By Topic

2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing

Date 5-8 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 78
  • [Cover]

    Publication Year: 2005, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (812 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2005, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (770 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2005, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (617 KB)
    Freely Available from IEEE
  • An Ecosystem Model for Massively-Deployed Sensor Networks

    Publication Year: 2005, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3680 KB) | HTML iconHTML

    Research in wireless sensor network technology has accelerated rapidly in the last decade. Promises of ubiquitous control of the physical environment by these networks open avenues for new applications that will redefine the way we live and work. Due to the small size and low cost of sensor devices, visionaries promise systems enabled by deployment of massive numbers of sensors working in concert.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Architecture for a Ubiquitous RFID Sensing Network

    Publication Year: 2005, Page(s):7 - 12
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4224 KB) | HTML iconHTML

    The concept of a "Networked Physical World" originated from the Auto-ID Center, now called the Auto-ID Labs. Such a system can be realized with a combination of automatic identification technology and a ubiquitous computer network that will glue the physical world together. The ability to form a ubiquitous network of physical objects has a wide range of applications including manufacturing automat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effects of Deployment Irregularity on Coverage in Wireless Sensor Networks

    Publication Year: 2005, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3368 KB) | HTML iconHTML

    One commonly employed method to calculate whether a wireless sensor network can adequately sense the entirety of a region of interest is to define the area that a sensor can monitor and ensure that the union of all these areas leaves no part of the region uncovered. This paper shows the results of a series of experiments in simulation designed to show how various degrees of deviation from intended... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA Implementation of Cluster Formation Algorithms in Mobile Ad-hoc Networks

    Publication Year: 2005, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2960 KB) | HTML iconHTML

    Scalability has been an important issue in mobile ad-hoc network (MANET). Clustering is one of the mechanisms that are used in handling the scalability issue. Many cluster formation and cluster maintenance algorithms have been proposed for MANET. This paper presents the hardware implementation and study of some of the proposed cluster formation algorithms such as lowest ID, highest degree, K-clust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Energy-efficient Clustering Protocol for Wireless Sensor Networks

    Publication Year: 2005, Page(s):25 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1240 KB)

    In this paper, we propose an energy-efficient clustering protocol for wireless sensor networks. The wireless sensor network can be represented by virtual groups known as clusters. In comparison with tree-based wireless sensor networks, clustering is an effective technique for prolonging sensor network life, and for load balancing. The proposed protocol runs in a distributed environment. There are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectures for Wireless Sensor Networks

    Publication Year: 2005, Page(s):31 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3200 KB) | HTML iconHTML

    Various architectures have been developed for wireless sensor networks. Many of them leave to the programmer important concepts as the way in which the inter-task communication and dynamic reconfigurations are addressed. In this paper we describe the characteristics of a new architecture we proposed - the data-centric architecture. This architecture offers an easy way of structuring the applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Balancing in the Self-configuring Sensor Networks

    Publication Year: 2005, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1368 KB) | HTML iconHTML

    Like other distributed systems, unattended sensor networks need to be balanced not only by load but also in terms of energy. Sensor networks are expected to live long. Lifetime can be maximized if and only if a balanced network can be formed. In this research work we first identify the tasks, that a sensor node accomplishes in its life time. Based on those, we define the sensor node life-cycle. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks

    Publication Year: 2005, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1600 KB) | HTML iconHTML

    We propose a secure one-time sensor scheme that is highly resistant to forged messages and replay message attacks. A sensor in a one-time sensor network transmits only a single message in its life time but retransmits messages from other sensors to provide message routing. The only security-specific computational capability required from a one-time sensor in our scheme is a hash function. The bulk... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bias Compensation for Least-Squares Multi-Pulse TDOA Localization Algorithms

    Publication Year: 2005, Page(s):51 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    A weighted least squares (WLS) estimator is presented for time difference of arrival (TDOA) localization of an emitter using multiple TDOA measurements collected by moving receivers. A comprehensive bias analysis for this estimate is provided. Based on the outcomes of the bias analysis, a bias compensation algorithm is developed to reduce the severe WLS estimation bias. The proposed algorithm util... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Time Based Load Balancing Technique for Wireless Sensor Networks

    Publication Year: 2005, Page(s):57 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2024 KB) | HTML iconHTML

    The load profiles of Parent Nodes (PNs) in a network can be used to define their current state as well as to predict potential failures caused by energy loss due to high loads on particular PNs. This paper presents a novel load balancing model that maintains PNs in a state whereby the time-to-live requirement is met. Our model is distributed and utilises historical load profile information about e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instrumental Variable Estimator for 3D Bearings-Only Emitter Localization

    Publication Year: 2005, Page(s):63 - 68
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    This paper develops a closed-form three-dimensional passive bearings-only localization algorithm based on the method of instrumental variables. The proposed localization algorithm is shown to attain a significant reduction in bias and root-mean-square error vis-à-vis orthogonal vector and pseudolinear estimators. It also has less computational requirements than a maximum likelihood estimator ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Distributed Resource Allocation in Sensor Networks

    Publication Year: 2005, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2632 KB) | HTML iconHTML

    Sensor networks have generated much interest in the research community because they have a wide range of potentially impactful applications. In this field, one of the major research challenges is the distributed resource allocation problem. This problem concerns how one should allocate or schedule the limited resources in a sensor network to minimize costs and maximize capability. Although various... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination of RFID and Vision for Mobile Robot Localization

    Publication Year: 2005, Page(s):75 - 80
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2928 KB) | HTML iconHTML

    This paper illustrates an efficient method for global localization incorporating signal detection from artificial landmark consisted of RFID tags, and for fine localization incorporating feature descriptor derived from a view of scene. The system incorporates a RFID reader on a mobile robot checking the signal from RFID tags to localize the robot with respect to global position. After determining ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous Localization and Mapping in Wireless Sensor Networks

    Publication Year: 2005, Page(s):81 - 87
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3960 KB) | HTML iconHTML

    Wireless sensors became smaller and cheaper in the recent years. Applications with thousands of nodes for tracking and monitoring are now feasible. Many of them require the knowledge about the locations of the sensors. The process of localization depends on estimating the position of the features within the environment. This paper proposes a novel algorithm to localize the sensors in any environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Secure a Wireless Sensor Network

    Publication Year: 2005, Page(s):89 - 95
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1776 KB) | HTML iconHTML

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the implementors' adoption of the technologies. We answer the challenge by proposing a guidelines according to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Model for Evaluating the Scalability in Wireless Sensor Networks

    Publication Year: 2005, Page(s):97 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Recent advances in wireless technology have enabled the rapid development of wireless sensor networks. Such networks, consisting of ten to thousands of randomly deployed nodes collaborating to achieve a goal, are used in a variety of applications. We have developed a new framework called TinyMaCLaS(tiny middleware and compositional language for sensor networks) for sensor networks that simplifies ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks

    Publication Year: 2005, Page(s):101 - 107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2320 KB) | HTML iconHTML

    To ensure a long-lived network of wireless communicating sensors, we are in need of a medium access control protocol that is able to prevent energy-wasting effects like idle listening, hidden terminal problem or collision of packets. Schedule-based medium access protocols are in general robust against these effects, but require a mechanism to establish a non-conflicting schedule. In this paper, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments with Reliable Data Delivery in Wireless Sensor Networks

    Publication Year: 2005, Page(s):109 - 114
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    The increasing complexity of Wireless Sensor Networks (WSN) applications require simple, yet reliable, underlying networking mechanisms. In this paper, we describe the experiments performed to establish the real challenges and sources of errors for the reliable data delivery problem. We also discuss several implementation solutions and try to establish the issues that should be taken into account ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of MIMO-Based Wireless Sensor Networks with Cochannel Interference

    Publication Year: 2005, Page(s):115 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB)

    Energy requirements of MIMO-based limited-energy wireless sensor networks are analyzed and simulated in the presence of the worst case cochannel interference and under different propagation conditions. The analysis and simulations were compared between three different types of systems, SISO, MIMO and MIMO with CSI. Results demonstrate the robustness of MIMO based wireless sensor networks in spite ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Cross-Layer Interactions in Sensor Network Applications

    Publication Year: 2005, Page(s):121 - 126
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2200 KB) | HTML iconHTML

    In the field of sensor networks cross-layer interactions are favored over strict layering of components and regarded as a way to provide the optimization capabilities required by sensor network applications. Despite their importance, developers tend to devise specific solutions for the application at hand, instead of designing more general primitives that can be used across applications. The contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.