Sensor Fusion for Intrusion Detection With Sensor Networks

MACRo 2015 ◽  
2015 ◽  
Vol 1 (1) ◽  
pp. 275-282 ◽  
Author(s):  
Bence Koszteczky ◽  
Gyula Simon

AbstractA sensor fusion algorithm is proposed, which can be used to fuse measurements from a distributed sensor network, containing inexpensive, easily deployable and energy efficient magnetic sensor devices. The sensor measurements are collected and transferred to a central base station, where the sensor fusion is performed, using the sensor location. The algorithm provides location, direction, and speed information about the detected vehicles. The paper describes the sensor technology and the fusion method, and the performance of the system is illustrated by real test measurements.

Author(s):  
Yupeng Hu ◽  
Rui Li

As an enabling network technology, energy efficient Medium Access Control (MAC) protocol plays a vital role in a battery-powered distributed sensor network. MAC protocols control how sensor nodes access a shared radio channel to communicate with each other. This chapter discusses the key elements of MAC design with an emphasis on energy efficiency. Furthermore, it reviews several typical MAC protocols proposed in the literature, comparing their energy conservation mechanism. Particularly, it presents a Collaborative Compression Based MAC (CCP-MAC) protocol, which takes advantage of the overheard data to achieve energy savings. Finally, it compares the performance of CCP-MAC with related MAC protocols, illustrating their advantages and disadvantages.


2019 ◽  
Vol 44 ◽  
pp. 85-98 ◽  
Author(s):  
J. Preetha Roselyn ◽  
R. Annie Uthra ◽  
Ajith Raj ◽  
D. Devaraj ◽  
Pranav Bharadwaj ◽  
...  

2013 ◽  
pp. 1776-1797
Author(s):  
Yupeng Hu ◽  
Rui Li

As an enabling network technology, energy efficient Medium Access Control (MAC) protocol plays a vital role in a battery-powered distributed sensor network. MAC protocols control how sensor nodes access a shared radio channel to communicate with each other. This chapter discusses the key elements of MAC design with an emphasis on energy efficiency. Furthermore, it reviews several typical MAC protocols proposed in the literature, comparing their energy conservation mechanism. Particularly, it presents a Collaborative Compression Based MAC (CCP-MAC) protocol, which takes advantage of the overheard data to achieve energy savings. Finally, it compares the performance of CCP-MAC with related MAC protocols, illustrating their advantages and disadvantages.


2011 ◽  
Vol 474-476 ◽  
pp. 522-526
Author(s):  
Hai Feng Chang

The characteristics of Wireless Sensor Network (WSN) determine that traditional security certification mechanism can not meet its security needs. Based on introduction of a distributed hierarchical WSN model, the paper divided WSN network architecture into application layer, base station layer and sensor node layer according to difference of computation speed, power energy, communication capability and storage space of sensor nodes. A kind of security certification schema of hierarchical distributed sensor network based on certificate reconstruction was presented. In the schema, application layer and base station layer used common digital certification of PKI model to construct trust relationship. The sensor node achieved identification authentication and data source authentication through certification reconstruction.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document