期刊文献+
共找到865篇文章
< 1 2 44 >
每页显示 20 50 100
A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks 被引量:1
1
作者 G.Nagalalli GRavi 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期475-490,共16页
Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like d... Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like data sensing,data processing,and communication.In thefield of medical health care,these network plays a very vital role in transmitting highly sensitive data from different geographic regions and collecting this information by the respective network.But the fear of different attacks on health care data typically increases day by day.In a very short period,these attacks may cause adversarial effects to the WSN nodes.Furthermore,the existing Intrusion Detection System(IDS)suffers from the drawbacks of limited resources,low detection rate,and high computational overhead and also increases the false alarm rates in detecting the different attacks.Given the above-mentioned problems,this paper proposes the novel MegaBAT optimized Long Short Term Memory(MBOLT)-IDS for WSNs for the effective detection of different attacks.In the proposed framework,hyperpara-meters of deep Long Short-Term Memory(LSTM)were optimized by the meta-heuristic megabat algorithm to obtain a low computational overhead and high performance.The experimentations have been carried out using(Wireless Sensor NetworkDetection System)WSN-DS datasets and performance metrics such as accuracy,recall,precision,specificity,and F1-score are calculated and compared with the other existing intelligent IDS.The proposed framework provides outstanding results in detecting the black hole,gray hole,scheduling,flooding attacks and significantly reduces the time complexity,which makes this system suitable for resource-constraint WSNs. 展开更多
关键词 wireless sensor network intrusion detection systems long short term memory megabat optimization
下载PDF
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
2
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 wireless sensor Network(WSN) Node authentication Blockchain TANGLE Worm detection
下载PDF
Deep Learning and Entity Embedding-Based Intrusion Detection Model for Wireless Sensor Networks 被引量:3
3
作者 Bandar Almaslukh 《Computers, Materials & Continua》 SCIE EI 2021年第10期1343-1360,共18页
Wireless sensor networks(WSNs)are considered promising for applications such as military surveillance and healthcare.The security of these networks must be ensured in order to have reliable applications.Securing such ... Wireless sensor networks(WSNs)are considered promising for applications such as military surveillance and healthcare.The security of these networks must be ensured in order to have reliable applications.Securing such networks requires more attention,as they typically implement no dedicated security appliance.In addition,the sensors have limited computing resources and power and storage,which makes WSNs vulnerable to various attacks,especially denial of service(DoS).The main types of DoS attacks against WSNs are blackhole,grayhole,flooding,and scheduling.There are two primary techniques to build an intrusion detection system(IDS):signature-based and data-driven-based.This study uses the data-driven approach since the signature-based method fails to detect a zero-day attack.Several publications have proposed data-driven approaches to protect WSNs against such attacks.These approaches are based on either the traditional machine learning(ML)method or a deep learning model.The fundamental limitations of these methods include the use of raw features to build an intrusion detection model,which can result in low detection accuracy.This study implements entity embedding to transform the raw features to a more robust representation that can enable more precise detection and demonstrates how the proposed method can outperform state-of-the-art solutions in terms of recognition accuracy. 展开更多
关键词 wireless sensor networks intrusion detection deep learning entity embedding artificial neural networks
下载PDF
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable 被引量:2
4
作者 Hossein Jadidoleslamy 《Wireless Sensor Network》 2011年第7期241-261,共21页
Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their spe... Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions;but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose;but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure;i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea;then it analyzed and evaluated the acquired results from the questionnaires. 展开更多
关键词 wireless sensor Network (WSN) Security intrusion detection System (IDS) HIERARCHICAL Distributed SCALABLE DYNAMIC RECONFIGURABLE Attack detection.
下载PDF
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
5
作者 Hossein Jadidoleslamy 《International Journal of Communications, Network and System Sciences》 2011年第8期523-543,共21页
Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their spe... Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions;but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose;but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete architecture of Intrusion Detection System (IDS). The main contribution of this architecture is its modularity and flexibility;i.e. it is designed and applicable, in four steps on intrusion detection process, consistent to the application domain and its required security level. Focus of this paper is on the heterogeneous WSNs and network-based IDS, by designing and deploying the Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the base station (sink). Finally, this paper has been designed a questionnaire to verify its idea, by using the acquired results from analyzing the questionnaires. 展开更多
关键词 wireless sensor Network (WSN) Security intrusion detection System (IDS) Modular Attack Process detection Response Tracking
下载PDF
A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection
6
作者 Chandraumakantham Om Kumar Sudhakaran Gajendran +2 位作者 Suguna Marappan Mohammed Zakariah Abdulaziz S.Almazyad 《Computers, Materials & Continua》 SCIE EI 2024年第10期471-501,共31页
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure... The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure the security of the network.Conventional intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system model.In this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot IoT.In this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant features.The proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO algorithm.This results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness estimation.As a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11. 展开更多
关键词 Deep learning intrusion detection fuzzy rules feature selection false alarm rate ACCURACY wireless sensor networks
下载PDF
Billiards Optimization with Modified Deep Learning for Fault Detection in Wireless Sensor Network
7
作者 Yousif Sufyan Jghef Mohammed Jasim Mohammed Jasim +1 位作者 Subhi R.M.Zeebaree Rizgar R.Zebari 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1651-1664,共14页
Wireless Sensor Networks(WSNs)gather data in physical environments,which is some type.These ubiquitous sensors face several challenges responsible for corrupting them(mostly sensor failure and intrusions in external a... Wireless Sensor Networks(WSNs)gather data in physical environments,which is some type.These ubiquitous sensors face several challenges responsible for corrupting them(mostly sensor failure and intrusions in external agents).WSNs were disposed to error,and effectual fault detection techniques are utilized for detecting faults from WSNs in a timely approach.Machine learning(ML)was extremely utilized for detecting faults in WSNs.Therefore,this study proposes a billiards optimization algorithm with modified deep learning for fault detection(BIOMDL-FD)in WSN.The BIOMDLFD technique mainly concentrates on identifying sensor faults to enhance network efficiency.To do so,the presented BIOMDL-FD technique uses the attention-based bidirectional long short-term memory(ABLSTM)method for fault detection.In the ABLSTM model,the attention mechanism enables us to learn the relationships between the inputs and modify the probability to give more attention to essential features.At the same time,the BIO algorithm is employed for optimal hyperparameter tuning of the ABLSTM model,which is stimulated by billiard games,showing the novelty of the work.Experimental analyses are made to affirm the enhanced fault detection outcomes of the BIOMDL-FD technique.Detailed simulation results demonstrate the improvement of the BIOMDL-FD technique over other models with a maximum classification accuracy of 99.37%. 展开更多
关键词 wireless sensor network fault detection RELIABILITY deep learning metaheuristics
下载PDF
Coordinate-free k-coverage hole detection algorithm in wireless sensor networks 被引量:11
8
作者 Ma Wenyu Yan Feng +2 位作者 Zuo Xuzhou Xia Weiwei Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2019年第1期8-15,共8页
For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists ... For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes. 展开更多
关键词 k-coverage hole detection K-COVERAGE wireless sensor networks
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
9
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
TDOA-based Sybil attack detection scheme for wireless sensor networks 被引量:5
10
作者 温蜜 李辉 +1 位作者 郑燕飞 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2008年第1期66-70,共5页
As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node w... As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing. 展开更多
关键词 attack detection Sybil attack.time difference of arrival (TDOA) wireless sensor networks (WSN)
下载PDF
Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks 被引量:2
11
作者 Song Jianhua Ma Chuanxiang 《China Communications》 SCIE CSCD 2008年第2期34-39,共6页
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wirele... With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks. 展开更多
关键词 ANOMALY detection ROUTING ATTACKS DATA-MINING wireless sensor networks
下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
12
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
下载PDF
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology 被引量:3
13
作者 Emad Felemban 《International Journal of Communications, Network and System Sciences》 2013年第5期251-259,共9页
Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, sma... Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical applications such as military applications. This paper surveys the literature for experimenting work done in border surveillance and intrusion detection using the technology of WSN. The potential benefits of using WSN in border surveillance are huge;however, up to our knowledge very few attempts of solving many critical issues about this application could be found in the literature. 展开更多
关键词 wireless sensor Network intrusion detection BORDER SURVEILLANCE PERIMETER SURVEILLANCE REMOTE Monitoring
下载PDF
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks 被引量:3
14
作者 Seo Hyun Oh Chan O. Hong Yoon Hwa Choi 《Wireless Sensor Network》 2012年第3期84-90,共7页
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulne... Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate. 展开更多
关键词 wireless sensor networks FAULT detection MALICIOUS NODE detection
下载PDF
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
15
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive wireless Mesh networks (CWMN) intrusion detection Trust mechanism Channel assignment ROUTING
下载PDF
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks 被引量:2
16
作者 Sung-Jib Yim Yoon-Hwa Choi 《Wireless Sensor Network》 2012年第9期219-225,共7页
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important... The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor networks. Malicious nodes are modeled as faulty nodes behaving intelligently to lead to an incorrect decision or energy depletion without being easily detected. Each sensor node makes a decision on the fault status of itself and its neighboring nodes based on the sensor readings. Most erroneous readings due to transient faults are corrected by filtering, while nodes with permanent faults are removed using confidence-level evaluation, to improve malicious node detection rate and event detection accuracy. Each node maintains confidence levels of itself and its neighbors, indicating the track records in reporting past events correctly. Computer simulation shows that most of the malicious nodes reporting against their own readings are correctly detected unless they behave similar to the normal nodes. As a result, high event detection accuracy is also maintained while achieving low false alarm rate. 展开更多
关键词 wireless sensor networks MALICIOUS NODES Faults Neighbor-Based detection
下载PDF
Forest Fire Detection Using Artificial Neural Network Algorithm Implemented in Wireless Sensor Networks 被引量:1
17
作者 Yongsheng Liu Yansong Yang +1 位作者 Chang Liu Yu Gu 《ZTE Communications》 2015年第2期12-16,共5页
A forest fire is a severe threat to forest resources and human life, In this paper, we propose a forest-fire detection system that has an artificial neural network algorithm implemented in a wireless sensor network (... A forest fire is a severe threat to forest resources and human life, In this paper, we propose a forest-fire detection system that has an artificial neural network algorithm implemented in a wireless sensor network (WSN). The proposed detection system mitigates the threat of forest fires by provide accurate fire alarm with low maintenance cost. The accuracy is increased by the novel multi- criteria detection, referred to as an alarm decision depends on multiple attributes of a forest fire. The multi-criteria detection is implemented by the artificial neural network algorithm. Meanwhile, we have developed a prototype of the proposed system consisting of the solar batter module, the fire detection module and the user interface module. 展开更多
关键词 forest fire detection artificial neural network wireless sensor network
下载PDF
Wireless Bioradar Sensor Networks for Speech Detection and Communication 被引量:1
18
作者 Ying Tian Sheng Li Jianqi Wang 《Engineering(科研)》 2013年第5期37-41,共5页
Wireless multimedia sensor networks (WMSN) are emerging to serve for the collection of acoustic and image information. In the WMSN, the microphone is usually employed to function as sensor nodes for the acquisition of... Wireless multimedia sensor networks (WMSN) are emerging to serve for the collection of acoustic and image information. In the WMSN, the microphone is usually employed to function as sensor nodes for the acquisition of acoustic data. However, those microphone sensors are needed to be placed close with sound source and cannot detect sound signal through certain obstacles. To overcome the shortcomings of microphone sensor, we develop a new type of bioradar sensor to achieve non-contact speech detection and investigate theoretically the mechanism of bioradar for speech detection. Results show that the system can successfully detect speech at some distance and even through non-metallic objects with certain thickness. In addition, in order to suppress the noise and improve the quality of the detected speech, we use spectral subtraction and Wiener filtering algorithm respectively to enhance the bioradar speech and evaluate the performance of the two methods using spectrogram. 展开更多
关键词 Bioradar sensor SPEECH detection wireless sensor networks
下载PDF
Environmental Sound Event Detection in Wireless Acoustic Sensor Networks for Home Telemonitoring 被引量:1
19
作者 Hyoung-Gook Kim Jin Young Kim 《China Communications》 SCIE CSCD 2017年第9期1-10,共10页
In this paper, we present an approach to improve the accuracy of environmental sound event detection in a wireless acoustic sensor network for home monitoring. Wireless acoustic sensor nodes can capture sounds in the ... In this paper, we present an approach to improve the accuracy of environmental sound event detection in a wireless acoustic sensor network for home monitoring. Wireless acoustic sensor nodes can capture sounds in the home and simultaneously deliver them to a sink node for sound event detection. The proposed approach is mainly composed of three modules, including signal estimation, reliable sensor channel selection, and sound event detection. During signal estimation, lost packets are recovered to improve the signal quality. Next, reliable channels are selected using a multi-channel cross-correlation coefficient to improve the computational efficiency for distant sound event detection without sacrificing performance. Finally, the signals of the selected two channels are used for environmental sound event detection based on bidirectional gated recurrent neural networks using two-channel audio features. Experiments show that the proposed approach achieves superior performances compared to the baseline. 展开更多
关键词 SOUND EVENT detection wirelesssensor network GATED RECURRENT neural net-work MULTICHANNEL audio
下载PDF
Inter-Data Commonality Detection for Spectrum Monitoring in Wireless Sensor Networks
20
作者 Zhijuan Hu Danyang Wang +1 位作者 Chenxi Li Tingting Wang 《China Communications》 SCIE CSCD 2020年第2期54-65,共12页
Cooperative spectrum monitoring with multiple sensors has been deemed as an efficient mechanism for improving the monitoring accuracy and enlarging the monitoring area in wireless sensor networks.However,there exists ... Cooperative spectrum monitoring with multiple sensors has been deemed as an efficient mechanism for improving the monitoring accuracy and enlarging the monitoring area in wireless sensor networks.However,there exists redundancy among the spectrum data collected by a sensor node within a data collection period,which may reduce the data uploading efficiency.In this paper,we investigate the inter-data commonality detection which describes how much two data have in common.We define common segment set and divide it into six categories firstly,then a method to measure a common segment set is conducted by extracting commonality between two files.Moreover,the existing algorithms fail in finding a good common segment set,so Common Data Measurement(CDM)algorithm that can identify a good common segment set based on inter-data commonality detection is proposed.Theoretical analysis proves that CDM algorithm achieves a good measurement for the commonality between two strings.In addition,we conduct an synthetic dataset which are produced randomly.Numerical results shows that CDM algorithm can get better performance in measuring commonality between two binary files compared with Greedy-String-Tiling(GST)algorithm and simple greedy algorithm. 展开更多
关键词 spectrum monitoring wireless sensor network inter-data commonality detection MEASUREMENT CDM algorithm
下载PDF
上一页 1 2 44 下一页 到第
使用帮助 返回顶部