Loading...
Search for: sensor-networks
0.02 seconds
Total 325 records

    2D Hash Chain robust Random Key Distribution scheme

    , Article Information Processing Letters ; Volume 116, Issue 5 , 2016 , Pages 367-372 ; 00200190 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Many Random Key Distribution (RKD) schemes have been proposed in the literature to enable security applications in Wireless Sensor Networks (WSNs). A main security aspect of RKD schemes is their resistance against node capture attacks, since compromising the sensors and capturing their keys is a common risk in such networks. We propose a new method, based on a 2-Dimensional Hash Chain (2DHC), that can be applied on any RKD scheme to improve their resilience. Our method maintains the flexibility and low cost features of RKD schemes and it doesn't require any special-purpose hardware or extra memory to store keys in the sensors. We demonstrate that our approach significantly increases the... 

    3D visibility and partial visibility complex

    , Article 2007 International Conference on Computational Science and its Applications, ICCSA 2007, Kuala Lumpur, 26 August 2007 through 29 August 2007 ; September , 2007 , Pages 208-215 ; 0769529453 (ISBN); 9780769529455 (ISBN) Nouribygi, M ; Ghodsi, M ; Sharif University of Technology
    2007
    Abstract
    Visibility is an important topic in computer graphics, motion planning, and computational geometry. To deal with the increasing complexity of the scenes considered, some research has been performed in visibility processing in order to accelerate the visibility determination. Two of the most studied such structures are visibility graph and visibility complex. Visibility graph is a fundamental geometric structure which is used in many applications, including illumination and rendering, motion planning, pattern recognition, and sensor networks. While the concept of visibility graph is widely studied for 2D scenes, there is no acceptable equivalence of visibility graph for 3D space. Similarly,... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act... 

    A biometric security scheme for wireless body area networks

    , Article Journal of Information Security and Applications ; Volume 41 , 2018 , Pages 62-74 ; 22142134 (ISSN) Dodangeh, P ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Wireless body area networks (WBANs) are receiving significant interest as the next generation of wireless networks and emerging technology in the field of health monitoring. One of the most important factors for the acceptance of WBANs is the provision of appropriate security and access control mechanisms. Due to its nature in transferring the patients' sensitive data, WBAN has both classical and specific security requirements. In this paper, we survey such requirements and propose a new security scheme for satisfying them in WBANs. The proposed scheme deals with the overall network architecture, including intra- and inter-WBAN tiers, and proposes two mutual authentication and key exchange... 

    Abnormality detection and monitoring in multi-sensor molecular communication

    , Article IEEE Transactions on Molecular, Biological, and Multi-Scale Communications ; Volume 5, Issue 2 , 2019 , Pages 68-83 ; 23327804 (ISSN) Ghoroghchian, N ; Mirmohseni, M ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of detecting and monitoring changes (abnormality) in molecular communication (MC), using the quickest change detection (QCD) schemes. The objective is to watch an environment using a sensor network and make decisions on the time and location of changes based on the received signals from sensors in the fusion center (FC). Such assumptions call for considering spatial and temporal correlations among sensors' transmitting signals. We use the framework of Partially Observable Markov Decision Processes (POMDPs) based on non-homogeneous Markov models. The metric in detection (stopping-time) scenario is to minimize the delay of announcing an abnormality... 

    A cycle by cycle FSK demodulator with high sensitivity of 1% frequency modulation index for implantable medical devices

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 69, Issue 11 , 2022 , Pages 4682-4690 ; 15498328 (ISSN) Razavi Haeri, A. A ; Safarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    This paper presents a cycle by cycle Frequency Shift Keying (FSK) demodulator, able to demodulate a FSK signal with 1% frequency modulation index (MI), in a single cycle. Based on the proposed demodulation scheme, a high rate data transmission link can be established through a high-Q inductive coupling link, breaking the basic tradeoff between the power transfer efficiency (PTE) and data rate in single carrier wireless power and data transfer systems. Designed and simulated with 0.18μ m CMOS process, the proposed FSK demodulator, detects successfully a 5Mbps data with a carrier frequency of 5MHz. A test chip is fabricated in 180nm CMOS technology. Measurement results shows that the... 

    Adaptive consensus averaging for information fusion over sensor networks

    , Article 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS, Vancouver, BC, 9 October 2006 through 12 October 2006 ; Volume 1 , 2006 , Pages 562-565 ; 1424405076 (ISBN); 9781424405077 (ISBN) Talebi, M. S ; Kefayati, M ; Khalaj, B. H ; Rabiee, H. R ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    This paper introduces adaptive consensus, a spatio-temporal adaptive method to improve convergence behavior of the current consensus fusion schemes. This is achieved by introducing a time adaptive weighting method for updating each sensor data in each iteration. Adaptive consensus method will improve node convergence rate, average convergence rate and the variance of error over the network. A mathematical formulation of the method according to the adaptive filter theory as well as derivation of the time adaptive weights and convergence conditions are presented. The analytical results are verified by simulation as well. ©2006 IEEE  

    Adaptive fault-tolerant data flooding for energy-aware sensor networks

    , Article 2nd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Chennai, 4 January 2005 through 7 January 2005 ; Volume 2005 , 2005 , Pages 83-87 ; 0780388402 (ISBN); 9780780388406 (ISBN) Karzand, M ; Ghannad Rezaie, M ; Shah Mansouri, V ; Sharif University of Technology
    2005
    Abstract
    Flooding technique is widely using to manipulate sensor network essential activities such as synchronization, data gathering, network query and in-network information processing. Reliable and low latency data broadcasting is the primary goal in design of appropriate quality of service aware flooding algorithm. This paper proposes a new error-rate adaptive reliable data flooding strategy. Energy consumption which it the main limitation in sensor network, has been considered in optimal presented scheme. Also the tradeoff between reliability, power consumption and latency has been cared to achieve the finest devise. The simulation results have shown significant enhancement in quality of data... 

    A differential cooperative transmission scheme with low rate feedback

    , Article 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2009, Taipei, 19 April 2009 through 24 April 2009 ; 2009 , Pages 2621-2624 ; 15206149 (ISSN); 9781424423545 (ISBN) Paredes, J. M ; Khalaj, B. H ; Gershman, A. B ; Institute of Electrical and Electronics Engineers; Signal Processing Society ; Sharif University of Technology
    2009
    Abstract
    The use of cooperative schemes in wireless networks has recently attracted much attention in scenarios where application of multipleantenna systems is impractical. In such scenarios, the requirement of having full channel state information (CSI) at the receiver side can be relaxed by using differential distributed (DD) transmission schemes. However, in the DD schemes proposed so far, the decoding complexity as well as the delay requirements increase with the number of relays. In this paper, we propose a low-rate feedback-based DD approach (with one-bit feedback per relay) that enjoys full diversity, linear maximum likelihood (ML) decoding complexity, and unrestrictive delay requirements. In... 

    A Distributed 1-bit compressed sensing algorithm robust to impulsive noise

    , Article IEEE Communications Letters ; Volume 20, Issue 6 , 2016 , Pages 1132-1135 ; 10897798 (ISSN) Zayyani, H ; Korki, M ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    This letter proposes a sparse diffusion algorithm for 1-bit compressed sensing (CS) in wireless sensor networks, and the algorithm is inherently robust against impulsive noise. The approach exploits the diffusion strategy from distributed learning in the 1-bit CS framework. To estimate a common sparse vector cooperatively from only the sign of measurements, a steepest descent method that minimizes the suitable global and local convex cost functions is used. A diffusion strategy is suggested for distributive learning of the sparse vector. A new application of the proposed algorithm to sparse channel estimation is also introduced. The proposed sparse diffusion algorithm is compared with both... 

    A fault-tolerant and energy-aware mechanism for cluster-based routing algorithm of WSNs

    , Article Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, 11 May 2015 through 15 May 2015 ; May , 2015 , Pages 659-664 ; 9783901882760 (ISBN) Hezaveh, M ; Shirmohammdi, Z ; Rohbani, N ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Wireless Sensor Networks (WSNs) are prone to faults due to battery depletion of nodes. A node failure can disturb routing as it plays a key role in transferring sensed data to the end users. This paper presents a Fault-Tolerant and Energy-Aware Mechanism (FTEAM), which prolongs the lifetime of WSNs. This mechanism can be applied to cluster-based WSN protocols. The main idea behind the FTEAM is to identify overlapped nodes and configure the most powerful ones to the sleep mode to save their energy for the purpose of replacing a failed Cluster Head (CH) with them. FTEAM not only provides fault tolerant sensor nodes, but also tackles the problem of emerging dead area in the network. Our... 

    A flexible approach to interference cancellation in distributed sensor networks

    , Article IEEE Communications Letters ; Volume 25, Issue 6 , 2021 , Pages 1853-1856 ; 10897798 (ISSN) Shamsi, M ; Haghighi, A. M ; Bagheri, N ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In a distributed algorithm several processing nodes communicate with each other and incorporate in order to reach a common goal. Each unit has its own locally-observed environment while it can either help or mislead other units when sharing its information. This could be either intentional or simply due to the observation noise. Previous works mainly focus on locating the agents properly and assigning weights based on stationary environment in order to minimize the impact of noisy nodes. We, however, propose a method capable of assigning combination weights in accordance with momentary performance of the neighboring nodes. In order to demonstrate this capability, the proposed algorithm has... 

    A framework for reliable and ubiquitous inference in wireless sensor network

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 63-70 ; 9781538614754 (ISBN) Shamsaie, A ; Abdi, E ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. This framework brings the reliability... 

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    A fuzzy sequential locomotion mode recognition system for lower limb prosthesis control

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 2153-2158 ; 9781509059638 (ISBN) Shahmoradi, S ; Bagheri Shouraki, S ; Sharif University of Technology
    Abstract
    Control of powered lower limb prostheses has a locomotion mode-dependent structure which demands a pattern recognizer that can classify the current locomotion mode and also detect transitions between them in an appropriate time. In order to achieve this goal, this paper presents a Fuzzy sequential locomotion mode recognition system to classify daily locomotion modes including level- walking, stair climbing, slope walking, standing and sitting using low-cost mechanical sensors. Since these signals have a quasi-periodic nature, using sequential pattern recognition tools, such as Hidden Markov Model(HMM) improves the recognition performance considering they use sequences of information to make... 

    A Game Theory approach for optimal routing: In Wireless Sensor Networks

    , Article 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, 23 September 2010 through 25 September 2010 ; September , 2010 ; 9781424437092 (ISBN) Arisian, B ; Eshghi, K ; Sharif University of Technology
    2010
    Abstract
    In this paper, a "Game Theory" approach for finding an optimal path in a "Wireless Sensor Network" is discussed. WSN is one of the most interesting research fields in the communication networks, and is the center of attention in recent years. In our model, a pricing and payment technique is presented to obtain an optimal path in a WSN by considering reliability, energy and traffic load. The proposed algorithm is able to find a path which improves network lifetime, load distribution and path reliability  

    A game theory approach for optimal routing: in wireless sensor networks [electronic resource]

    , Article Published in: Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on ; (2013), Vol. 3, No. 3, pp. 62-75 Arisian, B. (Babak) ; Eshghi, Kourosh ; Sharif University of Technology
    Abstract
    In this paper, a "Game Theory" approach for finding an optimal path in a "Wireless Sensor Network" is discussed. WSN is one of the most interesting research fields in the communication networks, and is the center of attention in recent years. In our model, a pricing and payment technique is presented to obtain an optimal path in a WSN by considering reliability, energy and traffic load. The proposed algorithm is able to find a path which improves network lifetime, load distribution and path reliability  

    A generalized total least squares algorithm for RSS-based localization with unknown path-loss model parameters

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 521-524 ; 9781467387897 (ISBN) Rahimi, G ; Danaee, M. R ; Bayat, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Node localization is of paramount importance to different wireless sensor network (WSN) applications. This paper investigates the received signal strength (RSS) based localization problem with unknown path-loss model parameters. Most works in RSS localization assume the transmit power and path-loss exponent (PLE) are known that is not a realistic assumption in some cases. However this paper, assumes the transmit power and the PLE are both unknown and a novel algorithm for sensor location is proposed. The algorithm is based on the generalized total least-squares (GTLS) method and gives an explicit solution for the localization problem. The performance of the proposed method is compared with... 

    A graph weighting method for reducing consensus time in random geographical networks

    , Article 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, 20 April 2010 through 23 April 2010, Perth ; 2010 , Pages 317-322 ; 9780769540191 (ISBN) Jalili, M ; Sharif University of Technology
    2010
    Abstract
    Sensor networks are increasingly employed in many applications ranging from environmental to military cases. The network topology used in many sensor network applications has a kind of geographical structure. A graph weighting method for reducing consensus time in random geographical networks is proposed in this paper. We consider a method based on the mutually coupled oscillators for providing general consensus in the network. In this way, one can relate the consensus time to the properties of the Laplacian matrix of the connection graph, i.e. to the second smallest eigenvalue (algebraic connectivity). Our weighting algorithm is based on the node and edge between centrality measures. The... 

    A hierarchical routing protocol for energy load balancing in wireless sensor networks

    , Article 2007 Canadian Conference on Electrical and Computer Engineering, CCECD, Vancouver, BC, 22 April 2007 through 26 April 2007 ; 2007 , Pages 1086-1089 ; 08407789 (ISSN) ; 1424410215 (ISBN); 9781424410217 (ISBN) Amini, N ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, a hierarchical routing protocol for wireless sensor networks is introduced that aims at reducing the energy imbalance among sensor nodes by integrating the distance of the nodes from the base station into clustering policies. Moreover, the proposed routing protocol does not need any centralized support from a certain node which is at odds with aiming to establish a scalable routing protocol. Mobility management is a salient feature of this protocol that guarantees reliable communications between mobile and static nodes. A simulator was developed in the MATLAB environment to evaluate the performance of this protocol. Simulations on two different network configurations are used...