Loading...
Search for: wireless-sensor-networks
0.014 seconds

    Channel modeling and reliability assessment for body-centric wireless communications

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 1-7 ; 9781509059638 (ISBN) Razavi, A ; Jahed, M ; Sharif University of Technology
    Abstract
    Wireless Body Area Networks (WBANs) are one of the emerging technological trends that have gained a lot of attention both from academic and industrial domains. WBAN, as standardized by IEEE 802.15.6, is a network composed of intelligent, miniaturized, low power nodes that are implanted in, placed on or in close proximity of human body for certain healthcare applications. Sensors send their acquired data to a central hub wirelessly for further processing. In this paper, based on a publicly available channel data set, we investigate the applicable channel models in a typical WBAN. Considering various scenarios with different carrier frequencies, bandwidths, body movements, and transceiver... 

    A biometric security scheme for wireless body area networks

    , Article Journal of Information Security and Applications ; Volume 41 , 2018 , Pages 62-74 ; 22142134 (ISSN) Dodangeh, P ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Wireless body area networks (WBANs) are receiving significant interest as the next generation of wireless networks and emerging technology in the field of health monitoring. One of the most important factors for the acceptance of WBANs is the provision of appropriate security and access control mechanisms. Due to its nature in transferring the patients' sensitive data, WBAN has both classical and specific security requirements. In this paper, we survey such requirements and propose a new security scheme for satisfying them in WBANs. The proposed scheme deals with the overall network architecture, including intra- and inter-WBAN tiers, and proposes two mutual authentication and key exchange... 

    Semi-myopic algorithm for resource allocation in wireless body area networks

    , Article IET Wireless Sensor Systems ; Volume 8, Issue 1 , January , 2018 ; 20436386 (ISSN) Karimzadeh Farshbafan, M ; Ashtiani, F ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Abstract
    The key features of wireless body area networks are limited energy resources of the sensor nodes and the need for highly reliable packet transmission. Therefore, designing a suitable algorithm that schedules transmission of the nodes is very important. Although an optimal algorithm has been previously reported based on a partially observable Markov decision process (POMDP), its complexity is high. In this study, the authors propose a suboptimal algorithm for scheduling the transmissions, i.e. a semi-myopic algorithm, with a performance close to the optimal, albeit with much lower complexity. To this end, they modify the structure of the cost function of the optimal algorithm such that the... 

    Energy-efficient speed routing protocol for wireless sensor networks

    , Article 2009 5th Advanced International Conference on Telecommunications, AICT 2009, Venice, Mestre, 24 May 2009 through 28 May 2009 ; 2009 , Pages 267-271 ; 9780769536118 (ISBN) Kordafshari, M. S ; Pourkabirian, A ; Faez, K ; Rahimabadi, A. M ; IARIA ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose an approach for routing in SPEED protocol considering residual energy in routing decisions. Due to the limited energy of a sensor node, energyefficient routing is a very important issue in sensor networks. This approach finds energy-efficient paths for delayconstrained data in real-time traffic. The SPEED protocol does not consider any energy metric in its routing. In our approach, routing is based on a weight function, which is a combination of the three factors: Delay, Energy & Speed. Here, the node with the greatest value in the weight function is to be selected as the next hop forwarding. We increase the network lifetime by considering energy metric in routing... 

    An analytical performance evaluation for WSNs using loop-free bellman ford protocol

    , Article 2009 International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, 26 May 2009 through 29 May 2009 ; 2009 , Pages 568-571 ; 1550445X (ISSN); 9780769536385 (ISBN) Baharloo, M ; Hajisheykhi, R ; Arjomand, M ; Jahangir, A. H ; IEEE Computer Society ; Sharif University of Technology
    2009
    Abstract
    Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service distribution as well as design constraints on network performance. This paper presents a new analytical model to compute message latency in a WSN with loop-free Bellman Ford routing strategy. The model considers limited buffer size for each node using M/G/1/k queuing system. Also, contention probability and resource utilization are suitably modeled. The results obtained from simulation experiments confirm that the model exhibits a high degree of accuracy for various network configurations. © 2009 IEEE  

    A differential cooperative transmission scheme with low rate feedback

    , Article 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2009, Taipei, 19 April 2009 through 24 April 2009 ; 2009 , Pages 2621-2624 ; 15206149 (ISSN); 9781424423545 (ISBN) Paredes, J. M ; Khalaj, B. H ; Gershman, A. B ; Institute of Electrical and Electronics Engineers; Signal Processing Society ; Sharif University of Technology
    2009
    Abstract
    The use of cooperative schemes in wireless networks has recently attracted much attention in scenarios where application of multipleantenna systems is impractical. In such scenarios, the requirement of having full channel state information (CSI) at the receiver side can be relaxed by using differential distributed (DD) transmission schemes. However, in the DD schemes proposed so far, the decoding complexity as well as the delay requirements increase with the number of relays. In this paper, we propose a low-rate feedback-based DD approach (with one-bit feedback per relay) that enjoys full diversity, linear maximum likelihood (ML) decoding complexity, and unrestrictive delay requirements. In... 

    Cost-aware reactive monitoring in resource-constrained wireless sensor networks

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Talebi, M ; Khonsari, A ; Jabarvand, R ; Sharif University of Technology
    2009
    Abstract
    Motivated by applications of sensor networks, there has been growing interest in monitoring large scale distributed systems. In these applications, we usually wish to monitor a global system condition defined as a function of local network elements parameters. In this paper, we study Reactive Monitoring in sensor networks, which has the benefit of operating in a decentralized manner. Our primary concern in adopting such a monitoring paradigm is reducing the communication cost which is the dominant factor of energy drain in wireless sensor networks. In this study, we address the reactive aggregate monitoring problem by casting the underlying threshold assignment as an optimization problem.... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act... 

    New routing framework base on rumor routing in wireless sensor networks

    , Article Computer Communications ; Volume 32, Issue 1 , 2009 , Pages 86-93 ; 01403664 (ISSN) Shokrzadeh, H ; Haghighat, A. T ; Nayebi, A ; Sharif University of Technology
    2009
    Abstract
    Rumor routing is a classic routing algorithm based on agents' random walk. This paper proposes a novel approach based on this routing algorithm. Here, we try to improve the latency and energy consumption of the traditional algorithm using propagation of query and event agents within straight lines, instead of using purely random walk paths. As can be seen in our results, this method improves the delivery ratio of the queries which is a drawback of traditional rumor routing. Due to the reduction of final path length between source and destination, we introduce a second layer geographical routing. Moreover, a method is proposed to reduce the cost of localization equipments by using cheaper... 

    A TDMA-based MAC protocol for mobile sensor networks

    , Article 8th International Conference on Networks, ICN 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 71-75 ; 9780769535524 (ISBN) Ordouei, M ; Manzuri Shalmani, M. T ; IARIA ; Sharif University of Technology
    2009
    Abstract
    Although many Medium Access Control (MAC) protocols have been specifically designed for WSNs where energy awareness is an essential consideration, only a few of them have considered the presence of mobile nodes or dynamic network topology in their protocols. However, they have usually considered occasional mobility, in which a few number of nodes may start moving at very low speeds and then remained immobile for a long period of time. In this paper, we propose a modified version of LMAC as Mobile-LMAC (MLMAC) to improve its performance in the scenarios include continuous mobility. The protocol is compared to SMAC and LMAC by simulation. The results show that the proposed MLMAC protocol has... 

    Dandelion: A unified code offloading system for wearable computing

    , Article IEEE Transactions on Mobile Computing ; Volume 18, Issue 3 , 2019 , Pages 546-559 ; 15361233 (ISSN) Golkarifard, M ; Yang, J ; Huang, Z ; Movaghar, A ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Execution speed seriously bothers application developers and users for wearable devices such as Google Glass. Intensive applications like 3D games suffer from significant delays when CPU is busy. Energy is another concern when the devices are in low battery level, but users need them for urgency use. To ease such pains, one approach is to expand the computational power by cloud offloading. This paradigm works well when the available Internet access has enough bandwidth. Another way is to leverage nearby devices for computation-offloading, which is known as device-to-device (D2D) offloading. In this paper, we present Dandelion, a unified code offloading system for wearable computing. Such... 

    Notice of violation of IEEE publication principles: a new automatic clustering algorithm via deadline timer for wireless ad-hoc sensor networks

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, 7 April 2008 through 11 April 2008, Damascus ; 2008 ; 9781424417513 (ISBN) Bazregar, A ; Movaghar, A ; Barati, A ; Eslami Nejhad, M. R ; Barati, H ; Sharif University of Technology
    2008
    Abstract
    This paper proposes a decentralized algorithm to organize an ad-hoc sensor network into clusters. Each sensor operates independently, monitoring communication among others. Those sensors which have many neighbors that are not already part of a cluster are likely candidates to creating a new cluster by declaring themselves to be a new cluster-head. The Clustering Algorithm via Deadline Timer (CADT) provides a protocol whereby this can be achieved and the process continues until all sensors are part of a cluster. Because of the difficulty of analyses simplified models are used to study and abstract its performance. A simple formula to estimate the number of clusters which will be formed in an... 

    Solving stochastic path problem: particle swarm optimization approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 18 June 2008 through 20 June 2008, Wroclaw ; Volume 5027 LNAI , 2008 , Pages 590-600 ; 03029743 (ISSN); 354069045X (ISBN); 9783540690450 (ISBN) Momtazi, S ; Kafi, S ; Beigy, H ; Sharif University of Technology
    2008
    Abstract
    An stochastic version of the classical shortest path problem whereby for each node of a graph, a probability distribution over the set of successor nodes must be chosen so as to reach a certain destination node with minimum expected cost. In this paper, we propose a new algorithm based on Particle Swarm Optimization (PSO) for solving Stochastic Shortest Path Problem (SSPP). The comparison of our algorithm with other algorithms indicates that its performance is suitable even by the less number of iterations. © 2008 Springer-Verlag Berlin Heidelberg  

    A hierarchical routing protocol for energy load balancing in wireless sensor networks

    , Article 2007 Canadian Conference on Electrical and Computer Engineering, CCECD, Vancouver, BC, 22 April 2007 through 26 April 2007 ; 2007 , Pages 1086-1089 ; 08407789 (ISSN) ; 1424410215 (ISBN); 9781424410217 (ISBN) Amini, N ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, a hierarchical routing protocol for wireless sensor networks is introduced that aims at reducing the energy imbalance among sensor nodes by integrating the distance of the nodes from the base station into clustering policies. Moreover, the proposed routing protocol does not need any centralized support from a certain node which is at odds with aiming to establish a scalable routing protocol. Mobility management is a salient feature of this protocol that guarantees reliable communications between mobile and static nodes. A simulator was developed in the MATLAB environment to evaluate the performance of this protocol. Simulations on two different network configurations are used... 

    PL-MAC; ProLonging network lifetime with a MAC layer approach in Wireless Sensor Networks

    , Article 2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, 25 August 2008 through 31 August 2008 ; 2008 , Pages 109-114 ; 9780769533308 (ISBN) Irandoost, A ; Taheri, S ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Energy consumption is one of the most important design criteria in Wireless Sensor Networks. Sensor nodes are expected to be battery-equipped. Due to their working environments, recharging or replacing batteries for each node is difficult and uneconomical. So prolonging the service lifetime of sensor nodes is a critical issue. The MAC protocol for WSNs plays a very important role in the control of energy consumption. Many of proposed MAC protocols attempt only to prolong the network lifetime for energy-efficiency. In this paper, we are going to reduce end-to-end latency in addition to extending the network lifetime. To reach this purpose, we propose a new adaptively ProLong MAC protocol... 

    A network information gathering (NIG) protocol and energy-aware load balancing algorithm for wireless sensor network

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 407-412 ; 1424410940 (ISBN); 9781424410941 (ISBN) Taifeh Aliverdi, M ; Pakravan, M. R ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose an energy-aware node-eentric load balancing algorithm that constructs a load balanced tree in sensor networks of asymmetric architecture. We show that the proposed energy-aware algorithm creates routing trees with better load balancing across the network and longer network life time compared to the other proposed algorithms. We also introduce a network information gathering (NIG) protocol that can collect the required information (load and neighboring information) from nodes and forward them to the base station. This protocol can be used by all centralized systems that require some additional information about nodes in the network. ©2007 IEEE  

    Coin: A COverage INcreasing algorithm in mixed sensor networks

    , Article 2007 International Conference on Sensor Technologies and Applications, SENSORCOMM 2007, Valencia, 14 October 2007 through 20 October 2007 ; December , 2007 , Pages 271-276 ; 0769529887 (ISBN); 9780769529882 (ISBN) Taheri, S ; Irandoost, A ; Movaghar, A ; Sharif University of Technology
    2007
    Abstract
    Sensor networks are systems of many small units that work together to monitor a given environment. A mixed sensor network is composed of a collection of static and mobile nodes that has sensing, computation, communication, and locomotion capabilities. Sensor mobility can be used to compensate for the lack of sensors and improve network coverage. This paper aims to describe an algorithm called Coin for mixed sensor network deployment in an unknown environment by using a small number of mobile sensors. It allows the network to achieve maximum coverage with minimum energy consumption. Our solution includes distributed schemes for: 1) determining the exact size of a coverage hole; 2) determining... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes... 

    SYNCOP: An evolutionary multi-objective placement of SDN controllers for optimizing cost and network performance in WSNs

    , Article Computer Networks ; Volume 185 , 2021 ; 13891286 (ISSN) Tahmasebi, S ; Rasouli, N ; Kashefi, A. H ; Rezabeyk, E ; Faragardi, H. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Due to the highly dynamic nature of Wireless Sensor Networks (WSN), Software-Defined Network (SDN) is a promising technology to ease network management by providing a logically centralized control plane. It is a common approach to employ multiple SDN controllers to form a physically distributed SDN to achieve better fault tolerance, boost scalability, and enhance performance. Despite physical distribution, since the notion behind SDN is to logically centralize network management, it is essential to provide a consistent view of the network's state for all controllers. Deploying multiple controllers result in higher synchronization and deployment cost. Since network performance and... 

    A cycle by cycle FSK demodulator with high sensitivity of 1% frequency modulation index for implantable medical devices

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 69, Issue 11 , 2022 , Pages 4682-4690 ; 15498328 (ISSN) Razavi Haeri, A. A ; Safarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    This paper presents a cycle by cycle Frequency Shift Keying (FSK) demodulator, able to demodulate a FSK signal with 1% frequency modulation index (MI), in a single cycle. Based on the proposed demodulation scheme, a high rate data transmission link can be established through a high-Q inductive coupling link, breaking the basic tradeoff between the power transfer efficiency (PTE) and data rate in single carrier wireless power and data transfer systems. Designed and simulated with 0.18μ m CMOS process, the proposed FSK demodulator, detects successfully a 5Mbps data with a carrier frequency of 5MHz. A test chip is fabricated in 180nm CMOS technology. Measurement results shows that the...