• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 26
Next 10 →

Emstar: a software environment for developing and deploying wireless sensor networks

by Lewis Girod, Jeremy Elson, Thanos Stathopoulos, Martin Lukac, Deborah Estrin - In Proceedings of the 2004 USENIX Technical Conference , 2004
"... Recent work in wireless embedded networked systems has followed heterogeneous designs, incorporating a mixture of elements from extremely constrained 8- or 16-bit “Motes ” to less resourceconstrained 32-bit embedded “Microservers.” Emstar is a software environment for developing and deploying comple ..."
Abstract - Cited by 194 (26 self) - Add to MetaCart
Recent work in wireless embedded networked systems has followed heterogeneous designs, incorporating a mixture of elements from extremely constrained 8- or 16-bit “Motes ” to less resourceconstrained 32-bit embedded “Microservers.” Emstar is a software environment for developing and deploying

Technical Report

by William Mary, Haodong Wang, Qun Li, Telosb Motes, Haodong Wang, Qun Li , 2006
"... Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not ..."
Abstract - Add to MetaCart
generation. For comparison, we show our new ECC implementation on TelosB motes with a signature time 1.60s and a verification time 3.30s. We also explain the reasons that TelosB mote can not perform better than MICAz even though it is equipped with a 16-bit CPU. We believe that the experiment results

unknown title

by William Mary, Haodong Wang, Qun Li, Telosb Motes, Haodong Wang, Qun Li , 2006
"... Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not ..."
Abstract - Add to MetaCart
. For comparison, we show our new ECC implementation on TelosB motes with a signature time 1.55s and a verification time 2.25s. We also explain the reasons that TelosB mote can not perform better than MICAz even though it is equipped with a 16-bit CPU. We believe that the experiment results are encouraging

A random perturbationbased scheme for pairwise key establishment in sensor networks

by Wensheng Zhang, Minh Tran - In ACM MobiHoc , 2007
"... A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes have been proposed in recent years, most of them have no guarantee for direct key establishment, no resilience to a large ..."
Abstract - Cited by 27 (1 self) - Add to MetaCart
, establishing a pairwise key of 80 bits between any two 8-bit, 7.37-MHz MICA2 motes only requires about 0.13 second of CPU time, 0.33 KB RAM space, and 15 KB ROM space per node.

Passive Infrared

by Keith Hellman , 2006
"... This morning we’ll discuss why math and computer science are such tightly coupled disciplines (here at Mines, they are the same department). We motivate the discussion using the real-world example of wireless sensor networks. And we provide a “brains-on” activity to drive home the idea that good com ..."
Abstract - Add to MetaCart
, different types of measure-ments. Unfortunately, the term sensor is overloaded. Sometimes it is used to refer to the entire piece of hardware consisting of • a microprocessor or CPU (typically 8, 16, or 32 bits) • some amount of non-volatile memory (4KB–2MB) • some amount of random-access-memory (10KB–32MB

RESEARCH ARTICLE OpenWSN: A Standards-Based Low-Power Wireless Development Environment

by Eur Trans Telecomms, Thomas Watteyne, Xavier Vilajosana, Branko Kerkez, Fabien Chraim, Kevin Weekly, Qin Wang, Steven Glaser, Kris Pister
"... The OpenWSN project is an open-source implementation of a fully standards-based protocol stack for capillary networks, rooted in the new IEEE802.15.4e Time Synchronized Channel Hopping standard. IEEE802.15.4e, coupled with Internet-of-Things standards, such as 6LoWPAN, RPL and CoAP, enables ultra-lo ..."
Abstract - Add to MetaCart
developed around it. The pure C OpenWSN stack was ported to four off-the-shelf platforms representative of hardware currently used, from older 16-bit micro-controller to state-of-the-art 32-bit Cortex-M architectures. The tools developed around the low-power mesh networks include visualization and debugging

Demo: An Imote2 Compatible High Fidelity Sensing Module for SHM Sensor Networks

by Bo Li, Dan Wang, Yi Qing Ni
"... Abstract—Existing Imote2 sensors (and the previous series such as Mica-2, Mica-Z) are developed for general purpose applications by the computer science community. During the past years, we have seen a sharp improvement in CPU speed, memory space and communication strength in these motes. However, w ..."
Abstract - Add to MetaCart
amplification, 16-bit Analog to Digital Conversion (ADC) and up to 512-tap FIR programmable filtering, which practically meet sensing requirements of very weak signals from real world structures. In this demo, we will first show our sensing module and present its technical design principles. We will then show

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
, sending few beacons in stable topologies yet quickly adapting to changes. Finally, Magnet addresses transient loops by using data traffic as active topology probes, quickly discovering and fixing routing failures. Magnet runs on six different mote platforms and we have tested it on four testbeds. In most

doi:10.1155/2012/826702 Research Article Exploiting the Burstiness of Intermediate-Quality Wireless Links

by Muhammad Hamad Alizai, Olaf L, Klaus Wehrle
"... Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estima ..."
Abstract - Add to MetaCart
Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estimation and routing over highly dynamic links, thats is, bursty links that rapidly shift between reliable and unreliable periods of transmissions. Based on significant empirical evidence of over 100,000 transmissions over each link in 802.15.4 and 802.11 testbeds, we propose two metrics, expected future transmissions (EFT) and MAC3, for runtime estimation of bursty wireless links.We introduce a bursty link estimator (BLE) that based on these twometrics, accurately estimates bursty links in the network rendering them available for data transmissions. Finally, we present bursty routing extensions (BRE): an adaptive routing strategy that uses BLE for forwarding packets over bursty links if they offer better routing progress than long-term stable links. Our evaluation, comprising experimental data from widely used IEEE 802.15.4-based testbeds, reveals an average of 19 % and a maximum of 42 % reduction in the number of transmissions when routing over long-range bursty links typically ignored by routing protocols. Additionally, we show that both BLE and BRE are not tied to any specific routing protocol and integrate seamlessly with existing routing protocols and link estimators. 1.

Collection Tree Protocol

by unknown authors
"... This paper presents and evaluates two principles for designing robust, reliable, and efficient collection protocols. These principles allow a protocol to benefit from accurate and agile link estimators by handling the dynamism such estimators introduce to routing tables. The first is datapath valida ..."
Abstract - Add to MetaCart
This paper presents and evaluates two principles for designing robust, reliable, and efficient collection protocols. These principles allow a protocol to benefit from accurate and agile link estimators by handling the dynamism such estimators introduce to routing tables. The first is datapath validation: a protocol can use data traffic as active topology probes, quickly discovering and fixing routing loops. The second is adaptive beaconing: by extending the Trickle code propagation algorithm to routing control traffic, a protocol sends fewer beacons while simultaneously reducing its route repair latency. We study these mechanisms in an implementation called Collection Tree Protocol (CTP) and evaluate their contributions to its performance. We evaluate CTP on 12 different testbeds ranging in size from 20–310 nodes and comprising 7 hardware platforms, on 6 different link layers, and on interference-free and interference-prone channels. In all cases, CTP delivers> 90 % of packets. Many experiments achieve 99.9%. Compared to standard beaconing, CTP sends 73 % fewer beacons while reducing topology repair latency by 99.8%. Finally, when using low-power link layers, CTP has duty cycles of 3 % while supporting aggregate loads of 30 packets/minute. 1
Next 10 →
Results 1 - 10 of 26
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University