasing environmental pollution, and the steadily growing traffic. Basic concepts and definitions of program and system management are discussed together with details regarding the employment of these concepts in connection with the solution of the problems of the Apollo program. Principles and significance of a systems approach are considered, giving attention to planning, system analysis, system integration, and project management. An application of the methods of project management to the problems of the civil sector is possible if the special characteristics of each particular case are taken into account.

  13. Deep Space Habitat Wireless Smart Plug

    Science.gov (United States)

    Morgan, Joseph A.; Porter, Jay; Rojdev, Kristina; Carrejo, Daniel B.; Colozza, Anthony J.

    2014-01-01

    NASA has been interested in technology development for deep space exploration, and one avenue of developing these technologies is via the eXploration Habitat (X-Hab) Academic Innovation Challenge. In 2013, NASA's Deep Space Habitat (DSH) project was in need of sensors that could monitor the power consumption of various devices in the habitat with added capability to control the power to these devices for load shedding in emergency situations. Texas A&M University's Electronic Systems Engineering Technology Program (ESET) in conjunction with their Mobile Integrated Solutions Laboratory (MISL) accepted this challenge, and over the course of 2013, several undergraduate students in a Capstone design course developed five wireless DC Smart Plugs for NASA. The wireless DC Smart Plugs developed by Texas A&M in conjunction with NASA's Deep Space Habitat team is a first step in developing wireless instrumentation for future flight hardware. This paper will further discuss the X-Hab challenge and requirements set out by NASA, the detailed design and testing performed by Texas A&M, challenges faced by the team and lessons learned, and potential future work on this design.

  14. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  15. Soil-soil solution distribution coefficient of soil organic matter is a key factor for that of radioiodide in surface and subsurface soils.

    Science.gov (United States)

    Unno, Yusuke; Tsukada, Hirofumi; Takeda, Akira; Takaku, Yuichi; Hisamatsu, Shun'ichi

    2017-04-01

    We investigated the vertical distribution of the soil-soil-solution distribution coefficients (K d ) of 125 I, 137 Cs, and 85 Sr in organic-rich surface soil and organic-poor subsurface soil of a pasture and an urban forest near a spent-nuclear-fuel reprocessing plant in Rokkasho, Japan. K d of 137 Cs was highly correlated with water-extractable K + . K d of 85 Sr was highly correlated with water-extractable Ca 2+ and SOC. K d of 125 I - was low in organic-rich surface soil, high slightly below the surface, and lowest in the deepest soil. This kinked distribution pattern differed from the gradual decrease of the other radionuclides. The thickness of the high- 125 I - K d middle layer (i.e., with high radioiodide retention ability) differed between sites. K d of 125 I - was significantly correlated with K d of soil organic carbon. Our results also showed that the layer thickness is controlled by the ratio of K d -OC between surface and subsurface soils. This finding suggests that the addition of SOC might prevent further radioiodide migration down the soil profile. As far as we know, this is the first report to show a strong correlation of a soil characteristic with K d of 125 I - . Further study is needed to clarify how radioiodide is retained and migrates in soil. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Energy Aware Clustering Algorithms for Wireless Sensor Networks

    Science.gov (United States)

    Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian

    2011-09-01

    The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.

  17. Cooperative networking in a heterogeneous wireless medium

    CERN Document Server

    Ismail, Muhammad

    2013-01-01

    This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.

  18. Wireless ultrasound-powered biotelemetry for implants.

    Science.gov (United States)

    Towe, Bruce C; Larson, Patrick J; Gulick, Daniel W

    2009-01-01

    A miniature piezoelectric receiver coupled to a diode is evaluated as a simple device for wireless transmission of bioelectric events to the body surface. The device converts the energy of a surface-applied ultrasound beam to a high frequency carrier current in solution. Bioelectrical currents near the implant modulate the carrier amplitude, and this signal is remotely detected and demodulated to recover the biopotential waveform. This technique achieves millivolt sensitivity in saline tank tests, and further attention to system design is expected to improve sensitivity.

  19. Wireless technologies for the Construction Sector

    DEFF Research Database (Denmark)

    Heller, Alfred; Orthmann, Christian

    2014-01-01

    The construction sector has been rather reluctant with respect to the implementation of ITC innovations that other industries have adopted for years. One of the reasons could be the lack of services by the proposed innovations especially the RFID solutions. This technology is well‐researched within...... that follow the wireless sensor network, the paper will line up the requirements that the new technology has to meet to be introduced successfully....... the building sector and is therefore used to analyse requirements for alternative technologies. The motivation of the current work is to find upcoming technologies that bring improvements into the sector, for example improved life cycle costs and energy efficiencies, increasing quality, construction...

  20. Wireless sensor networks from theory to applications

    CERN Document Server

    El Emary, Ibrahiem M M

    2013-01-01

    Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and consider

  1. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  2. Wireless sensor networks and ecological monitoring

    CERN Document Server

    Jiang, Joe-Air

    2013-01-01

    This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.  

  3. A wireless trust model for healthcare.

    Science.gov (United States)

    Wickramasinghe, Nilmini; Misra, Santosh K

    2004-01-01

    In today's context of escalating costs, managed care, regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and a technology savvy patient, the healthcare industry can no longer be complacent regarding embracing technologies to enable better, more effective and efficient practice management. In such an environment, many healthcare organisations are turning to m-commerce or wireless solutions. These solutions, in particular the mobile electronic patient record, have many advantages over their wired counterparts, including significant cost advantages, higher levels of physician acceptance, more functionalities as well as enabling easy accessibility to healthcare in remote geographic regions, however, they also bring with them challenges of their own. One such major challenge is security. To date, few models exist that help establish an appropriate framework, in the context of wireless in healthcare, in which to understand and evaluate all the security issues let alone facilitate the development of systematic and robust solutions. Our paper addresses this need by outlining an appropriate mobile trust model for such a scenario in healthcare organisations.

  4. Wireless networks and security issues, challenges and research trends

    CERN Document Server

    Pathan, Al-Sakib

    2013-01-01

     “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting  for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.  

  5. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  6. Synchronized Data Aggregation for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...... mechanism. It provides network-wide time synchronization for sensor network. In the initial stage algorithm established the hierarchical structure in the network and then perform the pair - wise synchronization. SDA aggregate data with a global time scale throughout the network. The aggregated packets...

  7. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  8. Wireless Networks: a brief introduction

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...

  9. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  10. Wireless Backhauling for 5G Small Cell Networks

    OpenAIRE

    Abdullah A. Al Orainy

    2016-01-01

    Small cell backhaul solutions need to be cost-effective, scalable, and easy to install. This paper presents an overview of small cell backhaul technologies. Wireless solutions including TV white space, satellite, sub-6 GHz radio wave, microwave and mmWave with their backhaul characteristics are discussed. Recent research on issues like beamforming, backhaul architecture, precoding and large antenna arrays, and energy efficiency for dense small cell backhaul with mmWave communications is revie...

  11. Review of Current State of the Art and Key Design Issues With Potential Solutions for Liquid Hydrogen Cryogenic Storage Tank Structures for Aircraft Applications

    Science.gov (United States)

    Mital, Subodh K.; Gyekenyesi, John Z.; Arnold, Steven M.; Sullivan, Roy M.; Manderscheid, Jane M.; Murthy, Pappu L. N.

    2006-01-01

    Due to its high specific energy content, liquid hydrogen (LH2) is emerging as an alternative fuel for future aircraft. As a result, there is a need for hydrogen tank storage systems, for these aircraft applications, that are expected to provide sufficient capacity for flight durations ranging from a few minutes to several days. It is understood that the development of a large, lightweight, reusable cryogenic liquid storage tank is crucial to meet the goals of and supply power to hydrogen-fueled aircraft, especially for long flight durations. This report provides an annotated review (including the results of an extensive literature review) of the current state of the art of cryogenic tank materials, structural designs, and insulation systems along with the identification of key challenges with the intent of developing a lightweight and long-term storage system for LH2. The broad classes of insulation systems reviewed include foams (including advanced aerogels) and multilayer insulation (MLI) systems with vacuum. The MLI systems show promise for long-term applications. Structural configurations evaluated include single- and double-wall constructions, including sandwich construction. Potential wall material candidates are monolithic metals as well as polymer matrix composites and discontinuously reinforced metal matrix composites. For short-duration flight applications, simple tank designs may suffice. Alternatively, for longer duration flight applications, a double-wall construction with a vacuum-based insulation system appears to be the most optimum design. The current trends in liner material development are reviewed in the case that a liner is required to minimize or eliminate the loss of hydrogen fuel through permeation.

  12. Effects of wireless packet loss in industrial process control systems.

    Science.gov (United States)

    Liu, Yongkang; Candell, Richard; Moayeri, Nader

    2017-05-01

    Timely and reliable sensing and actuation control are essential in networked control. This depends on not only the precision/quality of the sensors and actuators used but also on how well the communications links between the field instruments and the controller have been designed. Wireless networking offers simple deployment, reconfigurability, scalability, and reduced operational expenditure, and is easier to upgrade than wired solutions. However, the adoption of wireless networking has been slow in industrial process control due to the stochastic and less than 100% reliable nature of wireless communications and lack of a model to evaluate the effects of such communications imperfections on the overall control performance. In this paper, we study how control performance is affected by wireless link quality, which in turn is adversely affected by severe propagation loss in harsh industrial environments, co-channel interference, and unintended interference from other devices. We select the Tennessee Eastman Challenge Model (TE) for our study. A decentralized process control system, first proposed by N. Ricker, is adopted that employs 41 sensors and 12 actuators to manage the production process in the TE plant. We consider the scenario where wireless links are used to periodically transmit essential sensor measurement data, such as pressure, temperature and chemical composition to the controller as well as control commands to manipulate the actuators according to predetermined setpoints. We consider two models for packet loss in the wireless links, namely, an independent and identically distributed (IID) packet loss model and the two-state Gilbert-Elliot (GE) channel model. While the former is a random loss model, the latter can model bursty losses. With each channel model, the performance of the simulated decentralized controller using wireless links is compared with the one using wired links providing instant and 100% reliable communications. The sensitivity of the

  13. Critical evaluation of the Laboratory of Radionuclide Metrology results of the Institute of Radiation Protection and Dosimetry - IRD in the international key comparisons of activity measurement of radioactive solutions

    International Nuclear Information System (INIS)

    Iwahara, A.; Tauhata, L.; Silva, C.J. da

    2014-01-01

    The Radionuclide Metrology Laboratory (LMR) of LNMRI/IRD has been participating since 1984, in international key-comparisons of activity measurement of radioactive sources organized by BIPM and the Regional Metrology Organizations as EURAMET and APMP. The measured quantity is the activity of a radioactive solution, in becquerel (Bq), containing the radionuclide involved and the of measurement methods used are 4αβ-γ coincidence/anticoincidence, coincidence sum-peak and liquid scintillation. In this paper a summary of the methods used and a performance analysis of the results obtained are presented. (author)

  14. Wireless energy transmission to supplement energy harvesters in sensor network applications

    Energy Technology Data Exchange (ETDEWEB)

    Farinholt, Kevin M [Los Alamos National Laboratory; Taylor, Stuart G [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Farrar, Charles R [Los Alamos National Laboratory

    2010-01-01

    In this paper we present a method for coupling wireless energy transmission with traditional energy harvesting techniques in order to power sensor nodes for structural health monitoring applications. The goal of this study is to develop a system that can be permanently embedded within civil structures without the need for on-board power sources. Wireless energy transmission is included to supplement energy harvesting techniques that rely on ambient or environmental, energy sources. This approach combines several transducer types that harvest ambient energy with wireless transmission sources, providing a robust solution that does not rely on a single energy source. Experimental results from laboratory and field experiments are presented to address duty cycle limitations of conventional energy harvesting techniques, and the advantages gained by incorporating a wireless energy transmission subsystem. Methods of increasing the efficiency, energy storage medium, target applications and the integrated use of energy harvesting sources with wireless energy transmission will be discussed.

  15. Optimum wireless sensor deployment scheme for structural health monitoring: a simulation study

    Science.gov (United States)

    Liu, Chengyin; Fang, Kun; Teng, Jun

    2015-11-01

    With the rapid advancements in smart sensing technology and wireless communication technology, the wireless sensor network (WSN) offers an alternative solution to structural health monitoring (SHM). In WSNs, dense deployment of wireless nodes aids the identification of structural dynamic characteristics, while data transmission is a significant issue since wireless channels typically have a lower bandwidth and a limited power supply. This paper provides a wireless sensor deployment optimization scheme for SHM, in terms of both energy consumption and modal identification accuracy. A spherical energy model is established to formulate the energy consumption within a WSN. The optimal number of sensors and their locations are obtained through solving a multi-objective function with weighting factors on energy consumption and modal identification accuracy using a genetic algorithm (GA). Simulation and comparison results with traditional sensor deployment methods demonstrate the efficiency of the proposed optimization scheme.

  16. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  17. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  18. Eating of the pudding - Supporting the development life-cycle of wireless sensor networks for environmental monitoring scientists and ecologists

    NARCIS (Netherlands)

    Zhang, Kui

    2015-01-01

    In this thesis we present design and tooling solutions as well as network protocols to support application experts in the entire development life-cycle of wireless sensor networks. The complete life-cycle of wireless sensor networks starts with the user/application requirement analysis. It then goes

  19. 76 FR 59916 - Interconnected VoIP Service; Wireless E911 Location Accuracy Requirements; E911 Requirements for...

    Science.gov (United States)

    2011-09-28

    ..., Sprint Nextel, T-Mobile, the Telecommunications Industry Association (TIA), Andrew Corporation, Motorola... Telecommunications Industry Solutions' (ATIS) Emergency Services Forum (ESIF), an organization with wireless carriers... adopted there. 14. Nevertheless, the record in this proceeding clearly signals that the wireless industry...

  20. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  1. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  2. Selection of Key Component Vendor from the Aspects of Capability, Productivity, and Reliability

    Directory of Open Access Journals (Sweden)

    Vincent F. Yu

    2014-01-01

    Full Text Available In a technology-driven industry, the appropriate vendors/suppliers can effectively contribute to cobusiness development profits. Key component vendors help dynamically drive solution design firms to achieve strong performances, especially when an integrated circuit (IC component that has technical know-how specifications dominates an electronic solution design. This paper presents a systematic framework to examine the decision process for the selection of wireless fidelity (Wi-Fi IC vendor alternatives from the business ecosystem aspect in order to review the importance of buyer-supplier synergistic effects. We implement the fuzzy analytic hierarchy process technique which incorporates a vendor’s capability, productivity, and reliability characteristics into a hierarchical structure and deploys decision experts’ judgments along with vague data analysis to solve a real-world problem faced by a leading company specialized in the research and design of wireless networking solutions. The findings indicate the Taiwanese local vendor is the top priority for alternatives selection, and the results contribute significant values to the design firm’s operation management.

  3. Energy Efficient Data Transmission for Sensors with Wireless Charging

    Directory of Open Access Journals (Sweden)

    Xiaolin Fang

    2018-02-01

    Full Text Available This paper studies the problem of maximizing the energy utilization for data transmission in sensors with periodical wireless charging process while taking into account the thermal effect. Two classes of problems are analyzed: one is the case that wireless charging can process for only a limited period of time, and the other is the case that wireless charging can process for a long enough time. Algorithms are proposed to solve the problems and analysis of these algorithms are also provided. For the first problem, three subproblems are studied, and, for the general problem, we give an algorithm that can derive a performance bound of ( 1 − 1 2 m ( O P T − E compared to an optimal solution. In addition, for the second problem, we provide an algorithm with 2 m 2 m − 1 O P T + 1 performance bound for the general problem. Simulations confirm the analysis of the algorithms.

  4. Energy Efficient Data Transmission for Sensors with Wireless Charging.

    Science.gov (United States)

    Fang, Xiaolin; Luo, Junzhou; Wu, Weiwei; Gao, Hong

    2018-02-08

    This paper studies the problem of maximizing the energy utilization for data transmission in sensors with periodical wireless charging process while taking into account the thermal effect. Two classes of problems are analyzed: one is the case that wireless charging can process for only a limited period of time, and the other is the case that wireless charging can process for a long enough time. Algorithms are proposed to solve the problems and analysis of these algorithms are also provided. For the first problem, three subproblems are studied, and, for the general problem, we give an algorithm that can derive a performance bound of ( 1 - 1 2 m ) ( O P T - E ) compared to an optimal solution. In addition, for the second problem, we provide an algorithm with 2 m 2 m - 1 O P T + 1 performance bound for the general problem. Simulations confirm the analysis of the algorithms.

  5. Energy Efficient Data Transmission for Sensors with Wireless Charging

    Science.gov (United States)

    Luo, Junzhou; Wu, Weiwei; Gao, Hong

    2018-01-01

    This paper studies the problem of maximizing the energy utilization for data transmission in sensors with periodical wireless charging process while taking into account the thermal effect. Two classes of problems are analyzed: one is the case that wireless charging can process for only a limited period of time, and the other is the case that wireless charging can process for a long enough time. Algorithms are proposed to solve the problems and analysis of these algorithms are also provided. For the first problem, three subproblems are studied, and, for the general problem, we give an algorithm that can derive a performance bound of (1−12m)(OPT−E) compared to an optimal solution. In addition, for the second problem, we provide an algorithm with 2m2m−1OPT+1 performance bound for the general problem. Simulations confirm the analysis of the algorithms. PMID:29419770

  6. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  7. Armstrong Flight Research Center Flight Test Capabilities and Opportunities for the Applications of Wireless Data Acquisition Systems

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview NASA Armstrong Flight Research Centers flight test capabilities, which can provide various means for flight testing of passive and active wireless sensor systems, also, it will address the needs of the wireless data acquisition solutions for the centers flight instrumentation issues such as additional weight caused by added instrumentation wire bundles, connectors, wire cables routing, moving components, etc., that the Passive Wireless Sensor Technology Workshop may help. The presentation shows the constraints and requirements that the wireless sensor systems will face in the flight test applications.

  8. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  9. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  10. An Intelligent Logistics Tracking System Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Xing Jijun

    2018-01-01

    Full Text Available In view of the shortcomings in information collection and tracking management in existing logistics, the key technologies of wireless sensor network and the basic concepts and methods of Information Technology Infrastructure Library(ITIL is studied. The basic structure and main functions of the logistics tracking system based on wireless sensor network is put forward. It can effectively solve the detection, location, recognition and automatic processing of fault events and other issues of goods in the process of logistics tracking management. In addition, combined with the GIS software, the logistics tracking and monitoring system based on the wireless sensor network is realized by using Java language coding. The results show that this system can realize the tracking, visualization and automatic management of the information in the process of goods transportation. Therefore, the proposed method significantly improves the accuracy, rapidity and intuition of the logistics information management.

  11. The promises and prospects of worldwide wireless power transfer

    International Nuclear Information System (INIS)

    Van Voorhies, K.L.; Smith, J.E.

    1991-01-01

    The promise of worldwide wireless power transfer began with the pioneering work of Nikola Tesla about 100 years ago. His principal approach is summarized. The viability of such a system must still be demonstrated and many questions remain. Potentially, a wireless system can transfer power more efficiently and flexibly, especially to and from remote regions. This paper includes principle elements of worldwide wireless power transfer: the source: an oscillator/transmitter, the path: the cavity bounded by the earth and the ionosphere, and the receiver: a means of extracting power from the path. The system transfers and stores energy via the resonance modes of the cavity. The key challenges facing demonstration of technical feasibility are in finding an efficient means of coupling power into and out of the earth-ionosphere cavity, and in devising a feasible receiver that is both small and efficient. Along with demonstrating technical feasibility, new research must consider safety, environmental impact, susceptibility to weather, and effects on weather

  12. A Novel Linear Programming Formulation of Maximum Lifetime Routing Problem in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Cetin, Bilge Kartal; Prasad, Neeli R.; Prasad, Ramjee

    2011-01-01

    protocols, and the energy model for transmission. In this paper, we tackle the routing challenge for maximum lifetime of the sensor network. We introduce a novel linear programming approach to the maximum lifetime routing problem. To the best of our knowledge, this is the first mathematical programming......In wireless sensor networks, one of the key challenge is to achieve minimum energy consumption in order to maximize network lifetime. In fact, lifetime depends on many parameters: the topology of the sensor network, the data aggregation regime in the network, the channel access schemes, the routing...... of the maximum lifetime routing problem that considers the operation modes of the node. Solution of the linear programming gives the upper analytical bound for the network lifetime. In order to illustrate teh application of the optimization model, we solved teh problem for different parameter settings...

  13. Wireless Magnetic Sensor Network for Road Traffic Monitoring and Vehicle Classification

    Directory of Open Access Journals (Sweden)

    Velisavljevic Vladan

    2016-12-01

    Full Text Available Efficiency of transportation of people and goods is playing a vital role in economic growth. A key component for enabling effective planning of transportation networks is the deployment and operation of autonomous monitoring and traffic analysis tools. For that reason, such systems have been developed to register and classify road traffic usage. In this paper, we propose a novel system for road traffic monitoring and classification based on highly energy efficient wireless magnetic sensor networks. We develop novel algorithms for vehicle speed and length estimation and vehicle classification that use multiple magnetic sensors. We also demonstrate that, using such a low-cost system with simplified installation and maintenance compared to current solutions, it is possible to achieve highly accurate estimation and a high rate of positive vehicle classification.

  14. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  15. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  16. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  17. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  18. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  19. MedMon: securing medical devices through wireless monitoring and anomaly detection.

    Science.gov (United States)

    Zhang, Meng; Raghunathan, Anand; Jha, Niraj K

    2013-12-01

    Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.

  20. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  2. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  3. Improving Performance in Dense Wireless Spaces by Controlling Bulk Traffic

    Directory of Open Access Journals (Sweden)

    Marat Zhanikeev

    2017-01-01

    Full Text Available The growing number of wireless devices nowadays often results in congestion of wireless channels. In research, this topic is referred to as networking in dense wireless spaces. The literature on the topic shows that the biggest problem is the high number of concurrent sessions to a wireless access point. The obvious solution is to reduce the number of concurrent sessions. This paper proposes a simple method called Bulk-n-Pick which minimizes the number of prolonged concurrent sessions by separating bulk from sync traffic. Aiming at educational applications, under the proposed design, web applications would distribute the main bulk of content once at the beginning of a class and then rely on small messages for real time sync traffic during the class. For realistic performance analysis, this paper first performs real-life experiments with various counts of wireless devices, bulk sizes, and levels of sync intensity. Based on the experiments, this paper shows that the proposed Bulk-n-Pick method outperforms the traditional design even when only two concurrent bulk sessions are allowed. The experiment shows that up to 10 concurrent bulk sessions are feasible in practice. Based on these results, a method for online performance optimization is proposed and validated in a trace-based emulation.

  4. Ultra low power signal oriented approach for wireless health monitoring.

    Science.gov (United States)

    Marinkovic, Stevan; Popovici, Emanuel

    2012-01-01

    In recent years there is growing pressure on the medical sector to reduce costs while maintaining or even improving the quality of care. A potential solution to this problem is real time and/or remote patient monitoring by using mobile devices. To achieve this, medical sensors with wireless communication, computational and energy harvesting capabilities are networked on, or in, the human body forming what is commonly called a Wireless Body Area Network (WBAN). We present the implementation of a novel Wake Up Receiver (WUR) in the context of standardised wireless protocols, in a signal-oriented WBAN environment and present a novel protocol intended for wireless health monitoring (WhMAC). WhMAC is a TDMA-based protocol with very low power consumption. It utilises WBAN-specific features and a novel ultra low power wake up receiver technology, to achieve flexible and at the same time very low power wireless data transfer of physiological signals. As the main application is in the medical domain, or personal health monitoring, the protocol caters for different types of medical sensors. We define four sensor modes, in which the sensors can transmit data, depending on the sensor type and emergency level. A full power dissipation model is provided for the protocol, with individual hardware and application parameters. Finally, an example application shows the reduction in the power consumption for different data monitoring scenarios.

  5. Underwater fiber-wireless communication with a passive front end

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Lyu, Weichao; Kong, Meiwei; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-11-01

    We propose and experimentally demonstrate a novel concept on underwater fiber-wireless (Fi-Wi) communication system with a fully passive wireless front end. A low-cost step-index (SI) plastic optical fiber (POF) together with a passive collimating lens at the front end composes the underwater Fi-Wi architecture. We have achieved a 1.71-Gb/s transmission at a mean BER of 4.97 × 10-3 (1.30 × 10-3 when using power loading) over a 50-m SI-POF and 2-m underwater wireless channel using orthogonal frequency division multiplexing (OFDM). Although the wireless part is very short, it actually plays a crucial role in practical underwater implementation, especially in deep sea. Compared with the wired solution (e.g. using a 52-m POF cable without the UWOC part), the proposed underwater Fi-Wi scheme can save optical wet-mate connectors that are sophisticated, very expensive and difficult to install in deep ocean. By combining high-capacity robust POF with the mobility and ubiquity of underwater wireless optical communication (UWOC), the proposed underwater Fi-Wi technology will find wide application in ocean exploration.

  6. Synchronizing MIDI and wireless EEG measurements during natural piano performance.

    Science.gov (United States)

    Zamm, Anna; Palmer, Caroline; Bauer, Anna-Katharina R; Bleichner, Martin G; Demos, Alexander P; Debener, Stefan

    2017-07-08

    Although music performance has been widely studied in the behavioural sciences, less work has addressed the underlying neural mechanisms, perhaps due to technical difficulties in acquiring high-quality neural data during tasks requiring natural motion. The advent of wireless electroencephalography (EEG) presents a solution to this problem by allowing for neural measurement with minimal motion artefacts. In the current study, we provide the first validation of a mobile wireless EEG system for capturing the neural dynamics associated with piano performance. First, we propose a novel method for synchronously recording music performance and wireless mobile EEG. Second, we provide results of several timing tests that characterize the timing accuracy of our system. Finally, we report EEG time domain and frequency domain results from N=40 pianists demonstrating that wireless EEG data capture the unique temporal signatures of musicians' performances with fine-grained precision and accuracy. Taken together, we demonstrate that mobile wireless EEG can be used to measure the neural dynamics of piano performance with minimal motion constraints. This opens many new possibilities for investigating the brain mechanisms underlying music performance. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Wireless soil moisture sensor networks for environmental monitoring and irrigation

    Science.gov (United States)

    Hübner, Christof; Cardell-Oliver, Rachel; Becker, Rolf; Spohrer, Klaus; Jotter, Kai; Wagenknecht, Tino

    2010-05-01

    Dependable spatial-temporal soil parameter data is required for informed decision making in precision farming and hydrological applications. Wireless sensor networks are seen as a key technology to satisfy these demands. Hence, research and development focus is on reliable outdoor applications. This comprises sensor design improvement, more robust communication protocols, less power consumption as well as better deployment strategies and tools. Field trials were performed to investigate and iteratively improve wireless sensor networks in the above-mentioned areas. They accounted for different climate conditions, soil types and salinity, irrigation practices, solar power availability and also for different radio spectrum use which affects the reliability of the wireless links. E.g. 868 MHz and 2.4 GHz wireless nodes were compared in the field with regard to range. Furthermore a low-cost soil moisture sensor was developed to allow for large-scale field experiments. It is based on the measurement of the high frequency dielectric properties of the soil. Two agricultural sites were equipped with 80 sensors and 20 wireless nodes each. The soil moisture data is collected in regular intervals, aggregated in a base station and visualized through a web-based geographical information system. The complete system and results of field experiments are presented.

  8. QoS-based management of biomedical wireless sensor networks for patient monitoring.

    Science.gov (United States)

    Abreu, Carlos; Miranda, Francisco; Ricardo, Manuel; Mendes, Paulo Mateus

    2014-01-01

    Biomedical wireless sensor networks are a key technology to support the development of new applications and services targeting patient monitoring, in particular, regarding data collection for medical diagnosis and continuous health assessment. However, due to the critical nature of medical applications, such networks have to satisfy demanding quality of service requirements, while guaranteeing high levels of confidence and reliability. Such goals are influenced by several factors, where the network topology, the limited throughput, and the characteristics and dynamics of the surrounding environment are of major importance. Harsh environments, as hospital facilities, can compromise the radio frequency communications and, consequently, the network's ability to provide the quality of service required by medical applications. Furthermore, the impact of such environments on the network's performance is hard to manage due to its random and unpredictable nature. Consequently, network planning and management, in general or step-down hospital units, is a very hard task. In such context, this work presents a quality of service based management tool to help healthcare professionals supervising the network's performance and to assist them managing the admission of new sensor nodes (i.e., patients to be monitored) to the biomedical wireless sensor network. The proposed solution proves to be a valuable tool both, to detect and classify potential harmful variations in the quality of service provided by the network, avoiding its degradation to levels where the biomedical signs would be useless; and to manage the admission of new patients to the network.

  9. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    Science.gov (United States)

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  10. FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks

    KAUST Repository

    Alzenad, Mohamed

    2018-01-12

    The presence of a super high rate, but also cost-efficient, easy-to-deploy, and scalable, back-haul/fronthaul framework, is essential in the upcoming 5G wireless networks and beyond. Motivated by the mounting interest in unmanned flying platforms of various types, including UAVs, drones, balloons, and HAPs/MAPs/LAPs, which we refer to as networked flying platforms (NFPs), for providing communications services, and by the recent advances in free space optics (FSO), this article investigates the feasibility of a novel vertical backhaul/fronthaul framework where the NFPs transport the backhaul/fronthaul traffic between the access and core networks via point-to-point FSO links. The performance of the proposed innovative approach is investigated under different weather conditions and a broad range of system parameters. Simulation results demonstrate that the FSO-based vertical backhaul/fronthaul framework can offer data rates higher than the baseline alternatives, and thus can be considered a promising solution to the emerging backhaul/fronthaul requirements of the 5G+ wireless networks, particularly in the presence of ultra-dense heterogeneous small cells. This article also presents the challenges that accompany such a novel framework and provides some key ideas toward overcoming these challenges.

  11. Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

    Directory of Open Access Journals (Sweden)

    Ginesu G

    2006-01-01

    Full Text Available Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking, require a strong level of protection, allowing for verification of legitimate users' identity and enabling the user to distinguis trusted servers from shadow ones. A novel framework for image-based authentication (IBA is then proposed and evaluated. In order to provide mutual authentication, the proposed method integrates an IBA password technique with a challenge-response scheme based on a shared secret key for image scrambling. The wireless environment is mainly addressed by the proposed system, which tries to overcome the severe constraints on security, data transmission capability, and user friendliness imposed by such environment. In order to achieve such results, the system offers a strong solution for authentication, taking into account usability and avoiding the need for hardware upgrades. Data and application scalability is provided through the JPEG2000 standard and JPIP framework.

  12. Performance Analysis of Cooperative Virtual MIMO Systems for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-05-01

    Full Text Available Multi-Input Multi-Output (MIMO techniques can be used to increase the data rate for a given bit error rate (BER and transmission power. Due to the small form factor, energy and processing constraints of wireless sensor nodes, a cooperative Virtual MIMO as opposed to True MIMO system architecture is considered more feasible for wireless sensor network (WSN applications. Virtual MIMO with Vertical-Bell Labs Layered Space-Time (V-BLAST multiplexing architecture has been recently established to enhance WSN performance. In this paper, we further investigate the impact of different modulation techniques, and analyze for the first time, the performance of a cooperative Virtual MIMO system based on V-BLAST architecture with multi-carrier modulation techniques. Through analytical models and simulations using real hardware and environment settings, both communication and processing energy consumptions, BER, spectral efficiency, and total time delay of multiple cooperative nodes each with single antenna are evaluated. The results show that cooperative Virtual-MIMO with Binary Phase Shift Keying-Wavelet based Orthogonal Frequency Division Multiplexing (BPSK-WOFDM modulation is a promising solution for future high data-rate and energy-efficient WSNs.

  13. Energy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Akram

    2017-10-01

    Full Text Available Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the network to render it unresponsive. Adversaries launch counterfeit report injection attacks and false vote injection attacks through compromised sensor nodes. Several filtering solutions have been suggested for detecting and filtering false reports during the multi-hop forwarding process. However, almost all such schemes presuppose a conventional underlying protocol for data routing that do not consider the attack status or energy dissipation on the route. Each design provides approximately the equivalent resilience in terms of protection against compromised node. However, the energy consumption characteristics of each design differ. We propose a fuzzy adaptive path selection to save energy and avoid the emergence of favored paths. Fresh authentication keys are generated periodically, and these are shared with the filtering nodes to restrict compromised intermediate filtering nodes from the verification process. The scheme helps delay the emergence of hotspot problems near the base station and exhibits improved energy conserving behavior in wireless sensor networks. The proposed scheme provides an extended network lifetime and better false data filtering capacity.

  14. Markovian agents models for wireless sensor networks deployed in environmental protection

    International Nuclear Information System (INIS)

    Cerotti, Davide; Gribaudo, Marco; Bobbio, Andrea

    2014-01-01

    Wireless sensor networks (WSNs) are gaining popularity as distributed monitoring systems in safety critical applications, when the location to be controlled may be dangerous for a human operator or difficult to access. Fire is one of the major thread in urban as well as in open environments, and WSNs are receiving increasing attention as a mean to build effective and timely fire protection systems. The present paper presents a novel analytical technique for the study of the propagation of a fire in a wide open area and the interaction with a WSN deployed to monitor the outbreak of the fire and to send a warning signal to a base station. For the complex scenario under study, an analytical modeling and analysis technique based on Markovian agents (MAs) is discussed. It is shown that, even if the overall state space of the models is huge, nevertheless an analytical solution is feasible, by exploiting the locality of the interactions among MAs, based on a message passing mechanism combined with a perception function. - Highlights: • We present a revised theory of Markovian agent models, detailing the analysis techniques and its complexity • We a target a complex application of a wireless sensor network (WSN) that monitors forest fire. • The model captures the propagation of fire, heat, and the detection by the WSN. • We compute key performance indices such us the fire propagation front, and message travel time. • We perform an extensive set of experiments to study the effectiveness of the WSN in detecting forest fire

  15. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  16. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  17. Authenticated Encryption for Low-Power Reconfigurable Wireless Devices

    DEFF Research Database (Denmark)

    Khajuria, Samant; Andersen, Birger

    2013-01-01

    this enabling technology, these radios have to propose cryptographic services such as con- fidentiality, integrity and authentication. Therefore, integration of security services to these low-power devices is very challenging and crucial as they have limited resources and computational capabilities......With the rapid growth of new wireless communication standards, a solution that is capable of providing a seamless shift between existing wireless protocols and high flexibility as well as capability is crucial. Technology based on reconfigurable devices offers this flexibility. In order to avail....... In this paper, we present a crypto solution for reconfigurable devices. The solution is a single pass Authenticated Encryption (AE) scheme that is designed for protecting both message confidentiality and its authenticity. This makes AE very attractive for low-cost low-power hardware implementation. For test...

  18. A wireless actuating drug delivery system

    International Nuclear Information System (INIS)

    Jo, Won-Jun; Baek, Seung-Ki; Park, Jung-Hwan

    2015-01-01

    A wireless actuating drug delivery system was devised. The system is based on induction heating for drug delivery. In this study, thermally generated nitrogen gas produced by induction heating of azobisisobutyronitrile (AIBN) was utilized for pressure-driven release of the drug. The delivery device consists of an actuator chamber, a drug reservoir, and a microchannel. A semicircular copper disc (5 and 6 mm in diameter and 100 µm thick), and thermal conductive tape were integrated as the heating element in the actuator chamber. The final device was 2.7 mm thick. 28 µl of drug solution were placed in the reservoir and the device released the drug quickly at the rate of 6 µl s −1 by induction heating at 160 µT of magnetic intensity. The entire drug solution was released and dispersed after subcutaneous implantation under identical experimental condition. This study demonstrates that the device was simply prepared and drug delivery could be achieved by wireless actuation of a thin, pressure-driven actuator. (paper)

  19. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  20. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  1. Radio Relays Improve Wireless Products

    Science.gov (United States)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  2. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  3. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  4. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  5. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  6. CWSP Certified Wireless Security Professional Official Study Guide, Exam PW0-204

    CERN Document Server

    Coleman, David D; Harkins, Bryan E

    2010-01-01

    Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

  7. IEEE 802.11s Wireless Mesh Networks: Challenges and Perspectives

    Science.gov (United States)

    Sgora, Aggeliki; Vergados, Dimitris D.; Chatzimisios, Periklis

    A promising solution for wireless environments is the wireless mesh technology that envisages supplementing wired infrastructure with a wireless backbone for providing Internet connectivity to mobile nodes (MNs) or users in residential areas and offices. The IEEE 802.11 TGs has started to work in developing a mesh standard for local area wireless networks. Although a lot of progress has been made and a few new drafts have been released recently, there exist many issues that demand enhanced or even new solutions to 802.11s mesh networking. This paper aims to overview the latest version of the IEEE 802.11s protocol (Draft 2.02), especially the MAC and routing layers, and to point out the challenges that these networks have to overcome in these layers.

  8. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    modalities and (iv) system solutions with high end-user added value and cost benefits. The common thread is deployment and deployment evaluation. In particular, satisfaction of application requirements, involvement of the end-user in the design and deployment process, satisfactory system performance and user acceptance are concerns addressed in many of the contributions. The contributions form a valuable set, which help to identify the priorities for research in this burgeoning area: Robust, reliable and efficient data collection in embedded wireless multi-hop networks are essential elements in creating a true deploy-and-forget user experience. Maintaining full connectivity within a WSN, in a real world environment populated by other WSNs, WiFi networks or Bluetooth devices that constitute sources of interference is a key element in any application, but more so for those that are safety-critical, such as disaster response. Awareness of the effects of wireless channel, physical position and line-of-sight on received signal strength in real-world, outdoor environments will shape the design of many outdoor applications. Thus, the quantification of such effects is valuable knowledge for designers. Sensors' failure detection, scalability and commercialization are common challenges in many long-term monitoring applications; transferable solutions are evidenced here in the context of pollutant detection and water quality. Innovative, alternative thinking is often needed to achieve the desired long-lived networks when power-hungry sensors are foreseen components; in some instances, the very problems of wireless technology, such as RF irregularity, can be transformed into advantages. The importance of an iterative design and evaluation methodology—from analysis to simulation to real-life deployment—should be well understood by all WSN developers. The value of this is highlighted in the context of a challenging WPAN video-surveillance application based on a novel Nomadic Access

  9. Optimization Modeling and Decision Support for Wireless Infrastructure Deployment in Disaster Planning and Management

    DEFF Research Database (Denmark)

    Bartolacci, Michael R.; Mihovska, Albena D.; Ozceylan, Dilek

    2013-01-01

    Natural disasters and emergencies create the need for communication between and among the affected populace and emergency responders as well as other parties such as governmental agencies and aid organizations. Such communications include the dissemination of key information such as evacuation...... current wireless network optimization models and points out that none of them include the necessary variables for a disaster planning or emergency deployment context. Due to the fact that the choice of wireless technology impacts the nature of an overall model, a brief discussion of exemplar wireless...... the deployment of temporary mobile networks and other wireless equipment following disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimization effort involved with respect to maximizing key performance measures...

  10. Capacity Bounds for Parallel Optical Wireless Channels

    KAUST Repository

    Chaaban, Anas

    2016-01-01

    A system consisting of parallel optical wireless channels with a total average intensity constraint is studied. Capacity upper and lower bounds for this system are derived. Under perfect channel-state information at the transmitter (CSIT), the bounds have to be optimized with respect to the power allocation over the parallel channels. The optimization of the lower bound is non-convex, however, the KKT conditions can be used to find a list of possible solutions one of which is optimal. The optimal solution can then be found by an exhaustive search algorithm, which is computationally expensive. To overcome this, we propose low-complexity power allocation algorithms which are nearly optimal. The optimized capacity lower bound nearly coincides with the capacity at high SNR. Without CSIT, our capacity bounds lead to upper and lower bounds on the outage probability. The outage probability bounds meet at high SNR. The system with average and peak intensity constraints is also discussed.

  11. Wireless communication of real-time ultrasound data and control

    Science.gov (United States)

    Tobias, Richard J.

    2015-03-01

    The Internet of Things (IoT) is expected to grow to 26 billion connected devices by 2020, plus the PC, smart phone, and tablet segment that includes mobile Health (mHealth) connected devices is projected to account for another 7.3 billion units by 2020. This paper explores some of the real-time constraints on the data-flow and control of a wireless connected ultrasound machine. The paper will define an ultrasound server and the capabilities necessary for real-time use of the device. The concept of an ultrasound server wirelessly (or over any network) connected to multiple lightweight clients on devices like an iPad, iPhone, or Android-based tablet, smartphone and other network-attached displays (i.e., Google Glass) is explored. Latency in the ultrasound data stream is one of the key areas to measure and to focus on keeping as small as possible (data he sees on the wireless connected devices is running in real-time with the operator. The second parameter is the management of bandwidth. At minimum we need to be able to see 20 frames-per- second. It is possible to achieve ultrasound in triplex mode at >20 frames-per-second on a properly configured wireless network. The ultrasound server needs to be designed to accept multiple ultrasound data clients and multiple control clients. A description of the server and some of its key features will be described.

  12. Towards Perpetual Energy Operation in Wireless Communication Systems

    KAUST Repository

    Benkhelifa, Fatma

    2017-11-01

    Wireless is everywhere. Smartphones, tablets, laptops, implantable medical devices, and many other wireless devices are massively taking part of our everyday activities. On average, an actively digital consumer has three devices. However, most of these wireless devices are small equipped with batteries that are often limited and need to be replaced or recharged. This fact limits the operating lifetime of wireless devices and presents a major challenge in wireless communication. To improve the perpetual energy operation of wireless communication systems, energy harvesting (EH) from the radio frequency (RF) signals is one promising solution to make the wireless communication systems self-sustaining. Since RF signals are known to transmit information, it is interesting to study when RF signals are simultaneously used to transmit information and scavenge energy, namely simultaneous wireless information and power transfer (SWIPT). In this thesis, we specifically aim to study the SWIPT in multiple-input multiple-output (MIMO) relay communication systems and in cognitive radio (CR) networks. First, we study the SWIPT in MIMO relay systems where the relay harvests the energy from the source and uses partially/fully the harvested energy to forward the signal to the destination. For both the amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols, we consider the ideal scheme where both the energy and information transfer to the relay happen simultaneously, and the practical power splitting and time switching schemes. For each scheme, we aim to maximize the achievable end-to-end rate with a certain energy constraint at the relay. Furthermore, we consider the sum rate maximization problem for the multiuser MIMO DF relay broadcasting channels with multiple EH-enabled relays, and an enhanced low complex solution is proposed based on the block diagonalization method. Finally, we study the energy and data performance of the SWIPT in CR network where either the

  13. Millimeter-wave Wireless LAN and its Extension toward 5G Heterogeneous Networks

    OpenAIRE

    Sakaguchi, Kei; Mohamed, Ehab Mahmoud; Kusano, Hideyuki; Mizukami, Makoto; Miyamoto, Shinichi; Rezagah, Roya; Takinami, Koji; Takahashi, Kazuaki; Shirakata, Naganori; Peng, Hailan; Yamamoto, Toshiaki; Namba, Shinobu

    2015-01-01

    Millimeter-wave (mmw) frequency bands, especially 60 GHz unlicensed band, are considered as a promising solution for gigabit short range wireless communication systems. IEEE standard 802.11ad, also known as WiGig, is standardized for the usage of the 60 GHz unlicensed band for wireless local area networks (WLANs). By using this mmw WLAN, multi-Gbps rate can be achieved to support bandwidth-intensive multimedia applications. Exhaustive search along with beamforming (BF) is usually used to over...

  14. Advanced Wireless Integrated Navy Network

    National Research Council Canada - National Science Library

    Stutzman, Warren; Habayeb, Rick

    2005-01-01

    Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...

  15. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  16. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  17. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    techniques with both coherent and incoherent optical sources are studied and demonstrated. Employments of advanced modulation formats including phase-shift keying (PSK), M-quadrature amplitude modulation (QAM) and orthogonal frequency-division multiplexing (OFDM) for high speed photonic-wireless transmission...... techniques. In conclusion, the results presented in the thesis show the feasibility of employing mm-wave signals, advanced modulation formats and spatial multiplexing technologies in next generation high capacity hybrid optical fiber-wireless access systems....

  18. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  19. Wireless Josephson amplifier

    International Nuclear Information System (INIS)

    Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.

    2014-01-01

    Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.

  20. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  1. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  2. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  3. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  4. Wireless Technologies Bridging the Digital Divide in Education

    Directory of Open Access Journals (Sweden)

    Gerard Smyth

    2006-06-01

    Full Text Available The objective of this paper is to demonstrate how the latest wireless standards and technologies may overcome the digital divide in education in the developed and developing worlds. The concept of the digital divide is discussed in the traditional socio-economic sense and expanded in terms of the learner's location, age, culture and background. It is important that we understand the full extent and complexities of this division if we are to effectively bridge it. Why and how the digital divide may be bridged is examined. Apart from the inherent inequalities that need to be addressed from an ethical perspective, it is very much in the interests of governments and citizens globally that Information and Communications Technology (ICT is made available to all as quickly and cost-effectively as possible. New forms of wireless protocols are overcoming challenges of terrain, infrastructure and finance. It is proposed that, by leveraging open broadband wireless standards, like Wireless Fidelity (Wi-Fi* and Worldwide Interoperability for Microwave Access (WiMAX*, and implementing Mobile Computing architecture, it is now possible to make dramatic strides in this direction. The paper continues with a general overview of these wireless standards and technologies followed by an in-depth look at Wi-Fi and WiMAX. The paper goes on to give examples of the Innovation Centre's involvement in delivering solutions and new usage models for eLearning that utilize the latest wireless standards and technologies. The challenges and successes of these projects are outlined and metrics are presented where available.

  5. Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study

    Directory of Open Access Journals (Sweden)

    Philip Chan

    2011-11-01

    Full Text Available Organisations and individuals benefit when wireless networks are protected. After assessing the risks associated with wireless technologies, organisations can reduce the risks by applying countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational and technical controls. While these countermeasures will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless RF networks. Among engineers dealing with different scaled and interconnected engineering systems, such as tactical wireless RF communication systems, there is a growing need for a means of analyzing complex adaptive systems. We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems. There are is a need to assemble and balance the results of any successful measure, showing how well each solution meets the system’s objectives. The uncertain arguments used and other test results are combined using a form of mathematical theory for their analysis. Systems engineering thinking supports design decisions and enables decision‐makers to manage and assess the support for each solution. In these circumstances, complexity management arises from the many interacting and conflicting requirements of an increasing range of possible parameters. There may not be a single ‘right’ solution, only a satisfactory set of resolutions which this system helps to facilitate. Smart and innovative performance matrixes are introduced using a mathematical Bayesian network to manage, model, calculate and analyse all the potential vulnerability paths in wireless RF networks

  6. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  7. Fault Tolerance in ZigBee Wireless Sensor Networks

    Science.gov (United States)

    Alena, Richard; Gilstrap, Ray; Baldwin, Jarren; Stone, Thom; Wilson, Pete

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 PRO Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. This technology is supported by System-on-a-Chip solutions, resulting in extremely small and low-power nodes. The Wireless Connections in Space Project addresses the aerospace flight domain for both flight-critical and non-critical avionics. WSNs provide the inherent fault tolerance required for aerospace applications utilizing such technology. The team from Ames Research Center has developed techniques for assessing the fault tolerance of ZigBee WSNs challenged by radio frequency (RF) interference or WSN node failure.

  8. Optical Communication System for an Underwater Wireless Sensor Network

    Science.gov (United States)

    Gabriel, C.; Khalighi, A.; Bourennane, S.; Léon, P.; Rigaud, V.

    2012-04-01

    Seventy percent of the Earth is covered with water. Yet, we know so little about what lies below the sea surface. One new emerging technology that can help in oceans exploration is underwater wireless sensor network (UWSN). In such a network, a number of sensors are connected to a set of nodes that collect the data from them. Then, each node communicate its retrieved data to the other parts of the network through wireless links. So, an important step in the implementation of an UWSN is the design of an adequate transmitter/receiver system that is reliable, easy to implement, energy efficient and adapted to the underwater environment. Thanks to its cost-effectiveness and low-energy consumption property, optical underwater communication turns to be the most adequate solution for medium range node connections in an UWSN. To evaluate the optical underwater channel, we have studied its impulse response using a Monte Carlo simulator that takes into consideration all the transmitter, receiver and medium characteristics. We have demonstrated through these simulations that the channel delay dispersion is negligible in most practical cases. Therefore, we do not need to perform computationally complex signal processing such as channel equalization at the receiver. After studying the channel characteristics, we have turned our attention onto the transmitter/receiver system design. For this, we have simulated a system composed by a high-power monochromatic 532 nm LED transmitter and a Silicon PIN photodiode receiver with a collimating lens for capturing the scattered light. After photo-detection, the photo-current is converted to a voltage and low-pass filtered to limit the thermal noise variance which is the dominant noise in the receiver. Note that, in our case, background noise can be neglected because we are working in deep waters were the sunlight cannot penetrate. Then, using on-off-keying (OOK) modulation, we have proceeded to signal detection based on optimum

  9. THz Wireless Transmission Systems Based on Photonic Generation of Highly Pure Beat-Notes

    DEFF Research Database (Denmark)

    Jia, Shi; Yu, Xianbin; Hu, Hao

    2016-01-01

    In this paper, a terahertz (THz) wireless communication system at 400 GHz with various modulation formats [on–off keying (OOK), quadrature phase-shift keying (QPSK), 16-quadrature amplitude modulation (16-QAM), and 32-quadrature amplitude modulation (32-QAM)] is experimentally demonstrated based ...

  10. Energy neutral and low power wireless communications

    Science.gov (United States)

    Orhan, Oner

    Wireless sensor nodes are typically designed to have low cost and small size. These design objectives impose restrictions on the capacity and efficiency of the transceiver components and energy storage units that can be used. As a result, energy becomes a bottleneck and continuous operation of the sensor network requires frequent battery replacements, increasing the maintenance cost. Energy harvesting and energy efficient transceiver architectures are able to overcome these challenges by collecting energy from the environment and utilizing the energy in an intelligent manner. However, due to the nature of the ambient energy sources, the amount of useful energy that can be harvested is limited and unreliable. Consequently, optimal management of the harvested energy and design of low power transceivers pose new challenges for wireless network design and operation. The first part of this dissertation is on energy neutral wireless networking, where optimal transmission schemes under different system setups and objectives are investigated. First, throughput maximization for energy harvesting two-hop networks with decode-and-forward half-duplex relays is studied. For a system with two parallel relays, various combinations of the following four transmission modes are considered: Broadcast from the source, multi-access from the relays, and successive relaying phases I and II. Next, the energy cost of the processing circuitry as well as the transmission energy are taken into account for communication over a broadband fading channel powered by an energy harvesting transmitter. Under this setup, throughput maximization, energy maximization, and transmission completion time minimization problems are studied. Finally, source and channel coding for an energy-limited wireless sensor node is investigated under various energy constraints including energy harvesting, processing and sampling costs. For each objective, optimal transmission policies are formulated as the solutions of a

  11. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  12. Wireless sensor placement for structural monitoring using information-fusing firefly algorithm

    Science.gov (United States)

    Zhou, Guang-Dong; Yi, Ting-Hua; Xie, Mei-Xi; Li, Hong-Nan

    2017-10-01

    Wireless sensor networks (WSNs) are promising technology in structural health monitoring (SHM) applications for their low cost and high efficiency. The limited wireless sensors and restricted power resources in WSNs highlight the significance of optimal wireless sensor placement (OWSP) during designing SHM systems to enable the most useful information to be captured and to achieve the longest network lifetime. This paper presents a holistic approach, including an optimization criterion and a solution algorithm, for optimally deploying self-organizing multi-hop WSNs on large-scale structures. The combination of information effectiveness represented by the modal independence and the network performance specified by the network connectivity and network lifetime is first formulated to evaluate the performance of wireless sensor configurations. Then, an information-fusing firefly algorithm (IFFA) is developed to solve the OWSP problem. The step sizes drawn from a Lévy distribution are adopted to drive fireflies toward brighter individuals. Following the movement with Lévy flights, information about the contributions of wireless sensors to the objective function as carried by the fireflies is fused and applied to move inferior wireless sensors to better locations. The reliability of the proposed approach is verified via a numerical example on a long-span suspension bridge. The results demonstrate that the evaluation criterion provides a good performance metric of wireless sensor configurations, and the IFFA outperforms the simple discrete firefly algorithm.

  13. Wireless sensing and vibration control with increased redundancy and robustness design.

    Science.gov (United States)

    Li, Peng; Li, Luyu; Song, Gangbing; Yu, Yan

    2014-11-01

    Control systems with long distance sensor and actuator wiring have the problem of high system cost and increased sensor noise. Wireless sensor network (WSN)-based control systems are an alternative solution involving lower setup and maintenance costs and reduced sensor noise. However, WSN-based control systems also encounter problems such as possible data loss, irregular sampling periods (due to the uncertainty of the wireless channel), and the possibility of sensor breakdown (due to the increased complexity of the overall control system). In this paper, a wireless microcontroller-based control system is designed and implemented to wirelessly perform vibration control. The wireless microcontroller-based system is quite different from regular control systems due to its limited speed and computational power. Hardware, software, and control algorithm design are described in detail to demonstrate this prototype. Model and system state compensation is used in the wireless control system to solve the problems of data loss and sensor breakdown. A positive position feedback controller is used as the control law for the task of active vibration suppression. Both wired and wireless controllers are implemented. The results show that the WSN-based control system can be successfully used to suppress the vibration and produces resilient results in the presence of sensor failure.

  14. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  15. CMOS circuits for passive wireless microsystems

    CERN Document Server

    Yuan, Fei

    2011-01-01

    Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.

  16. Wireless Sensor Portal Technology, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...

  17. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  18. Application for vibration monitoring of aspheric surface machining based on wireless sensor networks

    Science.gov (United States)

    Han, Chun Guang; Guo, Yin Biao; Jiang, Chen

    2010-05-01

    Any kinds of tiny vibration of machine tool parts will have a great influence on surface quality of the workpiece at ultra-precise machining process of aspheric surface. At present the major way for decreasing influence of vibration is machining compensation technology. Therefore it is important for machining compensation control to acquire and transmit these vibration signals effectively. This paper presents a vibration monitoring system of aspheric surface machining machine tool based on wireless sensor networks (WSN). Some key issues of wireless sensor networks for vibration monitoring system of aspheric surface machining are discussed. The reliability of data transmission, network communication protocol and synchronization mechanism of wireless sensor networks are studied for the vibration monitoring system. The proposed system achieves multi-sensors vibration monitoring involving the grinding wheel, the workpiece and the workbench spindle. The wireless transmission of vibration signals is achieved by the combination with vibration sensor nodes and wireless network. In this paper, these vibration sensor nodes are developed. An experimental platform is structured which employs wireless sensor networks to the vibration monitoring system in order to test acquisition and wireless transmission of vibration signal. The test results show that the proposed system can achieve vibration data transmission effectively and reliability and meet the monitoring requirements of aspheric surface machining machine tool.

  19. Modeling of Bandwidth Aggregation over Heterogeneous Wireless Access Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Dittmann, Lars

    2012-01-01

    Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... applications. The analysis is performed on a multipath model developed with OPNET Modeler, which is an advanced research tool that supports modeling and integration of various kinds of built-in networks....

  20. Quantifying and Mitigating Privacy Threats in Wireless Protocols and Services

    Science.gov (United States)

    2009-07-01

    tunneling all traffic through a trusted VPN or mix network. SlyFi is an optimization to these solutions when both ends of the wireless link trust each...these techniques have been extremely successful (despite occasional problems [30, 34]) and protocols that use these techniques, such as IPSEC , SSL...through VPNs , the case for several users in the sigcomm trace, the IP addresses of the VPN servers would be revealing. No application or network level

  1. Wireless connectivity for Hilti power tools with bluetooth

    OpenAIRE

    Mingyong, Xu

    2015-01-01

    The increase use of ARM cores in industrial embedded systems make them more powerful. And as a method to implement a wireless communication we chose the relatively new Bluetooth Low Energy technology. In this Master Thesis we study the application and performance of Bluetooth technology on industrial power tools. We study and compare the performance of two Bluetooth modules for embedded solutions, one from STMicroelectronics and one from Microchip. And look if they are suitable...

  2. [Research progress on key technology of power and signal transmission in neuroprosthetic].

    Science.gov (United States)

    Wang, Xing; Peng, Chenglin; Liu, Tao; Wang, Rui; Hou, Wensheng; Zheng, Xiaolin; Zheng, Erxin

    2011-10-01

    The power and signal transmission technology is one of the key technologies in neuroprosthetic research. This paper proposes firstly the related theory of power and signal transmission technology in neuroprosthetic, then summarizes the three key aspects of the power and signal transmission technology in neuroprosthetic. After analyzed the development of the inductive wireless power harvesting technology, the wireless telemetry technology and the wireless power harvesting telemetry technology, the emphasis on research contents will be proposed and discussed, which will help accelerate the further research of prosthetic.

  3. STUDY & SURVEY ON WIRELESS CHARGING & TECHNOLOGY

    OpenAIRE

    Harshal Sharma*

    2016-01-01

    In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...

  4. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  5. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  6. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  7. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  8. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  9. Active Wireless System for Structural Health Monitoring Applications

    Directory of Open Access Journals (Sweden)

    Ricardo Perera

    2017-12-01

    Full Text Available The use of wireless sensors in Structural Health Monitoring (SHM has increased significantly in the last years. Piezoelectric-based lead zirconium titanate (PZT sensors have been on the rise in SHM due to their superior sensing abilities. They are applicable in different technologies such as electromechanical impedance (EMI-based SHM. This work develops a flexible wireless smart sensor (WSS framework based on the EMI method using active sensors for full-scale and autonomous SHM. In contrast to passive sensors, the self-sensing properties of the PZTs allow interrogating with or exciting a structure when desired. The system integrates the necessary software and hardware within a service-oriented architecture approach able to provide in a modular way the services suitable to satisfy the key requirements of a WSS. The framework developed in this work has been validated on different experimental applications. Initially, the reliability of the EMI method when carried out with the proposed wireless sensor system is evaluated by comparison with the wireless counterpart. Afterwards, the performance of the system is evaluated in terms of software stability and reliability of functioning.

  10. Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems

    Directory of Open Access Journals (Sweden)

    Jinxiang Dong

    2008-07-01

    Full Text Available There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting crosslayer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An eventdriven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN.

  11. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  12. Wireless capsule endo bronchoscopy

    Directory of Open Access Journals (Sweden)

    Baratz DM

    2014-03-01

    Full Text Available No abstract available. Article truncated at 150 words. Case Presentation History of Present Illness A 67 year-old man presents 10 days after swallowing a capsule endoscopy camera that was never retrieved. The wireless capsule was swallowed asymptomatically for evaluation of heme positive stools after negative upper and lower endoscopies. Patient noted that the evening after swallowing the camera he developed mild shortness of breath and cough. The cough and shortness of breath were persistent and worsened while lying down and when moving positions. He denied prior issues with swallowing or aspiration. Review of Systems Negative other than what is noted above. PMH, SH, and FH Past medical history: coronary artery disease, peripheral vascular disease, hyperlipidemia Surgical history: femoral-popliteal bypass, previous shoulder and back surgery Social history: 1 pack/day of cigarettes for 50 years, prior alcohol usage but not current, no illicit drugs Family history: no pulmonary diseases Physical Exam Vital signs: temperature 36.7º C, heart rate 86 beats per minute ...

  13. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  14. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  15. Cryptanalysis of a chaos block cipher for wireless sensor network

    Science.gov (United States)

    Yang, Jiyun; Xiao, Di; Xiang, Tao

    2011-02-01

    Based on the analysis of a chaos block cipher for wireless sensor network (WSN), it is found that there is a fatal flaw in its security because the number of rounds is too small and the calculation precision of round function is too short. The scheme could be cryptanalyzed by utilizing differential cryptanalysis theory. First, the third round key is recovered by chosen plaintext attack according to the characteristics of the round function. Then, the second round key can be deduced from the relationship of the sub-keys between the second and the third rounds. Based on the above successful attacks, the first round key could also be broken by brute-force attack. Finally, by employing the characteristics of Feistel structure, the fourth round key could also be obtained. Since all round keys have been cryptanalyzed, the plaintext can then be decrypted. The encryption scheme is proven to be insecure consequently.

  16. WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK ...

    African Journals Online (AJOL)

    ES Obe

    categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.

  17. WirelessHART modeling and performance evaluation

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Wu, Xian

    2013-01-01

    In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for

  18. A Review of Wireless and PLC Propagation Channel Characteristics for Smart Grid Environments

    Directory of Open Access Journals (Sweden)

    Sabih Güzelgöz

    2011-01-01

    Full Text Available Wireless, power line communication (PLC, fiber optic, Ethernet, and so forth are among the communication technologies on which smart grid communication infrastructure is envisioned to be built. Among these, wireless and PLC-based solutions are attractive considering the cost of initial deployment. Wireless communication deployment in smart grid covers a variety of environments such as indoor, outdoor, and electric-power-system facilities. Similar diversity is expected in PLC deployment as well covering low voltage (LV, medium voltage (MV, and high voltage (HV segments of the grid. In spite of being attractive, wireless and PLC channels are very harsh posing great challenges to performance of communication systems. In proposing solutions to smart grid communication needs, two approaches are likely to be followed. One is based on the use of existing wireless and PLC technologies with some modifications, and the other relies upon developing novel communication protocols particularly addressing the smart grid needs. Both of these approaches require an in-depth knowledge of communication channel characteristics. The aim of this study is to reveal the wireless and PLC channel characteristics of smart grid environments in terms of several parameters such as path loss and attenuation, time dispersion, time selectivity, amplitude statistics, and noise characteristics.

  19. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  20. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  1. Applications and Security of Next-Generation, User-Centric Wireless Systems

    Directory of Open Access Journals (Sweden)

    Danfeng Yao

    2010-07-01

    Full Text Available Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system’s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems’ robustness and security

  2. Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2012-01-01

    Full Text Available This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN; then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.

  3. Review of Radio Frequency Identification and Wireless Technology for Structural Health Monitoring

    International Nuclear Information System (INIS)

    Dhital, Dipesh; Chia, Chen Ciang; Lee, Jung Ryul; Park, Chan Yik

    2010-01-01

    Radio frequency identification(RFID) combined with wireless technology has good potential for structural health monitoring(SHM). We describe several advantages of RFID and wireless technologies for SHM, and review SHM examples with working principles, design and technical details for damage detection, heat exposure monitoring, force/strain sensing, and corrosion detection in concrete, steel, carbon fiber reinforced polymer(CFRP), and other materials. Various sensors combined with wireless communication are also discussed. These methodologies can be readily developed, implemented, and customized. There are some technical difficulties, but solutions are being addressed. Lastly, a surface acoustic wave-based RFID system is presented, and possible future trends of SHM based on RFID and wireless technology are presented

  4. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  5. A new cognitive radio based admission control method for wireless mesh networks

    Science.gov (United States)

    Wang, Jing; Li, Fangfang

    2011-10-01

    In this paper, we address the problem of supporting applications with high bandwidth requirements in Wireless Mesh Networks (WMN) and develop a Markov analytic framework to study the important performance measures experienced by SUs in a cognitive radio (CR) based wireless mesh network. Specifically, we study the blocking and forced termination probabilities and throughput of secondary users under systems with/without spectrum handoff and channel reservation. Based on this framework, a novel dynamic cognitive channel access control algorithm for wireless mesh networks is proposed in order to maintain given quality of service (QoS) requirements. Simulation and analysis results show that our proposed dynamic cognitive channel access control algorithm can maximize the throughput while keeping forced termination and blocking probabilities of SUs' requests under the desired constraints, which providing a solution to improve load balance among multipath in wireless mesh networks.

  6. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  7. Optimal Design and Analysis of the Stepped Core for Wireless Power Transfer Systems

    Directory of Open Access Journals (Sweden)

    Xiu Zhang

    2016-01-01

    Full Text Available The key of wireless power transfer technology rests on finding the most suitable means to improve the efficiency of the system. The wireless power transfer system applied in implantable medical devices can reduce the patients’ physical and economic burden because it will achieve charging in vitro. For a deep brain stimulator, in this paper, the transmitter coil is designed and optimized. According to the previous research results, the coils with ferrite core can improve the performance of the wireless power transfer system. Compared with the normal ferrite core, the stepped core can produce more uniform magnetic flux density. In this paper, the finite element method (FEM is used to analyze the system. The simulation results indicate that the core loss generated in the optimal stepped ferrite core can reduce about 10% compared with the normal ferrite core, and the efficiency of the wireless power transfer system can be increased significantly.

  8. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  9. A comparative study of wireless sensor networks and their routing protocols.

    Science.gov (United States)

    Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  10. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide...... a great advantage to final users and operators, compared with the nowadays situation with many disconnected systems and users equipped with different subscriptions, radio interfaces and terminals. To this issue, the IST project WINNER II has defined three system modes suited to local, metropolitan...... and wide area respectively. The aim of this paper is twofold: first, it presents an architectural solution for scalable and hybrid radio resource management to efficiently integrate the different WINNER modes; second, it proposes a hybrid handover mechanism to exploit the availability of the different...

  11. A-LNT: A Wireless Sensor Network Platform for Low-Power Real-Time Voice Communications

    Directory of Open Access Journals (Sweden)

    Yong Fu

    2014-01-01

    Full Text Available Combining wireless sensor networks and voice communication for multidata hybrid wireless network suggests possible applications in numerous fields. However, voice communication and sensor data transmissions have significant differences, Meanwhile, high-speed massive real-time voice data processing poses challenges for hardware design, protocol design, and especially power management. In this paper, we present a wireless audio sensor network platform A-LNT and study and discuss key elements for systematic design and implementation: node hardware design, low-power voice codec and processing, wireless network topology, hybrid MAC protocol design based on superframe, radio channel allocation, and clock synchronization. Furthermore, we discuss energy management methods such as address filtering and efficient power management in detail. The experimental and simulation results show that A-LNT is a lightweight, low-power, low-speed, and high-performance wireless sensor network platform for multichannel real-time voice communications.

  12. Wireless device monitoring systems and monitoring devices, and associated methods

    Science.gov (United States)

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  13. Impact of wireless link quality across communication layers

    OpenAIRE

    Zhou, J.

    2010-01-01

    Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...

  14. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  15. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  16. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  17. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  18. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  19. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  20. Wireless Ways: Business and Personal Applications of Wireless Technology.

    Science.gov (United States)

    Chung, Joe

    2001-01-01

    Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)