WorldWideScience

Sample records for wireless wide area

  1. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  2. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  3. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  4. Radiation area monitoring by wireless-communicating area monitor with surveillance camera

    International Nuclear Information System (INIS)

    Shimura, Mitsuo; Kobayashi, Hiromitsu; Kitahara, Hideki; Kobayashi, Hironobu; Okamoto, Shinji

    2004-01-01

    Aiming at a dose reduction and a work efficiency improvement for nuclear power plants that have high dose regions, we have developed our system of wireless-communicating Area Monitor with Surveillance Camera, and have performed an on-site test. Now we are implementing this Area Monitor with Surveillance Camera for a use as a TV camera in the controlled-area, which enables a personal computer to simultaneously display two or more dose values and site live images on the screen. For the radiation detector of this Area Monitor System, our wireless-communicating dosimeter is utilized. Image data are transmitted via a wireless Local Area Network (LAN). As a test result, image transmission of a maximum of 20 frames per second has been realized, which shows that this concept is a practical application. Remote-site monitoring also has been realized from an office desk located within the non-controlled area, adopting a Japan's wireless phone system, PHS (Personal Handy Phone) for the transmission interface. (author)

  5. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  6. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  7. Reconfigurable antenna options for 2.45/5 GHz wireless body area networks in healthcare applications.

    Science.gov (United States)

    Abbas, Syed Muzahir; Ranga, Yogesh; Esselle, Karu P

    2015-01-01

    This paper presents electronically reconfigurable antenna options in healthcare applications. They are suitable for wireless body area network devices operating in the industrial, scientific, and medical (ISM) band at 2.45 GHz and IEEE 802.11 Wireless Local Area Network (WLAN) band at 5 GHz (5.15-5.35 GHz, 5.25-5.35 GHz). Two types of antennas are investigated: Antenna-I has a full ground plane and Antenna-II has a partial ground plane. The proposed antennas provide ISM operation in one mode while in another mode they support 5 GHz WLAN band. Their performance is assessed for body centric wireless communication using a simplified human body model. Antenna sensitivity to the gap between the antenna and the human body is investigated for both modes of each antenna. The proposed antennas exhibit a wide radiation pattern along the body surface to provide wide coverage and their small width (14 mm) makes them suitable for on-body communication in healthcare applications.

  8. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  9. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  10. Traffic flow wide-area surveillance system definition

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.; Carnal, C.L. [Oak Ridge National Lab., TN (United States); Moynihan, P.I. [Jet Propulsion Lab., Pasadena, CA (United States)

    1994-11-01

    Traffic Flow Wide-Area Surveillance (TFWAS) is a system for assessing the state of traffic flow over a wide area for enhanced traffic control and improved traffic management and planning. The primary purpose of a TFWAS system is to provide a detailed traffic flow description and context description to sophisticated traffic management and control systems being developed or envisioned for the future. A successful TFWAS system must possess the attributes of safety, reconfigurability, reliability, and expandability. The primary safety premise of TFWAS is to ensure that no action or failure of the TFWAS system or its components can result in risk of injury to humans. A wide variety of communication techniques is available for use with TFWAS systems. These communication techniques can be broken down into two categories, landlines and wireless. Currently used and possible future traffic sensing technologies have been examined. Important criteria for selecting TFWAS sensors include sensor capabilities, costs, operational constraints, sensor compatibility with the infrastructure, and extent. TFWAS is a concept that can take advantage of the strengths of different traffic sensing technologies, can readily adapt to newly developed technologies, and can grow with the development of new traffic control strategies. By developing innovative algorithms that will take information from a variety of sensor types and develop descriptions of traffic flows over a wide area, a more comprehensive understanding of the traffic state can be provided to the control system to perform the most reasonable control actions over the entire wide area. The capability of characterizing the state of traffic over an entire region should revolutionize developments in traffic control strategies.

  11. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  12. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  13. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  14. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  15. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  16. Power allocation strategies to minimize energy consumption in wireless body area networks.

    Science.gov (United States)

    Kailas, Aravind

    2011-01-01

    The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.

  17. Development and Evaluation of a City-Wide Wireless Weather Sensor Network

    Science.gov (United States)

    Chang, Ben; Wang, Hsue-Yie; Peng, Tian-Yin; Hsu, Ying-Shao

    2010-01-01

    This project analyzed the effectiveness of a city-wide wireless weather sensor network, the Taipei Weather Science Learning Network (TWIN), in facilitating elementary and junior high students' study of weather science. The network, composed of sixty school-based weather sensor nodes and a centralized weather data archive server, provides students…

  18. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2004-03-01

    A comprehensive mine-wide, two-way wireless voice and data communication system for the underground mining industry was developed. The system achieves energy savings through increased productivity and greater energy efficiency in meeting safety requirements within mines. The mine-wide system is comprised of two interfaced subsystems: a through-the-earth communications system and an in-mine communications system. The mine-wide system permits two-way communication among underground personnel and between underground and surface personnel. The system was designed, built, and commercialized. Several systems are in operation in underground mines in the United States. The use of these systems has proven they result in considerable energy savings. A system for tracking the location of vehicles and people within the mine was also developed, built and tested successfully. Transtek's systems are being used by the National Institute of Occupational Safety and Health (NIOSH) in their underground mine rescue team training program. This project also resulted in a spin-off rescue team lifeline and communications system. Furthermore, the project points the way to further developments that can lead to a GPS-like system for underground mines allowing the use of autonomous machines in underground mining operations, greatly reducing the amount of energy used in these operations. Some products developed under this program are transferable to applications in fields other than mining. The rescue team system is applicable to use by first responders to natural, accidental, or terrorist-caused building collapses. The in-mine communications system can be installed in high-rise buildings providing in-building communications to security and maintenance personnel as well as to first responders.

  19. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  20. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  1. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI” Project

    Directory of Open Access Journals (Sweden)

    Michele Zorzi

    2009-05-01

    Full Text Available This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISEWAI” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity, a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated, as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper.

  2. Design and implementation on wireless transmission platform of area radiation monitoring data

    International Nuclear Information System (INIS)

    Li Dan; Ge Liangquan; Lai Wanchang; Ren Yong; Liu Huijun; Wang Guangxi

    2011-01-01

    To solve data transmission problems of radiation area monitoring system, Wireless transmission platform is built based on ZigBee module, thus wireless transmission between the radiation area central node and the monitoring points is achieved. It introduces the framework of ZigBee protocol, APL applications between FFD and RFD module, FFD, module and central node host, and RFD module and monitoring equipment, are developed using simplified protocol stack. Wireless network is set up using a FFD module and two RFD modules, the results show that RSSI are above 50, and the data communication is normal for the transmission distance of 60 m. (authors)

  3. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  4. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  5. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project

    Science.gov (United States)

    Casari, Paolo; Castellani, Angelo P.; Cenedese, Angelo; Lora, Claudio; Rossi, Michele; Schenato, Luca; Zorzi, Michele

    2009-01-01

    This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper. PMID:22408513

  6. Wireless Interconnect in Multilayer Chip-Area-Networks for Future Multimaterial High-Speed Systems Design

    Directory of Open Access Journals (Sweden)

    Oluwole John Famoriji

    2017-01-01

    Full Text Available Wireless chip area network which enables wireless communication among chips fosters development in wireless communication and it is envisioned that future hardware system and developmental functionality will require multimaterial. However, the traditional system architecture is limited by channel bandwidth-limited interfaces, throughput, delay, and power consumption and as a result limits the efficiency and system performance. Wireless interconnect has been proposed to overcome scalability and performance limitations of multihop wired architectures. Characterization and modeling of channel become more important for specification of choice of modulation or demodulation techniques, channel bandwidths, and other mitigation techniques for channel distortion and interference such as equalization. This paper presents an analytical channel model for characterization, modeling, and analysis of wireless chip-to-chip or interchip interconnects in wireless chip area network with a particular focus on large-scale analysis. The proposed model accounts for both static and dynamic channel losses/attenuation in high-speed systems. Simulation and evaluation of the model with experimental data conducted in a computer desktop casing depict that proposed model matched measurement data very closely. The transmission of EM waves via a medium introduces molecular absorption due to various molecules within the material substance. This model is a representative of channel loss profile in wireless chip-area-network communication and good for future electronic circuits and high-speed systems design.

  7. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  8. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-11-01

    Wireless power transfer (WPT) is the key enabler for a myriad of applications, from low-power RFIDs, and wireless sensors, to wirelessly charged electric vehicles, and even massive power transmission from space solar cells. One of the major challenges in designing implantable biomedical devices is the size and lifetime of the battery. Thus, replacing the battery with a miniaturized wireless power receiver (WPRx) facilitates designing sustainable biomedical implants in smaller volumes for sentient medical applications. In the first part of this dissertation, we propose a miniaturized, fully integrated, wirelessly powered implantable sensor with on-chip antenna, designed and implemented in a standard 0.18μm CMOS process. As a batteryless device, it can be implanted once inside the body with no need for further invasive surgeries to replace batteries. The proposed single-chip solution is designed for intraocular pressure monitoring (IOPM), and can serve as a sustainable platform for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W transmitter 3cm away from the chip. In the second part, we propose a self-biased, differential rectifier with enhanced efficiency over an extended range of input power. A prototype is designed for the medical implant communication service (MICS) band at 433MHz. It demonstrates an efficiency improvement of more than 40% in the rectifier power conversion efficiency (PCE) and a dynamic range extension of more than 50% relative to the conventional cross-coupled rectifier. A sensitivity of -15.2dBm input power for 1V output voltage and a peak PCE of 65% are achieved for a 50k load. In the third part, we propose a wide-range, differential RF-to-DC power converter using an adaptive, self-biasing technique. The proposed architecture doubles

  9. Equalized Energy Consumption in Wireless Body Area Networks for a Prolonged Network Lifetime

    Directory of Open Access Journals (Sweden)

    Maryam El Azhari

    2017-01-01

    Full Text Available The phenomenal advances in electronics contributed to a widespread use of distributed sensors in wireless communications. A set of biosensors can be deployed or implanted in the human body to form a Wireless Body Area Network (WBAN, where various WBAN PHY layers are utilized. The WBAN allows the measurement of physiological data, which is forwarded by the gateway to the base station for analysis purposes. The main issue in conceiving a WBAN communication mechanism is to manage the residual energy of sensors. The mobile agent system has been widely applied for surveillance applications in Wireless Sensor Networks (WSNs. It consists in dispatching one or more mobile agents simultaneously to collect data, while following a predetermined optimum itinerary. The continuous use of the optimal itinerary leads to a rapid depletion of sensor nodes batteries, which minimizes the network lifetime. This paper presents a new algorithm to equalize the energy consumption among sensor motes. The algorithm exploits all the available paths towards the destination and classifies them with respect to the end-to-end delay and the overall energy consumption. The proposed algorithm performs better compared to the optimal routing path. It increases the network lifetime to the maximum by postponing routing of data via the most-recently used path, and it also maintains data delivery within the delay interval threshold.

  10. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  11. COMPARATIVE ANALYSIS OF LEACH AND HEEMPCP PROTOCOLS FOR WIRELESS SENSOR NETWORKS SYSTEM

    OpenAIRE

    Richa Asstt. Pro.Misha Thakur

    2018-01-01

    In this paper author aims at describing a wireless sensor network. wireless sensor network consisting of spatially distributed autonomous devices using sensor to monitor physical or environmental conditions. Wireless sensor network can be used in wide range of applications including environmental monitoring, habitat monitoring, various military applications, smart home technologiesand agriculture. Wireless sensor networks constitute one of promising application areas of the recently developed...

  12. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  13. Electronic prescribing: criteria for evaluating handheld prescribing systems and an evaluation of a new, handheld, wireless wide area network (WWAN) prescribing system.

    Science.gov (United States)

    Goldblum, O M

    2001-02-01

    The objectives of this study were: 1) to establish criteria for evaluating handheld computerized prescribing systems; and 2) to evaluate out-of-box performance and features of a new, Palm Operating System (OS)-based, handheld, wireless wide area network (WWAN) prescribing system. The system consisted of a Palm Vx handheld organizer, a Novatel Minstrel V wireless modem, OmniSky wireless internet access and ePhysician ePad 1.1, the Palm OS electronic prescribing software program. A dermatologist familiar with healthcare information technology conducted an evaluation of the performance and features of a new, handheld, WWAN electronic prescribing system in an office practice during a three-month period in 2000. System performance, defined as transmission success rate, was determined from data collected during the three-month trial. Evaluation criteria consisted of an analysis of features found in electronic prescribing systems. All prescriptions written for all patients seen during a three-month period (August - November, 2000) were eligible for inclusion. Prescriptions written for patients who intended to fill them at pharmacies without known facsimile receiving capabilities were excluded from the study. The performance of the system was evaluated using data collected during the study. Criteria for evaluating features of electronic prescribing systems were developed and used to analyze the system employed in this study. During this three-month trial, 200 electronic prescriptions were generated for 132 patients included in the study. Of these prescriptions, 92.5 percent were successfully transmitted to pharmacies. Transmission failures resulted from incorrect facsimile numbers and non-functioning facsimile machines. Criteria established for evaluation of electronic prescribing systems included System (Hardware & Software), Costs, System Features, Printing & Transmission, Formulary & Insurance, Customization, Drug Safety and Security. This study is the first effort to

  14. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  15. Sierra Nevada snowpack and runoff prediction integrating basin-wide wireless-sensor network data

    Science.gov (United States)

    Yoon, Y.; Conklin, M. H.; Bales, R. C.; Zhang, Z.; Zheng, Z.; Glaser, S. D.

    2016-12-01

    We focus on characterizing snowpack and estimating runoff from snowmelt in high elevation area (>2100 m) in Sierra Nevada for daily (for use in, e.g. flood and hydropower forecasting), seasonal (supply prediction), and decadal (long-term planning) time scale. Here, basin-wide wireless-sensor network data (ARHO, http://glaser.berkeley.edu/wsn/) is integrated into the USGS Precipitation-Runoff Modeling System (PRMS), and a case study of the American River basin is presented. In the American River basin, over 140 wireless sensors have been planted in 14 sites considering elevation gradient, slope, aspect, and vegetation density, which provides spatially distributed snow depth, temperature, solar radiation, and soil moisture from 2013. 800 m daily gridded dataset (PRISM) is used as the climate input for the PRMS. Model parameters are obtained from various sources (e.g., NLCD 2011, SSURGO, and NED) with a regionalization method and GIS analysis. We use a stepwise framework for a model calibration to improve model performance and localities of estimates. For this, entire basin is divided into 12 subbasins that include full natural flow measurements. The study period is between 1982 and 2014, which contains three major storm events and recent severe drought. Simulated snow depth and snow water equivalent (SWE) are initially compared with the water year 2014 ARHO observations. The overall results show reasonable agreements having the Nash-Sutcliffe efficiency coefficient (NS) of 0.7, ranged from 0.3 to 0.86. However, the results indicate a tendency to underestimate the SWE in a high elevation area compared with ARHO observations, which is caused by the underestimated PRISM precipitation data. Precipitation at gauge-sparse regions (e.g., high elevation area), in general, cannot be well represented in gridded datasets. Streamflow estimates of the basin outlet have NS of 0.93, percent bias of 7.8%, and normalized root mean square error of 3.6% for the monthly time scale.

  16. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  17. An Implementation of Wireless Body Area Networks for Improving Priority Data Transmission Delay.

    Science.gov (United States)

    Gündoğdu, Köksal; Çalhan, Ali

    2016-03-01

    The rapid growth of wireless sensor networks has enabled the human health monitoring of patients using body sensor nodes that gather and evaluate human body parameters and movements. This study describes both simulation model and implementation of a new traffic sensitive wireless body area network by using non-preemptive priority queue discipline. A wireless body area network implementation employing TDMA is designed with three different priorities of data traffics. Besides, a coordinator node having the non-preemptive priority queue is performed in this study. We have also developed, modeled and simulated example network scenarios by using the Riverbed Modeler simulation software with the purpose of verifying the implementation results. The simulation results obtained under various network load conditions are consistent with the implementation results.

  18. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  19. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....

  20. Seamless interworking architecture for WBAN in heterogeneous wireless networks with QoS guarantees.

    Science.gov (United States)

    Khan, Pervez; Ullah, Niamat; Ullah, Sana; Kwak, Kyung Sup

    2011-10-01

    The IEEE 802.15.6 standard is a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. Providing high mobility with guaranteed Quality of Service (QoS) to a WBAN user in heterogeneous wireless networks is a challenging task. A WBAN uses a Personal Digital Assistant (PDA) to gather data from body sensors and forwards it to a remote server through wide range wireless networks. In this paper, we present a coexistence study of WBAN with Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWANs). The main issue is interworking of WBAN in heterogenous wireless networks including seamless handover, QoS, emergency services, cooperation and security. We propose a Seamless Interworking Architecture (SIA) for WBAN in heterogenous wireless networks based on a cost function. The cost function is based on power consumption and data throughput costs. Our simulation results show that the proposed scheme outperforms typical approaches in terms of throughput, delay and packet loss rate.

  1. Handheld Devices with Wide-Area Wireless Connectivity: Applications in Astronomy Educational Technology and Remote Computational Control

    Science.gov (United States)

    Budiardja, R. D.; Lingerfelt, E. J.; Guidry, M. W.

    2003-05-01

    Wireless technology implemented with handheld devices has attractive features because of the potential to access large amounts of data and the prospect of on-the-fly computational analysis from a device that can be carried in a shirt pocket. We shall describe applications of such technology to the general paradigm of making digital wireless connections from the field to upload information and queries to network servers, executing (potentially complex) programs and controlling data analysis and/or database operations on fast network computers, and returning real-time information from this analysis to the handheld device in the field. As illustration, we shall describe several client/server programs that we have written for applications in teaching introductory astronomy. For example, one program allows static and dynamic properties of astronomical objects to be accessed in a remote observation laboratory setting using a digital cell phone or PDA. Another implements interactive quizzing over a cell phone or PDA using a 700-question introductory astronomy quiz database, thus permitting students to study for astronomy quizzes in any environment in which they have a few free minutes and a digital cell phone or wireless PDA. Another allows one to control and monitor a computation done on a Beowulf cluster by changing the parameters of the computation remotely and retrieving the result when the computation is done. The presentation will include hands-on demonstrations with real devices. *Managed by UT-Battelle, LLC, for the U.S. Department of Energy under contract DE-AC05-00OR22725.

  2. Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks

    OpenAIRE

    Muhammad Mostafa Monowar; Mohammad Mehedi Hassan; Fuad Bajaber; Md. Abdul Hamid; Atif Alamri

    2014-01-01

    Wireless body area networks (WBANs) can be formed including implanted biosensors for health monitoring and diagnostic purposes. However, implanted biosensors could cause thermal damages on human tissue as it exhibits temperature rise due to wireless communication and processing tasks inside the human body. Again, Quality of Service (QoS) provisioning with multiconstraints (delay and reliability) is a striking requirement for diverse application types in WBANs to meet their objectives. This pa...

  3. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  4. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  5. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  6. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  7. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  8. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  9. Broadcast of four HD videos with LED ceiling lighting: optical-wireless MAC

    Science.gov (United States)

    Bouchet, Olivier; Porcon, Pascal; Gueutier, Eric

    2011-09-01

    The European project "hOME Gigabit Access Network" (OMEGA) targeted various wireless and wired solutions for 1 Gbit/s connectivity in Home Area Networks (HANs). One objective was to evaluate the suitability of optical wireless technologies in two spectral regions: visible light (visible-light communications - VLC) and near infrared (infrared communications - IRC). Several demonstrators have been built, all of them largely relying on overthe- shelf components. The demonstrators included a "wide-area" VLC broadcast link based on LED ceiling lighting and a laser-based high-data-rate "wide-area" IRC prototype. In this paper we discuss an adapted optical-wireless media-access-control (OWMAC) sublayer, which was developed and implemented during the project. It is suitable for both IRC and VLC. The VLC prototype is based on DMT signal processing and provides broadcasting at { 100 Mbit/s over an area of approximately 5 m2. The IRC prototype provides {300 Mbit/s half-duplex communication over an area of approximately 30 m2. The IRC mesh network, composed of one base station and two terminals, is based on OOK modulation, multi-sector transceivers, and an ultra-fast sector switch. After a brief discussion about the design of the optical-wireless data link layer and the optical-wireless switch (OWS) card, we address the card development and implementation. We also present applications for the VLC and IRC prototypes and measurement results regarding the MAC layer.

  10. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  11. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  12. Data transmission techniques for short-range optical fiber and wireless communication links

    DEFF Research Database (Denmark)

    Pham, Tien Thang

    The research work described in this thesis is devoted to experimental investigation of techniques for cost-effective high-speed optical communications supporting both wired and wireless services. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high......-speed optical/wireless integration and advanced modulation formats for intensity modulation with direct detection (IM/DD) optical systems. Regarding optical/wireless integration, this thesis focuses on integration of broadband ultra-wide band (UWB) and 60-GHz band wireless systems into optical fiber access...... networks to distribute wireless services in personal area networks (PANs). Photonic technologies to generate and distribute gigabit UWB and 60-GHz-band signals are proposed and demonstrated. Two novel methods are proposed and demonstrated to optically generate Federal Communications Commission (FCC...

  13. 3D-Printed Disposable Wireless Sensors with Integrated Microelectronics for Large Area Environmental Monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-05-19

    Large area environmental monitoring can play a crucial role in dealing with crisis situations. However, it is challenging as implementing a fixed sensor network infrastructure over large remote area is economically unfeasible. This work proposes disposable, compact, dispersible 3D-printed wireless sensor nodes with integrated microelectronics which can be dispersed in the environment and work in conjunction with few fixed nodes for large area monitoring applications. As a proof of concept, the wireless sensing of temperature, humidity, and H2S levels are shown which are important for two critical environmental conditions namely forest fires and industrial leaks. These inkjet-printed sensors and an antenna are realized on the walls of a 3D-printed cubic package which encloses the microelectronics developed on a 3D-printed circuit board. Hence, 3D printing and inkjet printing are uniquely combined in order to realize a low-cost, fully integrated wireless sensor node.

  14. Area efficient decimation filter based on merged delay transformation for wireless applications

    International Nuclear Information System (INIS)

    Rashid, U.; Siddiq, F.; Muhammad, T.; Jamal, H.

    2013-01-01

    Expected by 2014 is the 4G standard for cellular wireless communications, which will improve bandwidth, connectivity and roaming for mobile and stationary devices, 4G and other wireless systems are currently hot topics of research and development in the communication field. In wireless technologies like Global System for Mobile (GSM), Digital Enhanced Cordless Telecommunications (DECT) and Wi-Fi, decimation filters are essential part of transceivers being used. This paper describes a decimation filter which is efficient in terms of both the power consumption and the area used. The architecture is based upon Merged Delay Transformation (MDT). The existing Merged Delay Transformed Infinite Impulse Response (IIR) architecture is power efficient but requires larger area. The proposed and existing filters were implemented on Field-Programmable Gate Array (FPGA). The computational cost of the proposed filter is reduced to (3N/2 + 1) and M-1 times reduction in the number of multipliers in comparison to the existing FIR filter is achieved. The power consumption and speed remain nearly the same. (author)

  15. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  16. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  17. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  18. A TR-UWB Downconversion Autocorrelation Receiver for Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Islam SMRiazul

    2009-01-01

    Full Text Available Low power UWB receiver architecture is proposed for a Wireless Body Area Network (WBAN. This receiving technology is a synergy of existing downconversion-based narrowband rejection mechanism in RF front end and signal processing in frequency domain. Frequency components of converted and filtered UWB pulses are separated into real and imaginary parts, independently correlated and effectively combined to achieve an improved output Signal to noise ratio (SNR. An extensive mathematical analysis has been performed to formulate the close-form expressions for SNRs in order to compare system performances toward favorable BER under BPSK modulation scheme. Analysis shows that optimal rotation of coordination plays an important role for the enhancement of receiving SNR which is further confirmed by computer simulation. A wide range of link level simulation (LLS urges that the proposed system is more power efficient in higher-order modulation (HOM schemes. Transmitted Reference (TR scheme has been considered as the basis for wideband communication.

  19. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  20. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  1. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  2. Survey of main challenges (security and privacy in wireless body area networks for healthcare applications

    Directory of Open Access Journals (Sweden)

    Samaher Al-Janabi

    2017-07-01

    Full Text Available Wireless Body Area Network (WBAN is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.

  3. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  4. Performance analysis of data retrieval in wireless sensor networks

    NARCIS (Netherlands)

    Mitici, M.A.

    2015-01-01

    Wireless sensor networks are currently revolutionizing the way we live, work, and interact with the surrounding environment. Due to their ease of deployment, cost effectiveness and versatile functionality, sensors are employed in a wide range of areas such as environmental monitoring, surveillance

  5. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  6. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  7. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  8. Patient Health Monitoring Using Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Hsu Myat Thwe

    2015-06-01

    Full Text Available Abstract Nowadays remote patient health monitoring using wireless technology plays very vigorous role in a society. Wireless technology helps monitoring of physiological parameters like body temperature heart rate respiration blood pressure and ECG. The main aim of this paper is to propose a wireless sensor network system in which both heart rate and body temperature ofmultiplepatients can monitor on PC at the same time via RF network. The proposed prototype system includes two sensor nodes and receiver node base station. The sensor nodes are able to transmit data to receiver using wireless nRF transceiver module.The nRF transceiver module is used to transfer the data from microcontroller to PC and a graphical user interface GUI is developed to display the measured data and save to database. This system can provide very cheaper easier and quick respondent history of patient.

  9. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  10. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  11. Wideband metamaterial array with polarization-independent and wide incident angle for harvesting ambient electromagnetic energy and wireless power transfer

    Science.gov (United States)

    Zhong, Hui-Teng; Yang, Xue-Xia; Song, Xing-Tang; Guo, Zhen-Yue; Yu, Fan

    2017-11-01

    In this work, we introduced the design, demonstration, and discussion of a wideband metamaterial array with polarization-independent and wide-angle for harvesting ambient electromagnetic (EM) energy and wireless power transfer. The array consists of unit cells with one square ring and four metal bars. In comparison to the published metamaterial arrays for harvesting EM energy or wireless transfer, this design had the wide operation bandwidth with the HPBW (Half Power Band Width) of 110% (6.2 GHz-21.4 GHz), which overcomes the narrow-band operation induced by the resonance characteristic of the metamaterial. On the normal incidence, the simulated maximum harvesting efficiency was 96% and the HPBW was 110% for the random polarization wave. As the incident angle increases to 45°, the maximum efficiency remained higher than 88% and the HPBW remained higher than 83% for the random polarization wave. Furthermore, the experimental verification of the designed metamaterial array was conducted, and the measured results were in reasonable agreement with the simulated ones.

  12. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  13. Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender

    methods and techniques in different areas and brings them together to create an efficient verification system. The overall ambition is to provide a wide range of powerful techniques for analyzing models with quantitative and qualitative security information. We stated a new approach that first verifies...... applications, home automation, and traffic control. The challenges for research in this area are due to the unique features of wireless sensor devices such as low processing power and associated low energy. On top of this, wireless sensor networks need secure communication as they operate in open fields...... low level security protocol s in a qualitative manner and guarantees absolute security, and then takes these verified protocols as actions of scenarios to be verified in a quantitative manner. Working on the emerging ZigBee wireless sensor networks, we used probabilistic verification that can return...

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  15. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  16. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  17. Economics of area-wide pest control

    International Nuclear Information System (INIS)

    Mumford, J.D.

    2000-01-01

    Area-wide pest management is commonly practised throughout the world, probably much more so than is generally recognised (Lindquist 2000, Klassen 2000). Apart from highly publicised area-wide schemes such as the sterile insect technique (SIT) for fruit flies, pheromone disruption for cotton bollworms and classical biological control, there are many examples of actions such as concerted host plant eradication, enforced closed crop seasons, organised pesticide rotation for resistance management, coordination of resistant crop genotypes, etc., some going back several centuries, which should also be considered as area-wide practices. Each of these is faced with many of the economic issues generally associated with area-wide management which will be discussed below. In general, there are to be four major questions to answer in devising an area-wide pest management programme: 1) Should a particular pest be controlled locally or area-wide? 2) What is an appropriate area over which management should be attempted? 3) Within that area what form of control is most efficient? 4) What level of organisation should be used to get the job done? It should be noted that apart from clearly objective measures such as technical effectiveness (say, mortality) or cost efficiency (mortality per dollar), there are many subjective measures that come into the evaluation of area-wide control due to the element of risk (for example, in quarantine and eradication), the boundaries of externalities (for example, variable probabilities of pesticide drift under different conditions or target organism sensitivities) and time preferences for returns on capital investments (such as insect rearing facilities or research to develop pheromone technologies). As a result of these subjective components, it may sometimes be difficult to reach clearly agreed decisions based on objective economic analyses, even with a consensus on the data used. There are three general classes of economic problems in comparing

  18. Flexible quality of service model for wireless body area sensor networks

    OpenAIRE

    Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.

    2016-01-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the pro...

  19. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  20. Ultra wideband wireless body area networks

    CERN Document Server

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit

    2014-01-01

    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  1. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  2. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  3. 3D-Printed Disposable Wireless Sensors with Integrated Microelectronics for Large Area Environmental Monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad; Karimi, Muhammad Akram; Salama, Khaled N.; Shamim, Atif

    2017-01-01

    disposable, compact, dispersible 3D-printed wireless sensor nodes with integrated microelectronics which can be dispersed in the environment and work in conjunction with few fixed nodes for large area monitoring applications. As a proof of concept

  4. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    Science.gov (United States)

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  5. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  6. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  7. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  8. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  9. The Development of Wireless Body Area Network for Motion Sensing Application

    Science.gov (United States)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.; Ramadhany, F.; Arianto, L.; Habibie, D.

    2018-04-01

    The information era has driven the society into the digitally-controlled lifestyle. Wireless body area networks (WBAN) as the specific scope of wireless sensor networks (WSN) is consistently growing into bigger applications. Currently, people are able to monitor their medical parameters by simply using small electronics devices attached to their body and connected to the authorities. On top of that, this time, smart phones are typically equipped with sensors such as accelerometer, gyroscope, barometric pressure, heart rate monitor, etc. It means that the sensing yet the signal processing can be performed by a single device. Moreover, Android opens lot wider opportunities for new applications as the most popular open-sourced smart phone platform. This paper is intended to show the development of motion sensing application which focused on analysing data from accelerometer and gyroscope. Beside reads the sensors, this application also has the ability to convert the sensors’ numerical value into graphs.

  10. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  11. Connected vehicle insights : fourth generation wireless - vehicle and highway gateways to the cloud.

    Science.gov (United States)

    2011-12-01

    This paper examines next generation wide-area cellular such as fourth generation (4G) will be able to support vehicular applications, and how transportation infrastructure may mesh with wireless networks. : This report is part of the Connected Vehicl...

  12. Finding Waves: Techniques for a Successful Wireless Site Survey

    Science.gov (United States)

    Shanafelt, Michael

    2004-01-01

    Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…

  13. Clinical potential of implantable wireless sensors for orthopedic treatments.

    Science.gov (United States)

    Karipott, Salil Sidharthan; Nelson, Bradley D; Guldberg, Robert E; Ong, Keat Ghee

    2018-04-01

    Implantable wireless sensors have been used for real-time monitoring of chemicals and physical conditions of bones, tendons and muscles to diagnose and study orthopedic diseases and injuries. Due to the importance of these sensors in orthopedic care, a critical review, which not only analyzes the underlying technologies but also their clinical implementations and challenges, will provide a landscape view on their current state and their future clinical role. Areas covered: By conducting an extensive literature search and following the leaders of orthopedic implantable wireless sensors, this review covers the battery-powered and battery-free wireless implantable sensor technologies, and describes their implementation for hips, knees, spine, and shoulder stress/strain monitoring. Their advantages, limitations, and clinical challenges are also described. Expert commentary: Currently, implantable wireless sensors are mostly limited for scientific investigations and demonstrative experiments. Although rapid advancement in sensors and wireless technologies will push the reliability and practicality of these sensors for clinical realization, regulatory constraints and financial viability in medical device industry may curtail their continuous adoption for clinical orthopedic applications. In the next five years, these sensors are expected to gain increased interest from researchers, but wide clinical adoption is still unlikely.

  14. Flexible quality of service model for wireless body area sensor networks\\ud

    OpenAIRE

    Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.

    2016-01-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency (RF) ultra-wideband (UWB) technology has developed substantially for physiological signal monitoring due to its advantages such as low power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems of...

  15. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  16. An energy-efficient leader election mechanism for wireless body area networks

    OpenAIRE

    Zhang , Rongrong; Moungla , Hassine; Mehaoua , Ahmed

    2014-01-01

    International audience; In Wireless Body Area Networks (WBANs), the energy consumption determines the lifetime of the entire network. As a result, how to conserve the energy to prolong the network lifetime becomes a key problem in WBANs. In this paper, to address the energy conservation problem in WBANs, we develop an Energy-Efficient Leader Election mechanism, called EELE. In EELE, each node competes for the leader following the distributed leader election algorithm in which a utility functi...

  17. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  18. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  19. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  20. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Science.gov (United States)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-03-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  1. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    International Nuclear Information System (INIS)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-01-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection

  2. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Energy Technology Data Exchange (ETDEWEB)

    Deen, David A.; Osinsky, Andrei; Miller, Ross [Agnitron Technology Incorporated, Eden Prairie, Minnesota 55346 (United States)

    2014-03-03

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  3. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  4. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  5. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sabrina Boubiche

    2016-04-01

    Full Text Available Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  6. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  7. A Polygon Model for Wireless Sensor Network Deployment with Directional Sensing Areas

    Science.gov (United States)

    Wu, Chun-Hsien; Chung, Yeh-Ching

    2009-01-01

    The modeling of the sensing area of a sensor node is essential for the deployment algorithm of wireless sensor networks (WSNs). In this paper, a polygon model is proposed for the sensor node with directional sensing area. In addition, a WSN deployment algorithm is presented with topology control and scoring mechanisms to maintain network connectivity and improve sensing coverage rate. To evaluate the proposed polygon model and WSN deployment algorithm, a simulation is conducted. The simulation results show that the proposed polygon model outperforms the existed disk model and circular sector model in terms of the maximum sensing coverage rate. PMID:22303159

  8. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  9. Pest management strategies: Area-wide and conventional

    International Nuclear Information System (INIS)

    Lindquist, D.A.

    2000-01-01

    Conventional Insect Control The usual approach to insect control is to treat the commodity only after a damaging population of insects has developed. In other words, the producer, home owner or casual gardener fights a defensive battle. He reacts to an insect attack. When he sees the enemy or the damage caused by the enemy, he loads up his sprayer with an insecticide and mounts a counter attack. Most insect control procedures are applied by an individual producer on his own relatively small production area. This conventional insect control approach encourages the producer to make his own decisions about whether or not any insect control is to be used, which insect control method or product to use, when to use it, how to use it, who applies it, etc. Advice to producers on insect control is usually available from government extension personnel, private insect control consultants or representatives of companies that sell insecticides or other insect control materials or methods. The conventional procedure results in great variability in the efficacy of insect control because each producer makes his own decisions. The objective of conventional insect control is to protect the commodity. This is usually accomplished by treating the commodity, be it cows or corn or rice in a warehouse. Conventional insect control requires virtually no planning to achieve results. The 'programme' is short-term, frequently measured in days until the next insecticide application is needed. It is reactive (defensive). Area-wide Insect Control Area-wide insect control is applied against an important insect pest over a relatively large area involving many individual producers of the same or similar crops. The 'area' is a combination of geography and the range of hosts of the target insect pest. The term 'area' in 'area-wide' refers to the area where the target insect population survives. The area is not limited to production of the major crop(s) to be protected. It is very likely that a large

  10. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  11. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  12. Efficacy analysis of LDPC coded APSK modulated differential space-time-frequency coded for wireless body area network using MB-pulsed OFDM UWB technology.

    Science.gov (United States)

    Manimegalai, C T; Gauni, Sabitha; Kalimuthu, K

    2017-12-04

    Wireless body area network (WBAN) is a breakthrough technology in healthcare areas such as hospital and telemedicine. The human body has a complex mixture of different tissues. It is expected that the nature of propagation of electromagnetic signals is distinct in each of these tissues. This forms the base for the WBAN, which is different from other environments. In this paper, the knowledge of Ultra Wide Band (UWB) channel is explored in the WBAN (IEEE 802.15.6) system. The measurements of parameters in frequency range from 3.1-10.6 GHz are taken. The proposed system, transmits data up to 480 Mbps by using LDPC coded APSK Modulated Differential Space-Time-Frequency Coded MB-OFDM to increase the throughput and power efficiency.

  13. A New Technique of Removing Blind Spots to Optimize Wireless Coverage in Indoor Area

    Directory of Open Access Journals (Sweden)

    A. W. Reza

    2013-01-01

    Full Text Available Blind spots (or bad sampling points in indoor areas are the positions where no signal exists (or the signal is too weak and the existence of a receiver within the blind spot decelerates the performance of the communication system. Therefore, it is one of the fundamental requirements to eliminate the blind spots from the indoor area and obtain the maximum coverage while designing the wireless networks. In this regard, this paper combines ray-tracing (RT, genetic algorithm (GA, depth first search (DFS, and branch-and-bound method as a new technique that guarantees the removal of blind spots and subsequently determines the optimal wireless coverage using minimum number of transmitters. The proposed system outperforms the existing techniques in terms of algorithmic complexity and demonstrates that the computation time can be reduced as high as 99% and 75%, respectively, as compared to existing algorithms. Moreover, in terms of experimental analysis, the coverage prediction successfully reaches 99% and, thus, the proposed coverage model effectively guarantees the removal of blind spots.

  14. VillageLink: Wide-Area Wireless Coverage

    CSIR Research Space (South Africa)

    Pejovic, V

    2014-01-01

    Full Text Available is required to coordinate probing timing for channel probe senders and listeners. We use a token mechanism, in which a BS only sends channel probes when it has a token. All other BSs and CPEs without tokens are in a listening state. When a BS is in a probing... similar notion when listening for probes. CPEs of one BS experience interference from all other BSs. To account for this CPEs can be instructed to listen for probes from BSs with whom they are not associated. Frequency profiling results for CPEs are sent...

  15. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  16. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  17. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  18. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  19. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  20. Ultra wide band antennas

    CERN Document Server

    Begaud, Xavier

    2013-01-01

    Ultra Wide Band Technology (UWB) has reached a level of maturity that allows us to offer wireless links with either high or low data rates. These wireless links are frequently associated with a location capability for which ultimate accuracy varies with the inverse of the frequency bandwidth. Using time or frequency domain waveforms, they are currently the subject of international standards facilitating their commercial implementation. Drawing up a complete state of the art, Ultra Wide Band Antennas is aimed at students, engineers and researchers and presents a summary of internationally recog

  1. Flexible quality of service model for wireless body area sensor networks.

    Science.gov (United States)

    Liao, Yangzhe; Leeson, Mark S; Higgins, Matthew D

    2016-03-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the prospect of collecting human vital signs, early detection of abnormal medical conditions, real-time healthcare data transmission and remote telemedicine support. However, due to the technical constraints of sensor batteries, the supply of power is a major bottleneck for healthcare system design. Moreover, medium access control (MAC) needs to support reliable transmission links that allow sensors to transmit data safely and stably. In this Letter, the authors provide a flexible quality of service model for ad hoc networks that can support fast data transmission, adaptive schedule MAC control, and energy efficient ubiquitous WBASN networks. Results show that the proposed multi-hop communication ad hoc network model can balance information packet collisions and power consumption. Additionally, wireless communications link in WBASNs can effectively overcome multi-user interference and offer high transmission data rates for healthcare systems.

  2. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Hao, Yang; Foster, Robert

    2008-01-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  3. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  4. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  5. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design

    NARCIS (Netherlands)

    Selimis, G.; Huang, L.; Massé, F.; Tsekoura, I.; Ashouei, M.; Catthoor, F.; Huisken, J.; Stuyt, J.; Dolmans, G.; Penders, J.; Groot, H. de

    2011-01-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating

  6. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-01-01

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized. PMID:23974152

  7. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  8. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  9. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  10. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  11. On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays

    Directory of Open Access Journals (Sweden)

    Guo Wenxuan

    2009-01-01

    Full Text Available Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic placement of relay nodes (RNs in a disaster area wireless network. It is based on our prior work of mobility model that characterizes the spatial movement of the first responders as mobile nodes (MNs during their operations. We first investigate the COverage-oriented Relay Placement (CORP problem that is to maximize the total number of MNs connected with the relays. Considering the network throughput, we then study the CApacity-oriented Relay Placement (CARP problem that is to maximize the aggregated data rate of all MNs. For both coverage and capacity studies, we provide each the optimal and the greedy algorithms with computational complexity analysis. Furthermore, simulation results are presented to compare the performance between the greedy and the optimal solutions for the CORP and CARP problems, respectively. It is shown that the greedy algorithms can achieve near optimal performance but at significantly lower computational complexity.

  12. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    Science.gov (United States)

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  13. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    Science.gov (United States)

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  14. CAPAClTYANALYSIS OF WIRELESS MESH NET\\VORKS

    African Journals Online (AJOL)

    The limited available bandwidth makes capacity analysis of the network very essential. ... Wireless mesh networks can also be employed for wide variety ofapplications such ... wireless mesh networks using OPNET (Optimized Network Engineering Tool) Modeller 1-J..5. The .... /bps using I I Mbps data rate and 12000 bits.

  15. Wireless Sensing Opportunities for Aerospace Applications

    Directory of Open Access Journals (Sweden)

    William Wilson

    2008-07-01

    Full Text Available Wireless sensors and sensor networks is an emerging technology area with many applications within the aerospace industry. Integrated vehicle health monitoring (IVHM of aerospace vehicles is needed to ensure the safety of the crew and the vehicle, yet often high costs, weight, size and other constraints prevent the incorporation of instrumentation onto spacecraft. This paper presents a few of the areas such as IVHM, where new wireless sensing technology is needed on both existing vehicles as well as future spacecraft. From ground tests to inflatable structures to the International Space Station, many applications could receive benefits from small, low power, wireless sensors. This paper also highlights some of the challenges that need to overcome when implementing wireless sensor networks for aerospace vehicles.

  16. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  17. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  18. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  19. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Adnan, Md. Akhtaruzzaman; Razzaque, Mohammd Abdur; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2014-01-01

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted. PMID:24368702

  20. Bio-mimic optimization strategies in wireless sensor networks: a survey.

    Science.gov (United States)

    Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2013-12-24

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  1. An Efficient Topology for Wireless Power Transfer over a Wide Range of Loading Conditions

    Directory of Open Access Journals (Sweden)

    Tianqing Li

    2018-01-01

    Full Text Available Although an inductive power transfer (IPT system can transfer power efficiently in full-load conditions, its efficiency obviously decreases in light-load conditions. To solve this problem, based on a two-coil IPT system with a series-series compensation topology, a single-ended primary-inductor converter is introduced at the secondary side. By adjusting the set effective value of the current in the primary coil, the converter input voltage changes to maintain the equivalent input resistance of the converter in an optimal condition. The system can then transfer the power efficiently with the wide load conditions. Moreover, the system operates at a constant resonance frequency with a high power factor. Both the simulation and experimentation of a prototype with a 10 W IPT system demonstrate the effectiveness of the proposed topology for wireless power transfer.

  2. 2014 International Conference on Wireless Communications, Networking and Applications

    CERN Document Server

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  3. Wireless Technologies in Support of ISS Experimentation and Operations

    Science.gov (United States)

    Wagner, Raymond; Fink, Patrick

    2012-01-01

    Presentation reviews: (1) Wireless Communications (a) Internal (b) External (2) RFID (Radio Frequency Identification) (a) Existing and R&D (3) Wireless Sensor Networks (a) Existing and R&D (4) Ultra-Wide Band (UWB) (a) R&D

  4. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    Science.gov (United States)

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  5. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  6. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  7. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  8. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  9. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  10. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    OpenAIRE

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient’s life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body fu...

  11. Real Time Wide Area Radiation Surveillance System

    Science.gov (United States)

    Biafore, M.

    2012-04-01

    We present the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). Within this project, we propose a novel mobile system for real time, wide area radiation surveillance. The system is based on the integration of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit will include a wireless communication interface to send the data remotely to a monitoring base station which also uses a GPS system to calculate the position of the tag. The system will also incorporate middleware and high level software to provide web-service interfaces for the exchange of information, and that will offer top level functionalities as management of users, mobile tags and environment data and alarms, database storage and management and a web-based graphical user interface. Effort will be spent to ensure that the software is modular and re-usable across as many architectural levels as possible. Finally, an expert system will continuously analyze the information from the radiation sensor and correlate it with historical data from the tag location in order to generate an alarm when an abnormal situation is detected. The system will be useful for many different scenarios, including such lost radioactive sources and radioactive contamination. It will be possible to deploy in emergency units and in general in any type of mobile or static equipment. The sensing units will be highly portable thanks to their low size and low energy consumption. The complete system will be scalable in terms of complexity and cost and will offer very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system will allow for a realistic introduction to the market. Authorities may start with a

  12. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  13. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  14. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  15. Autonomous management of a recursive area hierarchy for large scale wireless sensor networks using multiple parents

    Energy Technology Data Exchange (ETDEWEB)

    Cree, Johnathan Vee [Washington State Univ., Pullman, WA (United States); Delgado-Frias, Jose [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-01

    Large scale wireless sensor networks have been proposed for applications ranging from anomaly detection in an environment to vehicle tracking. Many of these applications require the networks to be distributed across a large geographic area while supporting three to five year network lifetimes. In order to support these requirements large scale wireless sensor networks of duty-cycled devices need a method of efficient and effective autonomous configuration/maintenance. This method should gracefully handle the synchronization tasks duty-cycled networks. Further, an effective configuration solution needs to recognize that in-network data aggregation and analysis presents significant benefits to wireless sensor network and should configure the network in a way such that said higher level functions benefit from the logically imposed structure. NOA, the proposed configuration and maintenance protocol, provides a multi-parent hierarchical logical structure for the network that reduces the synchronization workload. It also provides higher level functions with significant inherent benefits such as but not limited to: removing network divisions that are created by single-parent hierarchies, guarantees for when data will be compared in the hierarchy, and redundancies for communication as well as in-network data aggregation/analysis/storage.

  16. Raspberry Pi Based Intelligent Wireless Sensor Node for Localized Torrential Rain Monitoring

    Directory of Open Access Journals (Sweden)

    Zhaozhuo Xu

    2016-01-01

    Full Text Available Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.

  17. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping

    2018-02-16

    Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  18. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-01-01

    for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W

  19. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  20. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  1. LSコイルを用いたWireless Power Transmission

    OpenAIRE

    吉川, 隆; 更谷, 翔太

    2014-01-01

    The wireless power transmission is widely studied for many kinds of application, for example, power supply for cell phone or power source of EV. The supplying power of those applications is always over mW. But it is impossible to transmit for longer distance under the index of regulation of protection from radiofrequency electromagnetic field. Then many of such applications are considered with restriction of narrow area. Then we have surveyed low power demanding application the suitable appl...

  2. Software-Defined Radio for Wireless Local-Area Networks

    NARCIS (Netherlands)

    Schiphorst, Roelof

    2004-01-01

    New wireless communications standards do not replace old ones, instead the number of standards keeps on increasing and by now an abundance of standards exists. Moreover there is no reason to assume that this trend will ever stop. Therefore, the software-radio concept is emerging as a potential

  3. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  4. Partnership Opportunities with AFRC for Wireless Systems Flight Testing

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview the flight test capabilities at NASA Armstrong Flight Research Center (AFRC), to open up partnership collaboration opportunities for Wireless Community to conduct flight testing of aerospace wireless technologies. Also, it will brief the current activities on wireless sensor system at AFRC through SBIR (Small Business Innovation Research) proposals, and it will show the current areas of interest on wireless technologies that AFRC would like collaborate with Wireless Community to further and testing.

  5. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  6. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  7. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg

    2010-01-01

    /actuators attached to the body and a host server application. The gateway uses the BlackFin BF533 processor from Analog Devices, and uses Bluetooth for wireless communication. Two types of sensors are attached to the network: an electro-cardio-gram sensor and an oximeter sensor. The testbed has been successfully...

  8. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  9. An area wide control of fruit flies in Mauritius

    International Nuclear Information System (INIS)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R.

    2006-01-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  10. An area wide control of fruit flies in Mauritius

    Energy Technology Data Exchange (ETDEWEB)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R., E-mail: ento@intnet.m, E-mail: moa-entomology@mail.gov.m [Ministry of Agro Industry and Fisheries Reduit, Republic of Mauritius (Mauritius)

    2006-07-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  11. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  12. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  13. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  14. Shed a light of wireless technology on portable mobile design of NIRS

    Science.gov (United States)

    Sun, Yunlong; Li, Ting

    2016-03-01

    Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.

  15. Wide-area situation awareness in electric power grid

    Science.gov (United States)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  16. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  17. Wireless Multiplexed Surface Acoustic Wave Sensors Project

    Science.gov (United States)

    Youngquist, Robert C.

    2014-01-01

    Wireless Surface Acoustic Wave (SAW) Sensor is a new technology for obtaining multiple, real-time measurements under extreme environmental conditions. This project plans to develop a wireless multiplexed sensor system that uses SAW sensors, with no batteries or semiconductors, that are passive and rugged, can operate down to cryogenic temperatures and up to hundreds of degrees C, and can be used to sense a wide variety of parameters over reasonable distances (meters).

  18. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  19. 40 CFR 52.326 - Area-wide nitrogen oxides (NOX) exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Area-wide nitrogen oxides (NOX) exemptions. 52.326 Section 52.326 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.326 Area-wide nitrogen...

  20. Distributed Water Pollution Source Localization with Mobile UV-Visible Spectrometer Probes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junjie Ma

    2018-02-01

    Full Text Available Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.

  1. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  2. Propagation Characteristics of International Space Station Wireless Local Area Network

    Science.gov (United States)

    Sham, Catherine C.; Hwn, Shian U.; Loh, Yin-Chung

    2005-01-01

    This paper describes the application of the Uniform Geometrical Theory of Diffraction (UTD) for Space Station Wireless Local Area Networks (WLANs) indoor propagation characteristics analysis. The verification results indicate good correlation between UTD computed and measured signal strength. It is observed that the propagation characteristics are quite different in the Space Station modules as compared with those in the typical indoor WLANs environment, such as an office building. The existing indoor propagation models are not readily applicable to the Space Station module environment. The Space Station modules can be regarded as oversized imperfect waveguides. Two distinct propagation regions separated by a breakpoint exist. The propagation exhibits the guided wave characteristics. The propagation loss in the Space Station, thus, is much smaller than that in the typical office building. The path loss model developed in this paper is applicable for Space Station WLAN RF coverage and link performance analysis.

  3. Wireless Broadband Network on TVWS for Rural Areas: an Indian Perspective

    DEFF Research Database (Denmark)

    Deshmukh, Madhukar; Patil, Kishor P.; Frederiksen, Flemming Bjerge

    2013-01-01

    and market domains. The current global move to switch from analogue to digital TV has opened up an opportunity for the re-allocation of this valuable resource. In one way, spectrum bands once used for analogue TV broadcasting will be completely cleared, leaving a space for deploying new licensed wireless...... services, and in another way, digital television technology geographically interleaves spectrum bands to avoid interference between neighboring stations-leaving a space for deploying new unlicensed wireless services. The focus of the paper is to assess the availability of geographically interleaved...

  4. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  5. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  6. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  7. EMI Evaluation on Wireless Computer Devices in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jae Ki; JI Yeong Hwa; Sung, Chan Ho

    2011-01-01

    Wireless computer devices, for example, mice and keyboards are widely used in various industries. However, I and C (instrumentation and control) equipment in nuclear power plants are very susceptible to the EMI (Electro-magnetic interference) and there are concerns regarding EMI induced transient caused by wireless computer devices which emit electromagnetic waves for communication. In this paper, industrial practices and nuclear related international standards are investigated to verify requirements of wireless devices. In addition, actual measurement and evaluation for the intensity of EMI of some commercially available wireless devices is performed to verify their compatibility in terms of EMI. Finally we suggest an appropriate method of using wireless computer devices in nuclear power plant control rooms for better office circumstances of operators

  8. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  9. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  10. Human++: Wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, R. de; Pflug, H.; Santana, J.; Visser, H.; Vullers, R.; Groot, H. de; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  11. Human++ : wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, de R.; Pflug, H.; Santana, J.; Visser, H.J.; Vullers, R.J.M.; Groot, de H.; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  12. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    OpenAIRE

    Xiaojun Liu; Youcheng Wang; Hub Hu

    2014-01-01

    As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area...

  13. IMPACT OF WIRELESS TECHNOLOGIES ON HUMAN HEALTH

    OpenAIRE

    Pejnović, Natalija

    2009-01-01

    SUMMARY: This paper explores adverse impacts of wireless technologies on user health. A wide range of situations in which radiation may influence the user was investigated. Emphasis was placed on the adverse impact of non-ionizing radiation. Thermal and non-thermal effects of non-ionizing radiation were explained in accordance with the operating principle of wireless devices. It is necessary to implement appropriate forms of protection in order to eliminate health risks or reduce them to the ...

  14. Impact of wireless communication on multimedia application performance

    Science.gov (United States)

    Brown, Kevin A.

    1999-01-01

    Multimedia applications and specifically voice and video conferencing tools are widely used in business communications, and are quickly being discovered by the consumer market as well. At the same time, wireless communication services such as PCS voice and cellular data are becoming very popular, leading to the desire to deploy multimedia applications in the wireless environment. Wireless links, however, exhibit several characteristics which are different from traditional wired networks. These include: dynamically changing bandwidth due to mobile host movement in and out of cell where bandwidth is shared, high rates of packet corruption and subsequent loss, and frequent are lengthy disconnections due to obstacles, fading, and movement between cells. In addition, these effects are short-lived and difficult to reproduce, leading to a lack of adequate testing and analysis for applications used in wireless environments.

  15. WIRELESS TECHNOLOGIES for LOCATION-BASED SERVICES

    Directory of Open Access Journals (Sweden)

    Dewi Wirastuti

    2012-06-01

    Full Text Available This paper presents an overview of wireless technologies that support location-based services (LBS. Satellite and cellular networks have exploited their communication infrastructure to offer LBS. The rapid deployment of mobile broadband wireless networks has offered another appealing application area. Key to the realisation of LBS is an efficient and accurate positioning technique with various methods and offering different performance levels. So far, Global Positioning System (GPS has offered the best accuracy at a low cost but it is challenged by poor indoor coverage. With the rapid deployment of broadband wireless access ubiquitously, Mobile WiMAX (Worldwide Interoperability for Microwave Access is seen as a potential positioning option for LBS. Some key features of WiMAX, i.e., broadband benefit, high speed and large coverage area; it will be exploited to provide LBS.

  16. Rotating-Disk-Based Hybridized Electromagnetic-Triboelectric Nanogenerator for Sustainably Powering Wireless Traffic Volume Sensors.

    Science.gov (United States)

    Zhang, Binbin; Chen, Jun; Jin, Long; Deng, Weili; Zhang, Lei; Zhang, Haitao; Zhu, Minhao; Yang, Weiqing; Wang, Zhong Lin

    2016-06-28

    Wireless traffic volume detectors play a critical role for measuring the traffic-flow in a real-time for current Intelligent Traffic System. However, as a battery-operated electronic device, regularly replacing battery remains a great challenge, especially in the remote area and wide distribution. Here, we report a self-powered active wireless traffic volume sensor by using a rotating-disk-based hybridized nanogenerator of triboelectric nanogenerator and electromagnetic generator as the sustainable power source. Operated at a rotating rate of 1000 rpm, the device delivered an output power of 17.5 mW, corresponding to a volume power density of 55.7 W/m(3) (Pd = P/V, see Supporting Information for detailed calculation) at a loading resistance of 700 Ω. The hybridized nanogenerator was demonstrated to effectively harvest energy from wind generated by a moving vehicle through the tunnel. And the delivered power is capable of triggering a counter via a wireless transmitter for real-time monitoring the traffic volume in the tunnel. This study further expands the applications of triboelectric nanogenerators for high-performance ambient mechanical energy harvesting and as sustainable power sources for driving wireless traffic volume sensors.

  17. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  18. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  19. Design and implementation about the campus wireless network

    International Nuclear Information System (INIS)

    Qi Fazhi; An Dehai; Wang Yanming; Cui Tao; Chen Gang; Liu Baoxu

    2007-01-01

    With the development of network applications, flexibility and wieldy is becoming more and more important for network users. Based on the analysis of the needs of campus wireless network. This article design and analysis the deployment mechanism, register system and protection system of wireless network. Built a wireless network system base on IHEP network environment, realization the 'always and everywhere' access the network in the IHEP campus area. (authors)

  20. Development of a wearable wireless body area network for health monitoring of the elderly and disabled

    Science.gov (United States)

    Rushambwa, Munyaradzi C.; Gezimati, Mavis; Jeeva, J. B.

    2017-11-01

    Novel advancements in systems miniaturization, electronics in health care and communication technologies are enabling the integration of both patients and doctors involvement in health care system. A Wearable Wireless Body Area Network (WWBAN) provides continuous, unobtrusive ambulatory, ubiquitous health monitoring, and provide real time patient’s status to the physician without any constraint on their normal daily life activities. In this project we developed a wearable wireless body area network system that continuously monitor the health of the elderly and the disabled and provide them with independent, safe and secure living. The WWBAN system monitors the following parameters; blood oxygen saturation using a pulse oximeter sensor (SpO2), heart rate (HR) pulse sensor, Temperature, hydration, glucose level and fall detection. When the wearable system is put on, the sensor values are processed and analysed. If any of the monitored parameter values falls below or exceeds the normal range, there is trigger of remote alert by which an SMS is send to a doctor or physician via GSM module and network. The developed system offers flexibility and mobility to the user; it is a real time system and has significance in revolutionizing health care system by enabling non-invasive, inexpensive, continuous health monitoring.

  1. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  2. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  3. Area-wide population suppression of codling moth

    International Nuclear Information System (INIS)

    Calkins, C.O.; Knight, A.L.; Richardson, G.; Bloem, K.A.

    2000-01-01

    The area-wide pest population control concept began with E.F. Knipling (1979) in the 1970s. Control of a pest population on individual fields does little to control the overall pest population because only a portion of the population is being affected. Expanding control tactics beyond individual farms tends to suppress the population on a wider scale and frequently results in suppression of the population for more than one year. The Agriculture Research Service (ARS) believes that this concept has not been addressed with the focus and support that it deserves. The ARS Administration made a conscious decision in 1994 to create a series of area-wide programmes funded out of ARS-based funds that had previously been used for pilot tests. These programmes involve a coordinated effort among ARS and university scientists, growers, and fieldmen for agriculture supply centres and fruit packing houses. The first area-wide programme supported by ARS was the codling moth (CM), Cydia pomonella L. (Lepidoptera: Tortricidae) suppression programme. The codling moth is the key pest of pome fruit throughout the western United States (Beers et al. 1993). About half of the insecticides applied on these crops are directed toward this pest. A non-insecticidal control technique, mating disruption (MD), is available to replace the organophosphates. Removal of the hard pesticides directed against this pest would do the most to allow natural enemies to survive and reproduce in the orchards, which in turn would have the effect of reducing secondary pests. Elimination of the pesticides would also remove much of the health risks to workers and would minimise buildup of pesticide resistance. The objectives of the Codling Moth Area-wide Program are to enhance the efficacy of the non-pesticide approach, to demonstrate that mating disruption will work if conducted properly, to develop biological technology to lower costs of control that complement mating disruption, to implement effective

  4. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  5. Body area networks using IEEE 802156 implementing the ultra wide band physical layer

    CERN Document Server

    Hernandez, Marco; Mucchi, Lorenzo

    2014-01-01

    The market of wearable wireless medical sensors is experiencing a rapid growth and the associated telecommunications services for the healthcare sector are forecast to further increase in the next years. Medical body area networks (MBANs) allow the mobility of patients and medical personnel by facilitating the remote monitoring of patients suffering from chronic or risky diseases. Currently, MBANs are being introduced in unlicensed frequency bands, where the risk of mutual interference with other electronic devices radiating in the same band can be high. Thus, coexistence is an issue on which

  6. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  7. Contributions to time-frequency synchronization in wireless systems

    OpenAIRE

    Koivisto, Tommi

    2015-01-01

    Time and frequency synchronization is an indispensable task for all wireless transceivers and systems. In modern wireless systems, such as 4G and future 5G systems, new wireless technologies set new challenges also to synchronization. In particular, new solutions for time and frequency synchronization are needed in multiantenna and cooperative systems. New research areas arise also in context of interference cancellation and cognitive radio systems where the transmission parameters of the sig...

  8. Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes

    Directory of Open Access Journals (Sweden)

    Theofanis P. Lambrou

    2009-01-01

    Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.

  9. A New Missing Values Estimation Algorithm in Wireless Sensor Networks Based on Convolution

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2013-04-01

    Full Text Available Nowadays, with the rapid development of Internet of Things (IoT applications, data missing phenomenon becomes very common in wireless sensor networks. This problem can greatly and directly threaten the stability and usability of the Internet of things applications which are constructed based on wireless sensor networks. How to estimate the missing value has attracted wide interest, and some solutions have been proposed. Different with the previous works, in this paper, we proposed a new convolution based missing value estimation algorithm. The convolution theory, which is usually used in the area of signal and image processing, can also be a practical and efficient way to estimate the missing sensor data. The results show that the proposed algorithm in this paper is practical and effective, and can estimate the missing value accurately.

  10. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-01-01

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed. PMID:27999258

  11. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey.

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-12-16

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.

  12. Artificial Neural Network for Location Estimation in Wireless Communication Systems

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2012-03-01

    Full Text Available In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS. To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA measurements and the angle of arrival (AOA information to locate MS when three base stations (BSs are available. Artificial neural networks (ANN are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line, based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  13. Artificial neural network for location estimation in wireless communication systems.

    Science.gov (United States)

    Chen, Chien-Sheng

    2012-01-01

    In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS). To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA) measurements and the angle of arrival (AOA) information to locate MS when three base stations (BSs) are available. Artificial neural networks (ANN) are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line), based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS) environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  14. Utility Maximization in Nonconvex Wireless Systems

    CERN Document Server

    Brehmer, Johannes

    2012-01-01

    This monograph formulates a framework for modeling and solving utility maximization problems in nonconvex wireless systems. First, a model for utility optimization in wireless systems is defined. The model is general enough to encompass a wide array of system configurations and performance objectives. Based on the general model, a set of methods for solving utility maximization problems is developed. The development is based on a careful examination of the properties that are required for the application of each method. The focus is on problems whose initial formulation does not allow for a solution by standard convex methods. Solution approaches that take into account the nonconvexities inherent to wireless systems are discussed in detail. The monograph concludes with two case studies that demonstrate the application of the proposed framework to utility maximization in multi-antenna broadcast channels.

  15. Seattle wide-area information for travelers (SWIFT) : architecture study

    Science.gov (United States)

    1998-10-19

    The SWIFT (Seattle Wide-area Information For Travelers) Field Operational Test was intended to evaluate the performance of a large-scale urban Advanced Traveler Information System (ATIS) deployment in the Seattle area. The unique features of the SWIF...

  16. Coverage and Connectivity Issue in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rachit Trivedi

    2013-04-01

    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  17. Wireless monitoring system for personal dose

    International Nuclear Information System (INIS)

    Kobayashi, Hironobu; Kawamura, Takeshi; Inoue, Takayuki

    2000-01-01

    Fuji Electric has developed a system for the higher radiation controlled area in nuclear power plants, in which exposure dose data measured on the wearer's chest, hands, and legs are transferred by wireless to the data control equipment so that the exposure dose can be controlled in real time. The system using a specified low-power radio wave causes no interference to the other types of dosimeters. The data control equipment automatically saves data received from the dosimeters and also has functions of calibration of dosimeters and maintenance of the wireless system. This paper describes the wireless monitoring system that consists of chest and parts dosimeters and data control equipment. (author)

  18. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  19. Wireless Technology Use Case Requirement Analysis for Future Space Applications

    Science.gov (United States)

    Abedi, Ali; Wilkerson, DeLisa

    2016-01-01

    This report presents various use case scenarios for wireless technology -including radio frequency (RF), optical, and acoustic- and studies requirements and boundary conditions in each scenario. The results of this study can be used to prioritize technology evaluation and development and in the long run help in development of a roadmap for future use of wireless technology. The presented scenarios cover the following application areas: (i) Space Vehicles (manned/unmanned), (ii) Satellites and Payloads, (iii) Surface Explorations, (iv) Ground Systems, and (v) Habitats. The requirement analysis covers two parallel set of conditions. The first set includes the environmental conditions such as temperature, radiation, noise/interference, wireless channel characteristics and accessibility. The second set of requirements are dictated by the application and may include parameters such as latency, throughput (effective data rate), error tolerance, and reliability. This report provides a comprehensive overview of all requirements from both perspectives and details their effects on wireless system reliability and network design. Application area examples are based on 2015 NASA Technology roadmap with specific focus on technology areas: TA 2.4, 3.3, 5.2, 5.5, 6.4, 7.4, and 10.4 sections that might benefit from wireless technology.

  20. Virtual Lab for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    PICOVICI, D.

    2008-06-01

    Full Text Available This article details an experimental system developed to enhance the education and research in the area of wireless networks technologies. The system referred, as Virtual Lab (VL is primarily targeting first time users or users with limited experience in programming and using wireless sensor networks. The VL enables a set of predefined sensor networks to be remotely accessible and controlled for constructive and time-efficient experimentation. In order to facilitate the user's wireless sensor applications, the VL is using three main components: a a Virtual Lab Motes (VLM, representing the wireless sensor, b a Virtual Lab Client (VLC, representing the user's tool to interact with the VLM and c a Virtual Lab Server (VLS representing the software link between the VLM and VLC. The concept has been proven using the moteiv produced Tmote Sky modules. Initial experimental use clearly demonstrates that the VL approach reduces dramatically the learning curve involved in programming and using the associated wireless sensor nodes. In addition the VL allows the user's focus to be directed towards the experiment and not towards the software programming challenges.

  1. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  2. Security Analysis of a Software Defined Wide Area Network Solution

    OpenAIRE

    Rajendran, Ashok

    2016-01-01

    Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...

  3. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  4. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  5. Short-range wireless communication fundamentals of RF system design and application

    CERN Document Server

    Bensky, Alan

    2004-01-01

    The Complete "Tool Kit” for the Hottest Area in RF/Wireless Design!Short-range wireless-communications over distances of less than 100 meters-is the most rapidly growing segment of RF/wireless engineering. Alan Bensky is an internationally recognized expert in short-range wireless, and this new edition of his bestselling book is completely revised to cover the latest developments in this fast moving field.You'll find coverage of such cutting-edge topics as: architectural trends in RF/wireless integrated circuits compatibility and conflict issues between differen

  6. A Wireless LAN and Voice Information System for Underground Coal Mine

    OpenAIRE

    Yu Zhang; Wei Yang; Dongsheng Han; Young-Il Kim

    2014-01-01

    In this paper we constructed a wireless information system, and developed a wireless voice communication subsystem based on Wireless Local Area Networks (WLAN) for underground coal mine, which employs Voice over IP (VoIP) technology and Session Initiation Protocol (SIP) to achieve wireless voice dispatching communications. The master control voice dispatching interface and call terminal software are also developed on the WLAN ground server side to manage and implement the voice dispatching co...

  7. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  8. General Data Acquisition Platform for Wireless Sensor Network Based on CC2538

    Directory of Open Access Journals (Sweden)

    Yang Zhi-Jun

    2017-01-01

    Full Text Available Wireless sensor networks are the hotspots of current research and have very wide application prospects. Its front end is a sensor that can sense and check the external world. This paper takes temperature and humidity as the research object, and builds a wireless sensor network data acquisition platform by combining the Internet of things and the WeChat public platform. The platform uses DHT11 temperature and humidity sensors and CC2538 sensor nodes to obtain the relevant data, through the server and database for data access. The combination with WeChat public platform not only allows us to view the temperature and humidity in the WeChat public, but also allows us to understand the environmental changes of the relevant detection area more conveniently and quickly. The effectiveness of the platform is also demonstrated by the collection of temperature and humidity data.

  9. Battery-free, wireless sensors for full-body pressure and temperature mapping.

    Science.gov (United States)

    Han, Seungyong; Kim, Jeonghyun; Won, Sang Min; Ma, Yinji; Kang, Daeshik; Xie, Zhaoqian; Lee, Kyu-Tae; Chung, Ha Uk; Banks, Anthony; Min, Seunghwan; Heo, Seung Yun; Davies, Charles R; Lee, Jung Woo; Lee, Chi-Hwan; Kim, Bong Hoon; Li, Kan; Zhou, Yadong; Wei, Chen; Feng, Xue; Huang, Yonggang; Rogers, John A

    2018-04-04

    Thin, soft, skin-like sensors capable of precise, continuous measurements of physiological health have broad potential relevance to clinical health care. Use of sensors distributed over a wide area for full-body, spatiotemporal mapping of physiological processes would be a considerable advance for this field. We introduce materials, device designs, wireless power delivery and communication strategies, and overall system architectures for skin-like, battery-free sensors of temperature and pressure that can be used across the entire body. Combined experimental and theoretical investigations of the sensor operation and the modes for wireless addressing define the key features of these systems. Studies with human subjects in clinical sleep laboratories and in adjustable hospital beds demonstrate functionality of the sensors, with potential implications for monitoring of circadian cycles and mitigating risks for pressure-induced skin ulcers. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  10. Packets with deadlines a framework for real-time wireless networks

    CERN Document Server

    Hou, I-Hong

    2013-01-01

    With the explosive increase in the number of mobile devices and applications, it is anticipated that wireless traffic will increase exponentially in the coming years. Moreover, future wireless networks all carry a wide variety of flows, such as video streaming, online gaming, and VoIP, which have various quality of service (QoS) requirements. Therefore, a new mechanism that can provide satisfactory performance to the complete variety of all kinds of flows, in a coherent and unified framework, is needed.In this book, we introduce a framework for real-time wireless networks. This consists of a m

  11. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  12. Environmental implications of wireless technologies: news delivery and business meetings.

    Science.gov (United States)

    Toffel, Michael W; Horvath, Arpad

    2004-06-01

    Wireless information technologies are providing new ways to communicate, and are one of several information and communication technologies touted as an opportunity to reduce society's overall environmental impacts. However, rigorous system-wide environmental impact comparisons of these technologies to the traditional applications they may replace have only recently been initiated, and the results have been mixed. In this paper, the environmental effects of two applications of wireless technologies are compared to those of conventional technologies for which they can substitute. First, reading newspaper content on a personal digital assistant (PDA) is compared to the traditional way of reading a newspaper. Second, wireless teleconferencing is compared to business travel. The results show that for both comparisons wireless technologies create lower environmental impacts. Compared to reading a newspaper, receiving the news on a PDA wirelessly results in the release of 32-140 times less CO2, several orders of magnitude less NOx and SOx, and the use of 26-67 times less water. Wireless teleconferencing results in 1-3 orders of magnitude lower CO2, NOx, and SO2 emissions than business travel.

  13. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  14. Wireless local network architecture for Naval medical treatment facilities

    OpenAIRE

    Deason, Russell C.

    2004-01-01

    Approved for public release; distribution is unlimited In today's Navy Medicine, an approach towards wireless networks is coming into view. The idea of developing and deploying workable Wireless Local Area Networks (WLAN) throughout Naval hospitals is but just a few years down the road. Currently Naval Medical Treatment Facilities (MTF) are using wired Local Area Networks (LANs) throughout the infrastructure of each facility. Civilian hospitals and other medical treatment facilities have b...

  15. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  16. Wide-Area Haptic Guidance: Taking the User by the Hand

    OpenAIRE

    Pérez Arias, Antonia; Hanebeck, Uwe D.

    2010-01-01

    In this paper, we present a novel use of haptic information in extended range telepresence, the wide-area haptic guidance. It consists of force and position signals applied to the user's hand in order to improve safety, accuracy, and speed in some telepresent tasks. Wide-area haptic guidance assists the user in reaching a desired position in a remote environment of arbitrary size without degrading the feeling of presence. Several methods for haptic guidance are analyzed. With active haptic gu...

  17. 3D inkjet printed disposable environmental monitoring wireless sensor node

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2017-01-01

    We propose a disposable, miniaturized, moveable, fully integrated 3D inkjet-printed wireless sensor node for large area environmental monitoring applications. As a proof of concept, we show the wireless sensing of temperature, humidity and H2S

  18. Integrated digital printing of flexible circuits for wireless sensing (Conference Presentation)

    Science.gov (United States)

    Mei, Ping; Whiting, Gregory L.; Schwartz, David E.; Ng, Tse Nga; Krusor, Brent S.; Ready, Steve E.; Daniel, George; Veres, Janos; Street, Bob

    2016-09-01

    Wireless sensing has broad applications in a wide variety of fields such as infrastructure monitoring, chemistry, environmental engineering and cold supply chain management. Further development of sensing systems will focus on achieving light weight, flexibility, low power consumption and low cost. Fully printed electronics provide excellent flexibility and customizability, as well as the potential for low cost and large area applications, but lack solutions for high-density, high-performance circuitry. Conventional electronics mounted on flexible printed circuit boards provide high performance but are not digitally fabricated or readily customizable. Incorporation of small silicon dies or packaged chips into a printed platform enables high performance without compromising flexibility or cost. At PARC, we combine high functionality c-Si CMOS and digitally printed components and interconnects to create an integrated platform that can read and process multiple discrete sensors. Our approach facilitates customization to a wide variety of sensors and user interfaces suitable for a broad range of applications including remote monitoring of health, structures and environment. This talk will describe several examples of printed wireless sensing systems. The technologies required for these sensor systems are a mix of novel sensors, printing processes, conventional microchips, flexible substrates and energy harvesting power solutions.

  19. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  20. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  1. Towards low-cost gigabit wireless systems at 60 GHz

    NARCIS (Netherlands)

    Yang, Haibing

    2008-01-01

    The world-wide availability of the huge amount of license-free spectral space in the 60 GHz band provides wide room for gigabit-per-second (Gb/s) wireless applications. A commercial (read: low-cost) 60-GHz transceiver will, however, provide limited system performance due to the stringent link budget

  2. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  3. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  4. An Architecture for a Wide Area Distributed System

    NARCIS (Netherlands)

    Homburg, P.; Steen, M.R. van; Tanenbaum, A.S.

    1996-01-01

    Distributed systems provide sharing of resources and information over a computer network. A key design issue that makes these systems attractive is that all aspects related to distribution are transparent to users. Unfortunately, general-purpose wide area distributed systems that allow users to

  5. Advances in analog and RF IC design for wireless communication systems

    CERN Document Server

    Manganaro, Gabriele

    2013-01-01

    Advances in Analog and RF IC Design for Wireless Communication Systems gives technical introductions to the latest and most significant topics in the area of circuit design of analog/RF ICs for wireless communication systems, emphasizing wireless infrastructure rather than handsets. The book ranges from very high performance circuits for complex wireless infrastructure systems to selected highly integrated systems for handsets and mobile devices. Coverage includes power amplifiers, low-noise amplifiers, modulators, analog-to-digital converters (ADCs) and digital-to-analog converters

  6. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2016-05-01

    Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.

  7. A Statewide Private Microwave Wide Area Network for Real-time Natural Hazard Monitoring

    Science.gov (United States)

    Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.

    2013-12-01

    The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and

  8. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  9. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  10. Directional MAC approach for wireless body area networks.

    Science.gov (United States)

    Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  11. Directional MAC Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Md. Asdaque Hussain

    2011-01-01

    Full Text Available Wireless Body Area Networks (WBANs designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA at BAN Coordinator (BAN_C node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  12. Competition in the domain of wireless networks security

    Science.gov (United States)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  13. Development of wireless sensor network for landslide monitoring system

    International Nuclear Information System (INIS)

    Suryadi; Puranto, Prabowo; Adinanta, Hendra; Tohari, Adrin; Priambodo, Purnomo S

    2017-01-01

    A wireless sensor network has been developed to monitor soil movement of some observed areas periodically. The system consists of four nodes and one gateway which installed on a scope area of 0.2 Km 2 . Each of nodehastwo types of sensor,an inclinometer and an extensometer. An inclinometer sensor is used to measure the tilt of a structure while anextensometer sensor is used to measure the displacement of soil movement. Each of nodeisalso supported by awireless communication device, a solar power supply unit, and a microcontroller unit called sensor module. In this system, there is also gateway module as a main communication system consistinga wireless communication device, power supply unit, and rain gauge to measure the rainfall intensity of the observed area. Each sensor of inclinometer and extensometer isconnected to the sensor module in wiring system but sensor module iscommunicating with gateway in a wireless system. Those four nodes are alsoconnectedeach other in a wireless system collecting the data from inclinometer and extensometer sensors. Module Gateway istransmitting the instruction code to each sensor module one by one and collecting the data from them. Gateway module is an important part to communicate with not only sensor modules but also to the server. This wireless system wasdesigned toreducethe electric consumption powered by 80 WP solar panel and 55Ah battery. This system has been implemented in Pangalengan, Bandung, which has high intensity of rainfall and it can be seen on the website. (paper)

  14. Wide area stability analysis and control of interconnected power systems with HVDC and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Li, Yong

    2012-11-01

    In order to damp low-frequency oscillations and improve the overall stability of large-scale interconnected power systems, this book investigates the wide-area stability analysis and control methods from different perspectives. The flexible and fast control capability of high-voltage (FACTS) is investigated in detail to implement a wide-area measurement based damping control. A sequential and global mixed optimization method is proposed to simultaneously optimize local and wide area damping controllers. A wide-area robust coordination method is presented to coordinate multiple wide-area damping controllers (WADC). A delay-dependent robust design method is also proposed to handle time-varying delays commonly existing in wide-area signal communication. A closed-loop hardware experiment is used to validate the damping performance. The research activities of this book include power system stability analysis and control, wide-area damping control as well as HVDC and FACTS technologies.

  15. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  16. Low-profile wireless passive resonators for sensing

    Energy Technology Data Exchange (ETDEWEB)

    Gong, Xun; An, Linan

    2017-04-04

    A resonator for sensing a physical or an environmental parameter includes a support having a top surface that provides a ground plane, and a polymer-derived ceramic (PDC) element positioned on the top surface including a PDC layer, and a metal patch on the PDC layer. The metal patch is electrically isolated from all surrounding structure, and the resonator has a resonant frequency that changes as a function of the physical or environmental parameter. A system for wirelessly sensing a physical or environmental parameter includes at least one resonator and a wireless RF reader located remotely from the resonator for transmitting a wide-band RF interrogation signal that excites the resonator. The wireless RF reader detects a sensing signal retransmitted by the resonator and includes a processor for determining the physical or environmental parameter at the location of the resonator from the sensing signal.

  17. Time Synchronized Wireless Sensor Network for Vibration Measurement

    Science.gov (United States)

    Uchimura, Yutaka; Nasu, Tadashi; Takahashi, Motoichi

    Network based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard based TSF counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on the synchronization accuracy and the effect is evaluated by stochastic analysis and simulation studies. A new wireless sensing system is developed and the hardware and software specifications are shown. The experiments are conducted in a reinforced concrete building and results show good performance enough for vibration measurement purpose.

  18. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into  the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances

  19. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chen, Chao

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  20. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  1. Experiment of Wireless Sensor Network to Monitor Field Data

    Directory of Open Access Journals (Sweden)

    Kwang Sik Kim

    2009-08-01

    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  2. The development of area wide traffic management scenarios

    NARCIS (Netherlands)

    Van Zuylen, H.J.; Lu, S.; Li, J.; Yusen, C.

    2014-01-01

    Traffic management in cities with congestion is a big challenge with still unused opportunities. Intersection control is a corner stone but this should be done in an area-wide context. The dominant traffic process on urban roads is the traffic flow on the intersections. Spill back is a most

  3. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen

    2016-11-01

    Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.

  4. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  5. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  6. A Survey on M2M Systems for mHealth: A Wireless Communications Perspective

    Directory of Open Access Journals (Sweden)

    Elli Kartsakli

    2014-09-01

    Full Text Available In the new era of connectivity, marked by the explosive number of wireless electronic devices and the need for smart and pervasive applications, Machine-to-Machine (M2M communications are an emerging technology that enables the seamless device interconnection without the need of human interaction. The use of M2M technology can bring to life a wide range of mHealth applications, with considerable benefits for both patients and healthcare providers. Many technological challenges have to be met, however, to ensure the widespread adoption of mHealth solutions in the future. In this context, we aim to provide a comprehensive survey on M2M systems for mHealth applications from a wireless communication perspective. An end-to-end holistic approach is adopted, focusing on different communication aspects of the M2M architecture. Hence, we first provide a systematic review ofWireless Body Area Networks (WBANs, which constitute the enabling technology at the patient’s side, and then discuss end-to-end solutions that involve the design and implementation of practical mHealth applications. We close the survey by identifying challenges and open research issues, thus paving the way for future research opportunities.

  7. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  8. Convergence of Photonics and Electronics for Terahertz Wireless Communications

    DEFF Research Database (Denmark)

    Salazar, Adrian Ruiz; Rommel, Simon; Anufriyev, E.

    2016-01-01

    Terahertz wireless communications are expected to offer the required high capacity and low latency performance necessary for short-range wireless access and control applications. We present an overview of some the activities in this area in the newly started H2020 ITN project CELTA: Convergence o...... of Electronics and Photonics Technologies Enabling Terahertz Applications....

  9. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  10. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  11. E- and W-band high-capacity hybrid fiber-wireless link

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Tafur Monroy, Idelfonso

    2014-01-01

    In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along with transm...... in mobile backhaul/fronthaul applications, dense distributed antenna systems and fiber-over-radio scenarios.......In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along...... with transmission over different type of optical fibers and for a number of values for the wireless link distance. Hybrid wireless-optical links can be composed of mature and resilient technology available off-the-shelf, and provide functionalities that can add value to optical access networks, specifically...

  12. WirelessHART vs. ISA100.11a: The Format War Hits the Factory Floor

    OpenAIRE

    Petersen, Stig; Carlsen, Simon

    2011-01-01

    The first decade of the new millennium has been a stage for the rapid development of wireless communication technologies for low-cost, low-power wireless solutions capable of robust and reliable communication [1]. IEEE Standard 802.15.4 for low-rate wireless personal area networks (WPANs) [2] has been the enabling technology for numerous applications within the field of wireless sensor networks (WSNs) [3], and more recently, wireless instrumentation. Although WSNs quickly found their way into...

  13. Application of wireless LAN technology to remote monitoring for inspection equipment

    International Nuclear Information System (INIS)

    Ishiyama, Koichi; Kimura, Takashi; Miura, Yasushi; Yamaguchi, Katsuhiro; Kabuki, Toshihide

    2011-01-01

    To support inspections under an Integrated Safeguards regime into Tokai Reprocessing Plant (TRP), the IAEA suggested making use of Remote Monitoring (RM) capabilities to the inspection equipment (surveillance camera and NDA systems) installed in the spent fuel storage area at TRP. Since TRP had no pre-prepared cabling infrastructure for data transmission in the spent fuel storage area, the option of wireless LAN was chosen over the telephone line due to its lower installation costs. Feasibility studies and tests were performed by TRP on communication and particularly on long-term continuous communication using wireless LAN equipment composed of APs (AP: Access Point) and the external antennas for introducing wireless LAN technology to RM. As a result it was recognized that wireless LAN has enough ability to communicate for long periods of time and consequently the IAEA installed the AP and the external antenna to each inspection equipment and the wireless LAN technology was applied for RM. In this paper, the summary of each test and the results are reported. (author)

  14. A wireless sensor tag platform for container security and integrity

    Science.gov (United States)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  15. Underwater fiber-wireless communication with a passive front end

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Lyu, Weichao; Kong, Meiwei; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-11-01

    We propose and experimentally demonstrate a novel concept on underwater fiber-wireless (Fi-Wi) communication system with a fully passive wireless front end. A low-cost step-index (SI) plastic optical fiber (POF) together with a passive collimating lens at the front end composes the underwater Fi-Wi architecture. We have achieved a 1.71-Gb/s transmission at a mean BER of 4.97 × 10-3 (1.30 × 10-3 when using power loading) over a 50-m SI-POF and 2-m underwater wireless channel using orthogonal frequency division multiplexing (OFDM). Although the wireless part is very short, it actually plays a crucial role in practical underwater implementation, especially in deep sea. Compared with the wired solution (e.g. using a 52-m POF cable without the UWOC part), the proposed underwater Fi-Wi scheme can save optical wet-mate connectors that are sophisticated, very expensive and difficult to install in deep ocean. By combining high-capacity robust POF with the mobility and ubiquity of underwater wireless optical communication (UWOC), the proposed underwater Fi-Wi technology will find wide application in ocean exploration.

  16. Terahertz communication: The opportunities of wireless technology beyond 5G

    KAUST Repository

    Elayan, Hadeel; Amin, Osama; Shubair, Raed M.; Alouini, Mohamed-Slim

    2018-01-01

    Over the past years, carrier frequencies used for wireless communications have been increasing to meet bandwidth requirements. The engineering community witnessed the development of wide radio bands such as the millimeter-wave (mmW) frequencies to fulfill the explosive growth of mobile data demand and pave the way towards 5G networks. Other research interests have been steered towards optical wireless communication to allow higher data rates, improve physical security and avoid electromagnetic interference. Nevertheless, a paradigm change in the electromagnetic wireless world has been witnessed with the exploitation of the Terahertz (THz) frequency band (0.1–10 THz). With the dawn of THz technology, which fills the gap between radio and optical frequency ranges, ultimate promise is expected for the next generation of wireless networks. In this paper, the light is shed on a number of opportunities associated with the deployment of the THz wireless links. These opportunities offer a plethora of applications to meet the future communication requirements and satisfy the ever increasing user demand of higher data rates.

  17. Terahertz communication: The opportunities of wireless technology beyond 5G

    KAUST Repository

    Elayan, Hadeel

    2018-05-17

    Over the past years, carrier frequencies used for wireless communications have been increasing to meet bandwidth requirements. The engineering community witnessed the development of wide radio bands such as the millimeter-wave (mmW) frequencies to fulfill the explosive growth of mobile data demand and pave the way towards 5G networks. Other research interests have been steered towards optical wireless communication to allow higher data rates, improve physical security and avoid electromagnetic interference. Nevertheless, a paradigm change in the electromagnetic wireless world has been witnessed with the exploitation of the Terahertz (THz) frequency band (0.1–10 THz). With the dawn of THz technology, which fills the gap between radio and optical frequency ranges, ultimate promise is expected for the next generation of wireless networks. In this paper, the light is shed on a number of opportunities associated with the deployment of the THz wireless links. These opportunities offer a plethora of applications to meet the future communication requirements and satisfy the ever increasing user demand of higher data rates.

  18. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  19. The Emerging Wireless Body Area Network on Android Smartphones: A Review

    Science.gov (United States)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.

    2018-01-01

    Our society now has driven us into an era where almost everything can be digitally monitored and controlled including the human body. The growth of wireless body area network (WBAN), as a specific scope of sensor networks which mounted or attached to human body also developing rapidly. It allows people to monitor their health and several daily activities. This study is intended to review the trend of WBAN especially on Android, one of the most popular smartphone platforms. A systematic literature review is concerned to the following parameters: the purpose of the device and/or application, the type of sensors, the type of Android device, and its connectivity. Most of the studies were more concern to healthcare or medical monitoring systems: blood pressure, electro cardiograph, tremor detection, etc. On the other hand, the rest of them aimed for activity tracker, environment sensing, and epidemic control. After all, those studies shown that not only Android can be a powerful platform to process data from various sensors but also smartphones can be a good alternative to develop WBANs for medical and other daily applications.

  20. Development of a Testbed for Wireless Underground Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mehmet C. Vuran

    2010-01-01

    Full Text Available Wireless Underground Sensor Networks (WUSNs constitute one of the promising application areas of the recently developed wireless sensor networking techniques. WUSN is a specialized kind of Wireless Sensor Network (WSN that mainly focuses on the use of sensors that communicate through soil. Recent models for the wireless underground communication channel are proposed but few field experiments were realized to verify the accuracy of the models. The realization of field WUSN experiments proved to be extremely complex and time-consuming in comparison with the traditional wireless environment. To the best of our knowledge, this is the first work that proposes guidelines for the development of an outdoor WUSN testbed with the goals of improving the accuracy and reducing of time for WUSN experiments. Although the work mainly aims WUSNs, many of the presented practices can also be applied to generic WSN testbeds.

  1. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    Directory of Open Access Journals (Sweden)

    Xiaojun Liu

    2014-04-01

    Full Text Available As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area protection algorithm based on positive sequence fault components directional comparison principle is proposed. The special associated intelligent electronic devices (IEDs zones which contain buses and transmission lines are created according to the installation location of the IEDs. When a fault occurs, with the help of the fault information collecting and sharing from associated zones with the fault discrimination principle defined in this paper, the IEDs can identify the fault location and remove the fault according to the predetermined action strategy. The algorithm will not be impacted by the load changes and transition resistance and also has good adaptability in open phase running power system. It can be used as a main protection, and it also can be taken into account for the back-up protection function. The results of cases study show that, the division method of the wide-area protection system and the proposed algorithm are effective.

  2. Toward Wireless Health Monitoring via an Analog Signal Compression-Based Biosensing Platform.

    Science.gov (United States)

    Zhao, Xueyuan; Sadhu, Vidyasagar; Le, Tuan; Pompili, Dario; Javanmard, Mehdi

    2018-06-01

    Wireless all-analog biosensor design for the concurrent microfluidic and physiological signal monitoring is presented in this paper. The key component is an all-analog circuit capable of compressing two analog sources into one analog signal by the analog joint source-channel coding (AJSCC). Two circuit designs are discussed, including the stacked-voltage-controlled voltage source (VCVS) design with the fixed number of levels, and an improved design, which supports a flexible number of AJSCC levels. Experimental results are presented on the wireless biosensor prototype, composed of printed circuit board realizations of the stacked-VCVS design. Furthermore, circuit simulation and wireless link simulation results are presented on the improved design. Results indicate that the proposed wireless biosensor is well suited for sensing two biological signals simultaneously with high accuracy, and can be applied to a wide variety of low-power and low-cost wireless continuous health monitoring applications.

  3. Concept definition of traffic flow wide-area surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.

    1994-07-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret large spatial projections of data originating from multiple sensor suites. The intent of the Wide-Area Surveillance (WAS) Project is to build upon this concept and define the operational specifications and characteristics of a Traffic Flow Wide-Area Surveillance (TFWAS) system in terms of traffic management and control. In doing so, the functional capabilities of a TFWAS will be mapped onto an operational profile that is consistent with the Federal Highway Administration`s Intelligent Vehicle Highway System. This document provides the underlying foundation of this work by offering a concept definition for the TFWAS system. It concentrates on answering the question: ``What is the system?`` In doing so, the report develops a hierarchy of specialized definitions.

  4. Securing Wireless Local Area Networks with GoC PKI

    Science.gov (United States)

    2007-10-01

    profit de la technologie d’infrastructure à clé publique (ICP) du Gouvernement du Canada (GC) pour une authentification forte des utilisateurs...environnements protégés du GC lorsqu’il fonctionne en mode entreprise et qu’il est combiné à des certificats délivrés par l’ICP du GC et à une...on the WPA2 secured wireless link. The VPN gateway carries out VPN authentication with the same user certificates used to perform WLAN authentication

  5. Energy and bandwidth-efficient wireless transmission

    CERN Document Server

    Gao, Wei

    2017-01-01

    This book introduces key modulation and predistortion techniques for approaching energy and spectrum-efficient transmission for wireless communication systems. The book presents a combination of theoretical principles, practical implementations, and actual tests. It focuses on spectrum-efficient modulation and energy-efficient transmission techniques in the portable wireless communication systems, and introduces currently developed and designed RF transceivers in the latest wireless markets. Most materials, design examples, and design strategies used are based on the author’s two decades of work in the digital communication fields, especially in the areas of the digital modulations, demodulations, digital signal processing, and linearization of power amplifiers. The applications of these practical products and equipment cover the satellite communications on earth station systems, microwave communication systems, 2G GSM and 3G WCDMA mobile communication systems, and 802.11 WLAN systems.

  6. Stochastic Modelling of Wireless Energy Transfer

    Science.gov (United States)

    Veilleux, Shaun; Almaghasilah, Ahmed; Abedi, Ali; Wilkerson, DeLisa

    2017-01-01

    This study investigates the efficiency of a new method of powering remote sensors by the means of wireless energy transfer. The increased use of sensors for data collection comes with the inherent cost of supplying power from sources such as power cables or batteries. Wireless energy transfer technology eliminates the need for power cables or periodic battery replacement. The time and cost of setting up or expanding a sensor network will be reduced while allowing sensors to be placed in areas where running power cables or battery replacement is not feasible. This paper models wireless channels for power and data separately. Smart scheduling for the data channel is proposed to avoid transmitting data on a noisy channel where the probability of data loss is high to improve power efficiency. Analytical models have been developed and verified using simulations.

  7. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Bakar, Kamalrulnizam Abu; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks. PMID:22368490

  8. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  9. Photonic sensor opportunities for distributed and wireless systems in security applications

    Science.gov (United States)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  10. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    2003-01-01

    After briefly describing the educational advantages of wireless networks using mobile computers, discusses the technical, operational, financial aspects of wireless local area networks (WLAN). Provides examples of school facilities designed for the use of WLAN. Includes a glossary of WLAN-related terms. (Contains 12 references.)

  11. Area-wide traffic calming for preventing traffic related injuries.

    Science.gov (United States)

    Bunn, F; Collier, T; Frost, C; Ker, K; Roberts, I; Wentz, R

    2003-01-01

    It is estimated that by 2020 road traffic crashes will have moved from ninth to third in the world disease burden ranking, as measured in disability adjusted life years, and second in developing countries. The identification of effective strategies for the prevention of traffic related injuries is of global health importance. Area-wide traffic calming schemes that discourage through traffic on residential roads is one such strategy. To evaluate the effectiveness of area-wide traffic calming in preventing traffic related crashes, injuries, and deaths. We searched the following electronic databases: Cochrane Injuries Group's Specialised Register, Cochrane Controlled Trials Register, MEDLINE, EMBASE and TRANSPORT (NTIS, TRIS, TRANSDOC). We searched the web sites of road safety organisations, handsearched conference proceedings, checked reference lists of relevant papers and contacted experts in the area. The search was not restricted by language or publication status. Randomised controlled trials, and controlled before-after studies of area-wide traffic calming schemes. Two reviewers independently extracted data on type of study, characteristics of intervention and control areas, and length of data collection periods. Before and after data were collected on the total number of road traffic crashes, all road user deaths and injuries, pedestrian-motor vehicle collisions and road user deaths. The statistical package STATA was used to calculate rate ratios for each study, which were then pooled to give an overall estimate using a random effects model. We found no randomised controlled trials, but 16 controlled before-after trials met our inclusion criteria. Seven studies were done in Germany, six in the UK, two in Australia and one in the Netherlands. There were no studies in low or middle income countries. Eight trials reported the number of road traffic crashes resulting in deaths. The pooled rate ratio was 0.63 (0.14, 2.59 95% CI). Sixteen studies reported the number

  12. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  13. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  14. Development of Autonomous Magnetometer Rotorcraft For Wide Area Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mark D. McKay; Matthew O. Anderson

    2011-08-01

    Large areas across the United States and internationally are potentially contaminated with unexploded ordinance (UXO), with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with (1) near 100% coverage and (2) near 100% detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 to 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys, resulting in costs of approximately $100-$150/acre. In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide highresolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. Thus there is a need for other systems, which can be used for effective data collection. An Unmanned Aerial Vehicle (UAV) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly

  15. The remote transmission test of the GUAM measurement data by the wireless LAN

    International Nuclear Information System (INIS)

    Asano, Takashi; Fujiwara, Shigeo; Takahashi, Saburo; Nemoto, Tadayuki; Sato, Takashi; Kuniyasu, Kazufusa; Hiruta, Kazuhiko

    2008-01-01

    JAEA has developed and demonstrated the Remote Monitoring (RM) technology on the safeguards equipment at the storage area in PFPF to improve the efficiency of the inspection activity. JAEA is considering the expansion of the RM technology to the safeguards equipment in the process area to improve the efficiency of the inspection activity under the integrated safeguards. JAEA considers that the cabling cost and work in the facility will be reduced to apply the wireless LAN to the RM technology. JAEA performed the confirmatory testing of the performance of the Glove box Unattended Assay and Monitoring system (GUAM) and the remote transmission of the GUAM measurement data by the wireless LAN in cooperation with Japan Nuclear Fuel Limited. In this test, JAEA confirmed it's possible to establish the wireless LAN networking in the process area. This paper reports the applicability of the wireless LAN to the RM technology based on the results of the confirmatory testing. (author)

  16. A Butterfly-Shaped Wideband Microstrip Patch Antenna for Wireless Communication

    Directory of Open Access Journals (Sweden)

    Liling Sun

    2015-01-01

    Full Text Available A novel butterfly-shaped patch antenna for wireless communication is introduced in this paper. The antenna is designed for wideband wireless communications and radio-frequency identification (RFID systems. Two symmetrical quasi-circular arms and two symmetrical round holes are incorporated into the patch of a microstrip antenna to expand its bandwidth. The diameter and position of the circular slots are optimized to achieve a wide bandwidth. The validity of the design concept is demonstrated by means of a prototype having a bandwidth of about 40.1%. The return loss of the butterfly-shaped antenna is greater than 10 dB between 4.15 and 6.36 GHz. The antenna can serve simultaneously most of the modern wireless communication standards.

  17. A Reliable Wireless Control System for Tomato Hydroponics.

    Science.gov (United States)

    Ibayashi, Hirofumi; Kaneda, Yukimasa; Imahara, Jungo; Oishi, Naoki; Kuroda, Masahiro; Mineno, Hiroshi

    2016-05-05

    Agricultural systems using advanced information and communication (ICT) technology can produce high-quality crops in a stable environment while decreasing the need for manual labor. The system collects a wide variety of environmental data and provides the precise cultivation control needed to produce high value-added crops; however, there are the problems of packet transmission errors in wireless sensor networks or system failure due to having the equipment in a hot and humid environment. In this paper, we propose a reliable wireless control system for hydroponic tomato cultivation using the 400 MHz wireless band and the IEEE 802.15.6 standard. The 400 MHz band, which is lower than the 2.4 GHz band, has good obstacle diffraction, and zero-data-loss communication is realized using the guaranteed time-slot method supported by the IEEE 802.15.6 standard. In addition, this system has fault tolerance and a self-healing function to recover from faults such as packet transmission failures due to deterioration of the wireless communication quality. In our basic experiments, the 400 MHz band wireless communication was not affected by the plants' growth, and the packet error rate was less than that of the 2.4 GHz band. In summary, we achieved a real-time hydroponic liquid supply control with no data loss by applying a 400 MHz band WSN to hydroponic tomato cultivation.

  18. A Reliable Wireless Control System for Tomato Hydroponics

    Science.gov (United States)

    Ibayashi, Hirofumi; Kaneda, Yukimasa; Imahara, Jungo; Oishi, Naoki; Kuroda, Masahiro; Mineno, Hiroshi

    2016-01-01

    Agricultural systems using advanced information and communication (ICT) technology can produce high-quality crops in a stable environment while decreasing the need for manual labor. The system collects a wide variety of environmental data and provides the precise cultivation control needed to produce high value-added crops; however, there are the problems of packet transmission errors in wireless sensor networks or system failure due to having the equipment in a hot and humid environment. In this paper, we propose a reliable wireless control system for hydroponic tomato cultivation using the 400 MHz wireless band and the IEEE 802.15.6 standard. The 400 MHz band, which is lower than the 2.4 GHz band, has good obstacle diffraction, and zero-data-loss communication is realized using the guaranteed time-slot method supported by the IEEE 802.15.6 standard. In addition, this system has fault tolerance and a self-healing function to recover from faults such as packet transmission failures due to deterioration of the wireless communication quality. In our basic experiments, the 400 MHz band wireless communication was not affected by the plants’ growth, and the packet error rate was less than that of the 2.4 GHz band. In summary, we achieved a real-time hydroponic liquid supply control with no data loss by applying a 400 MHz band WSN to hydroponic tomato cultivation. PMID:27164105

  19. 1st International Conference on Recent Cognizance in Wireless Communication & Image Processing

    CERN Document Server

    Srivastava, Vishnu; Singh, Ghanshyam; Bhatnagar, Deepak

    2016-01-01

    This volume comprises the proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. It brings together content from academicians, researchers, and industry experts in areas of Wireless Communication and Image Processing. The volume provides a snapshot of current progress in computational creativity and a glimpse of future possibilities. The proceedings include two kinds of paper submissions: (i) regular papers addressing foundation issues, describing original research on creative systems development and modeling; and (ii) position papers describing work-in-progress or research directions for computational creativity. This work will be useful to professionals and researchers working in the core areas of wireless communications and image processing.

  20. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  1. MSAT wide-area fleet management: End-user requirements and applications

    Science.gov (United States)

    Pedersen, Allister

    1995-01-01

    MSAT (Mobile SATellite) Services will become a reality in North America in 1995. MSAT will provide wide-area voice, data and fax services to land, marine and aeronautical mobile users anywhere in North America including 200 nautical miles off the coasts and into the Arctic waters. MSAT will also convey GPS position information from mobiles to dispatch centers. One broad application of MSAT is Wide Area Fleet Management (WAFM). This paper defines WAFM, outlines end-user requirements and identifies potential applications of MSAT WAFM. The paper draws from information obtained in several preMSAT WAFM field trials in land, marine and aeronautical mobile environments. The paper concludes with an outline of the potential benefits of MSAT WAFM.

  2. A Panoramic Wireless Endoscope System Design for the Application of Minimally Invasive Surgery

    Directory of Open Access Journals (Sweden)

    Chun-Hsiang Peng

    2014-05-01

    Full Text Available Minimally Invasive Surgery (MIS is the current trend in surgery. Compared to traditional surgery, MIS can substantially decrease recovery time and expenses needed by patients after surgeries, reduce pain during surgical procedures, and is highly regarded by physicians and patients. An endoscope is widely used in the diagnosis and treatments of various medical disciplines, such as hysteroscopy, laparoscopy, and colonoscopy, and have been adopted by many branches of medicine. However, the limited image field of MIS is often the most difficult obstacles faced by surgeons and medical students, especially to less experienced physicians and difficult surgical procedures; the limited field of view of endoscopic imaging does not provide a whole picture of the surgery area, making the procedures difficult and full of uncertainty. In light of this problem, we proposed a "Panoramic Wireless Endoscope System design", hoping to provide physicians with a wide field of view of the endoscopic image. We combine images captured from two parallel-mounted endoscope lenses into a single, wide-angle image, giving physicians a wider field of view and easier access to the surgical area. In addition, we developed a wireless transmission system so the image can be transmitted to various display platforms, eliminating the needs for excessive cabling on surgical tools and enable physicians to better operate on the patient. Finally, our system allows surgical assistants a better view of the operation process, and enables other physicians and nurses to remotely observe the process. Our experiment results have shown that we can increase the image to 152% of its original size. We used the PandaBoard ES platform with an ARM9 processor and 1G of onboard RAM, and continuously implementing animal trials to verify the reliability of our system.

  3. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  4. Overlapping coalition formation games in wireless communication networks

    CERN Document Server

    Wang, Tianyu; Saad, Walid; Han, Zhu

    2017-01-01

    This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...

  5. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  6. Guidelines for wireless technology in nuclear power plants

    International Nuclear Information System (INIS)

    Shankar, Ramesh

    2003-01-01

    As a result of technological breakthroughs, increased demand for the use of wireless technology is common in all industries today, and the electric power industry is no exception. Already, wireless technology has many applications in our industry, including - but not limited to - cellular phone systems, paging systems, two-way radio communication systems, dose management and tracking systems, and operator logs. EPRI has prepared a comprehensive guidelines document to support evaluation of wireless technologies in power plants for integrated (voice/data/video) communication, remote equipment and system monitoring, and to complement an electronic procedures support system (EPSS). The guidelines effort focuses on the development of a rules structure to support the deployment of wireless devices in a plant without compromising continuous, safe, and reliable operation. The guidelines document consists of two volumes. The first volume is introductory in nature and lays out the business case for applying wireless technologies. The intended audience is senior plant management personnel and utility industry executives. This volume contains background information, templates, worksheets, processes, and presentations that will allow internal sponsors to create business cases for piloting wireless projects. The second volume includes guidance on implementation and regulatory issues relevant to plant implementation. It covers the following application areas: implementation of integrated communication capability, equipment monitoring, work quality control, time and knowledge management, and business process automation. It details regulatory issues relevant to the adoption of wireless technology within nuclear power plants and offers guidance on preparing for and executing pilot and implementations of wireless technologies. The paper will cover important aspects on the guidelines. (author)

  7. Finnish perspectives of wireless in healthcare.

    Science.gov (United States)

    Alasaarela, Esko

    2009-01-01

    Wireless solutions are a good choice for healthcare development in Finland. A survey of 135 experts in Finland show that (1) the competences needed for developing wireless solutions exist (2) the Finnish healthcare system is integrated enough and (3) the technology industry in this area is too weak for global marketing. The following recommendations can be concluded: (1) Cooperate internationally (2) Develop integrated solutions and health managing concepts for the important health problems (such as diabetes), (3) Harness the healthcare system to act as a test bed for new solutions and (4) Help companies to grow and take global roles.

  8. Terahertz wireless communication based on InP-related devices (Conference Presentation)

    Science.gov (United States)

    Lee, Eui Su; Kim, Hyun-Soo; Park, Jeong-Woo; Park, Dong Woo; Park, Kyung Hyun

    2017-02-01

    Recently, a wide interest has been gathered in using terahertz (THz) waves as the carrier waves for the next generation of broadband wireless communications. Upon this objective, the photonics technologies are very attractive for their usefulness in signal generations, modulations and detections with enhanced bandwidth and data rates, and the readiness in combining to the existing fiber-optic or wireless networks. In this paper, as a preliminary step toward the THz wireless communications, a THz wireless interconnection system with a broadband antenna-integrated uni-traveling-carrier photodiode (UTC-PD) and a Shottky-barrier diode (SBD) module will be presented. In our system, optical beating signals are generated and digitally modulated by the optical intensity modulator driven by a pulse pattern generator (PPG). As the receiver a SBD and an IF filter followed by a low-noise preamplifier and a limiting amplifier was used. With a 6-mA photocurrent of the UTC-PD which corresponds to the transmitter output power of about 30 μW at 280 GHz, an error-free (BERdefinition serial digital interface format was successfully transmitted over a wireless link.

  9. Applicable approach of the wireless technology for Korean nuclear power plants

    International Nuclear Information System (INIS)

    Ko, Do Young; Lee, Soo Ill

    2013-01-01

    Highlights: • To apply wireless technology for Korean NPPs, several stipulations are proposed. • WLAN is proposed as the most appropriate wireless technology for Korean NPPs. • WLAN can be applied to the specific fields except in the control system. • An attitude survey on wireless showed that 94.7% agree with the necessity of wireless. - Abstract: Recently, many nuclear power plants (NPPs) over the world use various types of wireless systems for the advantages. Unfortunately, wireless technologies are not currently installed in any Korean NPPs because it is difficult to solve the negative impact of unexpected outcomes or failures from the influence of the wireless technologies, which is electromagnetic interference and radio-frequency interference (EMI/RFI). Moreover, a lack of desire on the part of Korean nuclear industry to implement it leads to give up benefit from the wireless technologies. To install the wireless technologies with maximum benefit and minimum risk, a systematic approach, which quantify the negative impact and prevent the influence, is essential; therefore, this paper describes an applicable research result on the wireless technology for Korean NPPs based on regulatory guides and current wireless hardware and software technologies. Also, survey on the needs for the wireless technology for Korean nuclear power plants was conducted, because the level of awareness of workers in NPPs regarding wireless technologies is very important issue. In this paper, we propose an applicable system to enhance the applicability for the wireless technology for Korean NPPs. The result based on proposed applicable system shows that wireless local area network (WLAN) is the representative candidate for Korean NPPs, which can be applied to the specific fields of radiation monitoring, voice and data communication, component monitoring and instrumentation, and wireless cameras

  10. Applicable approach of the wireless technology for Korean nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Do Young, E-mail: kodoyoung@khnp.co.kr; Lee, Soo Ill

    2013-12-15

    Highlights: • To apply wireless technology for Korean NPPs, several stipulations are proposed. • WLAN is proposed as the most appropriate wireless technology for Korean NPPs. • WLAN can be applied to the specific fields except in the control system. • An attitude survey on wireless showed that 94.7% agree with the necessity of wireless. - Abstract: Recently, many nuclear power plants (NPPs) over the world use various types of wireless systems for the advantages. Unfortunately, wireless technologies are not currently installed in any Korean NPPs because it is difficult to solve the negative impact of unexpected outcomes or failures from the influence of the wireless technologies, which is electromagnetic interference and radio-frequency interference (EMI/RFI). Moreover, a lack of desire on the part of Korean nuclear industry to implement it leads to give up benefit from the wireless technologies. To install the wireless technologies with maximum benefit and minimum risk, a systematic approach, which quantify the negative impact and prevent the influence, is essential; therefore, this paper describes an applicable research result on the wireless technology for Korean NPPs based on regulatory guides and current wireless hardware and software technologies. Also, survey on the needs for the wireless technology for Korean nuclear power plants was conducted, because the level of awareness of workers in NPPs regarding wireless technologies is very important issue. In this paper, we propose an applicable system to enhance the applicability for the wireless technology for Korean NPPs. The result based on proposed applicable system shows that wireless local area network (WLAN) is the representative candidate for Korean NPPs, which can be applied to the specific fields of radiation monitoring, voice and data communication, component monitoring and instrumentation, and wireless cameras.

  11. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  12. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  13. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  14. Wireless Sensor Network Optimization: Multi-Objective Paradigm.

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-07-20

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks.

  15. Wireless Sensor Network Optimization: Multi-Objective Paradigm

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-01-01

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks. PMID:26205271

  16. Transport Schemes for Fiber-Wireless Technology: Transmission Performance and Energy Efficiency

    Directory of Open Access Journals (Sweden)

    Christina Lim

    2014-04-01

    Full Text Available Fiber-wireless technology has been actively researched as a potential candidate for next generation broadband wireless signal distribution. Despite the popularity, this hybrid scheme has many technical challenges that impede the uptake and commercial deployment. One of the inherent issues is the transport of the wireless signals over a predominantly digital optical network in today’s telecommunication infrastructure. Many different approaches have been introduced and demonstrated with digitized RF transport of the wireless signals being the most compatible with the existing optical fiber networks. In this paper, we review our work in the area of digitized RF transport to address the inherent issues related to analog transport in the fiber-wireless links and compare the transmission performance and energy efficiency with the other transport strategies.

  17. Web: A Wireless Experiment Box for the Dextre Pointing Package ELC Payload

    Science.gov (United States)

    Bleier, Leor Z.; Marrero-Fontanez, Victor J.; Sparacino, Pietro A.; Moreau, Michael C.; Mitchell, Jason W.

    2012-01-01

    The Wireless Experiment Box (WEB) was proposed to work with the International Space Station (ISS) External Wireless Communication (EWC) system to support high-definition video from the Dextre Pointing Package (DPP). DPP/WEB was a NASA GSFC proposed ExPRESS Logistics Carrier (ELC) payload designed to flight test an integrated suite of Autonomous Rendezvous and Docking (AR&D) technologies to enable a wide spectrum of future missions across NASA and other US Government agencies. The ISS EWC uses COTS Wireless Access Points (WAPs) to provide high-rate bi-directional communications to ISS. In this paper, we discuss WEB s packaging, operation, antenna development, and performance testing.

  18. WEB - A Wireless Experiment Box for the Dextre Pointing Package ELC Payload

    Science.gov (United States)

    Bleier, Leor Z.; Marrero-Fontanez, Victor J.; Sparacino, Pietro A.; Moreau, Michael C.; Mitchell, Jason William

    2012-01-01

    The Wireless Experiment Box (WEB) was proposed to work with the International Space Station (ISS) External Wireless Communication (EWC) system to support high-definition video from the Dextre Pointing Package (DPP). DPP/WEB was a NASA GSFC proposed ExPRESS Logistics Carrier (ELC) payload designed to flight test an integrated suite of Autonomous Rendezvous and Docking (AR&D) technologies to enable a wide spectrum of future missions across NASA and other US Government agencies. The ISS EWC uses COTS Wireless Access Points (WAPs) to provide high-rate bi-directional communications to ISS. In this paper, we discuss WEB s packaging, operation, antenna development, and performance testing.

  19. Field and long-term demonstration of a wide area quantum key distribution network.

    Science.gov (United States)

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  20. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  1. High-Speed Optical Wide-Area Data-Communication Network

    Science.gov (United States)

    Monacos, Steve P.

    1994-01-01

    Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.

  2. Wide-area-distributed storage system for a multimedia database

    Science.gov (United States)

    Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro

    1998-12-01

    We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.

  3. Comparison of Broadband Wireless Access Technology for HAPS Communication

    Directory of Open Access Journals (Sweden)

    Mingxiang GUAN

    2014-03-01

    Full Text Available An information system formed by HAP (High Altitude Platform will be a new generation-system for the wireless communications and HAPS (HAP Station communication system combines the advantages of both terrestrial and satellite communication systems and avoids, to different extents, their disadvantages. Third generation (3G mobile technology which is specified by the third generation partnership project (3 GPP is definitely one of the candidates. With the success of wireless network, the IEEE 802.16 standard, with its wireless metropolitan area network (MAN air interface appears to be a strong competitor. We provide initial practical comparison of these two technologies for HAPS Communication.

  4. Emerging Needs for Pervasive Passive Wireless Sensor Networks on Aerospace Vehicles

    Science.gov (United States)

    Wilson, William C.; Juarez, Peter D.

    2014-01-01

    NASA is investigating passive wireless sensor technology to reduce instrumentation mass and volume in ground testing, air flight, and space exploration applications. Vehicle health monitoring systems (VHMS) are desired on all aerospace programs to ensure the safety of the crew and the vehicles. Pervasive passive wireless sensor networks facilitate VHMS on aerospace vehicles. Future wireless sensor networks on board aerospace vehicles will be heterogeneous and will require active and passive network systems. Since much has been published on active wireless sensor networks, this work will focus on the need for passive wireless sensor networks on aerospace vehicles. Several passive wireless technologies such as microelectromechanical systems MEMS, SAW, backscatter, and chipless RFID techniques, have all shown potential to meet the pervasive sensing needs for aerospace VHMS applications. A SAW VHMS application will be presented. In addition, application areas including ground testing, hypersonic aircraft and spacecraft will be explored along with some of the harsh environments found in aerospace applications.

  5. Design of Weighted Wide Area Damping Controller (WWADC Based PSS for Damping Inter-Area Low Frequency Oscillations

    Directory of Open Access Journals (Sweden)

    Saleh M. Bamasak

    2017-09-01

    Full Text Available Wide Area Measurement System (WAMS can extend and effectively improve the power system stabilizers (PSS capability in damping the inter-area low frequency oscillations in interconnected bulk power systems. This paper proposes the implementation of Weighted Wide Area Damping Controller (WWADC in which weighted factors are introduced for each remote feedback signals. Modal analysis approach is implemented for the purpose of identifying the optimal location as well as the input signals’ optimal combination of WWADC. Based on the linearized model, Differential Evolution (DE algorithm is applied to search for optimal controller parameters and optimal weighted factors. The successful application of the proposed approach is achieved in two power networks; the two-area 4-machine system and the IEEE-39 bus 10-machine system. The analysis of the eigenvalue and non-linear time domain simulations indicate that damping the inter-area oscillations and improving the system stability irrespective of the severity and the location of the disturbances can be effectively achieved by WADC

  6. Location verification algorithm of wearable sensors for wireless body area networks.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2018-01-01

    Knowledge of the location of sensor devices is crucial for many medical applications of wireless body area networks, as wearable sensors are designed to monitor vital signs of a patient while the wearer still has the freedom of movement. However, clinicians or patients can misplace the wearable sensors, thereby causing a mismatch between their physical locations and their correct target positions. An error of more than a few centimeters raises the risk of mistreating patients. The present study aims to develop a scheme to calculate and detect the position of wearable sensors without beacon nodes. A new scheme was proposed to verify the location of wearable sensors mounted on the patient's body by inferring differences in atmospheric air pressure and received signal strength indication measurements from wearable sensors. Extensive two-sample t tests were performed to validate the proposed scheme. The proposed scheme could easily recognize a 30-cm horizontal body range and a 65-cm vertical body range to correctly perform sensor localization and limb identification. All experiments indicate that the scheme is suitable for identifying wearable sensor positions in an indoor environment.

  7. Data security in wireless local area network

    International Nuclear Information System (INIS)

    Kishk, A.M.A

    2010-01-01

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  8. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  9. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  10. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  11. Demonstration of Airborne Wide Area Assessment Technologies at the Toussaint River, Ohio

    National Research Council Canada - National Science Library

    Foley, Jack; Wright, David

    2007-01-01

    ...) technology, a wide area assessment technology, to assist in the characterization of the shore and shallow areas in and around the Toussaint River relative to munitions contamination from historical...

  12. Multiagents-based wide area protection with best-effort adaptive strategy

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Yongli; Wang, Dewen [North China Electric Power University, Baoding (China); Song, Shaoqun [Fuzhou Electric Power Industry Bureau, Fujian Province (China)

    2009-02-15

    Abstract - Multi-trips of circuit breakers often occur within a short period in a severe blackout, and the tripping usually relates to relays' mal-operations. In fact, when two ore more electric primary devices are isolated by circuit breakers, the settings of most relays to protect their power system are getting infeasible and uncoordinated. Adaptive settings are needed to prevent them from wrong operation. This paper presents an adaptive protection scheme based on wide area information with best-effort protection strategy, and the outline of multiagents and WAN Based Adaptive Protection System (MAWAPS). In the scheme, the best-effort adaptive strategy is used to guarantee the adaptive settings to operate safely and effectively in most situations. The IP/SDH-based wide area network (WAN) is used to realize real-time wide area information exchange in the proposed protection scheme. Adaptive setting algorithms for the second stage zero-sequence current and phase overcurrent relays are proposed, which can provide larger line coverage than traditional relays. Moreover, multiagent techniques and IEC 61850 are employed to realize the fast communication between different agents, and MMS plays a prominent role in real-time remote communication. A simulating system has been developed according to the above ideas and approaches, and the experimental results show that the proposed adaptive protection scheme is feasible from the view of protective performance including the executing time. (author)

  13. Positioning system in wireless sensor networks using NS-2

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2012-10-01

    Full Text Available The practical difficulties of setting up a wireless sensor network (WSN) and analysing its performance have made simulation essential for the study of WSNs. The ns-2 network simulator is one of the most widely used tools by researchers...

  14. High Temperature, Wireless Seismometer Sensor for Venus

    Science.gov (United States)

    Ponchak, George E.; Scardelletti, Maximilian C.; Taylor, Brandt; Beard, Steve; Meredith, Roger D.; Beheim, Glenn M.; Hunter Gary W.; Kiefer, Walter S.

    2012-01-01

    Space agency mission plans state the need to measure the seismic activity on Venus. Because of the high temperature on Venus (462? C average surface temperature) and the difficulty in placing and wiring multiple sensors using robots, a high temperature, wireless sensor using a wide bandgap semiconductor is an attractive option. This paper presents the description and proof of concept measurements of a high temperature, wireless seismometer sensor for Venus. A variation in inductance of a coil caused by the movement of an aluminum probe held in the coil and attached to a balanced leaf-spring seismometer causes a variation of 700 Hz in the transmitted signal from the oscillator/sensor system at 426? C. This result indicates that the concept may be used on Venus.

  15. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  16. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  17. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  18. BLUETOOTH WIRELESS TECHNOLOGY: A MILESTONE IN ICT

    African Journals Online (AJOL)

    DJFLEX

    This article summarizes the Bluetooth technology – a type of Wireless Personal Area Network (WPAN) with emphasis ... facilitating data transmission over short distances from fixed and ... primarily designed for low power consumption, with a.

  19. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    Directory of Open Access Journals (Sweden)

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  20. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  1. Anticipating WPS PIN Vulnerability to Secure Wireless Network

    Directory of Open Access Journals (Sweden)

    Indra Dwi Rianto

    2013-12-01

    Full Text Available WiFi Protected Setup (WPS is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute forceattack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.

  2. Design of Wireless Point of Sale Based on ZigBee Technology

    Directory of Open Access Journals (Sweden)

    Xiaoning Jiang

    2014-02-01

    Full Text Available With the rapid development of Point of Sale technology and modern communication technology, financial Point of Sale terminal system has been started from wired to wireless. Wireless payment technology can used where can’t rely on or even no cable network. As one of the most important technologies in the information era, Wireless Sensor Network has been widely used in banking business and other various modem business fields. This paper describes a kind of simple portable Point of Sale terminal based on the ZigBee wireless network 1, which is a low power, low cost, flexible, safe and reliable network. This Point of Sale system can be applied gas stations, liquefied petroleum gas stations and other complex sales environment, and it improves safety of gas station and personnel safety. Simple and user-friendly, this formula design and optimization method greatly improves efficiency and thus has much value for practical application.

  3. Ninth International Conference on Wireless Communication and Sensor Networks

    CERN Document Server

    Tiwari, Murlidhar; Arora, Anish

    2014-01-01

    Wireless communication and sensor networks would form the backbone to create pervasive and ubiquitous environments that would have profound influence on the society and thus are important to the society. The wireless communication technologies and wireless sensor networks would encompass a wide range of domains such as HW devices such as motes, sensors and associated instrumentation, actuators, transmitters, receivers, antennas, etc., sensor network aspects such as topologies, routing algorithms, integration of heterogeneous network elements and topologies, designing RF devices and systems for energy efficiency and reliability etc. These sensor networks would provide opportunity to continuously and in a distributed manner monitor the environment and generate the necessary warnings and actions. However most of the developments have been demonstrated only in controlled and laboratory environments. So we are yet to see those powerful, ubiquitous applications for the benefit of the society. The conference and con...

  4. Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.

    Science.gov (United States)

    Zheng, Guanglou; Fang, Gengfa; Shankaran, Rajan; Orgun, Mehmet A; Zhou, Jie; Qiao, Li; Saleem, Kashif

    2017-05-01

    Generating random binary sequences (BSes) is a fundamental requirement in cryptography. A BS is a sequence of N bits, and each bit has a value of 0 or 1. For securing sensors within wireless body area networks (WBANs), electrocardiogram (ECG)-based BS generation methods have been widely investigated in which interpulse intervals (IPIs) from each heartbeat cycle are processed to produce BSes. Using these IPI-based methods to generate a 128-bit BS in real time normally takes around half a minute. In order to improve the time efficiency of such methods, this paper presents an ECG multiple fiducial-points based binary sequence generation (MFBSG) algorithm. The technique of discrete wavelet transforms is employed to detect arrival time of these fiducial points, such as P, Q, R, S, and T peaks. Time intervals between them, including RR, RQ, RS, RP, and RT intervals, are then calculated based on this arrival time, and are used as ECG features to generate random BSes with low latency. According to our analysis on real ECG data, these ECG feature values exhibit the property of randomness and, thus, can be utilized to generate random BSes. Compared with the schemes that solely rely on IPIs to generate BSes, this MFBSG algorithm uses five feature values from one heart beat cycle, and can be up to five times faster than the solely IPI-based methods. So, it achieves a design goal of low latency. According to our analysis, the complexity of the algorithm is comparable to that of fast Fourier transforms. These randomly generated ECG BSes can be used as security keys for encryption or authentication in a WBAN system.

  5. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    OpenAIRE

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  6. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Roy Sohini

    2015-09-01

    Full Text Available Wireless Sensor Network (WSN has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at the cost of energy. Hierarchical routing is more useful in this regard. The proposed algorithm Energy Aware Cluster Based Routing Scheme (EACBRS aims at conserving energy with the help of hierarchical routing by calculating the optimum number of cluster heads for the network, selecting energy-efficient route to the sink and by offering congestion control. Simulation results prove that EACBRS performs better than existing hierarchical routing algorithms like Distributed Energy-Efficient Clustering (DEEC algorithm for heterogeneous wireless sensor networks and Energy Efficient Heterogeneous Clustered scheme for Wireless Sensor Network (EEHC.

  7. Energy-efficient Organization of Wireless Sensor Networks with Adaptive Forecasting

    Directory of Open Access Journals (Sweden)

    Dao-Wei Bi

    2008-04-01

    Full Text Available Due to the wide potential applications of wireless sensor networks, this topic has attracted great attention. The strict energy constraints of sensor nodes result in great challenges for energy efficiency. This paper proposes an energy-efficient organization method. The organization of wireless sensor networks is formulated for target tracking. Target localization is achieved by collaborative sensing with multi-sensor fusion. The historical localization results are utilized for adaptive target trajectory forecasting. Combining autoregressive moving average (ARMA model and radial basis function networks (RBFNs, robust target position forecasting is performed. Moreover, an energyefficient organization method is presented to enhance the energy efficiency of wireless sensor networks. The sensor nodes implement sensing tasks are awakened in a distributed manner. When the sensor nodes transfer their observations to achieve data fusion, the routing scheme is obtained by ant colony optimization. Thus, both the operation and communication energy consumption can be minimized. Experimental results verify that the combination of ARMA model and RBFN can estimate the target position efficiently and energy saving is achieved by the proposed organization method in wireless sensor networks.

  8. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  9. Area-wide integrated pest management and the sterile insect technique

    International Nuclear Information System (INIS)

    Klassen, W.

    2005-01-01

    Area-wide integrated pest management (AW-IPM) focuses on the preventive management of pest populations throughout the ecosystem. It seeks to treat all habitats of the pest population so that none produces migrants to re-establish significant infestations in areas of concern. In contrast, the conventional strategy focuses narrowly on defending the valued entity (crop, livestock, people, buildings, etc.) from direct attack by pests. AW-IPM requires multiyear planning, and an organization dedicated exclusively to its implementation, whereas conventional pest management involves minimal forward planning, tends to be reactive, and is implemented independently by individual producers, businesses, or households. AW-IPM tends to utilize advanced technologies, whereas the conventional strategy tends to rely on traditional tactics and tools. The sterile insect technique (SIT) is a species-specific form of birth control imposed on the pest population. It is a powerful tool for 'mopping up' sparse pest populations, and is most efficient when applied as a tactic in a system deployed on an area-wide basis. On environmental, economic and biological grounds, the case for the SIT is compelling. (author)

  10. Research on quality metrics of wireless adaptive video streaming

    Science.gov (United States)

    Li, Xuefei

    2018-04-01

    With the development of wireless networks and intelligent terminals, video traffic has increased dramatically. Adaptive video streaming has become one of the most promising video transmission technologies. For this type of service, a good QoS (Quality of Service) of wireless network does not always guarantee that all customers have good experience. Thus, new quality metrics have been widely studies recently. Taking this into account, the objective of this paper is to investigate the quality metrics of wireless adaptive video streaming. In this paper, a wireless video streaming simulation platform with DASH mechanism and multi-rate video generator is established. Based on this platform, PSNR model, SSIM model and Quality Level model are implemented. Quality Level Model considers the QoE (Quality of Experience) factors such as image quality, stalling and switching frequency while PSNR Model and SSIM Model mainly consider the quality of the video. To evaluate the performance of these QoE models, three performance metrics (SROCC, PLCC and RMSE) which are used to make a comparison of subjective and predicted MOS (Mean Opinion Score) are calculated. From these performance metrics, the monotonicity, linearity and accuracy of these quality metrics can be observed.

  11. A Trace-Driven Analysis of Wireless Group Communication Mechanisms

    Directory of Open Access Journals (Sweden)

    Surendar Chandra

    2012-08-01

    Full Text Available Wireless access is increasingly ubiquitous while mobile devices that use them are resource rich. These trends allow wireless users to collaborate with each other. We investigate various group communication paradigms that underly collaboration applications. We synthesize durations when members collaborate using wireless device availability traces. Wireless users operate from a variety of locations. Hence, we analyzed the behavior of wireless users in universities, corporations, conference venues, and city-wide hotspots. We show that the availability durations are longer in corporations followed by university and then in hotspots. The number of simultaneously available wireless users is small in all the scenarios. The session lengths are becoming smaller while the durations between sessions are becoming larger. We observed user churn in all the scenarios. We show that synchronous mechanisms require less effort to maintain update synchronicity among the group members. However, distributed mechanisms require a large number of replicas in order to propagate updates among the users. For asynchronous mechanisms, we show that pull-based mechanisms naturally randomize the times when updates are propagated and thus achieve better performance than push based mechanisms.We develop an adaptive approach that customizes the update frequency using the last session duration and show that this mechanism exhibits good performance when the required update frequency intervals are large. We also show that for a given number of gossips, it is preferable to propagate updates to all available nodes rather than increasing the frequency while correspondingly reducing the number of nodes to propagate updates.We develop a middleware to illustrate the practicality of our approach.

  12. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  13. Economics of area-wide sit control programs

    International Nuclear Information System (INIS)

    Enkerlin, Walther

    2003-01-01

    The economic feasibility of using the sterile insect technique (SIT) to control certain key insect pests has been demonstrated clearly. The successful implementation of a number of area-wide and large-scale SIT programs has produced substantial economic benefits for the beneficiaries of the technology. The economic advantages of this technology will become more evident as indirect benefits of SIT application are incorporated into total program benefit estimates. Awareness of the technical and economic advantages of the SIT, and market forces favoring the use of environmentally clean pest control methods, will encourage private investment in this technology. (author)

  14. A 0.9-V 12-bit 40-MSPS Pipeline ADC for Wireless Receivers

    Science.gov (United States)

    Ito, Tomohiko; Itakura, Tetsuro

    A 0.9-V 12-bit 40-MSPS pipeline ADC with I/Q amplifier sharing technique is presented for wireless receivers. To achieve high linearity even at 0.9-V supply, the clock signals to sampling switches are boosted over 0.9V in conversion stages. The clock-boosting circuit for lifting these clocks is shared between I-ch ADC and Q-ch ADC, reducing the area penalty. Low supply voltage narrows the available output range of the operational amplifier. A pseudo-differential (PD) amplifier with two-gain-stage common-mode feedback (CMFB) is proposed in views of its wide output range and power efficiency. This ADC is fabricated in 90-nm CMOS technology. At 40MS/s, the measured SNDR is 59.3dB and the corresponding effective number of bits (ENOB) is 9.6. Until Nyquist frequency, the ENOB is kept over 9.3. The ADC dissipates 17.3mW/ch, whose performances are suitable for ADCs for mobile wireless systems such as WLAN/WiMAX.

  15. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  16. 11th International Conference On Broad-Band Wireless Computing, Communication and Applications

    CERN Document Server

    Xhafa, Fatos; Yim, Kangbin

    2017-01-01

    The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea. .

  17. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying...... forgetting factor is applied to identify online the reduced-order linearlized model which contains dominant inter-area low frequency oscillations. Based on this linearlized model, the generalized predictive control scheme considering control output constraints is employed to obtain the optimal control signal...... conditions and different disturbances, but also has better robustness against to the time delay existing in the remote signals. The comparison studies with the conventional lead-lag WADC are also provided....

  18. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  19. Area-wide integrated pest management of fruit flies in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Allwood, Allan; Vueti, Ema Tora

    2003-01-01

    Fruit flies (Diptera: Tephritidae) are recognised as one of the most important pests of fruits and vegetables. The importance of an Integrated Pest Management approach to fruit fly suppression or eradication has been emphasized over the past 30 years. Integrated Pest Management has, in some instance, a narrow focus on the crop or the orchard or farm, but not adopting an area-wide approach, where much of the activity may be outside the crop or production unit. All of the techniques used to manage fruit flies at the on-farm level may be used on an area-wide basis, preferably in combination to maximise the impact of each technique. There are some techniques, which are better suited to the area-wide approach, but can be used on-farm as well. Techniques include physical control (e.g., bagging), cultural control (e.g., production when fly numbers are low, resistant varieties, crop hygiene, early harvesting, growing refuge crops), biological control, behavioral control (e.g., protein bait spray application technique and male annihilation technique), sterile insect technique, and chemical control. In adopting an area-wide approach, very effective collaboration between many stakeholders is essential. (author)

  20. Wide area continuous offender monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hoshen, J. [Lucent Technologies (United States); Drake, G. [New Mexico Dept. of Corrections, Santa Fe, NM (United States); Spencer, D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-11-01

    The corrections system in the U.S. is supervising over five million offenders. This number is rising fast and so are the direct and indirect costs to society. To improve supervision and reduce the cost of parole and probation, first generation home arrest systems were introduced in 1987. While these systems proved to be helpful to the corrections system, their scope is rather limited because they only cover an offender at a single location and provide only a partial time coverage. To correct the limitations of first-generation systems, second-generation wide area continuous electronic offender monitoring systems, designed to monitor the offender at all times and locations, are now on the drawing board. These systems use radio frequency location technology to track the position of offenders. The challenge for this technology is the development of reliable personal locator devices that are small, lightweight, with long operational battery life, and indoors/outdoors accuracy of 100 meters or less. At the center of a second-generation system is a database that specifies the offender`s home, workplace, commute, and time the offender should be found in each. The database could also define areas from which the offender is excluded. To test compliance, the system would compare the observed coordinates of the offender with the stored location for a given time interval. Database logfiles will also enable law enforcement to determine if a monitored offender was present at a crime scene and thus include or exclude the offender as a potential suspect.

  1. Wireless transceiver circuits system perspectives and design aspects

    CERN Document Server

    Rhee, Woogeun

    2015-01-01

    This cutting-edge work contains comprehensive coverage of integrated circuit (IC) design for modern transceiver circuits and wireless systems. Ranging in scope from system perspectives to practical circuit design for emerging wireless applications, the book includes detailed discussions of transceiver architectures and system parameters, mm-wave circuits, ultra-low-power radios for biomedical and sensor applications, and the latest circuit techniques. Written by renowned international experts in IC industry and academia, the text is an ideal reference for engineers and researchers in the area

  2. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  3. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  4. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  5. In-Pipe Wireless Communication for Underground Sampling and Testing

    NARCIS (Netherlands)

    Nguyen, Nhan D.T.; Le, Duc V.; Meratnia, Nirvana; Havinga, Paul J.M.

    2017-01-01

    In this paper, we present an effective and low- cost wireless communication system for extremely long and narrow pipes that can replay the extant wire system in underground sensor network applications such as soil sampling and testing with the Cone Penetration Test (CPT), the most widely used

  6. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  7. Area-wide integration of lepidopteran F1 sterility and augmentative biological control

    International Nuclear Information System (INIS)

    Carpenter, James E.

    2000-01-01

    Area-wide pest management (APM) and integrated pest management (IPM) originated from two different efforts to combine two or more control techniques into programmes in which each method could synergise the effectiveness of others and thus create a level of pest control that was greater than that of a single technique (Perkins 1982). Since then, the concept of APM has evolved to include many aspects of IPM and often is now referred to as area-wide IPM. Still, the element of total population management is central to this approach of insect pest management. In support of APM, Knipling (1998) stated that of the insect pests that were of major concern to agriculture before the newer classes of insecticides were available, most are still pests today, the major exceptions being the screw-worm fly and the boll weevil in the southeastern US cotton growing region. Knipling also noted that both of these pest species were subjected to area-wide suppression programmes. In response to the USDA IPM Initiative (USDA 1993, 1994) which seeks to achieve the national goal of having 75% of the crop acres under IPM by the year 2000, the Agricultural Research Service developed an Area-wide IPM Programme. This programme combines environmentally-sound pest control techniques with the advantages of APM and develops partnerships with other federal, state, local and private sector entities. Technologies such as the integration of lepidopteran F 1 sterility and augmentative biological control may be considered for future programmes

  8. Simulation Of Wireless Networked Control System Using TRUETIME And MATLAB

    Directory of Open Access Journals (Sweden)

    Nyan Phyo Aung

    2015-08-01

    Full Text Available Wireless networked control systems WNCS are attracting an increasing research interests in the past decade. Wireless networked control system WNCS is composed of a group of distributed sensors and actuators that communicate through wireless link which achieves distributed sensing and executing tasks. This is particularly relevant for the areas of communication control and computing where successful design of WNCS brings about new challenges to the researchers. The primary motivation of this survey paper is to examine the design issues and to provide directions for successful simulation and implementation of WNCS. The paper also as well reviews some simulation tools for such systems.

  9. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  10. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  11. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Raber, Ellen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kirvel, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Don [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Love, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dombroski, Matthew [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McGrann, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Richards, John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Melius, Carl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bunt, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hibbard, Wilthea [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Greenwalt, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Miles, Robin [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dillon, Michael [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mancieri, Sav [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Harris, Steve [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Michalik, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wheeler, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hoppes, Bill [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Tucker, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krauter, Paula [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knowlton, Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yang, Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Franco, Dave [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Einfeld, Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brockman, John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Betty, Rita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urban area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision

  12. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  13. Wide-area service water information management system; Koiki suido joho kanri system

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A wide-area service water system is required to be more resistant to emergency situations, e.g., drought and hazards, and meet consumers' diversifying needs in each area, while stably supplying water at ordinary times by utilizing purification plants located in places within its system and piping networks in the water area. Fuji Electric is providing information management systems for wide-area service water systems, developed based on the company's abundant system know-hows accumulated for a long time and latest techniques. They are characterized by (1) Web monitoring, aided by an intranet system, (2) high-speed data transmission by a digital transmission system, (3) open network environments, and (4) emergency calling of the staff, and management of stock materials. The system allows to monitor operating conditions within the area on real time, needless to say, and business administration with civil minimum taken into consideration, e.g., stabilizing water quality by coordinating the purification plants within the system. (translated by NEDO)

  14. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach

    National Research Council Canada - National Science Library

    Lazos, L; Poovendran, Radha; Meadows, C; Syverson, P; Chang, L. W

    2005-01-01

    We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node...

  15. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  16. Throughput assurance of wireless body area networks coexistence based on stochastic geometry.

    Directory of Open Access Journals (Sweden)

    Ruixia Liu

    Full Text Available Wireless body area networks (WBANs are expected to influence the traditional medical model by assisting caretakers with health telemonitoring. Within WBANs, the transmit power of the nodes should be as small as possible owing to their limited energy capacity but should be sufficiently large to guarantee the quality of the signal at the receiving nodes. When multiple WBANs coexist in a small area, the communication reliability and overall throughput can be seriously affected due to resource competition and interference. We show that the total network throughput largely depends on the WBANs distribution density (λp, transmit power of their nodes (Pt, and their carrier-sensing threshold (γ. Using stochastic geometry, a joint carrier-sensing threshold and power control strategy is proposed to meet the demand of coexisting WBANs based on the IEEE 802.15.4 standard. Given different network distributions and carrier-sensing thresholds, the proposed strategy derives a minimum transmit power according to varying surrounding environment. We obtain expressions for transmission success probability and throughput adopting this strategy. Using numerical examples, we show that joint carrier-sensing thresholds and transmit power strategy can effectively improve the overall system throughput and reduce interference. Additionally, this paper studies the effects of a guard zone on the throughput using a Matern hard-core point process (HCPP type II model. Theoretical analysis and simulation results show that the HCPP model can increase the success probability and throughput of networks.

  17. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  18. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  19. Note: Design and development of wireless controlled aerosol sampling network for large scale aerosol dispersion experiments

    International Nuclear Information System (INIS)

    Gopalakrishnan, V.; Subramanian, V.; Baskaran, R.; Venkatraman, B.

    2015-01-01

    Wireless based custom built aerosol sampling network is designed, developed, and implemented for environmental aerosol sampling. These aerosol sampling systems are used in field measurement campaign, in which sodium aerosol dispersion experiments have been conducted as a part of environmental impact studies related to sodium cooled fast reactor. The sampling network contains 40 aerosol sampling units and each contains custom built sampling head and the wireless control networking designed with Programmable System on Chip (PSoC™) and Xbee Pro RF modules. The base station control is designed using graphical programming language LabView. The sampling network is programmed to operate in a preset time and the running status of the samplers in the network is visualized from the base station. The system is developed in such a way that it can be used for any other environment sampling system deployed in wide area and uneven terrain where manual operation is difficult due to the requirement of simultaneous operation and status logging

  20. Note: Design and development of wireless controlled aerosol sampling network for large scale aerosol dispersion experiments

    Energy Technology Data Exchange (ETDEWEB)

    Gopalakrishnan, V.; Subramanian, V.; Baskaran, R.; Venkatraman, B. [Radiation Impact Assessment Section, Radiological Safety Division, Indira Gandhi Centre for Atomic Research, Kalpakkam 603 102 (India)

    2015-07-15

    Wireless based custom built aerosol sampling network is designed, developed, and implemented for environmental aerosol sampling. These aerosol sampling systems are used in field measurement campaign, in which sodium aerosol dispersion experiments have been conducted as a part of environmental impact studies related to sodium cooled fast reactor. The sampling network contains 40 aerosol sampling units and each contains custom built sampling head and the wireless control networking designed with Programmable System on Chip (PSoC™) and Xbee Pro RF modules. The base station control is designed using graphical programming language LabView. The sampling network is programmed to operate in a preset time and the running status of the samplers in the network is visualized from the base station. The system is developed in such a way that it can be used for any other environment sampling system deployed in wide area and uneven terrain where manual operation is difficult due to the requirement of simultaneous operation and status logging.

  1. Channel coding study for ultra-low power wireless design of autonomous sensor works

    NARCIS (Netherlands)

    Zhang, P.; Huang, Li; Willems, F.M.J.

    2011-01-01

    Ultra-low power wireless design is highly demanded for building up autonomous wireless sensor networks (WSNs) for many application areas. To keep certain quality of service with limited power budget, channel coding techniques can be applied to maintain the robustness and reliability of WSNs. In this

  2. Analysis of area-wide management of insect pests based on sampling

    Science.gov (United States)

    David W. Onstad; Mark S. Sisterson

    2011-01-01

    The control of invasive species greatly depends on area-wide pest management (AWPM) in heterogeneous landscapes. Decisions about when and where to treat a population with pesticide are based on sampling pest abundance. One of the challenges of AWPM is sampling large areas with limited funds to cover the cost of sampling. Additionally, AWPM programs are often confronted...

  3. Energy harvesting for wireless sensors by using piezoelectric transducers

    Energy Technology Data Exchange (ETDEWEB)

    Duerager, Christian [Empa, Swiss Federal Laboratories for Materials Science and Technology, Duebendorf (Switzerland)

    2012-07-01

    Wireless sensor technology, which integrates transducers, measurement electronics and wireless communication, has become increasingly vital in structural health monitoring (SHM) applications. Compared to traditional wired systems, wireless solutions reduce the installation time and costs and are not subjected to breakage caused by harsh weather conditions or other extreme events. Because of the low installation costs, wireless sensor networks allow the deployment of a big number of wireless sensor nodes on the structures. Moreover, the nodes can be placed on particularly critical components of the structure difficult to reach by wires. In most of the cases the power supply are conventional batteries, which could be a problem because of their finite life span. Furthermore, in the case of wireless sensor nodes located on structures, it is often advantageous to embed them, which makes an access impossible. Therefore, if a method of obtaining the untapped energy surrounding these sensors was implemented, significant life could be added to the power supply. Various approaches to energy harvesting and energy storage are discussed and limitations associated with the current technology are addressed. In this paper we first discuss the research that has been performed in the area of energy harvesting for wireless sensor technologies by using the ambient vibration energy. In many cases the energy produced by the ambient vibrations is far too small to directly power a wireless sensor node. Therefore, in a second step we discuss the development process for an electronic energy harvesting circuit optimized for piezoelectric transducers. In the last part of this paper an experiment with different piezoelectric transducers and their applicability for energy harvesting applications on vibrating structures will be discussed. (orig.)

  4. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  5. Novel method for water vapour monitoring using wireless communication networks measurements

    Science.gov (United States)

    David, N.; Alpert, P.; Messer, H.

    2010-09-01

    We propose a new technique for monitoring near-surface water vapour, by estimating humidity from data collected through existing wireless communication networks. Weather conditions and atmospheric phenomena affect the electromagnetic channel, causing attenuations to the radio signals. Thus, wireless communication networks are in effect built-in environmental monitoring facilities. The wireless microwave links, used in these networks, are widely deployed by cellular providers for backhaul communication between base stations, a few tens of meters above ground level. As a result, if all available measurements are used, the proposed method can provide moisture observations with high spatial resolution and potentially high temporal resolution. Further, the implementation cost is minimal, since the data used are already collected and saved by the cellular operators. In addition - many of these links are installed in areas where access is difficult such as orographic terrain and complex topography. As such, our method enables measurements in places that have been hard to measure in the past, or have never been measured before. The technique is restricted to weather conditions which exclude rain, fog or clouds along the propagation path. Strong winds that may cause movement of the link transmitter or receiver (or both) may also interfere with the ability to conduct accurate measurements. We present results from real-data measurements taken from microwave links used in a backhaul cellular network that show very good correlation with surface station humidity measurements (comparisons were performed for several links, found at different locations, during different time periods, showing correlations in the range of 0.5-0.9).

  6. Area-wide pest management of fruit flies in Hawaiian fruits and vegetables

    International Nuclear Information System (INIS)

    Vargas, Roger I.; Jang, Eric B.; Klungness, L. Michael

    2003-01-01

    Four economically important fruit flies have been accidentally introduced into Hawaii: melon fly, Mediterranean fruit fly, oriental fruit fly, and the so-called Malaysian (solanaceous) fruit fly. Over 400 different host fruits are attacked. These fruit flies inhibit development of a diversified tropical fruit and vegetable industry, require that commercial fruits undergo quarantine treatment prior to export, and in Hawaii provide a breeding reservoir for their introduction into the continental United States. These exotic pests a serious threat of establishment into new areas with movement of people and commodities throughout the U.S. and the world. For example, if the Mediterranean fruit fly became established in California, projected losses would exceed $1 billion per year due to trade embargoes, loss of jobs, increased pesticide use, and direct crop loss. Present fruit fly control measures in Hawaii relay heavily on the application of organophosphate and carbamate insecticides to crops. Overuse of these insecticides has been implicated with secondary pest outbreaks, negative effects on beneficial insects, environmental contamination and adverse effects on human health. In 1999 a 5 year Area-wide Pest Management (AWPM) program was funded (for FY2000) for management of fruit flies in Hawaii. The goal of the Fruit Fly AWPM program is to develop and integrate biologically based pest management approaches that will result in area-wide suppression and control of fruit flies throughout selected agricultural areas of Hawaii. The IPM program will integrate two or more technologies into a comprehensive package that is economically viable, environmentally acceptable and sustainable. The program will result in a reduction in the use of organophosphate insecticides, and further growth and development of diversified agriculture in Hawaii. The technologies include: 1) field sanitation, 2) protein bait sprays and/or traps, 3) male annihilation with male lures and attractants, 4

  7. Piezoelectric components wirelessly driven by dipole antenna-like electric field generator

    Energy Technology Data Exchange (ETDEWEB)

    Bhuyan, S., E-mail: elesatya@nus.edu.sg [Department of Electrical and Computer Engineering, National University of Singapore, Singapore 117576 (Singapore); Kumar, R.; Panda, S.K. [Department of Electrical and Computer Engineering, National University of Singapore, Singapore 117576 (Singapore); Hu, J. [Lab of Precision Drive, Nanjing University of Aeronautics and Astronautics, Nanjing 210026 (China)

    2011-08-25

    Highlights: > Wireless energy transmission technique. > Dipole antenna-like electric field generator. > Piezoelecctric resonance. > Finite element analyses. > Simulations and experimental verifications. - Abstract: A new technique of transmitting electric energy wirelessly to piezoelectric components by using a dipole antenna-like electric field generator is explored. Two square size brass plate-shaped live and ground electrodes are used to form a dipole antenna-like electric field generator. When the dipole antenna-like electric field generator in electric resonance with an inductor, a maximum output power of 2.72 mW and an energy conversion efficiency of 0.0174% have been achieved wirelessly by the piezoelectric plate area of 40 mm{sup 2} operating in the thickness vibration mode, placed at the center 4 mm away from the antenna plane with an optimum electrical load of 1365 {Omega}, resonant frequency of 782 kHz, 1 cm electrodes separation, 2500 cm{sup 2} electrode area of dipole antenna-like structure, and input ac source power of 15.58 W applied to the series of dipole antenna-like structure and inductor. The theoretically calculated results have been validated by the experimental studies. It is seen that at the resonance frequency and optimum electrical load, the output power of the wirelessly driven piezoelectric component decreases with the size of piezoelectric component, distance of piezoelectric component from the electrode of antenna plane, but increases with the antenna electrode area.

  8. Impulse radio ultra wide-band over multi-mode fiber for in-home signal distribution

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Rodes, Roberto; Jensen, Jesper Bevensee

    2009-01-01

    We propose and experimentally demonstrate a high speed impulse radio ultra wide-band (IR-UWB) wireless link for in-home network signal distribution. The IR-UWB pulse is distributed over a multimode fiber to the transmitter antenna. Wireless transmitted bit-rates of 1 Gbps at 2 m and 2 Gbps at 1.5 m...

  9. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  10. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  11. Energy harvesting for autonomous wireless sensor networks

    NARCIS (Netherlands)

    Vullers, R.J.M.; van Schaijk, R.T.F.; Visser, H.J.; Penders, J.; Van Hoof, C.

    2010-01-01

    Wireless sensor nodes (WSNs) are employed today in many different application areas, ranging from health and lifestyle to automotive, smart building, predictive maintenance (e.g., of machines and infrastructure), and active RFID tags. Currently these devices have limited lifetimes, however, since

  12. Multi-objective ant algorithm for wireless sensor network positioning

    International Nuclear Information System (INIS)

    Fidanova, S.; Shindarov, M.; Marinov, P.

    2013-01-01

    It is impossible to imagine our modern life without telecommunications. Wireless networks are a part of telecommunications. Wireless sensor networks (WSN) consist of spatially distributed sensors, which communicate in wireless way. This network monitors physical or environmental conditions. The objective is the full coverage of the monitoring region and less energy consumption of the network. The most appropriate approach to solve the problem is metaheuristics. In this paper the full coverage of the area is treated as a constrain. The objectives which are optimized are a minimal number of sensors and energy (lifetime) of the network. We apply multi-objective Ant Colony Optimization to solve this important telecommunication problem. We chose MAX-MIN Ant System approach, because it is proven to converge to the global optima

  13. 38-GHz millimeter wave beam steered fiber wireless systems for 5G indoor coverage: architectures, devices, and links

    NARCIS (Netherlands)

    Cao, Z.; Zhao, X.; Soares, F.M.; Tessema, N.M.; Koonen, A.M.J.

    2017-01-01

    Millimeter wave (mm-wave) beam steering is a key technique for the next generation (5G) wireless communication. The 28 and 38-GHz bands are widely considered as the candidates for 5G. In the context of indoor coverage, fiber-wireless systems with multiple simplified remote antenna sites are

  14. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  15. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  16. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  17. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  18. Gas Detection Instrument Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    ANSONG FENG

    2013-06-01

    Full Text Available The wireless sensor network is used to simulate poisonous gas generating system in the Fire-Fighting Simulated Training System. In the paper, we use the wireless signal to simulate the poisonous gas source and use received signal strength indicator (RSSI to simulate the distance between the fireman and the gas source. The gas detection instrument samples the temperature and sphygmus of the trainee and uses the wireless signal as poisonous gas signal. When the trainee enters into the poisonous gas area, the gas detection instrument warns with sound and light and sends the type, density value, the location of the poisonous gas and vital signs of the trainee to host. The paper discusses the software and hardware design of the gas detection instrument. The system has been used to the several of Fire-Fighting training systems.

  19. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  20. MAP Fault Localization Based on Wide Area Synchronous Phasor Measurement Information

    Science.gov (United States)

    Zhang, Yagang; Wang, Zengping

    2015-02-01

    In the research of complicated electrical engineering, the emergence of phasor measurement units (PMU) is a landmark event. The establishment and application of wide area measurement system (WAMS) in power system has made widespread and profound influence on the safe and stable operation of complicated power system. In this paper, taking full advantage of wide area synchronous phasor measurement information provided by PMUs, we have carried out precise fault localization based on the principles of maximum posteriori probability (MAP). Large numbers of simulation experiments have confirmed that the results of MAP fault localization are accurate and reliable. Even if there are interferences from white Gaussian stochastic noise, the results from MAP classification are also identical to the actual real situation.

  1. Secure Multi-Gigabit Ultra-Wide Band Communications for Personal Area Networks

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Puerta Ramírez, Rafael; Tafur Monroy, Idelfonso

    2016-01-01

    scenarios where the user may be located in public spaces. We propose to use Ultra-Wideband communications, which can be seamlessly transported over fiber or wireless, and show different transmission experiments ranging from 2 Gbit/s to 35 Gbit/s. To achieve these record bit rates, the multi-band approach...

  2. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  3. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  4. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  5. High Resolution Flash Flood Forecasting Using a Wireless Sensor Network in the Dallas-Fort Worth Metroplex

    Science.gov (United States)

    Bartos, M. D.; Kerkez, B.; Noh, S.; Seo, D. J.

    2017-12-01

    In this study, we develop and evaluate a high resolution urban flash flood monitoring system using a wireless sensor network (WSN), a real-time rainfall-runoff model, and spatially-explicit radar rainfall predictions. Flooding is the leading cause of natural disaster fatalities in the US, with flash flooding in particular responsible for a majority of flooding deaths. While many riverine flood models have been operationalized into early warning systems, there is currently no model that is capable of reliably predicting flash floods in urban areas. Urban flash floods are particularly difficult to model due to a lack of rainfall and runoff data at appropriate scales. To address this problem, we develop a wide-area flood-monitoring wireless sensor network for the Dallas-Fort Worth metroplex, and use this network to characterize rainfall-runoff response over multiple heterogeneous catchments. First, we deploy a network of 22 wireless sensor nodes to collect real-time stream stage measurements over catchments ranging from 2-80 km2 in size. Next, we characterize the rainfall-runoff response of each catchment by combining stream stage data with gage and radar-based precipitation measurements. Finally, we demonstrate the potential for real-time flash flood prediction by joining the derived rainfall-runoff models with real-time radar rainfall predictions. We find that runoff response is highly heterogeneous among catchments, with large variabilities in runoff response detected even among nearby gages. However, when spatially-explicit rainfall fields are included, spatial variability in runoff response is largely captured. This result highlights the importance of increased spatial coverage for flash flood prediction.

  6. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  7. Monitoring Animals and Herd Behavioral Parameters Using a Wireless Sensor Network

    DEFF Research Database (Denmark)

    Sharak Nadimi, Esmaeil; Bak, Thomas; Izadi-Zamanabadi, Roozbeh

    2006-01-01

    The length of time that a herd of cows spent in an area covered by new grass that was provided for them has been measured using wireless sensor networks and calculated based on Bayesian probability functions. This time was also recorded by a camera. The results that were obtained by employing...... wireless sensor networks have been confirmed by the data registered by the camera....

  8. Design and Implementation of Mobile Car with Wireless Video Monitoring System Based on STC89C52

    Directory of Open Access Journals (Sweden)

    Yang Hong

    2014-05-01

    Full Text Available With the rapid development of wireless networks and image acquisition technology, wireless video transmission technology has been widely applied in various communication systems. The traditional video monitoring technology is restricted by some conditions such as layout, environmental, the relatively large volume, cost, and so on. In view of this problem, this paper proposes a method that the mobile car can be equipped with wireless video monitoring system. The mobile car which has some functions such as detection, video acquisition and wireless data transmission is developed based on STC89C52 Micro Control Unit (MCU and WiFi router. Firstly, information such as image, temperature and humidity is processed by the MCU and communicated with the router, and then returned by the WiFi router to the host computer phone. Secondly, control information issued by the host computer phone is received by WiFi router and sent to the MCU, and then the MCU sends relevant instructions. Lastly, the wireless transmission of video images and the remote control of the car are realized. The results prove that the system has some features such as simple operation, high stability, fast response, low cost, strong flexibility, widely application, and so on. The system has certain practical value and popularization value.

  9. Compact printed high rejection triple band-notch UWB antenna with multiple wireless applications

    Directory of Open Access Journals (Sweden)

    Manish Sharma

    2016-09-01

    Full Text Available In this paper, small printed urn-shape triple notch ultra-wideband (UWB monopole antenna with diverse wireless applications is presented. Notch bands include WiMAX (IEEE802.16 3.30–3.80 GHz, WLAN IEEE802.11a/h/j/n (5.15–5.35 GHz, 5.25–5.35 GHz, 5.47–5.725 GHz, 5.725–5.825 GHz, and X-band downlink satellite system (7.25–7.75 GHz and other multiple wireless services as close range radar (8–12 GHz in X-band & satellite communication (12–18 GHz in Ku-band. By including T-shape stub and etching two C-shaped slots on the radiating patch, triple band-notch function is obtained with measured high band rejection (VSWR = 16.54 at 3.60 GHz, VSWR = 22.35 at 5.64 GHz and VSWR = 6.38 at 7.64 GHz and covers a wide useable fractional bandwidth of 154.56% (2.49–19.41 GHz. In short the antenna offers triple band-notch UWB systems as a compact multifunctional antenna to reduce the number of antennas installed in wireless devices for accessing multiple wireless networks with wide radiation pattern.

  10. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  11. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  12. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  13. A Wireless LAN and Voice Information System for Underground Coal Mine

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2014-06-01

    Full Text Available In this paper we constructed a wireless information system, and developed a wireless voice communication subsystem based on Wireless Local Area Networks (WLAN for underground coal mine, which employs Voice over IP (VoIP technology and Session Initiation Protocol (SIP to achieve wireless voice dispatching communications. The master control voice dispatching interface and call terminal software are also developed on the WLAN ground server side to manage and implement the voice dispatching communication. A testing system for voice communication was constructed in tunnels of an underground coal mine, which was used to actually test the wireless voice communication subsystem via a network analysis tool, named Clear Sight Analyzer. In tests, the actual flow charts of registration, call establishment and call removal were analyzed by capturing call signaling of SIP terminals, and the key performance indicators were evaluated in coal mine, including average subjective value of voice quality, packet loss rate, delay jitter, disorder packet transmission and end-to- end delay. Experimental results and analysis demonstrate that the wireless voice communication subsystem developed communicates well in underground coal mine environment, achieving the designed function of voice dispatching communication.

  14. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  15. Neighbor Discovery Algorithm in Wireless Local Area Networks Using Multi-beam Directional Antennas

    Science.gov (United States)

    Wang, Jin; Peng, Wei; Liu, Song

    2017-10-01

    Neighbor discovery is an important step for Wireless Local Area Networks (WLAN) and the use of multi-beam directional antennas can greatly improve the network performance. However, most neighbor discovery algorithms in WLAN, based on multi-beam directional antennas, can only work effectively in synchronous system but not in asynchro-nous system. And collisions at AP remain a bottleneck for neighbor discovery. In this paper, we propose two asynchrono-us neighbor discovery algorithms: asynchronous hierarchical scanning (AHS) and asynchronous directional scanning (ADS) algorithm. Both of them are based on three-way handshaking mechanism. AHS and ADS reduce collisions at AP to have a good performance in a hierarchical way and directional way respectively. In the end, the performance of the AHS and ADS are tested on OMNeT++. Moreover, it is analyzed that different application scenarios and the factors how to affect the performance of these algorithms. The simulation results show that AHS is suitable for the densely populated scenes around AP while ADS is suitable for that most of the neighborhood nodes are far from AP.

  16. Summary of the Seattle Urban Area Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Kirvel, R

    2010-09-13

    A terrorist attack involving a release of biological warfare agent in the Seattle urban area would require decision-makers to make a host of important, and sometimes untested, choices concerning how best to respond and recover. This technical supplement supports the Puget Sound Regional Biological Attack Recovery Plan Annex to the Regional Catastrophic Plan, which structures the region’s response and recovery approach, by providing technical details on how to conduct a biological remediation. More specifically, the technical supplement identifies the principal issues that must be addressed following a wide-area release of aerosolized Bacillus anthracis (B. anthracis) spores; explains the resources that are available to address the release; sets forth strategies to reduce the time required for consequence management; and focuses on remediation options, procedures, and tools that can be implemented today should such an incident occur. The content is intended to be used with the Interim Consequence Management Guidance for a Wide-Area Biological Attack (LLNL 2009). A second and related purpose of this technical supplement is to serve as a detailed guide for other geographical regions interested in formulating their own consequence management plans. This technical supplement is funded by, and was developed as part of, the Interagency Biological Restoration Demonstration (IBRD) program—a collaborative effort among Department of Homeland Security, Department of Defense, and numerous other Federal, state, and local agencies—to improve the nation’s ability to respond to and recover from a wide-area biological incident. Content of the technical supplement follows the six-phase diagram for responding to and recovering from a biological contamination incident (see Figure 1 on the next page), which represents a consensus scheme developed after multi-agency review and approval. Whereas the focus of the document is on remediation/cleanup activities, the topics of response

  17. Low-Cost Wireless Temperature Measurement: Design, Manufacture, and Testing of a PCB-Based Wireless Passive Temperature Sensor.

    Science.gov (United States)

    Yan, Dan; Yang, Yong; Hong, Yingping; Liang, Ting; Yao, Zong; Chen, Xiaoyong; Xiong, Jijun

    2018-02-10

    Low-cost wireless temperature measurement has significant value in the food industry, logistics, agriculture, portable medical equipment, intelligent wireless health monitoring, and many areas in everyday life. A wireless passive temperature sensor based on PCB (Printed Circuit Board) materials is reported in this paper. The advantages of the sensor include simple mechanical structure, convenient processing, low-cost, and easiness in integration. The temperature-sensitive structure of the sensor is a dielectric-loaded resonant cavity, consisting of the PCB substrate. The sensitive structure also integrates a patch antenna for the transmission of temperature signals. The temperature sensing mechanism of the sensor is the dielectric constant of the PCB substrate changes with temperature, which causes the resonant frequency variation of the resonator. Then the temperature can be measured by detecting the changes in the sensor's working frequency. The PCB-based wireless passive temperature sensor prototype is prepared through theoretical design, parameter analysis, software simulation, and experimental testing. The high- and low-temperature sensing performance of the sensor is tested, respectively. The resonant frequency decreases from 2.434 GHz to 2.379 GHz as the temperature increases from -40 °C to 125 °C. The fitting curve proves that the experimental data have good linearity. Three repetitive tests proved that the sensor possess well repeatability. The average sensitivity is 347.45 KHz / ℃ from repetitive measurements conducted three times. This study demonstrates the feasibility of the PCB-based wireless passive sensor, which provides a low-cost temperature sensing solution for everyday life, modern agriculture, thriving intelligent health devices, and so on, and also enriches PCB product lines and applications.

  18. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  19. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  20. Corn rootworm area-wide management across the United States

    International Nuclear Information System (INIS)

    Chandler, Laurence D.; Coppedge, James R.; Richard Edwards, C.; Tollefson, Jon J.; Wilde, Gerald E.

    2000-01-01

    The western corn rootworm, Diabrotica virgifera virgifera LeConte, northern corn rootworm, D. barberi Smith and Lawrence, and Mexican corn rootworm, D. virgifera zeae Krysan and Smith are among the most economically and environmentally important pests of United States maize (Zea mays L.) production systems (Metcalf 1986). Annually, 8 to 10 million hectares of maize are treated with soil applied insecticides to protect the crop from larval feeding damage. Crop rotation, however, is also widely used to minimise the need for soil insecticide applications. Insecticides for adult rootworm management are also frequently used. Numerous problems are currently associated with corn rootworm management approaches. Soil insecticides are normally used to protect maize roots from larval feeding damage. However, they are ineffective in controlling the management of corn rootworm populations (Gray et al. 1992, Sutter et al. 1991). It is not uncommon for large numbers of rootworms to develop within treated fields. Thus, when maize is grown in the same field year after year (continuous cropping), soil insecticide applications must be used to protect the plant. These applications are generally made without knowledge (prophylactic) of the rootworm population levels within the field due to the difficulty of sampling for immature life stages. Western corn rootworm resistance to chlorinated hydrocarbon insecticides has been extensively documented (Ball and Weekman 1962). Recently, two distinct populations of western corn rootworms in Nebraska were found to be resistant to carbaryl and methyl parathion which are commonly used for adult control (Meinke et al. 1998). Although the occurrence of resistance has not spread outside of these areas, the potential for increased tolerance of western corn rootworm populations to carbamate and organophosphate insecticides across the region does exist. In response to many of the management problems discussed above, scientists with the USDA Agricultural

  1. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  2. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...

  3. Wireless link using on-chip photonic integrated millimeter-wave sources

    NARCIS (Netherlands)

    Guzmán, R. C.; Gordón, C.; Carpintero, G.; Leijtens, X.; Lawniczak, Katarzyna

    2015-01-01

    Over the last few years wireless link data traffic has drastically increased due to a change in the way today's society creates, shares, and consumes information. Millimeter-waves (30-300 GHz) have a great advantage due to the wide bandwidths available for carrying information, enabling broadband

  4. Summary of the 2012 Wide Area Recovery and Resiliency Program (WARRP) Waste Management Workshop

    Science.gov (United States)

    Workshop advanced the planning of federal, state and local officials in the area of waste management following a chemical, biological or radiological wide-area incident in the Denver, Colorado urban area.

  5. Lunar Wireless Power Transfer Feasibility Study

    Energy Technology Data Exchange (ETDEWEB)

    Freid, Sheldon [National Security Technologies, LLC. (NSTec), Mercury, NV (United States); Popovic, Zoya [Univ. of Colorado, Boulder, CO (United States); Beckett, David R. [Independent Consultant; Anderson, Scott R. [Independent Consultant; Mann, Diana [Independent Consultant; Walker, Stuart [Independent Consultant

    2008-03-01

    This study examines the feasibility of a multi-kilowatt wireless radio frequency (RF) power system to transfer power between lunar base facilities. Initial analyses, show that wireless power transfer (WPT) systems can be more efficient and less expensive than traditional wired approaches for certain lunar and terrestrial applications. The study includes evaluations of the fundamental limitations of lunar WPT systems, the interrelationships of possible operational parameters, and a baseline design approach for a notionial system that could be used in the near future to power remote facilities at a lunar base. Our notional system includes state-of-the-art photovoltaics (PVs), high-efficiency microwave transmitters, low-mass large-aperture high-power transmit antennas, high-efficiency large-area rectenna receiving arrays, and reconfigurable DC combining circuitry.

  6. An analytic Study of the Key Factors In uencing the Design and Routing Techniques of a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yogita Bahuguna

    2017-03-01

    Full Text Available A wireless sensor network contains various nodes having certain sensing, processing and communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size and battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security and military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity and coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network.

  7. Optimal Node Placement in Underwater Wireless Sensor Networks

    KAUST Repository

    Felamban, M.; Shihada, Basem; Jamshaid, K.

    2013-01-01

    Wireless Sensor Networks (WSN) are expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance

  8. Wide area monitoring study

    International Nuclear Information System (INIS)

    Wogman, N.A.; Holdren, G.R. Jr.

    1999-01-01

    Environmental sampling can be used to complement the safeguarding of nuclear material, especially in the detection of undeclared nuclear activities. Routine monitoring of nuclear installations has provided valuable information about the fate of key signature materials within different environmental settings. The approach collates information regarding the generation of individual radiochemical signatures within different nuclear processes, the potential for release of these signatures to the environment and, the chemical form and mobility of the signatures in environmental media along which the material could migrate. Meteorological, geological and hydrological information is used to determine where to sample, what to sample, and how often to sample to provide the greatest likelihood for detection. Multiple strategies can be used to implement wide area monitoring for safeguards purposes. The most complex, and expensive of these, involves establishing extensive networks of fixed location sampling sites. The sites would be operated continuously, and would be instrumented with automated sampling, analysis, and communication equipment to relay information regarding potential anomalies to control centers in near-real time. Alternative strategies can be used to supplement fixed location monitoring equipment, especially in regions that cannot support (financially or logistically) the fixed stations. Through combinations of these various strategies, using a variety of environmental media to monitor a region, we believe that a competent network, one with a quantifiable probability for detecting undeclared nuclear activities, can be designed. While this approach cannot and should not replace other inspection and monitoring activities, it can potentially contribute valuable information to an international safeguards system. (author)

  9. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  10. Internal model control for industrial wireless plant using WirelessHART hardware-in-the-loop simulator.

    Science.gov (United States)

    Tran, Chung Duc; Ibrahim, Rosdiazli; Asirvadam, Vijanth Sagayan; Saad, Nordin; Sabo Miya, Hassan

    2018-04-01

    The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID. Copyright © 2017. Published by Elsevier Ltd.

  11. A Game Theoretic Framework for Bandwidth Allocation and Pricing in Federated Wireless Networks

    Science.gov (United States)

    Gu, Bo; Yamori, Kyoko; Xu, Sugang; Tanaka, Yoshiaki

    With the proliferation of IEEE 802.11 wireless local area networks, large numbers of wireless access points have been deployed, and it is often the case that a user can detect several access points simultaneously in dense metropolitan areas. Most owners, however, encrypt their networks to prevent the public from accessing them due to the increased traffic and security risk. In this work, we use pricing as an incentive mechanism to motivate the owners to share their networks with the public, while at the same time satisfying users' service demand. Specifically, we propose a “federated network” concept, in which radio resources of various wireless local area networks are managed together. Our algorithm identifies two candidate access points with the lowest price being offered (if available) to each user. We then model the price announcements of access points as a game, and characterize the Nash Equilibrium of the system. The efficiency of the Nash Equilibrium solution is evaluated via simulation studies as well.

  12. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  13. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  14. ns-2 extension to simulate localization system in wireless sensor networks

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2011-09-01

    Full Text Available The ns-2 network simulator is one of the most widely used tools by researchers to investigate the characteristics of wireless sensor networks. Academic papers focus on results and rarely include details of how ns-2 simulations are implemented...

  15. Wireless Power Transfer to Millimeter-Sized Nodes Using Airborne Ultrasound.

    Science.gov (United States)

    Rekhi, Angad S; Khuri-Yakub, Butrus T; Arbabian, Amin

    2017-10-01

    We propose the use of airborne ultrasound for wireless power transfer to mm-sized nodes, with intended application in the next generation of the Internet of Things (IoT). We show through simulation that ultrasonic power transfer can deliver 50 [Formula: see text] to a mm-sized node 0.88 m away from a ~ 50-kHz, 25-cm 2 transmitter array, with the peak pressure remaining below recommended limits in air, and with load power increasing with transmitter area. We report wireless power recovery measurements with a precharged capacitive micromachined ultrasonic transducer, demonstrating a load power of 5 [Formula: see text] at a simulated distance of 1.05 m. We present aperture efficiency, dynamic range, and bias-free operation as key metrics for the comparison of transducers meant for wireless power recovery. We also argue that long-range wireless charging at the watt level is extremely challenging with existing technology and regulations. Finally, we compare our acoustic powering system with cutting edge electromagnetically powered nodes and show that ultrasound has many advantages over RF as a vehicle for power delivery. Our work sets the foundation for further research into ultrasonic wireless power transfer for the IoT.

  16. IEEE 802.11-Based Wireless Sensor System for Vibration Measurement

    Directory of Open Access Journals (Sweden)

    Yutaka Uchimura

    2010-01-01

    Full Text Available Network-based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard-based TSF-counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on synchronization accuracy and evaluated the effect by taking beacon collisions into account. The scalability issue by numerical simulations is also studied. This paper also introduces a newly developed wireless sensing system and the hardware and software specifications are introduced. The experiments were conducted in a reinforced concrete building to evaluate synchronization accuracy. The developed system was also applied for a vibration measurement of a 22-story steel structured high rise building. The experimental results showed that the system performed more than sufficiently.

  17. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    International Nuclear Information System (INIS)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui

    2015-01-01

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities

  18. Electromagnetic Interference Analysis of Cabinet for Wireless HART Communication

    Energy Technology Data Exchange (ETDEWEB)

    Choo, Jaeyul; Jeong, Sang Yong; Kim, Hyung Tae; Yu, Yeong Jin; Park, Hyun Shin; Jeong, Choong Heui [Korea Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    Among the protocols of the wireless communication, the wireless HART communication using the carrier frequency of 2.4 GHz has attracted a lot of interest due to the convenient monitoring and measurement of the variables of nuclear power plants. However the application of the wireless communication to nuclear power plants poses an ongoing challenge due to the unwanted electromagnetic interference (EMI) caused by wireless devices, which would cause the detrimental malfunctioning to adjacent equipment. Especially the EMI problem in the cabinet containing digital instrument and control (I and C) devices is crucial to safety functions and should thus be treated electromagnetically before the use of the wireless communication in nuclear power plants is approved. The mode-matching method has been widely used in electromagnetic analysis due to the reduced computing time by the fast convergence in series solutions. Inspired by this, we perform the electromagnetic scattering analyses of an open cabinet using the modematching method. The resulting information of the electric (E) and magnetic (H) fields enables us to estimate how much the digital I and C in the cabinet is influenced by the external electromagnetic source. The mode-matching method was applied to the scattering analysis of the open cabinet for the digital I and C in nuclear power plants. The mathematical expressions with the unknown modal coefficients for electromagnetic field distributions were formulated based on Helmholtz's equation in conjunction with both the separation of variables and the Fourier transforms. We then determined the modal coefficients from the boundary conditions for electric and magnetic field continuities.

  19. Bio-Inspired Distributed Transmission Power Control Considering QoS Fairness in Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Lee, Chan-Jae; Jung, Ji-Young; Lee, Jung-Ryun

    2017-10-14

    Recently, the development of wireless body area sensor network (WBASN) has accelerated due to the rapid development of wireless technology. In the WBASN environment, many WBASNs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Although nodes in a WBASN typically operate at a low power level, to avoid adversely affecting the human body, high transmission rates may be required to support some applications. In addition to this, since many varieties of applications exist in the WBASN environment, each prospective user may have different quality of service (QoS) requirements. Hence, the following issues should be considered in the WBASN environment: (1) interference between adjacent WBASNs, which influences the performance of a specific system, and (2) the degree of satisfaction on the QoS of each user, i.e., the required QoS such as user throughput should be considered to ensure that all users in the network are provided with a fair QoS satisfaction. Thus, in this paper, we propose a transmission power adjustment algorithm that addresses interference problems and guarantees QoS fairness between users. First, we use a new utility function to measure the degree of the satisfaction on the QoS for each user. Then, the transmission power of each sensor node is calculated using the Cucker-Smale model, and the QoS satisfaction of each user is synchronized dispersively. The results of simulations show that the proposed algorithm performs better than existing algorithms, with respect to QoS fairness and energy efficiency.

  20. MEDIAN: Wireless broadband LAN for multimedia applications

    NARCIS (Netherlands)

    Vliet, P.J. van

    1998-01-01

    MEDIAN is one of the projects in the mobile domain of the Advanced Communications Technologies and Services (ACTS) programme of the European Commission. The main obiective of the MEDIAN project is to evaluate and implement a high speed Wireless Customer Premises / Local Area Network (WCPN/WLAN)

  1. On the power and offset allocation for rate adaptation of spatial multiplexing in optical wireless MIMO channels

    KAUST Repository

    Park, Kihong; Ko, Youngchai; Alouini, Mohamed-Slim

    2011-01-01

    Visible light communication (VLC) using optical sources which can be simultaneously utilized for illumination and communication is currently an attractive option for wireless personal area network. Improving the data rate in optical wireless

  2. Security and privacy issues in wireless sensor networks for healthcare applications.

    Science.gov (United States)

    Al Ameen, Moshaddique; Liu, Jingwei; Kwak, Kyungsup

    2012-02-01

    The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.

  3. An NFC-Enabled CMOS IC for a Wireless Fully Implantable Glucose Sensor.

    Science.gov (United States)

    DeHennis, Andrew; Getzlaff, Stefan; Grice, David; Mailand, Marko

    2016-01-01

    This paper presents an integrated circuit (IC) that merges integrated optical and temperature transducers, optical interface circuitry, and a near-field communication (NFC)-enabled digital, wireless readout for a fully passive implantable sensor platform to measure glucose in people with diabetes. A flip-chip mounted LED and monolithically integrated photodiodes serve as the transduction front-end to enable fluorescence readout. A wide-range programmable transimpedance amplifier adapts the sensor signals to the input of an 11-bit analog-to-digital converter digitizing the measurements. Measurement readout is enabled by means of wireless backscatter modulation to a remote NFC reader. The system is able to resolve current levels of less than 10 pA with a single fluorescent measurement energy consumption of less than 1 μJ. The wireless IC is fabricated in a 0.6-μm-CMOS process and utilizes a 13.56-MHz-based ISO15693 for passive wireless readout through a NFC interface. The IC is utilized as the core interface to a fluorescent, glucose transducer to enable a fully implantable sensor-based continuous glucose monitoring system.

  4. MARGINAL EXPENSE OIL WELL WIRELESS SURVEILLANCE MEOWS

    Energy Technology Data Exchange (ETDEWEB)

    Mason M. Medizade; John R. Ridgely; Donald G. Nelson

    2004-11-01

    A marginal expense oil well wireless surveillance system to monitor system performance and production from rod-pumped wells in real time from wells operated by Vaquero Energy in the Edison Field, Main Area of Kern County in California has been successfully designed and field tested. The surveillance system includes a proprietary flow sensor, a programmable transmitting unit, a base receiver and receiving antenna, and a base station computer equipped with software to interpret the data. First, the system design is presented. Second, field data obtained from three wells is shown. Results of the study show that an effective, cost competitive, real-time wireless surveillance system can be introduced to oil fields across the United States and the world.

  5. Measurements on wireless transmission of ECG signals

    International Nuclear Information System (INIS)

    Gabrielli, A.; Lax, I.

    2016-01-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  6. Measurements on wireless transmission of ECG signals

    Science.gov (United States)

    Gabrielli, A.; Lax, I.

    2016-12-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  7. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  8. Value-Based Caching in Information-Centric Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Fadi M. Al-Turjman

    2017-01-01

    Full Text Available We propose a resilient cache replacement approach based on a Value of sensed Information (VoI policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs. These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures. These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.

  9. Worlds largest particle physics laboratory selects Proxim Wireless Mesh

    CERN Multimedia

    2007-01-01

    "Proxim Wireless has announced that the European Organization for Nuclear Research (CERN), the world's largest particle physics laboratory and the birthplace of the World Wide Web, is using it's ORiNOCO AP-4000 mesh access points to extend the range of the laboratory's Wi-Fi network and to provide continuous monitoring of the lab's calorimeters" (1/2 page)

  10. Wireless sensor networks distributed consensus estimation

    CERN Document Server

    Chen, Cailian; Guan, Xinping

    2014-01-01

    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  11. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    OpenAIRE

    Subhajit Pal; Debnath Bhattacharyya; Tai-hoon Kim

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and comp...

  12. Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN

    Science.gov (United States)

    Pfeiffer, F.; Rashwan, M.; Biebl, E.; Napholz, B.

    2015-11-01

    Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for cable replacement applications in a wireless personal area network (PAN). In addition, Daimler uses KLEER as third wireless technology in the unlicensed (UL) 2.4 GHz-ISM-band to transmit full CD-quality digital audio. As Bluetooth, IEEE 802.11 and KLEER are operating in the same frequency band, it has to be ensured that all three technologies can be used simultaneously without interference. In this paper, we focus on the impact of Bluetooth and IEEE 802.11 as interferer in presence of a KLEER audio transmission.

  13. Connected Dominating Set Based Topology Control in Wireless Sensor Networks

    Science.gov (United States)

    He, Jing

    2012-01-01

    Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…

  14. ZigBee wireless sensor network for environmental monitoring system

    Science.gov (United States)

    Chai, Shun-qi; Ji, Lei; Wu, Hong

    2009-11-01

    ZigBee is a new close-up, low-complexity, low-power, low data rate, low-cost wireless networking technology, mainly used for short distance wireless transmission. It is based on IEEE802.15.4 standards, thousands of tiny sensors form a network through mutual coordination to communications. This paper introduces the ZigBee wireless sensor networks in environmental monitoring applications. The hardware design, including microprocessor, data acquisition, antenna and peripheral circuits of the chips, and through software design composed ZigBee mesh network that can make data acquisition and communication. This network has low power consumption, low cost, the effective area is big, and information transfers reliable merits. And have confirmed the network's communication applicability by the Serial Com Assistant, also testified the network have very good pragmatism by the NS2 emulation the network's operation.

  15. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tengyue Zou

    2017-05-01

    Full Text Available Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k-means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  16. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Zou, Tengyue; Li, Zhenjia; Li, Shuyuan; Lin, Shouying

    2017-05-04

    Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k -means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  17. A fractional-N frequency divider for multi-standard wireless transceiver fabricated in 0.18 μm CMOS process

    Science.gov (United States)

    Wang, Jiafeng; Fan, Xiangning; Shi, Xiaoyang; Wang, Zhigong

    2017-12-01

    With the rapid evolution of wireless communication technology, integrating various communication modes in a mobile terminal has become the popular trend. Because of this, multi-standard wireless technology is one of the hot spots in current research. This paper presents a wideband fractional-N frequency divider of the multi-standard wireless transceiver for many applications. High-speed divider-by-2 with traditional source-coupled-logic is designed for very wide band usage. Phase switching technique and a chain of divider-by-2/3 are applied to the programmable frequency divider with 0.5 step. The phase noise of the whole frequency synthesizer will be decreased by the narrower step of programmable frequency divider. Δ-Σ modulator is achieved by an improved MASH 1-1-1 structure. This structure has excellent performance in many ways, such as noise, spur and input dynamic range. Fabricated in TSMC 0.18μm CMOS process, the fractional-N frequency divider occupies a chip area of 1130 × 510 μm2 and it can correctly divide within the frequency range of 0.8-9 GHz. With 1.8 V supply voltage, its division ratio ranges from 62.5 to 254 and the total current consumption is 29 mA.

  18. Installation of wireless LAN system into the SuperKEKB accelerator tunnel

    International Nuclear Information System (INIS)

    Iwasaki, Masako; Satoh, Masanori

    2014-01-01

    We have installed a wireless LAN system of the accelerator control network into the accelerator tunnel for SuperKEKB, which is the upgrade plan of the KEKB B-factory project. The wireless LAN system is used for the construction and maintenance of the accelerator components. The leaky coaxial cable (LCX) antennas are installed into the arc sections of SuperKEKB tunnel, and the collinear antennas are installed into the straight sections and the injector Linac. We have selected the LCX and collinear antennas with good radiation hardness of more than 1 MGy. After the installation, we evaluated the wireless LAN system and obtained the good network speed performance in the whole tunnel area. (author)

  19. A Benefit Analysis of Infusing Wireless into Aircraft and Fleet Operations - Report to Seedling Project Efficient Reconfigurable Cockpit Design and Fleet Operations Using Software Intensive, Network Enabled, Wireless Architecture (ECON)

    Science.gov (United States)

    Alexandrov, Natalia; Holmes, Bruce J.; Hahn, Andrew S.

    2016-01-01

    We report on an examination of potential benefits of infusing wireless technologies into various areas of aircraft and airspace operations. The analysis is done in support of a NASA seedling project Efficient Reconfigurable Cockpit Design and Fleet Operations Using Software Intensive, Network Enabled Wireless Architecture (ECON). The study has two objectives. First, we investigate one of the main benefit hypotheses of the ECON proposal: that the replacement of wired technologies with wireless would lead to significant weight reductions on an aircraft, among other benefits. Second, we advance a list of wireless technology applications and discuss their system benefits. With regard to the primary hypothesis, we conclude that the promise of weight reduction is premature. Specificity of the system domain and aircraft, criticality of components, reliability of wireless technologies, the weight of replacement or augmentation equipment, and the cost of infusion must all be taken into account among other considerations, to produce a reliable estimate of weight savings or increase.

  20. Efficient and scalable IPv6 communication functions for wireless outdour lighting networks

    NARCIS (Netherlands)

    Mamo, S.T.

    2014-01-01

    Outdoor lighting today is becoming increasingly network-connected. The rapid development in wireless communication technologies makes this progress faster and competitive. Philips Research and Philips Lighting are part of the leading forces in exploration and development of a wide spectrum of

  1. Traffic Agents for Improving QoS in Mixed Infrastructure and Ad Hoc Modes Wireless LAN

    Directory of Open Access Journals (Sweden)

    Yuan Hai-Feng

    2006-01-01

    Full Text Available As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN, which can offer high data-rate wireless multimedia services to the mobile stations (MSs in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light.

  2. Register of international standard NP on IT based wireless application in nuclear power plants

    International Nuclear Information System (INIS)

    Koo, I. S.; Hong, S. B.; Cho, I. W.; Choi, Y. S.; Lee, J. C.

    2011-04-01

    DC draft of standard technical report for wireless applications in NPP is developed, which is a Korean IT technologies. Wireless technologies are forwardwd to converging technologies nuclear and IT area. These technologies are supported to reduce vulnerability against cyber attacks and are forwarded to international standards which met with the nuclear environment requirements. DC draft of standard technical report is provided and circulated. Korean experts participate in Plenary meeting for IEC TC45/SC45A and intermediate meeting for IEC SC45A/WGA3 and 9. Korean expert takes the chair of wireless session at ANS winter conference. Visible light communication is experimented for feasibility study on reducing vulnerability against cyber attacks. VLC is capable of robust wireless communication against cyber attacks. This is suggested to describe a method for technical report. Issue DTR for wireless applications in NPP in 2012

  3. Using of wireless communication in nuclear power plants

    International Nuclear Information System (INIS)

    Ku, C. S.; Kim, B. Y.; Jeong, C. H.; Lee, K. B.; Song, T. S.

    2001-01-01

    The using of wireless communication in nuclear power plants have been limited due to the mis-operation of the safety related instrumentation and control system. If some obstacles such as electromagnetic interference are solved, the using of wireless communication in nuclear power plants recommended because of lots of benefit. In this paper, we measured the electric field intensity for the operation of a potable transceiver in the area of the PPS, PCS, CPC and main control room and provided the electric field intensity limits that a portable transceiver can be used safely near by the safety related systems without electromagnetic interference to the safety related equipment

  4. Designing for Wide-Area Situation Awareness in Future Power Grid Operations

    Science.gov (United States)

    Tran, Fiona F.

    Power grid operation uncertainty and complexity continue to increase with the rise of electricity market deregulation, renewable generation, and interconnectedness between multiple jurisdictions. Human operators need appropriate wide-area visualizations to help them monitor system status to ensure reliable operation of the interconnected power grid. We observed transmission operations at a control centre, conducted critical incident interviews, and led focus group sessions with operators. The results informed a Work Domain Analysis of power grid operations, which in turn informed an Ecological Interface Design concept for wide-area monitoring. I validated design concepts through tabletop discussions and a usability evaluation with operators, earning a mean System Usability Scale score of 77 out of 90. The design concepts aim to support an operator's complete and accurate understanding of the power grid state, which operators increasingly require due to the critical nature of power grid infrastructure and growing sources of system uncertainty.

  5. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  6. Broadband nanophotonic wireless links and networks using on-chip integrated plasmonic antennas.

    Science.gov (United States)

    Yang, Yuanqing; Li, Qiang; Qiu, Min

    2016-01-19

    Owing to their high capacity and flexibility, broadband wireless communications have been widely employed in radio and microwave regimes, playing indispensable roles in our daily life. Their optical analogs, however, have not been demonstrated at the nanoscale. In this paper, by exploiting plasmonic nanoantennas, we demonstrate the complete design of broadband wireless links and networks in the realm of nanophotonics. With a 100-fold enhancement in power transfer superior to previous designs as well as an ultrawide bandwidth that covers the entire telecommunication wavelength range, such broadband nanolinks and networks are expected to pave the way for future optical integrated nanocircuits.

  7. An Implantable Wireless Neural Interface System for Simultaneous Recording and Stimulation of Peripheral Nerve with a Single Cuff Electrode.

    Science.gov (United States)

    Shon, Ahnsei; Chu, Jun-Uk; Jung, Jiuk; Kim, Hyungmin; Youn, Inchan

    2017-12-21

    Recently, implantable devices have become widely used in neural prostheses because they eliminate endemic drawbacks of conventional percutaneous neural interface systems. However, there are still several issues to be considered: low-efficiency wireless power transmission; wireless data communication over restricted operating distance with high power consumption; and limited functionality, working either as a neural signal recorder or as a stimulator. To overcome these issues, we suggest a novel implantable wireless neural interface system for simultaneous neural signal recording and stimulation using a single cuff electrode. By using widely available commercial off-the-shelf (COTS) components, an easily reconfigurable implantable wireless neural interface system was implemented into one compact module. The implantable device includes a wireless power consortium (WPC)-compliant power transmission circuit, a medical implant communication service (MICS)-band-based radio link and a cuff-electrode path controller for simultaneous neural signal recording and stimulation. During in vivo experiments with rabbit models, the implantable device successfully recorded and stimulated the tibial and peroneal nerves while communicating with the external device. The proposed system can be modified for various implantable medical devices, especially such as closed-loop control based implantable neural prostheses requiring neural signal recording and stimulation at the same time.

  8. An Implantable Wireless Neural Interface System for Simultaneous Recording and Stimulation of Peripheral Nerve with a Single Cuff Electrode

    Directory of Open Access Journals (Sweden)

    Ahnsei Shon

    2017-12-01

    Full Text Available Recently, implantable devices have become widely used in neural prostheses because they eliminate endemic drawbacks of conventional percutaneous neural interface systems. However, there are still several issues to be considered: low-efficiency wireless power transmission; wireless data communication over restricted operating distance with high power consumption; and limited functionality, working either as a neural signal recorder or as a stimulator. To overcome these issues, we suggest a novel implantable wireless neural interface system for simultaneous neural signal recording and stimulation using a single cuff electrode. By using widely available commercial off-the-shelf (COTS components, an easily reconfigurable implantable wireless neural interface system was implemented into one compact module. The implantable device includes a wireless power consortium (WPC-compliant power transmission circuit, a medical implant communication service (MICS-band-based radio link and a cuff-electrode path controller for simultaneous neural signal recording and stimulation. During in vivo experiments with rabbit models, the implantable device successfully recorded and stimulated the tibial and peroneal nerves while communicating with the external device. The proposed system can be modified for various implantable medical devices, especially such as closed-loop control based implantable neural prostheses requiring neural signal recording and stimulation at the same time.

  9. Human-Centric Wireless Communication Networks

    OpenAIRE

    Cavallari, Riccardo

    2016-01-01

    This thesis covers two main topics: the design and performance evaluation of Wireless Body Area Networks (WBANs), and the simulation and mathematical modeling of Delay Tolerant Networks (DTNs). Different Medium Access Control (MAC) protocols for WBANs are implemented on dedicated hardware in order to evaluate, through extensive measurement campaigns, the performance of the network in terms of packet loss rate, delay and energy consumption. Novel solutions to cope with bo...

  10. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  11. Systematic review of wireless phone use and brain cancer and other head tumors.

    Science.gov (United States)

    Repacholi, Michael H; Lerchl, Alexander; Röösli, Martin; Sienkiewicz, Zenon; Auvinen, Anssi; Breckenkamp, Jürgen; d'Inzeo, Guglielmo; Elliott, Paul; Frei, Patrizia; Heinrich, Sabine; Lagroye, Isabelle; Lahkola, Anna; McCormick, David L; Thomas, Silke; Vecchia, Paolo

    2012-04-01

    We conducted a systematic review of scientific studies to evaluate whether the use of wireless phones is linked to an increased incidence of the brain cancer glioma or other tumors of the head (meningioma, acoustic neuroma, and parotid gland), originating in the areas of the head that most absorb radiofrequency (RF) energy from wireless phones. Epidemiology and in vivo studies were evaluated according to an agreed protocol; quality criteria were used to evaluate the studies for narrative synthesis but not for meta-analyses or pooling of results. The epidemiology study results were heterogeneous, with sparse data on long-term use (≥ 10 years). Meta-analyses of the epidemiology studies showed no statistically significant increase in risk (defined as P brain cancer or other head tumors from wireless phone use. Analyses of the in vivo oncogenicity, tumor promotion, and genotoxicity studies also showed no statistically significant relationship between exposure to RF fields and genotoxic damage to brain cells, or the incidence of brain cancers or other tumors of the head. Assessment of the review results using the Hill criteria did not support a causal relationship between wireless phone use and the incidence of adult cancers in the areas of the head that most absorb RF energy from the use of wireless phones. There are insufficient data to make any determinations about longer-term use (≥ 10 years). © 2011 Wiley Periodicals, Inc.

  12. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  13. Convergence of photonics and electronics for Terahertz wireless communications – the ITN CELTA project

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso

    2016-01-01

    Terahertz wireless communications is expected to offer the required high capacity and low latency performance required from short-range wireless access and control applications. We present an overview of some the activities in this area in the newly started H2020 ITN project CELTA: convergence of...... of electronics and photonics technologies enabling Terahertz applications...

  14. Gait-Cycle-Driven Transmission Power Control Scheme for a Wireless Body Area Network.

    Science.gov (United States)

    Zang, Weilin; Li, Ye

    2018-05-01

    In a wireless body area network (WBAN), walking movements can result in rapid channel fluctuations, which severely degrade the performance of transmission power control (TPC) schemes. On the other hand, these channel fluctuations are often periodic and are time-synchronized with the user's gait cycle, since they are all driven from the walking movements. In this paper, we propose a novel gait-cycle-driven transmission power control (G-TPC) for a WBAN. The proposed G-TPC scheme reinforces the existing TPC scheme by exploiting the periodic channel fluctuation in the walking scenario. In the proposed scheme, the user's gait cycle information acquired by an accelerometer is used as beacons for arranging the transmissions at the time points with the ideal channel state. The specific transmission power is then determined by using received signal strength indication (RSSI). An experiment was conducted to evaluate the energy efficiency and reliability of the proposed G-TPC based on a CC2420 platform. The results reveal that compared to the original RSSI/link-quality-indication-based TPC, G-TPC reduces energy consumption by 25% on the sensor node and reduce the packet loss rate by 65%.

  15. Online fault diagnostics and testing of area gamma radiation monitor using wireless network

    Science.gov (United States)

    Reddy, Padi Srinivas; Kumar, R. Amudhu Ramesh; Mathews, M. Geo; Amarendra, G.

    2017-07-01

    Periodical surveillance, checking, testing, and calibration of the installed Area Gamma Radiation Monitors (AGRM) in the nuclear plants are mandatory. The functionality of AGRM counting electronics and Geiger-Muller (GM) tube is to be monitored periodically. The present paper describes the development of online electronic calibration and testing of the GM tube from the control room. Two electronic circuits were developed, one for AGRM electronic test and another for AGRM detector test. A dedicated radiation data acquisition system was developed using an open platform communication server and data acquisition software. The Modbus RTU protocol on ZigBee based wireless communication was used for online monitoring and testing. The AGRM electronic test helps to carry out the three-point electronic calibration and verification of accuracy. The AGRM detector test is used to verify the GM threshold voltage and the plateau slope of the GM tube in-situ. The real-time trend graphs generated during these tests clearly identified the state of health of AGRM electronics and GM tube on go/no-go basis. This method reduces the radiation exposures received by the maintenance crew and facilitates quick testing with minimum downtime of the instrument.

  16. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  17. A Review on State of Art Variants of LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuvaraj P.

    2015-03-01

    Full Text Available Recent advances in wireless communication lead to many improvements in application specific wireless sensor network (WSN deployment. Sensing different data from different environments is essential to monitor and control the situations. For instance, it is very important to sense the forest fire as early as possible to control the upshot. So efficient and timely gathering of the data from a network of small sensor nodes is necessary. In WSN, the small sized sensor nodes are working with very small batteries with limited energy. Since those are randomly deployed over a wide area, replacement of battery or recharging is not feasible. So, for getting prolonged life time of WSN, energy efficient operation is the key factor. Among many protocols proposed for enhancing the life time of WSN, the clustering based hierarchical protocols are popular and gaining the attention of researchers because of their high energy efficiency. Low Energy Adaptive Clustering Hierarchy (LEACH is energy efficient hierarchical, clustering based protocol. It is considered as the base of many hierarchical clustering protocols. In this paper, some of the recent tailored protocols proposed to strengthen LEACH are examined.

  18. Open-source telemedicine platform for wireless medical video communication.

    Science.gov (United States)

    Panayides, A; Eleftheriou, I; Pantziaris, M

    2013-01-01

    An m-health system for real-time wireless communication of medical video based on open-source software is presented. The objective is to deliver a low-cost telemedicine platform which will allow for reliable remote diagnosis m-health applications such as emergency incidents, mass population screening, and medical education purposes. The performance of the proposed system is demonstrated using five atherosclerotic plaque ultrasound videos. The videos are encoded at the clinically acquired resolution, in addition to lower, QCIF, and CIF resolutions, at different bitrates, and four different encoding structures. Commercially available wireless local area network (WLAN) and 3.5G high-speed packet access (HSPA) wireless channels are used to validate the developed platform. Objective video quality assessment is based on PSNR ratings, following calibration using the variable frame delay (VFD) algorithm that removes temporal mismatch between original and received videos. Clinical evaluation is based on atherosclerotic plaque ultrasound video assessment protocol. Experimental results show that adequate diagnostic quality wireless medical video communications are realized using the designed telemedicine platform. HSPA cellular networks provide for ultrasound video transmission at the acquired resolution, while VFD algorithm utilization bridges objective and subjective ratings.

  19. Open-Source Telemedicine Platform for Wireless Medical Video Communication

    Science.gov (United States)

    Panayides, A.; Eleftheriou, I.; Pantziaris, M.

    2013-01-01

    An m-health system for real-time wireless communication of medical video based on open-source software is presented. The objective is to deliver a low-cost telemedicine platform which will allow for reliable remote diagnosis m-health applications such as emergency incidents, mass population screening, and medical education purposes. The performance of the proposed system is demonstrated using five atherosclerotic plaque ultrasound videos. The videos are encoded at the clinically acquired resolution, in addition to lower, QCIF, and CIF resolutions, at different bitrates, and four different encoding structures. Commercially available wireless local area network (WLAN) and 3.5G high-speed packet access (HSPA) wireless channels are used to validate the developed platform. Objective video quality assessment is based on PSNR ratings, following calibration using the variable frame delay (VFD) algorithm that removes temporal mismatch between original and received videos. Clinical evaluation is based on atherosclerotic plaque ultrasound video assessment protocol. Experimental results show that adequate diagnostic quality wireless medical video communications are realized using the designed telemedicine platform. HSPA cellular networks provide for ultrasound video transmission at the acquired resolution, while VFD algorithm utilization bridges objective and subjective ratings. PMID:23573082

  20. Open-Source Telemedicine Platform for Wireless Medical Video Communication

    Directory of Open Access Journals (Sweden)

    A. Panayides

    2013-01-01

    Full Text Available An m-health system for real-time wireless communication of medical video based on open-source software is presented. The objective is to deliver a low-cost telemedicine platform which will allow for reliable remote diagnosis m-health applications such as emergency incidents, mass population screening, and medical education purposes. The performance of the proposed system is demonstrated using five atherosclerotic plaque ultrasound videos. The videos are encoded at the clinically acquired resolution, in addition to lower, QCIF, and CIF resolutions, at different bitrates, and four different encoding structures. Commercially available wireless local area network (WLAN and 3.5G high-speed packet access (HSPA wireless channels are used to validate the developed platform. Objective video quality assessment is based on PSNR ratings, following calibration using the variable frame delay (VFD algorithm that removes temporal mismatch between original and received videos. Clinical evaluation is based on atherosclerotic plaque ultrasound video assessment protocol. Experimental results show that adequate diagnostic quality wireless medical video communications are realized using the designed telemedicine platform. HSPA cellular networks provide for ultrasound video transmission at the acquired resolution, while VFD algorithm utilization bridges objective and subjective ratings.

  1. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  2. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  3. An LDPC decoder architecture for wireless sensor network applications.

    Science.gov (United States)

    Biroli, Andrea Dario Giancarlo; Martina, Maurizio; Masera, Guido

    2012-01-01

    The pervasive use of wireless sensors in a growing spectrum of human activities reinforces the need for devices with low energy dissipation. In this work, coded communication between a couple of wireless sensor devices is considered as a method to reduce the dissipated energy per transmitted bit with respect to uncoded communication. Different Low Density Parity Check (LDPC) codes are considered to this purpose and post layout results are shown for a low-area low-energy decoder, which offers percentage energy savings with respect to the uncoded solution in the range of 40%-80%, depending on considered environment, distance and bit error rate.

  4. 3D inkjet printed disposable environmental monitoring wireless sensor node

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-10-24

    We propose a disposable, miniaturized, moveable, fully integrated 3D inkjet-printed wireless sensor node for large area environmental monitoring applications. As a proof of concept, we show the wireless sensing of temperature, humidity and H2S levels which are important for early warnings of two critical environmental conditions namely forest fires and industrial gas leaks. The temperature sensor has TCR of -0.018/°, the highest of any inkjet-printed sensor and the H2S sensor can detect as low as 3 ppm of gas. These sensors and an antenna have been realized on the walls of a 3D-printed cubic package which encloses the microelectronics developed on a 3D-printed circuit board. Hence, 3D printing and inkjet printing have been combined in order to realize a unique low-cost, fully integrated wireless sensor node. Field tests show that these sensor nodes can wirelessly communicate up to a distance of over 100m. Our proposed sensor node can be a part of internet of things with the aim of providing a better and safe living.

  5. An Adaptive Allocation Algorithm Using Directional CSMA/CA over mmWave Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Hyunhee Park

    2012-04-01

    Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni-antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention-based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP control procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.

  6. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  7. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  8. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chongqing Zhang

    2017-05-01

    Full Text Available Wireless body area networks (WBANs are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic.

  9. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  10. Getting ahead of the curve in wireless communications | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC Research Chair in Wireless Communications Indian Institute of Technology ... of Engineering and Technology, UK, and the Institution of Electronics and ... He has also received a number of best paper awards and is the Area Editor for ...

  11. Flood and Traffic Wireless Monitoring System for Smart Cities

    KAUST Repository

    Mousa, Mustafa

    2016-01-01

    The convergence of computation, communication and sensing has led to the emergence of Wireless Sensor Networks (WSNs), which allow distributed monitoring of physical phenomena over extended areas. In this thesis, we focus on a dual flood and traffic

  12. WMSA for wireless communication applications

    Energy Technology Data Exchange (ETDEWEB)

    Vats, Monika; Agarwal, Alok, E-mail: alokagarwal26@yahoo.com; Kumar, Ravindra [Dept. of Electronics & Electrical Engineering, Lingaya’s University Faridabad (India)

    2016-03-09

    Modified rectangular compact microstrip patch antenna having finite ground plane is proposed in this paper. Wideband Microstrip Antenna (WMSA) is achieved by corner cut and inserting air gaps inside the edges of the radiating patch having finite ground plane. The obtained impedance bandwidth for 10 dB return loss for the operating frequency f{sub 0} = 2.09 GHz is 28.7 % (600 MHz), which is very high as compared to the bandwidth obtained for the conventional microstrip antenna. Compactness with wide bandwidth of this antenna is practically useful for the wireless communication systems.

  13. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  14. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  15. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  16. Wireless Sensor Networks Data Processing Summary Based on Compressive Sensing

    Directory of Open Access Journals (Sweden)

    Caiyun Huang

    2014-07-01

    Full Text Available As a newly proposed theory, compressive sensing (CS is commonly used in signal processing area. This paper investigates the applications of compressed sensing (CS in wireless sensor networks (WSNs. First, the development and research status of compressed sensing technology and wireless sensor networks are described, then a detailed investigation of WSNs research based on CS are conducted from aspects of data fusion, signal acquisition, signal routing transmission, and signal reconstruction. At the end of the paper, we conclude our survey and point out the possible future research directions.

  17. Development of autonomous magnetometer rotorcraft for wide area assessment

    Energy Technology Data Exchange (ETDEWEB)

    Roelof Versteeg; Matt Anderson; Les Beard; Eric Corban; Darryl Curley; Jeff Gamey; Ross Johnson; Dwight Junkin; Mark McKay; Jared Salzmann; Mikhail Tchernychev; Suraj Unnikrishnan; Scott Vinson

    2010-04-01

    Large areas across the United States are potentially contaminated with UXO, with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with 1) near 100 % coverage and 2) near 100 % detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 – 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys (resulting in costs of approximately $100-$150/acre). In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide high resolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. There is thus a need for other systems which can be used for effective data collection. An UAV (Unmanned Aerial Vehicle) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly characterization (through the use of

  18. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  19. Reliable low-power wireless networks over unstable transmission power

    NARCIS (Netherlands)

    Kotian, Roshan; Exarchakos, Georgios; Liotta, Antonio

    2017-01-01

    Internet of Things promises large scale interconnected sensing and actuation capabilities in domains, areas, applications and activities never accessed before by Internet. Besides other technical barriers, wireless network node lifetime impedes its applicability. To reduce the energy cost incurred

  20. Cloud based spectrum manager for future wireless regulatory environment

    CSIR Research Space (South Africa)

    Masonta, MT

    2015-12-01

    Full Text Available The regulatory environment in radio frequency spectrum management lags the advancement of wireless technologies, especially in the area of cognitive radio and dynamic spectrum access. In this paper we argue that the solution towards spectrum Pareto...