Wireless Sensor Network Technologies for the Information Explosion Era


Book Description

Wireless Sensor Network Technologies for Information Explosion Era The amount and value of information available due to rapid spread of information technology is exploding. Typically, large enterprises have approximately a petabyte of operational data stored in hundreds of data repositories supporting thousands of applications. Data storage volumes grow in excess of 50% annually. This growth is expected to continue due to vast proliferation of existing infor- tion systems and the introduction of new data sources. Wireless Sensor Networks (WSNs) represent one of the most notable examples of such new data sources. In recent few years, various types of WSNs have been deployed and the amount of information generated by wireless sensors increases rapidly. The information - plosion requires establishing novel data processing and communication techniques for WSNs. This volume aims to cover both theoretical and practical aspects - lated to this challenge, and it explores directions for future research to enable ef- cient utilization of WSNs in the information-explosion era. The book is organized in three main parts that consider (1) technical issues of WSNs, (2) the integration of multiple WSNs, and (3) the development of WSNs systems and testbeds for conducting practical experiments. Each part consists of three chapters.




Embedded Systems and Wireless Technology


Book Description

The potential of embedded systems ranges from the simplicity of sharing digital media to the coordination of a variety of complex joint actions carried out between collections of networked devices. The book explores the emerging use of embedded systems and wireless technologies from theoretical and practical applications and their applications in a




Secure Sensor Cloud


Book Description

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.




Advances in Sensors: Reviews, Vol. 3


Book Description

Sensors, Transducers, Signal Conditioning and Wireless (Book Series 'Advances in Sensors: Reviews', Vol. 3) is a premier sensor review source and contains 19 chapters with sensor related state-of-the-art reviews and descriptions of latest achievements written by 55 authors from academia and industry from 19 countries: Botswana, Canada, China, Finland, France, Germany, India, Jordan, Mexico, Portugal, Romania, Russia, Senegal, Serbia, South Africa, South Korea, UK, Ukraine and USA. Coverage includes current developments in physical sensors and transducers, chemical sensors, biosensors, sensing materials, signal conditioning energy harvesters and wireless sensor networks. This book ensures that readers will stay at the cutting edge of the field and get the right and effective start point and road map for the further researches and developments.




Distributed Networks


Book Description

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific research in distributed network intelligence, security, and novel applications. The book presents recent trends and advances in the theory and applications of network intelligence and helps you understand how to successfully incorporate them into distributed systems and services. Featuring contributions by leading scholars and experts from around the world, this collection covers: Approaches for distributed network intelligence Distributed models for distributed enterprises, including forecasting and performance measurement models Security applications for distributed enterprises, including intrusion tackling and peer-to-peer traffic detection Future wireless networking scenarios, including the use of software sensors instead of hardware sensors Emerging enterprise applications and trends such as the smartOR standard and innovative concepts for human–machine interaction in the operating room Several chapters use a tutorial style to emphasize the development process behind complex distributed networked systems and services, which highlights the difficulties of knowledge engineering of such systems. Delving into novel concepts, theories, and advanced technologies, this book offers inspiration for further research and development in distributed computing and networking, especially related to security solutions for distributed environments.




Building Next-Generation Converged Networks


Book Description

Providing a comprehensive introduction to next-generation networks, this book strikes a balance between how and why things work and making them work. It examines Internet architectures and protocols, network management and traffic engineering, embedded systems and sensor networks, web services, cloud technologies, and next-generation wireless networking. Containing the contributions of top industry experts and academics, the book investigates new technologies such as IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) architectures and standards, mobility, and security.




Trends in Communication, Cloud, and Big Data


Book Description

This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2–3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.




Adaptive Mobile Computing


Book Description

Adaptive Mobile Computing: Advances in Processing Mobile Data Sets explores the latest advancements in producing, processing and securing mobile data sets. The book provides the elements needed to deepen understanding of this trend which, over the last decade, has seen exponential growth in the number and capabilities of mobile devices. The pervasiveness, sensing capabilities and computational power of mobile devices have turned them into a fundamental instrument in everyday life for a large part of the human population. This fact makes mobile devices an incredibly rich source of data about the dynamics of human behavior, a pervasive wireless sensors network with substantial computational power and an extremely appealing target for a new generation of threats. - Offers a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography and development related to mobile computing - Explains state-of-the-art technological solutions for the main issues hindering the development of next-generation pervasive systems including: supporting components for collecting data intelligently, handling resource and data management, accounting for fault tolerance, security, monitoring and control, addressing the relation with the Internet of Things and Big Data and depicting applications for pervasive context-aware processing - Presents the benefits of mobile computing and the development process of scientific and commercial applications and platforms to support them - Familiarizes readers with the concepts and technologies that are successfully used in the implementation of pervasive/ubiquitous systems




Universal Access in Human-Computer Interaction: Aging and Assistive Environments


Book Description

The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 251 contributions included in the UAHCI proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 75 papers included in this volume are organized in the following topical sections: design for aging; health and rehabilitation applications; accessible smart and assistive environments; assistive robots and mobility, navigation and safety.