By Topic

Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE International Conference on

Date 7-9 June 2010

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (280 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (139 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • Message from the SUTC 2010 Chairs

    Publication Year: 2010 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Workshop Co-Chairs of UMC 2010

    Publication Year: 2010 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • SUTC 2010 Organizing Committee

    Publication Year: 2010 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • SUTC 2010 Program Committee

    Publication Year: 2010 , Page(s): xv - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • UMC 2010 Organization

    Publication Year: 2010 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • A Wireless Body Sensor Network for Different Health Related Applications

    Publication Year: 2010 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (140 KB) |  | HTML iconHTML  

    We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of monitoring different subjects. The architecture of the system consists of three layers. At the body sensor layer (BSL), the integrated monitoring of a person's activities, geographic location, and air pollution exposures occurs. At the personal network layer (PNL), a wireless mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desirable Advances in Cyber-Physical System Software Engineering

    Publication Year: 2010 , Page(s): 2 - 4
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    The scale and complexity of advanced cyber-physical systems (CPSs) are steadily growing. Most new-generation CPSs being developed or to be developed involve networked embedded computing (NEC) devices. The state of the art in software engineering for such network-based CPSs is weak. Major problems faced are the low quality of network-based CPS software and the low productivity of CPS software engin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Semantic Sensor Web and Pervasive Computing

    Publication Year: 2010 , Page(s): 5 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    In this paper we discuss issues on developing a secure semantic sensor web. SensorML is the starting point for this work. We explore the layers for a semantic sensor web and discuss security issues. We also discuss secure peer-to-peer computing as it relates to sensor web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TABS: Link Loss Tolerant Data Routing Protocol for Multi-hop Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 11 - 18
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (361 KB) |  | HTML iconHTML  

    Routing techniques of multi-hop wireless sensor networks try to mask low-power radio properties such as link asymmetry, unidirectionality and unreliability using different techniques like blacklisting, link reliability metrics etc. In addition to associated overhead, these approaches limit routing options. In this paper, we design a novel link loss tolerant data routing protocol, called TABS (Try-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis, Comparison, and Optimization of Routing Protocols for Energy Harvesting Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 19 - 26
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    Energy harvesting has been steadily gaining interest in the wireless sensor network community. Instead of minimizing the energy consumption and maximizing a network’s operational time, the main challenge in energy harvesting sensor networks is to maximize the utility of the application subject to the harvested energy. One major challenge is to maximize the data delivery rates by exploiting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Information Transport for Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 27 - 34
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse applications supported by WSNs also stipulate a diverse range of reliability requirements for the transport of various information types. The continuous variation of application requirements and dynamic operational perturbations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ASample: Adaptive Spatial Sampling in Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 35 - 42
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (227 KB) |  | HTML iconHTML  

    A prominent application of Wireless Sensor Networks is the monitoring of physical phenomena. The value of the monitored attributes naturally depends on the accuracy of the spatial sampling achieved by the deployed sensors. The monitored phenomena often tend to have unknown spatial distributions at pre-deployment stage, which also change over time. This can detrimentally affect the overall achievab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Caching in Ad Hoc Networks Using Game-Theoretic Analysis

    Publication Year: 2010 , Page(s): 43 - 49
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem's theoretical root in classic facility location problem and k-median problem, most of the research assumes i), the data items are initially outside of the network, and ii), the caching cost is either a constant or not considered. In this paper, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 50 - 57
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (604 KB) |  | HTML iconHTML  

    Compressed Sensing (CS) is a novel sampling paradigm that tries to take data-compression concepts down to the sampling layer of a sensory system. It states that discrete compressible signals are recoverable from sub-sampled data, when the data vector is acquired by a special linear transform of the original discrete signal vector. Distributed sampling problems especially in Wireless Sensor Network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations on Security in ZigBee Networks

    Publication Year: 2010 , Page(s): 58 - 65
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    ZigBee outlines a new suite of protocols targeted at low-rate, low-power devices and sensor nodes. ZigBee Specification includes a number of security provisions and options. The security model specified in the Smart Energy Profile seems bound to become the reference security model for most of ZigBee applications. In this paper we review this security model and highlight places where its specificat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pollution Attack Defense for Coding Based Sensor Storage

    Publication Year: 2010 , Page(s): 66 - 73
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Based Attestation for Trustworthy Visual Sensor Networks

    Publication Year: 2010 , Page(s): 74 - 81
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (968 KB) |  | HTML iconHTML  

    Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems has considerably increased their capabilities. With large-scale deployments of smart cameras and visual sensor networks, public awareness of privacy issues is increasing. Researchers are addressing these concerns by introducing pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Implementation of Symbol Synchronization for Underwater FSK

    Publication Year: 2010 , Page(s): 82 - 88
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (388 KB) |  | HTML iconHTML  

    Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reducing the reliability and quality of service of the wireless network. This paper provides a practical description of the design choices and hardware implementation details required to build a compact and efficient symbol synchro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 89 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    There have been trends in using spread spectrum channel accessing techniques in wireless sensor networks to mitigate the effect of potential collisions in concurrent transmissions and to increase the throughput as well as countering jamming-like noises. Overhearing of the data has been previously analyzed in cellular CDMA networks as this technique was first introduced for mobile communications wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Equalization Based on Data Reuse LMS Algorithm for Shallow Water Acoustic Communication

    Publication Year: 2010 , Page(s): 95 - 98
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (329 KB) |  | HTML iconHTML  

    In recent years, there has been increasing interest in the design of underwater acoustic modems for marine environmental monitoring, underwater structure inspection and sea bottom resource exploitation. As underwater acoustic channels pose difficulties such as multipath, time-space selectivity, frequency dependent noise, and Doppler shifts on transmission, research on adaptive equalizers play an i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.