• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 754
  • 202
  • 109
  • 95
  • 38
  • 34
  • 22
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 1517
  • 1517
  • 1025
  • 554
  • 283
  • 223
  • 200
  • 195
  • 193
  • 182
  • 178
  • 170
  • 158
  • 158
  • 150
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Distributed motion coordination for mobile wireless sensor networks using vision

Lee, Justin January 2003 (has links)
Mobile wireless sensor networks (MWSNs) will enable information systems to gather detailed information about the environment on an unprecedented scale. These selforganising, distributed networks of sensors, processors and actuators that are capable of movement have a broad range of potential applications, including military reconnaissance, surveillance, planetary exploration and geophysical mapping. In many of the foreseen applications a certain geometric pattern will be required for the task. Hence, algorithms for maintaining the geometric pattern of an MWSN are investigated. In many tasks such as land mine detection, a group of nodes arranged in a line must provide continuous coverage between each end of the formation. Thus, we present algorithms for maintaining the geometric pattern of a group of nodes arranged in a line. An MWSN may also need to form a geometric pattern without assistance from the user. In military reconnaissance, for example, the nodes will be dropped onto the battlefield from a plane and land at random positions. The nodes will be expected to arrange themselves into a predetermined formation in order to perform a specific task. Thus, we present algorithms for forming a circle and regular polygon from a given set of random positions. The algorithms are distributed and use no communication between the nodes to minimise energy consumption. Unlike past studies of geometric problems where algorithms are either tested in simulations where each node has global knowledge of all the other nodes or implemented on a small number of robots, the robustness of our algorithms has been studied with simulations that model the sensor system in detail. / The nodes locate their neighbours using simulated vision where a ray-tracer is used to generate images of a model of the scene that would be captured by each node's cameras. The simulations demonstrate that the algorithms are robust against random errors in the sensors and actuators. Even though the nodes had incomplete knowledge of the positions of other nodes due to occlusion, they were still able to perform the assigned tasks.
92

Bayesian methods for modelling and management of trust in wireless sensor networks.

Momani, Mohammad January 2008 (has links)
Security and trust are two interdependent concepts and are often used interchangeably when defining a secure wireless sensor network (WSN) system. However, security is different from trust in that, it assumes no node is trustworthy and requires ongoing authentication using sophisticated protocols leading to high communication and computation overheads. This makes the traditional cryptographic security tools hard, if not impossible, to be used in wireless sensor networks that are severely resource constrained. Trust on the other hand is the exact opposite of security in that any node can interact with any other and requires no authentication and unwrapping of hidden keys to carry on with their business and hence carries zero overhead. However, this leads to the miss-use and abuse of networks causing loss and damage to the owners of the networks. This thesis focuses on developing novel methods for modelling and managing trust that enable WSN to be secure while significantly reducing computing and communication overheads. Although researchers have been studying the problem of trust modelling and management in wireless sensor networks for over a decade, their focus was on the trust associated with routing messages between nodes (communication trust). However, wireless sensor networks are mainly deployed to sense the world and report data, both continuous and discrete. However, there are no methods in the literature that focus on the trust associated with misreporting data (data trust). In this thesis, we model the trust associated with the integrity of the data, and propose methods to combine the data trust with the communication trust to infer the total trust. Bayesian probabilistic approach is used to model and manage trust. A new risk assessment algorithm for establishing trust in wireless sensor networks based on the quality of services characteristics of sensor nodes, using the traditional weighting approach is introduced. Then a Beta distribution is used to model communication trust (due to its binary nature) and determine the weights in terms of the Beta distribution parameters to probabilistically combine direct and indirect trust. The thesis extends the Bayesian probabilistic approach to model data trust for cases when the sensed data is continuous. It introduces the Gaussian trust and reputation system to that accounts for uncertain characteristics of sensor data. Finally we introduce a Bayesian fusion algorithm to combine the data trust and communication trust to infer the overall trust between nodes. Simulation results are presented to demonstrate how the models accurately classify different nodes as being trustworthy or not based on their reliability in sensor reporting and routing functions.
93

A Real-Time Communication Framework for Wireless Sensor Networks

AAL SALEM, MOHAMMED January 2009 (has links)
Doctor of Philosophy(PhD) / Recent advances in miniaturization and low power design have led to a flurry of activity in wireless sensor networks. Sensor networks have different constraints than traditional wired networks. A wireless sensor network is a special network with large numbers of nodes equipped with embedded processors, sensors, and radios. These nodes collaborate to accomplish a common task such as environment monitoring or asset tracking. In many applications, sensor nodes will be deployed in an ad-hoc fashion without careful planning. They must organize themselves to form a multihop, wireless communication network. In sensor network environments, much research has been conducted in areas such as power consumption, self-organisation techniques, routing between the sensors, and the communication between the sensor and the sink. On the other hand, real-time communication with the Quality of Service (QoS) concept in wireless sensor networks is still an open research field. Most protocols either ignore real time or simply attempt to process as fast as possible and hope that this speed is sufficient to meet the deadline. However, the introduction of real-time communication has created additional challenges in this area. The sensor node spends most of its life routing packets from one node to another until the packet reaches the sink; therefore, the node functions as a small router most of the time. Since sensor networks deal with time-critical applications, it is often necessary for communication to meet real time constraints. However, research that deals with providing QoS guarantees for real-time traffic in sensor networks is still in its infancy.This thesis presents a real-time communication framework to provide quality of service in sensor networks environments. The proposed framework consists of four components: First, present an analytical model for implementing Priority Queuing (PQ) in a sensor node to calculate the queuing delay. The exact packet delay for corresponding classes is calculated. Further, the analytical results are validated through an extensive simulation study. Second, report on a novel analytical model based on a limited service polling discipline. The model is based on an M/D/1 queuing system (a special class of M/G/1 queuing systems), which takes into account two different classes of traffic in a sensor node. The proposed model implements two queues in a sensor node that are served in a round robin fashion. The exact queuing delay in a sensor node for corresponding classes is calculated. Then, the analytical results are validated through an extensive simulation study. Third, exhibit a novel packet delivery mechanism, namely the Multiple Level Stateless Protocol (MLSP), as a real-time protocol for sensor networks to guarantee the traffic in wireless sensor networks. MLSP improves the packet loss rate and the handling of holes in sensor network much better than its counterpart, MMSPEED. It also introduces the k-limited polling model for the first time. In addition, the whole sending packets dropped significantly compared to MMSPEED, which it leads to decrease the consumption power. Fourth, explain a new framework for moving data from the sink to the user, at a low cost and low power, using the Universal Mobile Telecommunication System (UMTS), which is standard for the Third Generation Mobile System (3G). The integration of sensor networks with the 3G mobile network infrastructure will reduce the cost of building new infrastructures and enable the large-scale deployment of sensor networks
94

Bayesian methods for modelling and management of trust in wireless sensor networks.

Momani, Mohammad. January 2008 (has links)
Security and trust are two interdependent concepts and are often used interchangeably when defining a secure wireless sensor network (WSN) system. However, security is different from trust in that, it assumes no node is trustworthy and requires ongoing authentication using sophisticated protocols leading to high communication and computation overheads. This makes the traditional cryptographic security tools hard, if not impossible, to be used in wireless sensor networks that are severely resource constrained. Trust on the other hand is the exact opposite of security in that any node can interact with any other and requires no authentication and unwrapping of hidden keys to carry on with their business and hence carries zero overhead. However, this leads to the miss-use and abuse of networks causing loss and damage to the owners of the networks. This thesis focuses on developing novel methods for modelling and managing trust that enable WSN to be secure while significantly reducing computing and communication overheads. Although researchers have been studying the problem of trust modelling and management in wireless sensor networks for over a decade, their focus was on the trust associated with routing messages between nodes (communication trust). However, wireless sensor networks are mainly deployed to sense the world and report data, both continuous and discrete. However, there are no methods in the literature that focus on the trust associated with misreporting data (data trust). In this thesis, we model the trust associated with the integrity of the data, and propose methods to combine the data trust with the communication trust to infer the total trust. Bayesian probabilistic approach is used to model and manage trust. A new risk assessment algorithm for establishing trust in wireless sensor networks based on the quality of services characteristics of sensor nodes, using the traditional weighting approach is introduced. Then a Beta distribution is used to model communication trust (due to its binary nature) and determine the weights in terms of the Beta distribution parameters to probabilistically combine direct and indirect trust. The thesis extends the Bayesian probabilistic approach to model data trust for cases when the sensed data is continuous. It introduces the Gaussian trust and reputation system to that accounts for uncertain characteristics of sensor data. Finally we introduce a Bayesian fusion algorithm to combine the data trust and communication trust to infer the overall trust between nodes. Simulation results are presented to demonstrate how the models accurately classify different nodes as being trustworthy or not based on their reliability in sensor reporting and routing functions.
95

Design study of energy-efficient routing protocol for wireless sensor networks.

Lu, Lifang January 2009 (has links)
Recent advances in wireless sensor networks have led to an emergence of many routing protocols. Limited battery capacity of sensor nodes makes energy efficiency a major and challenge problem in wireless sensor networks. Thus, the routing protocols for wireless sensor networks must be energy efficient in order to maximise the network lifetime. In this thesis, we developed a centralised clustering, energy-efficient routing protocol for wireless sensor networks. Our protocol consists of a cluster head selection algorithm, a cluster formation scheme and a routing algorithm for the data transmission between cluster heads and the base station. The cluster head selection algorithm is performed by the base station using global information of the network. This algorithm aiming at choosing cluster heads that ensure both the intra-cluster data transmission and inter-cluster data transmission are energy-efficient. The cluster formation scheme is accomplished by exchanging messages between non-cluster-head nodes and the cluster head to ensure a balanced energy load among cluster heads. The routing algorithm is based on the optimal transmission range for the data transmission between cluster heads and the base station using multi-hop. The performance of our routing protocol is evaluated by comparing with three existing routing protocols on a simulation platform. The simulation results show that our protocol can achieve better performance in terms of energy efficiency and network lifetime. Because of the centralised algorithm and multi-hop routing, there is a small communication overhead and transmission delay when using our protocol. Since our protocol can save energy and prolong network lifetime, it is well suited for applications where energy and network lifetime are the primary considerations and small overhead and time delay can be tolerated. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1456494 / Thesis (M.Eng.Sc.) - University of Adelaide, School of Electrical and Electronic Engineering, 2009
96

Energy Saving Methods in Wireless Sensor Networks

JAWAD ALI, SYED, ROY, PARTHA January 2008 (has links)
<p>To predict the lifetime of wireless sensor networks before their installation is an important concern. The IEEE 802.15.4 standard is specifically meant to support long battery life time; still there are some precautions to be taken by which a sensor network system application based on the standard can be made to run for longer time periods.</p><p>This thesis defines a holistic approach to the problem of energy consumption in sensor</p><p>networks and suggests a choice of node architecture, network structure and routing</p><p>algorithm to support energy saving in the network. The idea and thrust of the thesis is that stand-alone measures such as selecting a low-power microcontroller with embedded transceiver will not alone be sufficient to achieve energy saving over the entire network. A comprehensive design study with energy saving as a primary task must be made. Focus given on the design objectives needs to look at different aspects – application code, network configuration code, routing algorithms etc to come up with an energy efficient network.</p>
97

Remote Surveillance and Measurement

Rashid, Muhammad, Mutarraf, Mumtaz January 2008 (has links)
<p>Wireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission.</p><p> </p><p>The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.</p>
98

ZigBee suitability for Wireless Sensor Networks in Logistic Telemetry Applications

Javed, Kamran January 2006 (has links)
<p>There has been a quick development in the wireless network area during the last decade. Mostly </p><p>these days the focus in the wireless area is on very high speed and long range applications. This </p><p>thesis describes how ZigBee is suitable for wireless sensor networks in logistic telemetry </p><p>applications for global managing and monitoring of goods. ZigBee has been developed by the </p><p>organization named as ‘ZigBee Alliance’ as a new wireless standard for the wireless solutions </p><p>based upon the IEEE 802.15.4 Standard [2]. ZigBee is a new technology as compared to the other </p><p>wireless technologies such as Bluetooth, but it has certain characteristics such as low cost, low </p><p>power, support for mesh networking e.t.c which makes its chances to be more successful than </p><p>others. </p><p> </p><p>The other aim of this thesis is to examine different issues related to ZigBee to see its fitness for </p><p>logistic telemetry applications like multi-hop routing issues, routing strategies and design </p><p>requirements. ZigBee is relatively new wireless technology, so there are great deals of promises </p><p>associated with it. In this thesis, a comparison between ZigBee and Bluetooth technologies will </p><p>also be made.</p>
99

Security versus Power Consumption in Wireless Sensor Networks

Fötschl, Christine, Rainer, Stefan January 2006 (has links)
<p>X3 C is a Swedish company which develops a world wide good tracking system by using ARFID </p><p>tags placed on every item which has to be delivered and base stations as gateway in a wireless </p><p>sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to </p><p>implement security. Firstly an evaluation of possible security mechanisms and their power </p><p>consumption was done by measuring the avalanche effect and character frequency of the sym- </p><p>metric algorithms Blowfish, RC2 and XTEA. Secondly, the required CPU time which is needed </p><p>by each algorithm for encrypting a demo plaintext, was measured and analyzed. Summariz- </p><p>ing both analysis, the XTEA algorithm, run in CBC mode, is the recommendation for the XC </p><p>ARFID tags. The testing processes and the results are presented in detail in this thesis.</p>
100

Supporting Assisted Living by Using Wireless Sensor Networks

Oguz, Mehli, Ibrahim Halil, Uzun January 2009 (has links)
<p>Wireless Sensor Networks have to be very flexible and self-organizing, providing an ease way to be deployed. This feature is required due to a wide variety of possible applications and deployment scenarios in which they can be used. They can support different kinds of tools and applications in distinct areas, such as in agriculture, military, health care, home or factory automation, among other. </p><p> An assisted living system supported by a WSN is presented in this work. The main feature of this system is to locate and track inhabitant’s behaviour. The system has been implemented using Mica2 Motes, which were placed in different rooms in a house. In order to make the use of the WSN easier, this project investigated and used a middleware called TinyDB, which represents a key technology to improve the usability of WSN.</p>

Page generated in 0.0757 seconds