首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An ad hoc network of small robots (sensor nodes) adjusting their positions to establish network connectivity would be able to provide a communication infrastructure in an urban battlefield environment. A sensor node would be capable of moving to a particular position to establish network connectivity, provided it knows its current position, positions of other sensor nodes and the radio propagation characteristics of the sensor area.In this paper, we present a pseudo formation control based trajectory algorithm to determine the optimal trajectory of a moving beacon used in localization of the sensor nodes in real-time. The trajectory and the frequency of transmission of the GPS based position information of the moving beacon influences the accuracy of localization and the power consumed by the beacon to localize. Localization accuracy and reduction in the number of position information messages can be achieved, in real-time, by determining the optimal position from where the beacon should transmit its next position information. This will decrease the time required to localize, and power consumed by the beacon in comparison to random or predetermined trajectories.We first show that optimal position determination is a pseudo formation control problem. Next, we show the pseudo formation control problem formulated as an unconstrained optimization problem under the free space propagation model. We further present the modeling of the beacon incorporating the trajectory algorithm based on the pseudo formation control in a discrete event simulator. Simulation results, comparing the performance of localization with pseudo formation control based trajectory against random waypoint and predetermined trajectories for the beacon are presented. The simulation results show that the localization accuracy is significantly improved along with reduction in the number of position information messages transmitted when the beacon traverses along the pseudo formation control based trajectory.  相似文献   

2.
Rapid advances in a wide range of wireless access and networking technologies, along with ubiquitous computing and communications, have set the stage for the development of smart environments (for example, smart homes or offices). "Context awareness" is perhaps the most salient feature in such intelligent (indoor) environments. Examples of contexts include the "location" and "activities" of the inhabitants among others. In this paper, we develop a predictive framework for location-aware resource optimization in smart homes based on the hypothesis that the mobility of an inhabitant creates an uncertainty of his location. With the help of information theory, the proposed framework is shown to minimize this uncertainty through optimal learning and prediction of the inhabitant's movement (location) profiles captured in the symbolic domain. The concept of the asymptotic equipartition property (AEP) is also used to predict the inhabitant's most likely routes (or path-segments) with a high degree of accuracy. Successful predictions help in several ways, such as automated device control and proactive reservation of resources (for example, electrical energy and other utilities or scarce wireless bandwidth for mobile multimedia applications) along the inhabitant's most probable locations and routes. The goal here is to minimize the maintenance and operations cost of the smart home, as well as to provide better comfort to the inhabitants. Experimental results from a typical smart home floor plan corroborate the prediction success and significant reduction in daily energy consumption and manual operations of devices.  相似文献   

3.

This paper presents a resilient localization scheme for wireless sensor networks (WSNs). It suits well in estimation of node position under a corrupted radio environment. Position computation is based on information of angle-of-arrivals (AoA) and references obtained from a few mobile anchors. In the network, anchors are equipped with smart antennas and global positioning system receivers. They broadcast signals in a synchronous and periodic fashion. The neighboring nodes having the signals with received signal strength values above a prescribed threshold level, respond with their respective IDs. Anchors evaluate AoA information from these signals using estimation of signal parameters via rotational invariance technique (ESPRIT) algorithm. Next, they forward beacon messages, containing their references and estimated angles, to the corresponding nodes and move along random trajectories. After receiving three sets of such data, at least, nodes can initiate selective segregation of the inconsistent position estimations. Simulation results attaining higher degree of localization accuracy validate its competency over the existing schemes.

  相似文献   

4.
As we are moving towards the internet of things (IoT), a significant growth of stationary and mobile sensing and computing IoT devices continuously generate enormous amounts of contextual information, e.g., environmental data. Contextual information collection, reasoning, and inference plays critical role in IoT. In this paper, we consider the contextual information collection and harvesting problem in which stationary sensing and computing devices (sources), which are incapable to communicate with each other either due to their long distance, or for energy efficiency, or spatially dispersed network, rely on mobile IoT devices (collectors) to ‘drain’ their acquired contextual information. (e.g., generating from IoT applications: smart cities, smart metering, and smart agriculture). At the contact instances with the collectors, sources have to decide whether to deliver the contextual information obtained so far or postpone their delivery for later hitting epochs in an effort to sense fresher (or more critical) contextual information. We rest on the principles of Optimal Stopping Theory and propose an intelligent context collection scheme in IoT environments. We show through simulations with synthetic and real mobility data the effectiveness of our scheme compared to other approaches.  相似文献   

5.
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are mainly based on conventional identity management schemes and use centralized architectures. There are known security and privacy limitations with such schemes and architectures, such as the single-point failure or surveillance (e.g., device tracking). Hence, in this paper, we present an architecture for capability-based IoT access control utilizing the blockchain and decentralized identifiers to manage the identity and access control for IoT devices. Then, we propose a protocol to provide a systematic view of system interactions, to improve security. We also implement a proof-of-concept prototype of the proposed approach and evaluate the prototype using a real-world use case. Our evaluation results show that the proposed solution is feasible, secure, and scalable.  相似文献   

6.
Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.  相似文献   

7.
The emergence of the Internet of Things (IoT) era has necessitated the development of intelligent wearable electronics for fire warning to mitigate fire hazards prior to ignition. Although significant advancements are achieved in thermoelectric materials and devices, the design of a specific thermoelectric wearable device for precision fire warning still remains challenging. In this study, an intelligent sensing system for human IoT fire warning that utilizes a novel light/heat dual-parameter-responsive single-walled carbon nanotube/poly(3-hexylthiophene-2,5-diyl) (SWCNT/P3HT) composite is developed. This system comprises the composite, a circuit microcontroller, and a message transmission system, which together create an intelligent fire source sensing device. The synergistic effect of light and heat is observed to enhance the output voltage and response time under concurrent stimuli, as compared to heating alone. The intelligent sensing system is found to effectively identify and alarm for fire sources, owing to the high thermoelectric and photoelectric performance of the SWCNT/P3HT composite, precise fire recognition, and the ability to adjust the alarming threshold for detecting fire hazards. This study presents a new approach for designing light/heat dual-parameter-responsive materials and wearable devices, which hold potential applications in smart home living environments, including child protection against fire hazards.  相似文献   

8.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

9.
With the advent of high efficacy light emitting diode directional lamps as a key component in focal lighting, new possibilities emerge for re-designing the smart home scenario. A smart home scenario is characterized by enabled intelligent interworking of various wireless and wired technologies to provide inhabitants with ease of use of appliances, while creating a personalized and safe ambience space. More and more high and low data rate circulates within the indoor ambient space (e.g., home, hospitals, offices). Although, unlicensed technologies, such as wireless local area networks can take upon part of the indoor traffic, the ever increasing demand for such data, and users, calls for either use of licensed or novel unlicensed wireless communication technologies as part of the smart home enablers. This paper focuses on the potentials of visible light communications (VLCs), jointly with radio and fiber communications, to support very dense low and high data rate connectivity, while enabling deployment of secure-sensitive indoor applications, including indoor tracking and localization. The paper proposes a scenario for integrating VLC into the smart home scenario and a conceptual supporting architecture for its deployment. Further, the technical challenges and possible roadmap for the actual deployment are analyzed for the particular case of an eHealth scenario where the utilization of VLC technology is the enabler of the cost-efficient rollout of the required infrastructure and thus the game-changer in a multi-billion eHealth niche that is seeking for cost affordable solutions.  相似文献   

10.
The Internet of Things (IoT) is a system that includes smart items with different sensors, advanced technologies, analytics, cloud servers, and other wireless devices that integrate and work together to create an intelligent environment that benefits end users. With its wide spectrum of applications, IoT is revolutionizing both the current and future generations of the Internet. IoT systems can be employed for broad-ranging real applications, such as agriculture, the environment, cities, healthcare, and the industrial sector. In this paper, we briefly discuss the three-tier architectural view of IoT, its different communication technologies, and the smart sensors. Moreover, we study various application areas of IoT such as the environmental domain, healthcare, agriculture, smart cities, and industrial, commercial, and general aspects. A critical analysis is shown for the existing schemes and techniques related to this work. Further, this paper addresses the basic context, tools and evaluation approaches, future scope, and the advantages and disadvantages of the aforestated IoT applications. A comprehensive analysis is provided for each domain along with its fundamental parameters like the quality of service (QoS), network longevity, scalability, energy efficiency, accuracy, and cost. Finally, this study highlights the technical challenges and open research problems existing in different IoT applications.  相似文献   

11.
4G 时代运营商已经沦为数据业务管道,5G 时代运营商将积极寻求业务转型。根据研究机构预测,室内定位及物联网市场前景广阔,运营商正在努力拓展相关领域的垂直行业应用。但是,现有室内通信网络功能单一,无法有效支撑室内定位和物联网业务。提出了一种通信·导航·物联一体化5G室内通信网络,通过在室分天线内部集成蓝牙模块,使其具备下行蓝牙定位、广告信息推送、链路损耗检测、上行物联收集和上行蓝牙定位等功能。该技术方案可应用于智慧医疗场景中,提供智慧导诊、设备管理、安防管理、后备保障和一键告警等服务。  相似文献   

12.

Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.

  相似文献   

13.
魏颖琪  林玮平  李颖 《电信科学》2015,31(8):132-138
物联网智能终端从炒作阶段进入产品化阶段。微型化、集成化、智能化和多样化的传感器帮助物联网智能终端将现实世界数字化。而具备应用处理能力的处理器和先进的操作系统实现物联网终端的智能,通过云计算和大数据加强其智能化。和智能手机一样,物联网智能终端需要建立活跃的生态系统,激发开发者创新。旨在探讨、分析和展示上述几个关键技术的新进展和演进趋势。  相似文献   

14.
Telecommunication Systems - With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device...  相似文献   

15.
Mobile devices are the primary communication tool in day to day life of the people. Nowadays, the enhancement of the mobile applications namely IoTApps and their exploitation in various domains like healthcare monitoring, home automation, smart farming, smart grid, and smart city are crucial. Though mobile devices are providing seamless user experience anywhere, anytime, and anyplace, their restricted resources such as limited battery capacity, constrained processor speed, inadequate storage, and memory are hindering the development of resource‐intensive mobile applications and internet of things (IoT)‐based mobile applications. To solve this resource constraint problem, a web service‐based IoT framework is proposed by exploiting fuzzy logic methodologies. This framework augments the resources of mobile devices by offloading the resource‐intensive subtasks from mobile devices to the service providing entities like Arduino, Raspberry PI controller, edge cloud, and distant cloud. Based on the recommended framework, an online Repository of Instructional Talk (RIoTalk) is successfully implemented to store and analyze the classroom lectures given by faculty in our study site. Simulation results show that there is a significant reduction in energy consumption, execution time, bandwidth utilization, and latency. The proposed research work significantly increases the resources of mobile devices by offloading the resource‐intensive subtasks from the mobile device to the service provider computing entities thereby providing Quality of Service (QoS) and Quality of Experience (QoE) to mobile users.  相似文献   

16.
Home appliance manufacturers have recently been trying to provide smart products capable of various Internet services. For example, one health care manufacturer provides a Wi‐Fi‐capable scale. Once users register their information with the manufacturer's server, their weight and body fat records are automatically uploaded to the server whenever they measure their weight. The users can then watch and check their weight log easily using a smart device, such as a smartphone or tablet. One of the biggest problems, however, is that the initial configuration of the appliances and the user registration process may be quite complicated to typical users who are unfamiliar with such IT devices. This paper proposes an autoconfiguration system structure and protocol for Internet‐capable home appliances, which supports the initial configuration and remote maintenance service of the device with only little user effort. Manufacturers can develop their own information appliances and provide differentiated services using the proposed system and protocol.  相似文献   

17.
Over the last decade, the Internet of Things (IoT) has become ever more popular, as is evident from its role in changing the human lifestyle and conferring remarkable privileges for them. It has a significant presence in various crucial areas, including smart cities, smart factories, manufacturing, transportation, and healthcare. Massive amounts of data generated by IoT devices have the potential to endanger the lifetime of nodes in IoT-based networks due to increased communication power consumption. It has become crucial to propose solutions for network-based issues, such as quality of service, security, network heterogeneity, congestion avoidance, reliable routing, and energy conservation. To address the mentioned problems, routing protocols play a critical role in data transmission among heterogeneous items. In such environments, routing refers to constructing routes between mobile nodes. Since identifying optimal routes among IoT nodes and establishing an effective routing protocol in an IoT network are an NP-hard issue, employing metaheuristic algorithms may be a viable solution to overcome this problem. Various IoT routing protocols based on metaheuristic algorithms have been presented in recent years, but there is still a lack of systematic study for reviewing the existing works. The current study emphasizes the impact of metaheuristic algorithms in the IoT routing problem, discusses the optimization models, presents a comprehensive comparison of protocols based on critical parameters, and eventually suggests some hints for future studies.  相似文献   

18.
The Internet of Things (IoT) is one of the paradigms related to the evolution of telecommunication networks which is contributing to the evolution of numerous use cases, such as smart city and smart agriculture. However, the current communication infrastructure and wireless communication technologies are not always able to guarantee a proper service for these IoT scenarios. Smart solutions are needed to overcome current terrestrial network limitations offering a cost-effective way to extend the current terrestrial network coverage. For example, temporary extensions “on-request” of the terrestrial infrastructure may be a viable solution to allow collecting data generated by nodes outside the current network coverage. Flying objects can help achieve this goal. Various studies supported the use of unmanned aerial vehicles (UAVs) as intermediate nodes between IoT devices and the network. However, such solutions have not been exhaustively tested yet in real-case scenarios. This paper proposes an efficient solution to collect data from multiple IoT sensors in rural and remote areas based on UAVs. It describes the implementation of the proposed UAV-based Long RangeWide Area Network (LoRaWAN) flying gateway able to collect data directly from LoRaWAN sensors during its flight, keep them stored in an onboard memory, and forward them at the end of its flying path to a platform where the authorized users can access them. A prototype of the gateway has been developed to assess the proposed solution through both indoor and outdoor tests aiming to test its feasibility both in terms of communication performance and UAV-required hardware resources.  相似文献   

19.
A plethora of indoor localization systems based on Wi‐Fi, radio frequency chips, ultra‐wide‐band, and bluetooth have been proposed, yet these systems do not work when the infrastructure is absent. On the other hand, infrastructure less systems benefit mostly from off‐the‐shelf smartphone sensors and do not need additional hardware. This study shows a similar indoor localization approach which turns smartphone built‐in sensors to good account. We take advantage of magnetic field strength fingerprinting approach to localize a pedestrian indoor. In addition, accelerometer and gyroscope sensors are utilized to find the pedestrian's traveled distance and heading estimation, respectively. Our aim is to solve the problem of device dependence by devising an approach that can perform localization using various smartphones in a similar fashion. We make the use of patterns of magnetic field strength to formulate the fingerprint database to achieve this goal. This approach solves two problems: need to update the database periodically and device dependence. We conduct experiments using Samsung Galaxy S8 and LG G6 for five different buildings with different dimensions in Yeungnam University, Republic of Korea. The evaluation is performed by following three different path geometries inside the buildings. The results show that the proposed localization approach can potentially be used for indoor localization with heterogeneous devices. The errors for path 1 and path 2 are very similar, however, localization error for path 3 is comparatively higher because of the complexity of the path 3. The mean and median errors for Galaxy S8 are 1.37 and 0.88 m while for LG G6, these are 1.84 and 1.21 m, respectively, while considering all buildings and all paths followed during the experiment. Overall, the proposed approach can potentially localize a pedestrian within 1.21 m at 50% and within 1.93 m at 75%, irrespective of the device used for localization. The performance of the proposed approach is compared with the K nearest neighbor (KNN) for evaluation. The proposed approach outperforms the KNN  相似文献   

20.
In many applications of wireless sensor network, the position of the sensor node is useful to identify the actuating response of the environment. The main idea of the proposed localization scheme is similar with most of the existing localization schemes, where a mobile beacon with global positioning system broadcast its current location coordinate periodically. The received information of the coordinates help other unknown nodes to localize themselves. In this paper, we proposed a localization scheme using mobile beacon points based on analytical geometry. Sensor node initially choose two distant beacon points, in-order to minimize its residence area. Later using the residence area, sensor node approximate the radius and half length of the chord with reference to one of the distant beacon point. Then the radius and half length of the chord are used to estimate the sagitta of an arc. Later, sensor node estimate its position using radius, half length of the chord, and sagitta of an arc. Simulation result shows the performance evaluation of our proposed scheme on various trajectories of mobile beacon such as CIRCLE, SPIRAL, S-CURVE, and HILBERT.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号