Using Received Signal Strength Variation for Surveillance In Residential Areas

Size: px
Start display at page:

Download "Using Received Signal Strength Variation for Surveillance In Residential Areas"

Transcription

1 Using Received Signal Strength Variation for Surveillance In Residential Areas Sajid Hussain, Richard Peters, and Daniel L. Silver Jodrey School of Computer Science, Acadia University, Wolfville, Canada. ABSTRACT There are various uses of wireless sensor technology, ranging from medical, to environmental, to military. One possible usage is home security. A wireless sensor network could be used to detect the presence of an intruder. We have investigated the use of Received Signal Strength Indicator () values to determine the mobility of an intruder and have found that accurate intruder detection is possible for at least short distances (up to 20 feet). The results of interference monitoring show that a wireless sensor network could be a feasible alternative for security and surveillance of homes. Keywords: Wireless Sensor Networks, Security, Intruder,, LQI. 1. INTRODUCTION Wireless Sensor Networks (WSNs) have a diverse range of applications. This paper deals with the usage of wireless sensor networks for home security and surveillance. The objective is to determine if the interference between two sensor nodes caused by an intruder; the variation of received signal strength indicator (), is sufficient to detect the intruder. We use a light sensor to validate an intrusion event. The light from one sensor node is interrupted at the other node due to the intruder blocking the beam. Although this validation method is only feasible in a dark environment and requires an additional light source, it allows us to collect accurate intrusion data for testing our -based approach. The MicaZ processor boards and MTS 400CA sensor boards of Crossbow Technologies 1 are used in the experiments. 2. RELATED WORK Detection of physical objects is not a new field in wireless sensor networks. There have been several papers published that deal with the detection of human beings and of vehicles. Chen et al. (2006) provide experimental details to detect human movement within a field. The experiment relied on passive infrared motion detectors to detect intruders. Cheung et al. (2005) and He et al. (2006) detail experiments using magnetic sensors to detect vehicles and multiple properties of these vehicles, using magnetic fields. Although He et al. (2006) focus more on military usage; Cheung et al. (2005) provide emphasis on commercial usage. Ploetner and Trivedi (2006) combine wireless sensor network technology with other technologies such as video cameras and microphones to detect both human and vehicle traffic. For wireless sensor networks, both magnetic and passive infrared motion detectors are used. Schlessman et al. (2006) seek to detect human presence. The paper proposes using a camera sensor, combined with a passive infrared motion sensor or an ultrasonic distance sensor. All of the above related works used the sensors provided on the sensor nodes, and in some cases, combine these results with additional technology. On the other hand, the proposed method of using variation in values removes all but the bare minimum required equipment. This will reduce cost of equipment and the energy cost on the nodes themselves. Chen et al. (2005) use wireless LAN environment to develop RF-based surveillance system. Although Wireless LANs can be used for surveillance, they cannot be densely deployed because of cost. Further, the energy consumption of nodes of wireless LAN is significantly higher than the energy consumption of sensor nodes; hence, the WSN-based surveillance system would be more scalable, accurate, and easy to maintain. 1

2 3. PRELIMINARY TESTING Objective: Investigate the possibility of using the variation in Received Signal Strength Indicator () and Link Quality Indicator (LQI) values for intrusion detection. Method: For this test, two sensor nodes were placed 4 feet apart, with a beam of light going across both. The power level of both nodes was set to -15 dbm. A test subject then walked between the nodes, causing interference on both the beam of light and the signal itself. The light sensor is used to validate the results based on LQI and variation. The sensor nodes used for the experiment are programmed to detect light, and then send that information in a packet. The opposite node, upon receiving this packet, adds the and LQI values. The packet is then sent to the base station, to be logged. The experiment is conducted for 30 minutes and the sampling frequency is 1 sample/second. Results: A brief section of the results (one minute of collected data) are shown below, with the LQI results in Figure 1, and results in Figure 2. The horizontal axis shows the time scale and vertical axis provides the LQI or and light levels Node 1 LQI Node 2 LQI 0:00:05 0:00:10 0:00:15 0:00:20 0:00:25 0:00:30 0:00:35 0:00:40 0:00:45 0:00:50 0:00:55 0:01:00 Time Fig. 1. LQI variation is negligible and cannot be used to determine the intrusion Node 1 Node :00:05 0:00:10 0:00:15 0:00:20 0:00:25 0:00:30 0:00:35 0:00:40 0:00:45 0:00:50 0:00:55 0:01:00 Time Fig. 2. variation is significant and can be used for intrusion detection. A simple linear regression model was developed using LQI and as the independent variables and LIGHT as the dependent response variable marking the presence of an intruder. The model has correlation, r 2, of that is due to the dependent variable (with significance p = 2.63E-79). The second independent variable LQI is a poor predictor

3 of an intruder s presence (p = ). These results agree with the graphs of Figure 2 showing a match in the reduction in and light levels as a person moves back and forth between the sensor nodes. Our conclusion is that cam be used on its own to determine the presence of an intruder. 4. THEORY The next step is to devise an algorithm for detecting abnormal deviation in levels that would strongly correlate with abnormal deviations in LIGHT levels as an indicator of presence of an intruder. A simple approach is to calculate the required deviation in the that indicates sufficient abnormality. We assumed that ambient noise in the could be modeled by a normal curve. We then examined the reduction in when an intruder was present and found that values one standard deviation below the mean (based on a window of several seconds) acted as a good indicator of an intruder. This can be compueted as follows: ALGORITHM // window size determines the number of samples considered // in mean and standard deviation calculations var WINDOW_SIZE; // total number of readings var TOTAL_ENTRIES; // keep track of total number of intruders intruder_count=0; // index for current sample t=0; // skip t entries in order to get a window of data t = t + WINDOW_SIZE; DO // compute mean over previous WINDOW_SIZE entries // i.e. mean is computed over samples: (t-window_size)... t Compute µ; // similarly, compute standard deviation over previous WINDOW_SIZE entries Compute σ; IF t < µ σ intruder_detected = TRUE; intruder_count++; ELSE intruder_detected = FALSE; t = t + 1; WHILE t < TOTAL_ENTRIES The above algorithm shows the computation details to identify an intruder s presence based on values. The mean and standard deviation are computed over a given number of samples, called WINDOW_SIZE. If the value is less than the deviation µ σ, an intruder is detected and the counter is incremented; otherwise, there is no intruder. A suitable window size can be determined based on some preliminary investigation of the deployment environment. Table 1 shows the results of applying the above algorithm for data obtained in the preliminary testing of Section 3. As the window size increases, the number of false alarms is reduced until a stable point is reached. As an example, based on the results shown below, a window size of 60 seconds would be used for the estimation of mean and standard deviation.

4 Window Size False alarms Missed Intruders Table 1. Window Size Comparisons (220 intruders) 5. EXPERIMENT Objective: Investigate the effect of using our algorithm of Section 4 for detecting and intruder as the transmission distance between two sensor nodes is increased. Method: The sensors are deployed in a standard living room with typical furniture such as sofa, couch, dining table, and exercise machine. In order to avoid absorption of signals because of ground, the sensors are placed at the height of 3 feet, using stools. Two sensor nodes were used, both set to a power level of -15dBm. The nodes were tested at distances of 5, 10, 15, and 20 feet. The nodes were programmed as specified in Section 3, and the various distance tests were done for 20 minutes each. During the experiment, only one person was allowed in the area. The power levels for the nodes were maintained at a constant level by using fresh batteries for each run. Results: Graphs of the and LIGHT levels for a 5 minute interval of each tested distance are shown in Figures 3 to 6. The statistics from regression models for the runs are shown in Table 2. The level of correlation and significance of the with respect to LIGHT remains high (r 2 > 0.35 and p-value < ). We conclude that, with a power level of -15dBm, up to a distance of 10 feet there is consistently a good correlation between the and LIGHT levels and therefore presence of an intruder. Beyond 10 feet the relationship degrades slightly; however, even at 20 feet the correlation remains acceptable. The loss in accuracy due to distance is caused by at least two factors. First, as distance increases, the will decrease and this can lead to lost packets. At 5 feet, approximately packets were lost; whereas 520 packets were lost at distance 20 feet. The packet loss occurs more frequently when an intruder is present because the interference they cause can prevent packets from reaching to the opposite node, or to the base station. Second, as levels fall due to distance, the impact of the intruder on the signal falls below the one standard deviation limit. One can see the difference in the spikes caused by an intruder at a distance of 5 feet (Figure 3) as compared to that of an intruder at a distance of 20 feet (Figure 6). Distance (feet) Observations Multiple R R Square Standard Error Significance F 1.4E E E E-137 Number of Intruders False Alarm Rate Missed Intruders Rate Table 2. Regression Statistics: Y = light level, X = value.

5 :00:20 0:00:42 0:01:01 0:01:21 0:01:43 0:02:04 0:02:25 0:02:45 0:03:06 0:03:27 0:03:47 0:04:07 0:04:27 0:04:49 Fig. 3. Sample of and readings at 5 feet :00:22 0:00:41 0:01:01 0:01:22 0:01:42 0:02:02 0:02:22 0:02:42 0:03:04 0:03:25 0:03:48 0:04:08 0:04:30 0:04:52 Fig. 4. Sample of and readings at 10 feet :00:13 0:00:34 0:00:54 0:01:15 0:01:36 0:01:56 0:02:18 0:02:40 0:03:08 0:03:27 0:03:51 0:04:14 0:04:37 0:04:57 Fig. 5. Sample of and readings at 15 feet :00:23 0:00:51 0:01:13 0:01:37 0:01:59 0:02:25 0:02:47 0:03:15 0:03:42 0:04:09 0:04:36 Fig. 6. Sample of and readings at 20 feet.

6 6. CONCLUSION The results have shown that while the LQI of the sensor nodes has no significant relationship with the presence of an intruder, the does. This is because of the radio interference that is cause by the intruder s body. We have shown that this variation is significant enough to act as a detector for sensors placed up to 20 feet apart. Thus, intruder detection via could well become a cheap, quickly deployed security system. These findings could be the basis for many future endeavors. Such a usage of wireless sensor networks could extend beyond home security into military usage; such as setting up a perimeter to detect incoming enemies. On the industrial side, using a more complex setup and a little logic, it would be feasible to keep track of human traffic within a building or to identify the relative number of individuals in each room. For security, one could use paired keys between neighboring nodes to hinder the ability of intruders to hide themselves by injecting their own packets. Another possible enhancement is using relay nodes to carry the result packets back to a distant base station, or having redundant nodes that can be activated upon sensor node death to enhance the lifetime of the network. In future work, we plan to further study the relationship between an intruder s position and the effect on. More specifically, we will investigate the use of three or more sensors for intruder localization using triangulation strategies and possibly path traversal through a mesh network of sensors. This will require the use of more advanced modeling techniques from statistics and machine learning. REFERENCES [1] [2] [3] [4] [5] [6] P. Chen, S. Oh, M. Manzo, B. Sinopoli, C. Sharp, K. Whitehouse, G. Tolle, J. Jeong, P. Dutta, J. Hui, S. Shaert, S. Kim, J. Taneja, B. Zhu, T. Roosta, M. Howard, D. Culler, and S. Sastry Booth, N. and Smith, A. S., Experiments in instrumenting wireless sensor networks for real-time surveillance, IEEE International Conference on Robotics and Automation (ICRA), pp (2006). S. Y. Cheung, S. C. Ergen, and P. Varaiya, Traffic surveillance with wireless magnetic sensors," Proceedings of the 12 th World Congress on Intelligent Transport Systems (ITS), pages 13, (2005). T. He, S. Krishnamurthy, L. Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Q. Cao, P. Vicaire, J. A. Stankovic, T. F. Abdelzaher, J. Hui, and B. Krogh, Vigilnet: An integrated sensor network system for energy-efficient surveillance, ACM Transactions on Sensor Networks (TOSN), v.2 n.1, p.1-38 (2006). J. Ploetner and M. M. Trivedi, A multimodal approach for dynamic event capture of vehicles and pedestrians, Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks, pp , (2006). J. Schlessman, J. Shim, I. Kim, Y. C. Baek, and W. Wolf, Low power, low cost, wireless camera sensor nodes for human detection, Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks, pp (2006). J. Chen, Z. Safar, J. A. Sørensen, and K. J. Kristoffersen, An RF-based surveillance system using commercial offthe-shelf wireless LAN components, Proceedings of the 13 th European Signal Processing Conference, pages 4 (2005).

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University

More information

An Intelligent Car Park Management System based on Wireless Sensor Networks

An Intelligent Car Park Management System based on Wireless Sensor Networks An Intelligent Car Park Management System based on Wireless Sensor Networks Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao Internet and Mobile Computing Lab Department of Computing, The Hong Kong Polytechnic

More information

2. SYSTEM ARCHITECTURE AND HARDWARE DESIGN

2. SYSTEM ARCHITECTURE AND HARDWARE DESIGN Design and Evaluation of a Wireless Sensor Network for Monitoring Traffic Yuhe Zhang 1, 2, Xi Huang 1, 2, Li Cui 1,, Ze Zhao 1 Tel: +86-10-6260 0724, Fax: +86-10-6256 2701 1 Inst. of Computing Technology,

More information

Real-time Traffic Monitoring with Magnetic Sensor Networks *

Real-time Traffic Monitoring with Magnetic Sensor Networks * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1473-1486 (2011) Short Paper Real-time Traffic Monitoring with Magnetic Sensor Networks * LEI ZHANG, RUI WANG + AND LI CUI Institute of Computing Technology

More information

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Abdallah Makhoul University of Franche-Comté LIFC Laboratory Email: abdallah.makhoul@iut-bm.univ-fcomte.fr Rachid

More information

Original Research Articles

Original Research Articles Original Research Articles Researchers Mr.Ramchandra K. Gurav, Prof. Mahesh S. Kumbhar Department of Electronics & Telecommunication, Rajarambapu Institute of Technology, Sakharale, M.S., INDIA Email-

More information

A Review of Security System for Smart Home Applications

A Review of Security System for Smart Home Applications Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department

More information

Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage

Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage Gurhan Avdan Computer Engineering Department Istanbul Technical University Istanbul, Turkey Esin Ergen, Gursans

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Totally Wireless Video Security

Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

Indoor Surveillance System Using Android Platform

Indoor Surveillance System Using Android Platform Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao

More information

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,

More information

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI Available online at www.apije.com ASIA PACIFIC INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE Vol. 02 (01) (2016) 37 41 AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI A.Arun Raja

More information

Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks

Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks Georg Wittenburg, Kirsten Terfloth, Freddy López Villafuerte, Tomasz Naumowicz, Hartmut Ritter, and Jochen Schiller Freie

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

Exploiting Radio Irregularity in the Internet of Things for Automated People Counting

Exploiting Radio Irregularity in the Internet of Things for Automated People Counting Exploiting Radio Irregularity in the Internet of Things for Automated People Counting Wei-chuan Lin Winston K.G. Seah Wei Li School of Engineering and Computer Science Victoria University of Wellington,

More information

INFORMATION ON STANDARDS FOR ELECTRONIC SECURITY SYSTEMS

INFORMATION ON STANDARDS FOR ELECTRONIC SECURITY SYSTEMS INFORMATION ON STANDARDS FOR ELECTRONIC SECURITY SYSTEMS This is an uncontrolled document. The purpose of this document is to list the primary technical standards that NACOSS Gold and Systems Silver approved

More information

Automated Security System using ZigBee

Automated Security System using ZigBee IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038 ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 200614038 1 Project Name : Sensor Network System Project company : ROBUTEL Contact : www.robutel.com Project instructor : Yrd. Doç. Dr. Orhan GAZİ Contact

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering

More information

PRODUCT PROFILE BURGLAR ALARMS AUSTRALIA S STANDBY POWER STRATEGY 2002-2012

PRODUCT PROFILE BURGLAR ALARMS AUSTRALIA S STANDBY POWER STRATEGY 2002-2012 STANDBY PRODUCT PROFILE 2004/15 UPDATED NOVEMBER 2005 PRODUCT PROFILE BURGLAR ALARMS AUSTRALIA S STANDBY POWER STRATEGY 2002-2012 AN INITIATIVE OF THE MINISTERIAL COUNCIL ON ENERGY FORMING PART OF THE

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS G.MERLIN SHEEBA Electronics and Telecommunication Department, Sathyabama University Chennai, TamilNadu,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

INTERNET OF THINGS 1

INTERNET OF THINGS 1 INTERNET OF THINGS 1 OUTLINE Introduction to IoT Technologies Ubiquitous Network Network Management Technologies RFID WSN Embedded Nanotechnology IPv6 UPnP SNMP Challenging Problems Conclusions and Future

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm , pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College

More information

A wireless sensor network for traffic surveillance

A wireless sensor network for traffic surveillance A wireless sensor network for traffic surveillance Sing Yiu Cheung, Sinem Coleri, Ram Rajagopal, Pravin Varaiya University of California, Berkeley Outline Traffic measurement Wireless Sensor Networks Vehicle

More information

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring International Journal of Computer Sciences and Engineering Vol.-4(4), PP(25-29) April 2016, E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4,

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

INTELLIGENT HOME MONITORING USING RSSI

INTELLIGENT HOME MONITORING USING RSSI INTELLIGENT HOME MONITORING USING RSSI IN WIRELESS SENSOR NETWORKS FIRDOUS KAUSAR, EISA AL EISA, IMAM BAKHSH Department of Computer Science, College of Computer and Information Sciences, Imam University,

More information

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network 24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: zulhani@utem.edu.my

More information

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF). Page 1 of 30 Page 2 of 30 1. Basic terminology - Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF). - Remote Element:

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm

Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm Choon Kiat Lee 1, Vwen Yen Lee 2 1 Hwa Chong Institution, Singapore choonkiat.lee@gmail.com 2 Institute

More information

Tnet WIRELESS MESH SENSOR NETWORKS

Tnet WIRELESS MESH SENSOR NETWORKS Product Line Overview Tnet WIRELESS MESH SENSOR NETWORKS The fusion of advanced sensor and actuator technology with state of the art wireless networks has enabled a whole new level of applications for

More information

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612 Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,

More information

Fast and energy-efficient technique for jammed region mapping in wireless sensor networks

Fast and energy-efficient technique for jammed region mapping in wireless sensor networks Fast and energy-efficient technique for jammed region mapping in wireless sensor networks Nabila Rahman Matthew Wright Department of Computer Science and Engineering The University of Texas at Arlington

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

Development of Docking System for Mobile Robots Using Cheap Infrared Sensors

Development of Docking System for Mobile Robots Using Cheap Infrared Sensors Development of Docking System for Mobile Robots Using Cheap Infrared Sensors K. H. Kim a, H. D. Choi a, S. Yoon a, K. W. Lee a, H. S. Ryu b, C. K. Woo b, and Y. K. Kwak a, * a Department of Mechanical

More information

ZigBee Propagation for Smart Metering Networks

ZigBee Propagation for Smart Metering Networks ZigBee Propagation for Smart Metering Networks The UK government requires energy suppliers to take all reasonable steps to deploy smart meters in customer residences in Great Britain by 2019, with the

More information

System Design in Wireless Communication. Ali Khawaja

System Design in Wireless Communication. Ali Khawaja System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Antenna Deployment Technical Brief

Antenna Deployment Technical Brief ProCurve Networking Antenna Deployment Technical Brief Introduction... 2 Antenna types... 2 Omni directional antennas... 2 Directional antennas... 2 Diversity antennas... 3 High gain directional antennas...

More information

Defending Wireless Sensor Networks Against Adversarial Localization

Defending Wireless Sensor Networks Against Adversarial Localization Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,

More information

Sensors and Cellphones

Sensors and Cellphones Sensors and Cellphones What is a sensor? A converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument What are some sensors we use every

More information

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C.

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C. COMPANY PROFIL Date: 18 th May 2015 Dear Sir/Madam, Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C. Silver Space Electro Mechanical

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

High-Frequency Distributed Sensing for Structure Monitoring

High-Frequency Distributed Sensing for Structure Monitoring High-Frequency Distributed Sensing for Structure Monitoring K. Mechitov, W. Kim, G. Agha and T. Nagayama* Department of Computer Science, University of Illinois at Urbana-Champaign 201 N. Goodwin Ave.,

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

SmartMesh Wireless Sensor Networking for Industrial IoT

SmartMesh Wireless Sensor Networking for Industrial IoT SmartMesh Wireless Sensor Networking for Industrial IoT l l l l >99.999% Data Reliability >10 Year Battery Life Complete Embedded Network Software Industrial Grade Network Security Linear Technology s

More information

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks Sensors 2014, 14, 10804-10828; doi:10.3390/s140610804 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Automatic Docking System with Recharging and Battery Replacement for Surveillance Robot

Automatic Docking System with Recharging and Battery Replacement for Surveillance Robot International Journal of Electronics and Computer Science Engineering 1148 Available Online at www.ijecse.org ISSN- 2277-1956 Automatic Docking System with Recharging and Battery Replacement for Surveillance

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology

A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology Md Athiq UR Raza Ahamed M., Wajid Ahamed Department of Computer Science, S. A. Engineering College, Chennai, TamilNadu,

More information

Optimization Problems in Infrastructure Security

Optimization Problems in Infrastructure Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,

More information

Efficient Node Discovery in Mobile Wireless Sensor Networks

Efficient Node Discovery in Mobile Wireless Sensor Networks Efficient Node Discovery in Mobile Wireless Sensor Networks Vladimir Dyo, Cecilia Mascolo 1 Department of Computer Science, University College London Gower Street, London WC1E 6BT, UK v.dyo@cs.ucl.ac.uk

More information

MCTA: Target Tracking Algorithm based on

MCTA: Target Tracking Algorithm based on This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

EN.600.450.01.FA11 Network Embedded Systems/Sensor Networks Week 7: Energy Management. Marcus Chang, Andreas Terzis @ CS JHU

EN.600.450.01.FA11 Network Embedded Systems/Sensor Networks Week 7: Energy Management. Marcus Chang, Andreas Terzis @ CS JHU EN.600.450.01.FA11 Network Embedded Systems/Sensor Networks Week 7: Energy Management Marcus Chang, Andreas Terzis @ CS JHU 1 Power Management Where does all my power go? Simulation Collect power measurements

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

Surveillance and Security Technologies for Bridges and Tunnels

Surveillance and Security Technologies for Bridges and Tunnels Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean

More information

Surveillance System Using Wireless Sensor Networks

Surveillance System Using Wireless Sensor Networks Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA dantnguyen84@gmail.com chihshun@gmail.com Abstract The

More information

Large-Area Wireless Sensor System for Ambient Assisted Living

Large-Area Wireless Sensor System for Ambient Assisted Living DOI 10.516/sensor013/C4. Large-Area Wireless Sensor System for Ambient Assisted Living A. Steinhage, C. Lauterbach, A. Techmer Future-Shape GmbH, Höhenkirchen-Siegertsbrunn, Germany axel.steinhage@future-shape.com

More information

Keywords: Wireless Sensor Networks (WSN), Micro Electronics Mechanic System (MEMS), Genetic Algorithm (GA), applications, Energy Efficiency.

Keywords: Wireless Sensor Networks (WSN), Micro Electronics Mechanic System (MEMS), Genetic Algorithm (GA), applications, Energy Efficiency. Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on applications

More information

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,

More information

Positioning with Bluetooth

Positioning with Bluetooth Positioning with Bluetooth Josef Hallberg, Marcus Nilsson, Kåre Synnes Luleå University of Technology / Centre for Distance-spanning Technology Department of Computer Science and Electrical Engineering

More information

Industrial Robotics. Training Objective

Industrial Robotics. Training Objective Training Objective After watching the program and reviewing this printed material, the viewer will learn the basics of industrial robot technology and how robots are used in a variety of manufacturing

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

Smart Mobility Management for D2D Communications in 5G Networks

Smart Mobility Management for D2D Communications in 5G Networks Smart Mobility Management for D2D Communications in 5G Networks Osman N. C. Yilmaz, Zexian Li, Kimmo Valkealahti, Mikko A. Uusitalo, Martti Moisio, Petteri Lundén, Carl Wijting Nokia Research Center Nokia

More information

Device-Free Passive Localization

Device-Free Passive Localization Device-Free Passive Localization Matthew Mah Abstract This report describes a Device-Free Passive Localization System (DfP). The system provides a software solution over nominal WiFi equipment to detect

More information

A Sarsa based Autonomous Stock Trading Agent

A Sarsa based Autonomous Stock Trading Agent A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA achal@cs.utexas.edu Abstract This paper describes an autonomous

More information

Location management Need Frequency Location updating

Location management Need Frequency Location updating Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Sam Docknevich, PSP, Security Service Portfolio Manager. Are You Prepared? The impending impact of Code on Servicing Security Systems

Sam Docknevich, PSP, Security Service Portfolio Manager. Are You Prepared? The impending impact of Code on Servicing Security Systems Sam Docknevich, PSP, Security Service Portfolio Manager Are You Prepared? The impending impact of Code on Servicing Security Systems usa.siemens.com/infrastructure-cities Share current and upcoming standards

More information