Search results

1 – 10 of over 5000

Abstract

Details

Transport Science and Technology
Type: Book
ISBN: 978-0-08-044707-0

Article
Publication date: 1 November 2005

Kiran Modukari, Salim Hariri, Nader V. Chalfoun and Mazin Yousif

Programming Sensor Networks currently is a subtle task not because of enormous amount of code but due to inherent limitations of embedded hardware like the power, memory, network

Abstract

Programming Sensor Networks currently is a subtle task not because of enormous amount of code but due to inherent limitations of embedded hardware like the power, memory, network bandwidth and clock speed. In addition, there are very few programming abstractions and standards available which lead to close coupling between the application code and the embedded OS requiring understanding of low‐level primitives during implementation. A Middleware can provide glue code between the applications and the heterogeneity of devices by providing optimized set of services for autonomously managing the resources and functionality of wireless nodes in a distributed wireless sensor network. This paper presents an autonomous middleware framework for low power distributed wireless sensor networks that support adaptive sensor functionality, context aware communications, clustering, quality of service and faulttolerance. Finally an application on how to use the autonomous middleware is illustrated on the Envelope System Research Apparatus (ESRA).

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 April 2006

Bo Tao, Han Ding and Youlun Xiong

Modern manufacturing plants have a desperate need for large amounts of sensor information, to refine and improve their production. A novel peer‐to‐peer distributed sensor network

1941

Abstract

Purpose

Modern manufacturing plants have a desperate need for large amounts of sensor information, to refine and improve their production. A novel peer‐to‐peer distributed sensor network (DSN) framework is presented in this paper to continue the previous research of the IP sensor.

Design/methodology/approach

A device description sheet method, stemming from the TEDS of IEEE 1451 standard, is presented to achieve the self‐identify and self‐description of each IP sensor in a DSN application. Moreover, a virtual mapping mechanism, named transducer domain name server (TDNS), is also presented.

Findings

Ethernet is the backbone of the DSN architecture presented, and direct access between any two sensors located in a same DSN is allowable. With the help of the TDNS, the reallocation of each sensor's role at run‐time is achieved by performing a dynamic binding between the devices monitored and the IP sensors.

Originality/value

In the new proposal, two key problems, including the connection establishment of a large sensor network and the dynamic reallocation of each sensor's role at run‐time, are efficiently settled. All of the methods presented will be an important step towards seeking for a practical use at the production floor.

Details

Assembly Automation, vol. 26 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 22 November 2010

Hen‐I Yang, Chao Chen, Bessam Abdulrazak and Sumi Helal

A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of…

Abstract

Purpose

A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of consensus about the best approaches to create such systems or how to evaluate them. To address these issues, this paper aims to develop a performance evaluation framework for pervasive computing systems.

Design/methodology/approach

Based on the authors' experience in the Gator Tech Smart House – an assistive environment for the elderly, they established a reference scenario that was used to guide the analysis of the large number of systems they studied. An extensive survey of the literature was conducted, and through a thorough analysis, the authors derived and arrived at a broad taxonomy that could form a basic framework for evaluating existing and future pervasive computing systems.

Findings

A taxonomy of pervasive systems is instrumental to their successful evaluation and assessment. The process of creating such taxonomy is cumbersome, and as pervasive systems evolve with new technological advances, such taxonomy is bound to change by way of refinement or extension. This paper found that a taxonomy for something so broad as pervasive systems is very complex. It overcomes the complexity by focusing the classifications on key aspects of pervasive systems, decided purely empirically and based on the authors own experience in a real‐life, large‐scale pervasive system project.

Originality/value

There are currently no methods or frameworks for comparing, classifying, or evaluating pervasive systems. The paper establishes a taxonomy – a first step toward a larger evaluation methodology. It also provides a wealth of information, derived from a survey of a broad collection of pervasive systems.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6649

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 31 December 2006

Mu‐Huan Chiang and Gregory T. Byrd

Data‐centric storage is an efficient scheme to store and retrieve event data in sensor networks, but with the multi‐hop routing nature of sensor networks, the communication cost…

Abstract

Data‐centric storage is an efficient scheme to store and retrieve event data in sensor networks, but with the multi‐hop routing nature of sensor networks, the communication cost of the home nodes and their neighboring nodes tends to be much higher than the other nodes. These hot‐spots can adversely impact system lifetime by draining off their limited energy rapidly. In this paper, we present Zone‐Repartitioning, a load‐balancing mechanism that reduces the energy consumption of the hot‐spots by distributing their communication load while event frequency is high. The trade‐off between event storage cost and query cost makes Zone Repartitioning a competitive approach in different kinds of applications. We compare the performance of Zone Repartitioning against GHT and show that Zone Repartitioning provides better adaptability in various sensor network scenarios.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 31 December 2007

Jang‐Ping Sheu, Yu‐Chia Chang and Gang‐Hua Song

The purpose of this paper is to propose a distributed protocol to build a logical coordinate system based on the hop counts of each node to four selected landmarks, and the real…

Abstract

Purpose

The purpose of this paper is to propose a distributed protocol to build a logical coordinate system based on the hop counts of each node to four selected landmarks, and the real location information is not needed.

Design/methodology/approach

The designed protocol uses the sink node as one of the landmarks and then selects three other sensor nodes near the corners of the sensor network as landmarks.

Findings

The simulation results show that the proposed protocol has the superior performance in packet delivery ratio, average hop counts among nodes, and communication overhead to previous works.

Originality/value

This paper presents a distributed protocol to build a logical coordinate system based on hop counts to landmarks.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 31 December 2006

R. Kalindi, R. Kannan, S.S. Iyengar and A. Durresi

Security in sensor networks is more important than traditional networks as they are deployed in hostile environments and are more prone to capture. Trusted third party…

Abstract

Security in sensor networks is more important than traditional networks as they are deployed in hostile environments and are more prone to capture. Trusted third party authentication schemes, public‐key systems are not suitable owing to their high resource requirements. Key pre‐distribution was introduced in (3) to solve this problem. Our scheme achieves identical connectivity compared to the random key pre distribution (4) using a less number of preloaded keys in each sensor node. The design of our scheme is motivated by the observation that at present most key pre‐distribution schemes employ random mechanisms which use a large number of keys and are unsuitable for sensor networks. In this paper we extend the deterministic key pre‐distribution scheme proposed by us in our earlier work (1), which is based on assigning keys to sensors by placing them on a grid. This approach has been further modified to use multiple mappings of keys to nodes. In each mapping every node gets distinct set of keys which it shares with different nodes. The key assignment is done such that, there will be keys in common between nodes in different sub‐grids. After randomly being deployed, the nodes discover common keys, authenticate and communicate securely. The analysis and simulation results show that this scheme is able to achieve better security compared to the random schemes.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 8 November 2019

Peter Simon Sapaty

In this chapter, different security-related examples are shown in SGL dealing with discovery, tracing and analysis of multiple mobile objects, technical or human, in distributed

Abstract

In this chapter, different security-related examples are shown in SGL dealing with discovery, tracing and analysis of multiple mobile objects, technical or human, in distributed environments. Starting from how overall command and control of a hypothetical missile defence can be automatically managed in SGL by following and supervising the movement of multiple ballistic missiles on their full path from discovery to elimination. Other case is dealing with fully distributed tracing of cruise missiles with complex and tricky routes, which can be effectively chased, analysed and controlled by mobile spatial intelligence spreading through intelligent sensor network. Another one is providing high-level simulation and tracing of multiple objects in outer space to avoid collisions for new vehicles launched, with engagement of scattered space observation sensors integrated under SGT. The chapter also shows how to organize distributed simulation, assistance and control of flow of refugees through international borders.

Details

Complexity in International Security
Type: Book
ISBN: 978-1-78973-716-5

1 – 10 of over 5000