scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Distributed Sensor Networks in 2014"


Journal ArticleDOI
TL;DR: This work will summarise all the technologies that have been used for forest fire detection with exhaustive surveys of their techniques/methods used with exhaustive comparisons between the four methods.
Abstract: Context. Apart from causing tragic loss of lives and valuable natural and individual properties including thousands of hectares of forest and hundreds of houses, forest fires are a great menace to ecologically healthy grown forests and protection of the environment. Every year, thousands of forest fires across the globe cause disasters beyond measure and description. This issue has been the research interest for many years; there are a huge amount of very well studied solutions available out there for testing or even ready for use to resolve this problem. Aim. This work will summarise all the technologies that have been used for forest fire detection with exhaustive surveys of their techniques/methods used in this application. Methods. A lot of methods and systems are available in the market and for research. The paper reviews all the methods and discusses examples of research experiment results and some market product methods for better understanding. Result. Each technique has its own advantages and disadvantages. A full discussions provided after each type. Conclusion. A full table is provided at the end to summarise a comparison between the four methods.

263 citations


Journal ArticleDOI
TL;DR: This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment.
Abstract: Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

209 citations


Journal ArticleDOI
TL;DR: A survey of CPS in healthcare applications that have been proposed to date by academia as well as industry is presented and a comprehensive taxonomy is provided that characterizes and classifies different components and methods that are required for the application of CPS for healthcare.
Abstract: Cyber-physical system (CPS) is an integration of physical processes with computation and communication. It has the ability to add more intelligence to social life. Wireless sensor networks (WSN) can be a vital part of CPS as strong sensing capability is one of the major driving factors for CPS applications. CPS is still considered to be a nascent technology, and there are many challenges yet to be addressed. A few CPS applications in healthcare have been proposed to date, and they lack the flexibility of technology integration, such as integration of computing resources with sensor networks. This paper presents a survey of CPS in healthcare applications that have been proposed to date by academia as well as industry. A comprehensive taxonomy is also provided that characterizes and classifies different components and methods that are required for the application of CPS in healthcare. The taxonomy not only highlights the similarities and differences of the state-of-the-art technologies utilized in CPS for healthcare from the perspective of WSN and Cloud Computing but also identifies the areas that require further research. It is expected that this taxonomy and its mapping to relevant systems will be highly useful for further development of CPS for healthcare.

208 citations


Journal ArticleDOI
TL;DR: This proposed forwarding-function based routing protocol for underwater sensor networks (UWSNs) provides on-demand routing by formulating hard threshold, soft threshold, and prime energy limit, and simulation results verify effectiveness and efficiency of the proposed iAMCTD.
Abstract: We propose forwarding-function (FF) based routing protocol for underwater sensor networks (UWSNs): improved adaptive mobility of courier nodes in threshold-optimized depth-based-routing (iAMCTD). Unlike existing depth-based acoustic protocols, the proposed protocol exploits network density for time-critical applications. In order to tackle flooding, path loss, and propagation latency, we calculate optimal holding time (HT) and use routing metrics: localization-free signal-to-noise ratio (LSNR), signal quality index (SQI), energy cost function (ECF), and depth-dependent function (DDF). Our proposal provides on-demand routing by formulating hard threshold (Hth), soft threshold (Sth), and prime energy limit (Rprime). Simulation results verify effectiveness and efficiency of the proposed iAMCTD.

172 citations


Journal ArticleDOI
TL;DR: In this paper, some features of the smart grid have been discussed such as communications, demand response, and security, and microgrids and issues with integration of distributed energy sources are also considered.
Abstract: The smart grid is expected to revolutionize existing electrical grid by allowing two-way communications to improve efficiency, reliability, economics, and sustainability of the generation, transmission, and distribution of electrical power. However, issues associated with communication and management must be addressed before full benefits of the smart grid can be achieved. Furthermore, how to maximize the use of network resources and available power, how to ensure reliability and security, and how to provide self-healing capability need to be considered in the design of smart grids. In this paper, some features of the smart grid have been discussed such as communications, demand response, and security. Microgrids and issues with integration of distributed energy sources are also considered.

157 citations


Journal ArticleDOI
TL;DR: This work implements a smartphone-based HAR scheme that not only selects the most relevant features from each sensor for each activity but it also takes into account the differences resulting from carrying a phone at different positions.
Abstract: Although human activity recognition (HAR) has been studied extensively in the past decade, HAR on smartphones is a relatively new area. Smartphones are equipped with a variety of sensors. Fusing the data of these sensors could enable applications to recognize a large number of activities. Realizing this goal is challenging, however. Firstly, these devices are low on resources, which limits the number of sensors that can be utilized. Secondly, to achieve optimum performance efficient feature extraction, feature selection and classification methods are required. This work implements a smartphone-based HAR scheme in accordance with these requirements. Time domain features are extracted from only three smartphone sensors, and a nonlinear discriminatory approach is employed to recognize 15 activities with a high accuracy. This approach not only selects the most relevant features from each sensor for each activity but it also takes into account the differences resulting from carrying a phone at different positions. Evaluations are performed in both offline and online settings. Our comparison results show that the proposed system outperforms some previous mobile phone-based HAR systems.

150 citations


Journal ArticleDOI
TL;DR: A pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications, in which the sensor nodes can establish secured links with peer sensor nodes and end-users is proposed.
Abstract: Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet According to the distributed architecture, sensor nodes measure data, process, exchange information, and perform collaboratively with other sensor nodes and end-users, which can be internal or external to the network In order to maintain the trustworthy connectivity and the accessibility of distributed IoT, it is important to establish secure links for end-to-end communication with a strong pervasive authentication mechanism However, due to the resource constraints and heterogeneous characteristics of the devices, traditional authentication and key management schemes are not effective for such applications This paper proposes a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications, in which the sensor nodes can establish secured links with peer sensor nodes and end-users The established authentication scheme PAuthKey is based on implicit certificates and it provides application level end-to-end security A comprehensive description for the scenario based behavior of the protocol is presented With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs

142 citations


Journal ArticleDOI
TL;DR: This paper describes the new technology Software-Defined Networking (SDN) and analyzes its opportunities in the development of IoT applications and presents the first applications and projects based on this technology.
Abstract: The exponential growth of devices connected to the network has resulted in the development of new IoT applications and on-line services. However, these advances are limited by the rigidity of the current network infrastructure, in which the administrator has to implement high-level network policies adapting and configuring protocols manually and usually through a command line interface (CLI). At this point, Software-Defined Networking (SDN) appears as a viable alternative network architecture that allows for programming the network and opening the possibility of creating new services and more efficient applications to cover the actual requirements. In this paper, we describe this new technology and analyze its opportunities in the development of IoT applications. Similarly, we present the first applications and projects based on this technology. Finally, we discuss the issues and challenges in its implementation.

110 citations


Journal ArticleDOI
Junqi Duan1, Dong Yang1, Haoqing Zhu1, Sidong Zhang1, Jing Zhao1 
TL;DR: This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks and shows with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
Abstract: In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. However, several key issues in conventional trust-aware routing protocols still remain to be solved, such as the compatibility of trust metric with QoS metrics and the control of overhead produced by trust evaluation procedure. This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks. To meet the security requirements of routing protocols in WSNs, we first analyze features of common attacks on trust-aware routing schemes. Then, specific trust computation and trust derivation schemes are proposed based on analysis results. Finally, our design uses the combination of trust metric and QoS metrics as routing metrics to present an optimized routing algorithm. We show with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.

103 citations


Journal ArticleDOI
TL;DR: This paper presents Reliability Enhanced-Adaptive Threshold based Thermal-unaware Energy-efficient Multi-hop ProTocol (RE-ATTEMPT) for WBASNs, and conducts a comprehensive analysis supported by MATLAB simulations to provide an estimation of path loss.
Abstract: Modern health care system is one of the most popular Wireless Body Area Sensor Network (WBASN) applications and a hot area of research subject to present work. In this paper, we present Reliability Enhanced-Adaptive Threshold based Thermal-unaware Energy-efficient Multi-hop ProTocol (RE-ATTEMPT) for WBASNs. The proposed routing protocol uses fixed deployment of wireless sensors (nodes) such that these are placed according to energy levels. Moreover, we use direct communication for the delivery of emergency data and multihop communication for the delivery of normal data. RE-ATTEMPT selects route with minimum hop count to deliver data which downplays the delay factor. Furthermore, we conduct a comprehensive analysis supported by MATLAB simulations to provide an estimation of path loss, and problem formulation with its solution via linear programming model for network lifetime maximization is also provided. In simulations, we analyze our protocol in terms of network lifetime, packet drops, and throughput. Results show better performance for the proposed protocol as compared to the existing one.

101 citations


Journal ArticleDOI
TL;DR: This paper proposes an optimal routing protocol for WSN inspired by the foraging behavior of ants, which uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution.
Abstract: A wireless sensor network (WSN) is a collection of sensor nodes that dynamically self-organize themselves into a wireless network without the utilization of any preexisting infrastructure. One of the major problems in WSNs is the energy consumption, whereby the network lifetime is dependent on this factor. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulator 2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decreases the number of routing request packets, and increases the network lifetime in comparison with the original AODV.

Journal ArticleDOI
TL;DR: A novel intelligent supply chain integration and management system based on Cloud of Things is presented, in order to provide flexible and agile approaches to facilitate the resource sharing and participant collaboration in the whole supply chain life cycle.
Abstract: The fierce global competition and market turbulence has been forcing the enterprises towards to the integration and intelligence for supply chain management, and the seamless information sharing and collaboration as well as operation agility are the challenges which need to be conquered, in terms of the highly distributed and heterogeneous resources located in separated warehouses. Although a number of works have been done to achieve the aforementioned targets, few of them are able to provide an overall integration and intelligence support for such system management. In this context, a novel intelligent supply chain integration and management system based on Cloud of Things is presented, in order to provide flexible and agile approaches to facilitate the resource sharing and participant collaboration in the whole supply chain life cycle. Furthermore, the enabling technologies, such as intelligent supply chain condition perception, heterogeneous network access convergence, and resource servicisation, are also studied. Finally, a case study together with the prototype system is implemented and demonstrates that the developed system can efficiently realise the integration of supply chain processes in the form of services, and also provide the effective intelligence support for physical resource management, so as to achieve an overall performance assurance for the system operation.

Journal ArticleDOI
TL;DR: A relative distance based forwarding (RDBF) routing protocol, which aims to provide transmission efficient, energy-saving, and low delay routing, and results show that RDBF performs better in terms of packet delivery ratio, end-to-end delay, and energy efficiency.
Abstract: Underwater wireless sensor network (UWSN) features many unique characteristics, including slow propagation speed, high end-to-end delay, low available bandwidth, variable link quality, and energy constraint. All these problems pose a big challenge to devise a transmission efficient, energy-saving, and low delay routing protocol for UWSNs. In this paper we devise a relative distance based forwarding (RDBF) routing protocol, which aims to provide transmission efficient, energy-saving, and low delay routing. We utilize a fitness factor to measure and judge the degree of appropriateness for a node to forward the packets. Under the limitations of the fitness factor, RDBF can confine the scope of the candidate forwarders and find the beneficial relays to forward packets. In this way, only a small fraction of nodes are involved in forwarding process, which can distinctly reduce the energy consumption. Moreover, using only the selected beneficial nodes as forwarders can both enhance the transmission efficiency and reduce the end-to-end delay. This is because the distances of these nodes to the sink are the shortest and the hop counts of routing paths consisted by these nodes are minimum. We use the ns-2 based simulator to conduct our experiment; the results show that RDBF performs better in terms of packet delivery ratio, end-to-end delay, and energy efficiency.

Journal ArticleDOI
TL;DR: This paper proposes an intelligent street light control system based on adaptive behavior rules and evaluates the approach by using a simulator which combines wireless sensor networks and belief-desire-intention agents to enable a precise simulation of both the city infrastructure and the adaptive behavior that it implements.
Abstract: The driving force behind the smart city initiative is to offer better, more specialized services which can improve the quality of life of the citizens while promoting sustainability. To achieve both of these apparently competing goals, services must be increasingly autonomous and continuously adaptive to changes in their environment and the information coming from other services. In this paper we focus on smart lighting, a relevant application domain for which we propose an intelligent street light control system based on adaptive behavior rules. We evaluate our approach by using a simulator which combines wireless sensor networks and belief-desire-intention (BDI) agents to enable a precise simulation of both the city infrastructure and the adaptive behavior that it implements. The results reveal energy savings of close to 35% when the lighting system implements an adaptive behavior as opposed to a rigid, predefined behavior.

Journal ArticleDOI
TL;DR: The experimental results not only showed the corresponding framework of collaborative media service for efficient collaboration between caregivers and healthcare professionals more efficient than the similar system but also proved that the solution can work well for web service-based collaborative environment.
Abstract: With the increasing growth of media cloud technologies, web service technologies, and smartphones equipped sensors, a number of collaborative media services are being built for ubiquitous user access. Currently, collaborative services are being used in several areas like healthcare, defense, education, and so forth. However, due to the challenge of providing such service to users in terms of computations, communications, processing, and storage, there is a growing need for an infrastructure to have on-demand access to a shared pool of configurable computing resources (e.g., networks, storages, servers, applications, and services). Cloud computing is such a paradigm or infrastructure to provide configurable platform to support the collaborative service. In this paper, we present the corresponding framework of collaborative media service for efficient collaboration between caregivers and healthcare professionals. The experimental results not only showed our solution is more efficient than the similar system but also proved that our solution can work well for web service-based collaborative environment.

Journal ArticleDOI
TL;DR: The use of the IoT gateway is proposed as a fundamental component in IoT architectures to provide seamless connectivity and interoperability among things and connect two different worlds to build the IoT: the Things world and the Internet world.
Abstract: The Internet of Things (IoT) concept proposes that everyday objects are globally accessible from the Internet and integrate into new services having a remarkable impact on our society. Opposite to Internet world, things usually belong to resource-challenged environments where energy, data throughput, and computing resources are scarce. Building upon existing standards in the field such as IEEE1451 and ZigBee and rooted in context semantics, this paper proposes CTP (Communication Things Protocol) as a protocol specification to allow interoperability among things with different communication standards as well as simplicity and functionality to build IoT systems. Also, this paper proposes the use of the IoT gateway as a fundamental component in IoT architectures to provide seamless connectivity and interoperability among things and connect two different worlds to build the IoT: the Things world and the Internet world. Both CTP and IoT gateway constitute a middleware content-centric architecture presented as the mechanism to achieve a balance between the intrinsic limitations of things in the physical world and what is required from them in the virtual world. Said middleware content-centric architecture is implemented within the frame of two European projects targeting smart environments and proving said CTP’s objectives in real scenarios.

Journal ArticleDOI
Murat Dener1
TL;DR: This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN and presents characteristics, security requirements, attacks, encryption algorithms, and operation modes.
Abstract: In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. The paper also presents characteristics, security requirements, attacks, encryption algorithms, and operation modes. This paper is considered to be useful for security designers in WSNs.

Journal ArticleDOI
TL;DR: With the smart RFID tag, the freshness of the meat is estimated and the relationship between meat freshness and the sensor signal is estimated by comparing the temperature, humidity, and gas concentration of theMeat storage environment.
Abstract: This paper proposes a monitoring system for meat freshness and use-by date, based on the smart RFID (radio frequency identification) tag. Freshness can be checked by various factors, such as the presence of microorganisms, bacteria, and gases. This paper focuses on detecting the temperature, humidity, and the gases released by meat. We analyzed the factors affecting the freshness of meat and decided to use a gas sensor as the main detection method. We use temperature sensor and humidity sensor as auxiliary sensors to get the food poisoning index. The proposed system consists of an RFID tag, temperature sensor, humidity sensor, gas sensor, reader, and server. By comparing the temperature, humidity, and gas concentration of the meat storage environment, we can get the relationship between meat freshness and the sensor signal. This monitoring system can show the meat freshness at four distinct grades: High, Medium, Low, and Spoilage. In order to confirm the usefulness of the proposed system, we performed experiments on pork. With the smart RFID tag, we successfully estimated the freshness of the meat.

Journal ArticleDOI
Zhijie Han1, Wanli Ren1
TL;DR: This paper has put forward a new solution for WSNS in accordance with the OpenFlow technology research in the application of traditional network.
Abstract: Since the SDN (Software Defined Network) technology based on OpenFlow was born, domestic and foreign research institutions have had increasing attention to this emerging field. The OpenFlow technology which is known for standardization and compatibility network virtualization has brought a lot of innovative solutions in the field of research. As the wireless sensor network node is complex and difficult to move and the network topology is changing rapidly with time, this requires a routing protocol for it to be able to adapt to this high topology change. Because traditional WSNS protocol communication needs to consider energy consumption, load balancing and other factors, it is difficult to find one to take into account all aspects of network algorithms. In this paper, we put forward a new solution for WSNS in accordance with the OpenFlow technology research in the application of traditional network.

Journal ArticleDOI
TL;DR: A cross-layer proactive routing framework that constructs an ongoing routing table which includes multiple shortest-path routes to address diverse QoS requirements and a hotspot avoidance mechanism to avoid the packets to traverse through heated areas known as hotspot.
Abstract: Wireless body area networks (WBANs) can be formed including implanted biosensors for health monitoring and diagnostic purposes. However, implanted biosensors could cause thermal damages on human tissue as it exhibits temperature rise due to wireless communication and processing tasks inside the human body. Again, Quality of Service (QoS) provisioning with multiconstraints (delay and reliability) is a striking requirement for diverse application types in WBANs to meet their objectives. This paper proposes TMQoS, a thermal-aware multiconstrained intrabody QoS routing protocol for WBANs, with the aim of ensuring the desired multiconstrained QoS demands of diverse applications along with keeping the temperature of the nodes to an acceptable level preventing thermal damages. We develop a cross-layer proactive routing framework that constructs an ongoing routing table which includes multiple shortest-path routes to address diverse QoS requirements. To avoid the packets to traverse through heated areas known as hotspot, we devise a hotspot avoidance mechanism. The route selection algorithm of TMQoS selects forwarder(s) based on the intended QoS demands of diverse traffic classes. The performance of TMQoS has been evaluated through simulation which demonstrates that the protocol achieves desired QoS demands while maintaining low temperature in the network compared to the state-of-the-art thermal-aware approaches.

Journal ArticleDOI
TL;DR: The results depict the lead of IC-ACO as compared to LEACH protocol by indicating higher energy efficiency, prolonged network lifetime, enhanced stability period, and the elevated amount of data packets in a densely deployed wireless sensor network.
Abstract: Wireless sensor networks have grown rapidly with the innovation in Information Technology. Sensor nodes are distributed and deployed over the area for gathering requisite information. Sensor nodes possess a negative characteristic of limited energy which pulls back the network from exploiting its peak capabilities. Hence, it is necessary to gather and transfer the information in an optimized way which reduces the energy dissipation. Ant Colony Optimization (ACO) is being widely used in optimizing the network routing protocols. Ant Based Routing can play a significant role in the enhancement of network life time. In this paper, Intercluster Ant Colony Optimization algorithm (IC-ACO) has been proposed that relies upon ACO algorithm for routing of data packets in the network and an attempt has been made to minimize the efforts wasted in transferring the redundant data sent by the sensors which lie in the close proximity of each other in a densely deployed network. The IC-ACO algorithm was studied by simulation for various network scenarios. The results depict the lead of IC-ACO as compared to LEACH protocol by indicating higher energy efficiency, prolonged network lifetime, enhanced stability period, and the elevated amount of data packets in a densely deployed wireless sensor network.

Journal ArticleDOI
TL;DR: Simulations show that the proposed ZEQoS offers better performance in terms of higher throughput, less packets dropped on MAC and network layers, and lower network traffic than comparable protocols including DMQoS and noRouting.
Abstract: This paper proposes a novel integrated energy and QoS-aware routing protocol with the considerations of energy, end-to-end latency, and reliability requirements of body area network (BAN) communication. The proposed routing protocol, called ZEQoS, introduces two main modules (MAC layer and network layer) and three algorithms (neighbor table constructor, routing table constructor, and path selector). To handle ordinary packets (OPs), delay-sensitive packets (DSPs), and reliability-sensitive packets (RSPs), the new mechanism first calculates the communication costs, end-to-end path delays, and end-to-end path reliabilities of all possible paths from a source to destination. The protocol then selects the best possible path(s) for OPs, RSPs, and DSPs by considering their QoS requirement. Extensive simulations using OMNeT

Journal ArticleDOI
Feng Yu, Minghua Jiang, Jing Liang, Xiao Qin1, Ming Hu, Tao Peng, Xinrong Hu 
TL;DR: The proposed cluster k-nearest neighbor (KNN) algorithm with 5 G WiFi signal to reduce the environmental interference and improve the localization performance without additional equipment is proposed and implemented and the performance with existent popular algorithms is evaluated.
Abstract: Indoor localization based on existent WiFi signal strength is becoming more and more prevalent and ubiquitous. Unfortunately, the WiFi received signal strength (RSS) is susceptible by multipath, signal attenuation, and environmental changes, which is the major challenge for accurate indoor localization. To overcome these limitations, we propose the cluster -nearest neighbor (KNN) algorithm with 5 G WiFi signal to reduce the environmental interference and improve the localization performance without additional equipment. In this paper, we propose three approaches to improve the performance of localization algorithm. For one thing, we reduce the computation effort based on the coarse localization algorithm. For another, according to the detailed analysis of the 2.4 G and 5 G signal fluctuation, we expand the real-time measurement RSS before matching the fingerprint map. More importantly, we select the optimal nearest neighbor points based on the proposed cluster KNN algorithm. We have implemented the proposed algorithm and evaluated the performance with existent popular algorithms. Experimental results demonstrate that the proposed algorithm can effectively improve localization accuracy and exhibit superior performance in terms of localization stabilization and computation effort.

Journal ArticleDOI
TL;DR: The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale surveillance settings.
Abstract: The new generation of multimedia surveillance systems integrates a large number of heterogeneous sensors to collect, process, and analyze multimedia data for identifying events of potential security threats. Some of the major concerns facing these systems are scalability, ubiquitous access to sensory data, event processing overhead, and massive storage requirements—all of which demand novel scalable approach. Cloud computing can provide a powerful and scalable infrastructure for large-scale storage, processing, and dissemination of sensor data. Furthermore, the integration of sensor technology and cloud computing offers new possibilities for efficient development and deployment of sensor-based systems. This paper proposes a framework for a cloud-based multimedia surveillance system and highlights several research and technical issues. A prototype surveillance system is also designed and analyzed in the context of the proposed surveillance framework. The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale surveillance settings.

Journal ArticleDOI
TL;DR: The availability and validity of the UGW testing-reinforced concrete corrosion damage is proved by corrosion experiment, which shows that the first wave peak value could describe the whole process of steel rebar corrosion.
Abstract: Corrosion of reinforced concrete structures has become a major problem worldwide, leading to very high repair costs. A dearth of studies has focused on the corrosion damage evolution of reinforced concrete. In this paper, the ultrasonic guided wave (UGW) technique is adopted to monitor the reinforced concrete corrosion damage evolution process. The properties of different guide wave modes were studied by steel rebar dispersion curves of UGWs through numerical calculation. The availability and validity of the UGW testing-reinforced concrete corrosion damage is proved by corrosion experiment. The experiment shows that the first wave peak value could describe the whole process of steel rebar corrosion. As the corrosion damage level increases, the relative variation for the first UGW peak value increases first and then decreases.

Journal ArticleDOI
TL;DR: This paper studies the organization of big sensing data with event-linked network (ELN) model, where events are regarded as primary units for organizing data and links are used to represent the semantic associations among events.
Abstract: Massive sensing data are generated continuously in the Internet of Things. How to organize and how to query the big sensing data are big challenges for intelligent applications. This paper studies the organization of big sensing data with event-linked network (ELN) model, where events are regarded as primary units for organizing data and links are used to represent the semantic associations among events. Several different types of queries on the event-linked network are also explored, which are different from queries on traditional relational database. We use an instance of smart home to show the effectiveness and efficiency of organization and query approaches based on the event-linked network.

Journal ArticleDOI
TL;DR: The purpose of this research was to see if Kinect sensor can recognize numeric and alphabetic characters written with the hand in the air, and it takes some time to master them both.
Abstract: The purpose of this research was to see if Kinect sensor can recognize numeric and alphabetic characters written with the hand in the air. Kinect sensor can capture motion without the sensor device being attached to the user’s body. The input screen has both modes of numerals and alphabet. The recognition rate was measured and the user wrote the numbers from zero to nine and the letters from A to Z twice. Alphabet recognition relied on Palm’s Graffiti. The input numerals and alphabet were recognized by dynamic programming matching based on interstroke information. In addition, this system can perform the numeral operation, such as

Journal ArticleDOI
TL;DR: This paper introduces a hybrid and secure MAC protocol (PMAC) for WBAN that uses the priority-guaranteed CSMA/CA procedure in the CAP period, where different priorities are assigned to WBAN nodes by adjusting the backoff window size.
Abstract: This paper introduces a hybrid and secure MAC protocol (PMAC) for WBAN. The PMAC protocol uses two contention access periods (CAPs) for accommodating normal and life-critical traffic and one contention-free period (CFP) for accommodating large amount of data packets. The priority-guaranteed CSMA/CA procedure is used in the CAP period, where different priorities are assigned to WBAN nodes by adjusting the backoff window size. In addition, a set of security keys is used to prevent illegal access to the network. Analytical expressions are derived to analyze the average delay, power consumption, throughput, and packet loss probability of the PMAC protocol. Results derived from these expressions are validated by computer simulations.

Journal ArticleDOI
TL;DR: Simulation results show that SCR achieves better performance than other social routing protocols with the incentive scheme, which consists of reciprocal contribution and community contribution.
Abstract: Routing in vehicular network is a challenging task due to the characteristic of intermittent connectivity, especially when nodes behave selfishly in the real world. Previous works usually assume that all nodes in the network are willing to forward packets for others, which is impractical in real world. Selfish behaviors of nodes would degrade network performance greatly. In this paper, we propose SCR, a social contribution-based routing protocol, for selfish vehicular network. When making forwarding decision, SCR considers both the delivery probability to the destination and the social contributions of the relay node. The delivery probability is determined by the social relations among nodes and social contribution is used as the incentive to stimulate selfish nodes to be more cooperative, which consists of reciprocal contribution and community contribution. The node with higher delivery probability and lower social contributions is the preferred candidate for the next hop. Simulation results show that SCR achieves better performance than other social routing protocols with the incentive scheme.

Journal ArticleDOI
TL;DR: ERI-MAC is proposed, a new receiver-initiated MAC protocol for energy harvesting sensor networks that leverages the benefit of receiver- initiated and packet concatenation to achieve good performance both in latency and in energy efficiency.
Abstract: Energy harvesting technology potentially solves the problem of energy efficiency, which is the biggest challenge in wireless sensor networks. The sensor node, which has a capability of harvesting energy from the surrounding environment, is able to achieve infinitive lifetime. The technology promisingly changes the fundamental principle of communication protocols in wireless sensor networks. Instead of saving energy as much as possible, the protocols should guarantee that the harvested energy is equal to or bigger than the consumed energy. At the same time, the protocols are designed to have the efficient operation and maximum network performance. In this paper, we propose ERI-MAC, a new receiver-initiated MAC protocol for energy harvesting sensor networks. ERI-MAC leverages the benefit of receiver-initiated and packet concatenation to achieve good performance both in latency and in energy efficiency. Moreover, ERI-MAC employs a queueing mechanism to adjust the operation of a sensor node following the energy harvesting rate from the surrounding environment. We have extensively evaluated ERI-MAC in a large scale network with a realistic traffic model using the network simulator ns-2. The simulation results show that ERI-MAC achieves good network performance, as well as enabling infinitive lifetime of sensor networks.