近年来,物联网(Internet of Things,IoT)产业受到许多的关注,世界各国均视其为潜在无限商机的高科技产业,并投入大量的资源从事研发与推广。由于物联网的应用非常广泛,且透过物联网技术人类得以提升生活质量,让生活更加便利,因此,本论...近年来,物联网(Internet of Things,IoT)产业受到许多的关注,世界各国均视其为潜在无限商机的高科技产业,并投入大量的资源从事研发与推广。由于物联网的应用非常广泛,且透过物联网技术人类得以提升生活质量,让生活更加便利,因此,本论文首先简介物联网的背景及应用,并介绍其基本概念与架构。接着,本论文以「无线感测真菌人文树道」为例,针对物联网技术应用于人文艺术领域进行说明,并详细叙述其所使用到之各项软件、韧体及硬件技术,透过真菌的感测、无线通信及异质网络连网功能的设计,使真菌网络成为物联网在人文艺术应用的一个重要典范。展开更多
A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs ...A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value.展开更多
[Objective] This study was to design an intelligent greenhouse real-time monitoring system based on the core technology of Internet of Things in order to meet the needs of agricultural informatization and intellectual...[Objective] This study was to design an intelligent greenhouse real-time monitoring system based on the core technology of Internet of Things in order to meet the needs of agricultural informatization and intellectualization. [Method] Based on the application characteristics of Wireless Sensor Network (WSN), the intelligent greenhouse monitoring system was designed. And for the incompleteness strategy of load balancing in the Low-Energy Adaptive Clustering Hierarchy (LEACH), a Real- time Threshold Routing Algorithm (RTRA) was proposed. [Result] The performance of network lifetime and network delay of RTRA were tested in MATLAB and found that, within the same testing environment, RTRA can save nodes energy consumption, prolong network lifetime, and had better real-time performance than LEACH. The al- gorithm satisfies the crops' requirements on real-time and energy efficiency in the greenhouse system. [Conclusion] For the good performance on real-time, the de- signed intelligent greenhouse real-time monitoring system laid the foundation for the research and development of agricultural informatization and intellectualization.展开更多
For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists ...For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes.展开更多
Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide...Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%.展开更多
Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve...Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network.展开更多
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici...The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.展开更多
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af...Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach.展开更多
Simple GNSS navigation receivers, developed for the mass market, can be used for positioning with sub centimeter accuracy in a wireless sensor network if the read-out of the carrier phase data is possible and all data...Simple GNSS navigation receivers, developed for the mass market, can be used for positioning with sub centimeter accuracy in a wireless sensor network if the read-out of the carrier phase data is possible and all data is permanently broadcast to a central computer for near real time processing of the respective base lines. Experiences gained in two research projects related to landslide monitoring are depicted in terms of quality and reliability of the results by the developed approach. As far as possible a modular system set up with commercial off-the-shelf components, e.g., standard WLAN fur commtmication, solar batteries with solar panels for autarkic power supply and in cooperation of existing proofed program tools is chosen. The challenge of the still ongoing development is to have a flexible and robust GNSS based sensor network available - concerned not only for landslide monitoring in future.展开更多
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc...Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.展开更多
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ...In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.展开更多
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ...This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.展开更多
Spectrum sensing is one of the key issues in cognitive radio networks. Most of previous work concenates on sensing the spectrum in a single spectrum band. In this paper, we propose a spectrum sensing sequence predicti...Spectrum sensing is one of the key issues in cognitive radio networks. Most of previous work concenates on sensing the spectrum in a single spectrum band. In this paper, we propose a spectrum sensing sequence prediction scheme for cognitive radio networks with multiple spectrum bands to decrease the spectrum sensing time and increase the throughput of secondary users. The scheme is based on recent advances in computational learning theory, which has shown that prediction is synonymous with data compression. A Ziv-Lempel data compression algorithm is used to design our spectrum sensing sequence prediction scheme. The spectrum band usage history is used for the prediction in our proposed scheme. Simulation results show that the proposed scheme can reduce the average sensing time and improve the system throughput significantly.展开更多
Bamboo Winding Composite Pipes(BWCPs)have many advantages such as good mechanical properties,low cost,low carbon,environmental friendliness,thermal insulation and easy installation et al.At present,BWCP is widely used...Bamboo Winding Composite Pipes(BWCPs)have many advantages such as good mechanical properties,low cost,low carbon,environmental friendliness,thermal insulation and easy installation et al.At present,BWCP is widely used in urban water supply,drainage,communication cable protection,farmland irrigation etc.It is obvious that the Bamboo Winding Composite materials have good application prospects in the field of utility tunnels.However,considering that the size of utility tunnels is much larger than that of normal pipelines,the wide application of Bamboo Composite Utility Tunnels(BCUTs)is still a challenge.In this paper,the force performance of BCUT in Datong Shanxi Province,was studied using two methods:real time monitoring and numerical simulation.Wireless sensor networks were used for monitoring,and the real time monitoring data of horizontal convergence and strains under the condition of backfill were obtained.The monitoring data indicated that the horizontal convergence can meet the requirement of relevant technical standards.A three-dimensional numerical model of the utility tunnel was established using FEM software.The influence of soil parameters on the deformation and strain of the BCUT was studied using the numerical method.The simulation results were compared with real-time monitoring data.The soil parameters K_(0) and k_(sh) have significant effects on the deformation,stress and strain of the utility tunnel.This kind of utility tunnel is recommended to use in areas with relatively good geological conditions.展开更多
文摘近年来,物联网(Internet of Things,IoT)产业受到许多的关注,世界各国均视其为潜在无限商机的高科技产业,并投入大量的资源从事研发与推广。由于物联网的应用非常广泛,且透过物联网技术人类得以提升生活质量,让生活更加便利,因此,本论文首先简介物联网的背景及应用,并介绍其基本概念与架构。接着,本论文以「无线感测真菌人文树道」为例,针对物联网技术应用于人文艺术领域进行说明,并详细叙述其所使用到之各项软件、韧体及硬件技术,透过真菌的感测、无线通信及异质网络连网功能的设计,使真菌网络成为物联网在人文艺术应用的一个重要典范。
基金Supported by the Fund for Independent Innovation of Agricultural Sciences in Jiangsu Province(CX(14)2108&CX(13)5066)~~
文摘A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value.
基金Supported by the Science and Technology Surface Project of Yunnan Province(2010ZC142)the Doctoral Foundation of Dali University(KYBS201015),the Scientific Research Program for College Students of Dali University~~
文摘[Objective] This study was to design an intelligent greenhouse real-time monitoring system based on the core technology of Internet of Things in order to meet the needs of agricultural informatization and intellectualization. [Method] Based on the application characteristics of Wireless Sensor Network (WSN), the intelligent greenhouse monitoring system was designed. And for the incompleteness strategy of load balancing in the Low-Energy Adaptive Clustering Hierarchy (LEACH), a Real- time Threshold Routing Algorithm (RTRA) was proposed. [Result] The performance of network lifetime and network delay of RTRA were tested in MATLAB and found that, within the same testing environment, RTRA can save nodes energy consumption, prolong network lifetime, and had better real-time performance than LEACH. The al- gorithm satisfies the crops' requirements on real-time and energy efficiency in the greenhouse system. [Conclusion] For the good performance on real-time, the de- signed intelligent greenhouse real-time monitoring system laid the foundation for the research and development of agricultural informatization and intellectualization.
基金The National Natural Science Foundation of China(No.61601122,61471164,61741102)
文摘For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes.
基金Financial support for this study, provided by the National Natural Science Foundation of China (No.60674002) the Science and Technology Research of the Ministry of Railways of China (No. 2006x006-E), is gratefully acknowledged
文摘Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%.
基金Supported by the National Natural Science Foundation of China(50534060)
文摘Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.60971082,60872049,60972073and60871042)the National Key Basic Research Program of China(Grant No.2009CB320400)+1 种基金the National Great Science Specific Project(Grant Nos.2009ZX03003-001,2009ZX03003-011and2010ZX03001003)Chinese Universities Scientific Fund,China
文摘The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.
基金supported by the NSFC(U1536206,61232016,U1405254,61373133,61502242,71401176)BK20150925the PAPD fund
文摘Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach.
文摘Simple GNSS navigation receivers, developed for the mass market, can be used for positioning with sub centimeter accuracy in a wireless sensor network if the read-out of the carrier phase data is possible and all data is permanently broadcast to a central computer for near real time processing of the respective base lines. Experiences gained in two research projects related to landslide monitoring are depicted in terms of quality and reliability of the results by the developed approach. As far as possible a modular system set up with commercial off-the-shelf components, e.g., standard WLAN fur commtmication, solar batteries with solar panels for autarkic power supply and in cooperation of existing proofed program tools is chosen. The challenge of the still ongoing development is to have a flexible and robust GNSS based sensor network available - concerned not only for landslide monitoring in future.
基金National Natural Science Foundation of China(No.61163009)。
文摘Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.
基金Supported by 863 Project of China (No.2006AA01Z224)
文摘In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.
基金Supported by the National Natural Science Foundation of China(No.60903157)the Fundamental Research funds for the Central Universities of China(No.ZYGX2011J066)the Sichuan Science and Technology Support Project(No.2013GZ0022)
文摘This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.
基金Supported by the National Natural Science Foundation of China(No.60832009), the Natural Science Foundation of Beijing (No.4102044) and the National Nature Science Foundation for Young Scholars of China (No.61001115)
文摘Spectrum sensing is one of the key issues in cognitive radio networks. Most of previous work concenates on sensing the spectrum in a single spectrum band. In this paper, we propose a spectrum sensing sequence prediction scheme for cognitive radio networks with multiple spectrum bands to decrease the spectrum sensing time and increase the throughput of secondary users. The scheme is based on recent advances in computational learning theory, which has shown that prediction is synonymous with data compression. A Ziv-Lempel data compression algorithm is used to design our spectrum sensing sequence prediction scheme. The spectrum band usage history is used for the prediction in our proposed scheme. Simulation results show that the proposed scheme can reduce the average sensing time and improve the system throughput significantly.
基金supported by The Construction Program of Shanghai Engineering Research Center(Grant number 17DZ2251800).
文摘Bamboo Winding Composite Pipes(BWCPs)have many advantages such as good mechanical properties,low cost,low carbon,environmental friendliness,thermal insulation and easy installation et al.At present,BWCP is widely used in urban water supply,drainage,communication cable protection,farmland irrigation etc.It is obvious that the Bamboo Winding Composite materials have good application prospects in the field of utility tunnels.However,considering that the size of utility tunnels is much larger than that of normal pipelines,the wide application of Bamboo Composite Utility Tunnels(BCUTs)is still a challenge.In this paper,the force performance of BCUT in Datong Shanxi Province,was studied using two methods:real time monitoring and numerical simulation.Wireless sensor networks were used for monitoring,and the real time monitoring data of horizontal convergence and strains under the condition of backfill were obtained.The monitoring data indicated that the horizontal convergence can meet the requirement of relevant technical standards.A three-dimensional numerical model of the utility tunnel was established using FEM software.The influence of soil parameters on the deformation and strain of the BCUT was studied using the numerical method.The simulation results were compared with real-time monitoring data.The soil parameters K_(0) and k_(sh) have significant effects on the deformation,stress and strain of the utility tunnel.This kind of utility tunnel is recommended to use in areas with relatively good geological conditions.