By Topic

Communications, IET

Issue 12 • Date August 12 2011

Filter Results

Displaying Results 1 - 16 of 16
  • Editorial - Distributed intelligence and data fusion for sensor systems

    Publication Year: 2011 , Page(s): 1633 - 1636
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    Sensor systems can monitor any type of parameter which is ideal for gathering information from the real world. The next step is to promote the research of distribute intelligence in sensor systems in order to let the sensors be smart and take their own decisions, and propose new data fusion techniques and methods in order to obtain the appropriate data and accurate results. In this paper we summarise a Special Issue that tackles the distributed intelligence and data fusion for sensor systems from the perspective of coding and channel allocation, data aggregation and data storage, routing, security, mobility and distributed services. This paper introduces the reader to those main hot topics and summarises the recent advances provided by the papers published in this Special Issue. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive channel and time allocation for body area networks

    Publication Year: 2011 , Page(s): 1637 - 1649
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (613 KB)  

    Personal health care is a promising application of a body area network (BAN). The BAN for health care application consists of a data collector and multiple wearable sensors that send data to the collector according to a sampling interval determined by the application. The data collector may be any hand-held or portable device such as a mobile phone, a PDA or a wristwatch. An individual user needs a BAN to detect, track or manage his/her health. Multiple BANs for such purpose are likely to appear in a nearby area, especially a place where population density is high. Since multiple BANs must share wireless medium in this scenario, a problem of packet collisions among BANs is unavoidable. To deal with such problem, this study proposes an adaptive scheme to allocate channel and time for coexisting BANs. The proposed scheme distinguishes inter-BAN and intra-BAN communications, and adaptively allocates channel and time according to the current number of BANs that exist in a nearby area. As a salient feature, the proposed scheme allocates time by attempting to satisfy the requirement of sampling interval determined by the application. The evaluation results demonstrate that our scheme achieves much higher packet delivery rate than the existing scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient scheduling of distributed estimation with convolutional coding and rate-compatible punctured convolutional coding

    Publication Year: 2011 , Page(s): 1650 - 1660
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (523 KB)  

    The problem of distributed estimation of an unknown noise-corrupted parameter in wireless sensor networks, with a fusion centre, is considered. Convolutional coding and rate-compatible punctured convolutional coding are used to protect the transmission of sensor observations and to reduce the impact of noise channels. Two novel kinds of power scheduling based on different encoding methods are derived for minimising the total power consumption. The formulas of the proposed power scheduling suggest that local sensors with poor observation qualities should decrease their quantisation levels. The levels should also be related to coding methods, channel qualities, a given mean squared error (MSE) and local signal-to-noise ratios. Finally, simulation results show that not only these two schemes are energy-efficient but also they can achieve comparable performance of a given MSE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data fusion on wireless sensor and actuator networks powered by the zensens system

    Publication Year: 2011 , Page(s): 1661 - 1668
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (662 KB)  

    Wireless sensor and actuator networks (WSANs) provide sensor and actuator services through small smart nodes with very limited hardware and power supply. Information fusion must be considered a critical step in WSAN design, enabling energy saving, increasing data quality and deeper insight of the monitored environment. This study presents experimental results over real hardware on inner-node fusion in the context of the ZensSens system. ZenSens provides user-centric WSAN functionality, with IPv6 support at the sensor node level, automatic node attachment and suitable software tools for multi-channel access. This study presents some material about information fusion, the ZenSens system and possible solutions for inner-node information fusion based on real temperature sensor data. The approach proves the feasibility of inner-node fusion on constrained hardware with IPv6 support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling data-aggregation in multi-replication data centric storage systems for wireless sensor and actor networks

    Publication Year: 2011 , Page(s): 1669 - 1681
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (891 KB)  

    This paper studies data-centric storage (DCS) as a suitable system to perform data aggregation on wireless sensor and actor networks (WSANs), in which sensor and actor nodes collaborate together in a fully distributed way without any central base station that manages the network or provides connectivity to the outside world. The authors compare different multi-replication DCS proposals and choose the best one to be applied when studying data aggregation. In addition, the authors provide mathematical models for the production, consumption and overall network traffic for different application profiles. Those application profiles are based on the ability of a particular application to perform data aggregation and on what type of traffic is dominant, either the consumption or the production one. Furthermore, the authors provide closed formulas for each application profile that defines the optimal number of replicas that minimise the overall network traffic. Finally, the authors validate the proposed models via simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and control sensor system for fish feeding in marine fish farms

    Publication Year: 2011 , Page(s): 1682 - 1690
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (428 KB)  

    One of the main issues in aquaculture is the high cost of the lost food when the fish are fed. Furthermore, this wasted food is deposited in the seabed and generates an environmental impact on the surrounding area. It causes failure to uphold aquaculture legislation. The authors propose a feeding control system based on groups of sensors that take the appropriate decisions when the fish are fed in marine fish farms. This system mixes data obtained from a group of sensors and performs an exhaustive control on the food offered to the fish, thus reducing costs. This will avoid wasting large quantities of food and an economic saving will be achieved. To develop the proposed system, the authors used the behaviour of the movements of the fishes and some parameters from the water. These movements are monitored strategically by a group of underwater transducers placed along the length, width and depth of the cage and, through data fusion, they provide the information needed in the system to continue feeding the fish or not. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary game-based data aggregation model for wireless sensor networks

    Publication Year: 2011 , Page(s): 1691 - 1697
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (299 KB)  

    Data aggregation has been emerged as a basic approach in wireless sensor networks (WSNs) in order to reduce the number of transmissions of sensor nodes. Since multi-source data obtained from different nodes represent redundancy or complement property, as an effective tool to deal with the conflicts, the use of game theory for WSNs is provided. The authors propose a common aggregation model, which is independent of the specific application environments, based on the evolutionary game theory called evolutionary game-based data aggregation model (EGDAM) in WSNs. EGDAM made up of formal definition, functional model and general process is defined to map the competition and cooperation in aggregation procedure into games, and well-avoid perfect rationality. The authors then put the theoretic model into application. Guided by our model, an evolutionary game-based adaptive weighting algorithm named EGWDA is provided for the pixel-level data aggregation with homogeneous sensors. Reasonable weights distribution of sensors can be achieved during the aggregation in WSNs. The experiments on both the self-constructed data and the one from reference made satisfied performances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service-guaranteed cluster-based multihop wireless ad hoc sensor networks

    Publication Year: 2011 , Page(s): 1698 - 1710
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (863 KB)  

    With the help of prioritised polling token and a local synchronisation scheme, this study proposes a quality of service (QoS)-guaranteed scheduling algorithm. It works based on distributed intelligence and schedules both intra-cluster and inter-cluster connections in a cluster-based multihop wireless ad hoc sensor network. Theoretical analyses are employed to derive the bounds for the jitter and delay of each intra-cluster and inter-cluster connection. Based on the obtained jitter bounds and delay bounds, a connection admission control scheme is proposed as the admission criterion for each newly requested connection. Both numerical and simulation results show that by taking the advantages of proposed polling-based QoS scheduling algorithm and the connection admission control jointly, the QoS requirements of all admitted intra-cluster and inter-cluster connections are guaranteed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards intelligent contention-based geographic forwarding in wireless sensor networks

    Publication Year: 2011 , Page(s): 1711 - 1719
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (913 KB)  

    Contention-based geographic forwarding (CGF) is a state-free communication paradigm for data delivery in multihop wireless sensor networks. CGF is robust to frequent topology changes, scalable to large-scale node deployment and applicable to data-centric applications and resource constrained networks. However, CGF may experience significant performance degradation under unreliable links. In this work, we present the intelligent CGF (ICGF) to combat the channel variation. IGCF combines the advantages of both cooperative and contention-based forwarding, involving multiple neighbours of the sender into the local forwarding to improve the transmission reliability. ICGF differs from existing work in that it extends the cooperation scope intelligently, by sending one additional control message on demand. For this reason, the probability of cooperation void in ICGF is decreased and the single-hop packet progress is increased. The authors conduct extensive simulations to study the performance of the proposed ICGF compared with existing protocols. Simulation results demonstrate that ICGF improves the end-to-end data delivery delay, energy efficiency and data delivery ratio. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-division secret key protocol for wireless sensor networking

    Publication Year: 2011 , Page(s): 1720 - 1726
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (400 KB)  

    A device of wireless sensor networks (WSNs) has restricted computational resources, and is always deployed in a harsh, unattended or hostile environment. This investigation presented the time-division secret key protocol for wireless sensor networking to detect denial-of-service (DoS) attack. Simulation results indicate that detect DoS attack and cipher function can be effectively applied to WSNs. The simulation results indicate that after running for 400 s, a detection jamming scheme still alive with 160 nodes, but the one with only 50 nodes does. This result demonstrates that a detection jamming scheme can extend the network lifetime when the WSN security is adopted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centralised conference key mechanism with elliptic curve cryptography and lagrange interpolation for sensor networks

    Publication Year: 2011 , Page(s): 1727 - 1731
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (122 KB)  

    In the sensor network, the system behaviours are usually presented according to the data monitored, but there are many malicious users who might attack the data. In order to make the sensor network applications work smoothly, it is important to provide the data transmission in highly secure. In this study, we will propose a secure, flexible and integrated conference key mechanism for the sensor networks. The proposal is developed by the elliptic curve cryptography and Lagrange interpolation. Compared to the other researches, the proposal provides lower computing cost, and improves some security problems. The security analysis shows that the proposed mechanism is able to defeat the security attacks, and provide the secure communication for the sensor network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects

    Publication Year: 2011 , Page(s): 1732 - 1743
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (579 KB)  

    This study provides a mechanism to divide the complete geographical extent of wireless sensor networks (WSNs) under attack of a jammer into different zones as per the severity of jamming experienced by various nodes of the network. There are some existing methods such as, `Localised Edge Detection in Sensor Field`, `Robust Edge Detection in Wireless Sensor Networks` and `JAM: A Jammed Area Mapping Service for Sensor Networks`, that solve similar problems; but all of them are able to map the geographical extent into only two zones ` `jammed` and `not jammed`, and they all are vulnerable to information warfare as they all require to communicate even while under a jamming attack. The proposed method for zonalisation of the geographical extent of WSNs based on the effects of jamming on various nodes follows the centralised approach, where the mapping is done by the base station through hull tracing of jammed nodes as per their pre-calculated jamming indices thus enforcing the economy of scale, and making it one of the most energy-efficient and fastest-known mapping systems. The method is procedure-centric, as against almost all of the known systems that are protocol-centric, wherein the proposed method dispenses with the need of inter-nodal communications during moments of jamming. The system has no inherent inaccuracies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient sensor node authentication in third generation-wireless sensor networks integrated networks

    Publication Year: 2011 , Page(s): 1744 - 1754
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (904 KB)  

    The advent of converged environment merged with wireless sensor networks (WSNs) and mobile networks can have the possibility on enabling us to experience variety of ubiquitous applications based on multi-sensor attached smartphones. However, most of current researches are failed to recognise the fact that there are many drawbacks to break through between the heterogeneous networks such as a WSN and mobile network. In this study, the authors propose the authentication and key agreement protocol that efficiently reduces the overall computational and communication costs in the next generation converged network. The enhanced security procedures are operated through the mobile network in order to maximise the lifetime of the sensor networks and to apply the combined capabilities of both networks. The authors show the presented novel design can show the feasibility to minimise the usage of the sensor networks with the battery-powered sensors in comparison with the existing authentication models, and can be deployed under the standard architectures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems

    Publication Year: 2011 , Page(s): 1755 - 1768
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (248 KB)  

    Radio frequency identification (RFID)-based sensor systems are emerging as a new generation of wireless sensor networks by inherently integrating identification, sensing, communications and computation capabilities. Security and privacy are critical issues in dealing with a large amount of sensed data. In the study, the authors propose a distributed key array authentication protocol (KAAP) that provides classified security protection. KAAP is synthetically analysed in three aspects: logic, security and performance. The logic analysis includes messages formalisation, initial assumptions and anticipant goals based on GNY Logic formal method to verify the design correctness of the protocol. The security analysis with respect to confidentiality, integrity, authentication, anonymity and availability is performed via the simulated attacks, which involves supposing the attacker's identity, simulating the attacker's authentication process and creating compromised conditions. Such analysis ensures that the protocol has an ability to resist both external attacks (spoofing, replay, tracking and Denial of Service) and internal forgery attacks. Additionally, the performance is evaluated and compared with other related protocols to show that KAAP can improve the reliability and efficiency of sensor systems with insignificantly increased complexity. The result indicates that the protocol is reliable and scalable in advanced RFID-based sensor systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple mobile agents' itinerary planning in wireless sensor networks: survey and evaluation

    Publication Year: 2011 , Page(s): 1769 - 1776
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (297 KB)  

    Over the last decade, mobile agent (MA) systems for surveillance applications in wireless sensor networks (WSNs) has gained much attention. However, a conventional MA-based WSN may have the issues of energy efficiency and task duration as the scale of the network is increased. In order to overcome the drawbacks of using a single MA, dispatching two or more MAs for data collection simultaneously is a promising alternative in a WSN. The authors first discuss the itinerary planning issues for multiple MAs: deciding the number of MAs to be dispatched, grouping of source nodes for each MA, routing of each MA for its assigned source nodes. The authors then survey the existing algorithms for these issues, and evaluate their performance by OPNET. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed service integration for disaster monitoring sensor systems

    Publication Year: 2011 , Page(s): 1777 - 1784
    Cited by:  Papers (5)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (860 KB)  

    Sensor networks have the potential to revolutionise the capture, processing and communication of critical data for use of disaster rescue and relief. In order to provide a dependable rescue capability through dynamically integrating newly developed and legacy sensor systems with other systems and computing, new methodologies are required for the dependable integration of services in heterogeneous environments. In this study, the authors present a new architectural model which can proactively self-adapt to changes and evolution occurring in the provision of search and rescue capabilities in a dynamic environment. This performance and reliability of the approach has been evaluated using simulations in a dynamic environment and demonstrated through developing and testing a demonstration system for a scenario of disaster area monitoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Communications covers the theory and practice of systems, networks and applications involving line, mobile radio, satellite and optical technologies for telecommunications, and Internet and multimedia communications.

Full Aims & Scope

Meet Our Editors

IET Research Journals
iet_com@theiet.org