Asynchronous variable hop size transmission with stochastic data model for sensor networks
- Authors: Azad, Arman , Kamruzzaman, Joarder
- Date: 2008
- Type: Text , Conference proceedings
- Full Text: false
- Description: Most existing data models and transmission policies for sensor network assume uniform periodic data generation and unconstrained transmission range for sensor nodes, both assumptions being too restrictive to capture and analyze real- world operation for practical deployment. In this paper, we consider these two practical aspects and present a new transmission policy formulated after (i) stochastic data model where a set of events occur with certain probabilities and rate of data generation by a sensor varies based on sensed event and (ii) limited transmission range of sensors. Assuming co-centric rings around the base station, located at a generic location (internal or external to the network area), ring thickness and hope sizes over lifetime is determined by formatting an optimization problem where nodes in each ring may transmit data at different hop sizes at a given instant and also vary hop sizes over lifetime. Performance analysis shows significant improvement in network lifetime and better uniformity in energy usage distribution in the proposed policy irrespective of network size and maximum allowable transmission range of nodes.
Energy efficient and hop constraint intra-cluster transmission for heterogeneous sensor networks
- Authors: Azad, Arman , Kamruzzaman, Joarder
- Date: 2008
- Type: Text , Conference proceedings
- Full Text: false
- Description: Although transmission policy is crucial in extending lifetime of sensor networks, most existing policies make simplified assumptions which include: i) circular cluster with cluster head (CH) at the center, ii) uniform periodic data generation model and iii) unrestricted transmission range for nodes. But, in practice, these assumptions are too restrictive for real-world deployment of heterogeneous sensor networks where clusters are usually polygonal. Moreover, in multi hop transmission energy consumption by sensors varies greatly with their distance from CH and even among sensors in the critical ring due to non-uniform relay traffic caused by asymmetric polygonal structure of cluster. In this paper, we propose a new transmission policy where sensors transmit at optimally determined hop sizes that varies over lifetime and a distributed hop selection algorithm that regulates each packet's arrival to CH within a given hop limit. Our formulation considers generic polygonal cluster, stochastic data generation model where data generation rate by sensors vary with events and limited transmission range for sensors. Performance analysis shows significant improvement in lifetime and better uniformity in energy usage among sensors in the proposed policy irrespective of cluster size, hop limit and maximum allowable transmission range of nodes
SOAP based assistive care loop using wireless sensor networks
- Authors: Balasubramanian, Venki , Hoang, Doan , Ahmad, N. F.
- Date: 2008
- Type: Text , Conference proceedings
- Relation: 2008 IEEE International Symposium on IT in Medicine and Education, ITME 2008; Xiamen; China; 12th-14th December 2008 published in Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education, ITME 2008 p. 409-414
- Full Text: false
- Reviewed:
- Description: There is a growing trend towards in-house health monitoring system. It is now feasible to place a Personal Digital Assistant (PDA) or smart phone in the hands of care-delivery staff and the patients regardless of where they are located or what their duties might be. In such instance, the staff would be able to access records and communicate with patients in a flexible and cost effective way. This paper proposes an Active Care Loop Framework (ACLF). The strength of our ACLF is to monitor disease over longer period of time and to consult patient who are then able to discuss their conditions with the care staff. Where patients need emergency intervention, an assistive health monitoring system can provide a direct communication channel to summon assistance and to enable with managing the situation until the assistance arrives. With a regular schedule of monitoring and consultation, the assistive ACLF has the capacity to forestall and manage non-critical situations and therefore the system can be deployed to minimize the rate and costs of hospitalizations. © 2008 Crown.
- Description: Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education, ITME 2008
A contender-aware backoff algorithm for CSMA based MAC protocol for wireless sensor network
- Authors: Miraz Al-Mamun, Miraz , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2010
- Type: Text , Conference proceedings
- Full Text: false
- Description: Existing contention based nonpersistent medium access control protocols in Wireless Sensor Network (WSN) do not perform well in high contention. Their performances are affected by occurrence of collision due to uniform probability distribution in choosing Time Slot (TS) during backoff period. To address this issue nonuniform probability distribution was proposed. However success rate still drops for higher number of contenders. In this paper we propose CSMA/s (Collision Sense Multiple Access /per Slot based), a new approach in nonuniform contender-aware probability distribution for choosing TS in the backoff period. Rather than taking a premeditated fixed value for contender population size, our proposed scheme embeds neighborhood population size into its bedrock to automatically converge to the actual number of contenders which enables the contender to adaptively choose TS in the backoff period for reducing collision. This method produces better success rate and lower latency for even very high number of contenders.
Availability measure model for Assistive Care Loop Framework using wireless sensor networks
- Authors: Balasubramanian, Venki , Hoang, Doan
- Date: 2010
- Type: Text , Conference proceedings
- Relation: 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010,Brisbane, 7th-10th Dec, 2010 published in Proceedings of ISSNIP 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, p. 281-286
- Full Text: false
- Reviewed:
- Description: Nowadays, body area wireless sensor networks (BAWSNs) applications are increasingly being used in in-house health monitoring systems. These applications have stringent timing requirements and often run continuously without interruptions. Hence, it becomes imperative to determine the operational continuity of the BAWSN applications by measuring their availability. The BAWSN applications rely on the collection of data within a critical time from all of the source sensor nodes rather than the data from an individual source. Subsequently, the measure of availability for a BAWSN application should be based on the time and the data delivery from all the sensor nodes. Taking into account these specific characteristics and the constraints of the BAWSN, we develop a model to measure the availability of a BAWSN application based on the unavailable time. The proposed model is evaluated through a series of experiments conducted in our existing Assistive Care Loop Framework (ACLF). Furthermore, we also develop an analogous theoretical model to evaluate the availability of a BAWSN application
Optimal reliable and energy aware inter-cluster communication in wireless sensor networks
- Authors: Sadat, Anwar , Karmakar, Gour
- Date: 2010
- Type: Text , Conference proceedings
- Full Text: false
- Description: Inter-cluster communication technique is drawing immense research interest in recent wireless sensor network (WSN) applications. Since sensor nodes are very much constrained in power supply, extending lifetime of these sensors is essential. On the other hand, it is difficult to provide reliable data transfer in WSNs because of their unreliable link quality and congestion at a cluster head (CH) node. CHs perform the crucial inter-cluster communication task for WSN. However, extreme use of energy due to relaying multi-hop data traffic leads to sudden death of a CH node. Existing routing protocols usually utilize minimum hop count or energy consumption path for inter-cluster path selection; consequently, they ignore the reliability in the routing process. In this paper, we have proposed an optimal inter-cluster routing technique considering both energy consumption and reliability. Reliability is measured in terms of link quality and congestion that mainly introduce data loss. Simulation results demonstrate that the proposed technique has improved both network lifetime and reliability significantly compared with the contemporary cluster based routing techniques.
Range-free passive localization using static and mobile sensors
- Authors: Iqbal, Anindya , Murshed, Manzur
- Date: 2012
- Type: Text , Conference proceedings
- Relation: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, 25th-28th June, 2012 p. 1-6
- Full Text: false
- Reviewed:
- Description: In passive localization, sensors try to locate an event without any knowledge of event's emitted power. So, this is a more challenging problem compared to active localization. Existing passive localization schemes use expensive and noise-vulnerable range-based techniques. In this paper, we propose, to the best of our knowledge for the first time, a cost-effective range-free passive localization scheme exploiting hybrid sensor network model where mobile sensors are deployed on demand once an event is sensed by a static sensor. Efficient use of mobile sensors leads to two concomitant optimization problems: (1) positioning the mobile sensors so that the expected possible event location area is minimized; and (2) minimizing their overall traversed distance. To solve the first problem, we have developed a novel arc-coding based range-free localization technique that can accurately define the area of possible event location from the feedback of arbitrarily placed sensors without relying on expensive hardware to estimate range of signals. We have achieved significantly high localization accuracy with a low number of mobile sensors even after considering significant environmental noise. To solve the second problem, three alternative deployment strategies for the mobile sensors were simulated to recommend the best.
Data sharing in secure multimedia wireless sensor networks
- Authors: Usman, Muhammad , Jan, Mian Ahmad , Xiangjian, He , Nanda, Priyadarsi
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 IEEE Trustcom/BigDataSE/ISPA;Tianjin, China; 23-26 August 2016 p. 590-597
- Full Text: false
- Reviewed:
- Description: The use of Multimedia Wireless Sensor Networks (MWSNs) is becoming common nowadays with a rapid growth in communication facilities. Similar to any other WSNs, these networks face various challenges while providing security, trust and privacy for user data. Provisioning of the aforementioned services become an uphill task especially while dealing with real-time streaming data. These networks operates with resource-constrained sensor nodes for days, months and even years depending on the nature of an application. The resource-constrained nature of these networks makes it difficult for the nodes to tackle real-time data in mission-critical applications such as military surveillance, forest fire monitoring, health-care and industrial automation. For a secured MWSN, the transmission and processing of streaming data needs to be explored deeply. The conventional data authentication schemes are not suitable for MWSNs due to the limitations imposed on sensor nodes in terms of battery power, computation, available bandwidth and storage. In this paper, we propose a novel quality-driven clustering-based technique for authenticating streaming data in MWSNs. Nodes with maximum energy are selected as Cluster Heads (CHs). The CHs collect data from member nodes and forward it to the Base Station (BS), thus preventing member nodes with low energy from dying soon and increasing life span of the underlying network. The proposed approach not only authenticates the streaming data but also maintains the quality of transmitted data. The proposed data authentication scheme coupled with an Error Concealment technique provides an energy-efficient and distortion-free real-time data streaming. The proposed scheme is compared with an unsupervised resources scenario. The simulation results demonstrate better network lifetime along with 21.34 dB gain in Peak Signal-to-Noise Ratio (PSNR) of received video data streams.
Efficient spatio-temporal sensor deployments: A smart building application
- Authors: Linh, Nguyen , Guoqiang, Hu , Spanos, Costas J.
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 13th IEEE International Conference on Control & Automation (ICCA); Ohrid, Macedonia; 03-06 July, 2017 p. 612-617
- Full Text: false
- Reviewed:
- Description: The paper addresses the problem of efficiently deploying sensors in spatial environments, e.g. smart buildings, for the purpose of monitoring environmental phenomena. By modelling the environmental fields using spatio-temporal Gaussian processes, a new and efficient optimality criterion of minimizing prediction uncertainties is proposed to find the best sensor locations. Though the environmental processes spatially and temporally vary, the proposed approach of choosing sensor positions is not affected by time variations, which significantly reduces computational complexity of the optimization problem. The sensor deployment problem is then solved by a practically and feasibly polynomial algorithm, where its solutions are guaranteed. The proposed approaches were implemented in a real tested space in a university building, where the obtained results are highly promising.
Periodic associated sensor patterns mining from wireless sensor networks
- Authors: Rashid, Mamunur , Kamruzzaman, Joarder , Gondal, Iqbal , Hassan, Rafiul
- Date: 2017
- Type: Text , Conference proceedings
- Relation: Proceedings of the 24th International Conference on Neural Information Processing (ICONIP 2017); Guangzhou, China; 14/11/2017-18/11/2017 p. 247-255
- Full Text: false
- Reviewed:
- Description: Mining interesting knowledge from the massive amount of data gathered in wireless sensor networks is a challenging task. Works reported in literature all-confidence measure based associated sensor patterns can captures association-like co-occurrences and the strong temporal correlations implied by such co-occurrences in the sensor data. However, when the user given all-confidence threshold is low, a huge amount of patterns are generated and mining these patterns may not be space and time efficient. Temporal periodicity of pattern appearance can be regarded as an important criterion for measuring the interestingness of associated patterns in WSNs. Associated sensor patterns that occur after regular intervals is called periodic associated sensor patterns. Even though mining periodic associated sensor patterns from sensor data stream is extremely important in many real-time applications, no such algorithm has been proposed yet. In this paper, we propose a compact tree structure called Periodic Associated Sensor Pattern-tree (PASP-tree) and an efficient mining approach for finding periodic associated sensor patterns (PASPs) from WSNs. Extensive performance analyses show that our technique is time and memory efficient in finding periodic associated sensor patterns.
Monitoring body motions related to Huntington disease by exploiting the 5G Paradigm
- Authors: Haider, Daniyal , Romain, Olivier , Kernec, Julien Le , Shah, Syed Yaseen , Farooq, Malik Muhammad Umer , Qadus, Zunaira
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 UK/ China Emerging Technologies (UCET); Glasgow UK; 21-22 August 2019 p. 1-4
- Full Text: false
- Reviewed:
- Description: The modern wireless technology exploiting the full potential of 5G IoT is the future for healthcare sector. In the healthcare sector, the 5G technology will maximize the performance and will reduce the chances of damage to the patient by providing careful and advance activity monitoring scenarios. We have proposed the idea of monitoring different body posture in Huntington disease by exploiting the low cost wireless devices operating at 4.8 GHz frequency. The system captures the wireless channel information for three body motions and classification of these motions was performed by using support vector machine. The SVM used 10 time-domain features for the classification process by using three main kernel functions, such as, Linear, Polynomial and Radial basis function. The system minimizes all the external noise by using the microwave absorbing materials. This increases the performance and feasibility of sensing body motions.
Security hardening of implantable cardioverter defibrillators
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology