24 resultados para Sentinel Node

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a novel scheme for node localization in a Delay-Tolerant Sensor Network (DTN). In a DTN, sensor devices are often organized in network clusters that may be mutually disconnected. Some mobile robots may be used to collect data from the network clusters. The key idea in our scheme is to use this robot to perform location estimation for the sensor nodes it passes based on the signal strength of the radio messages received from them. Thus, we eliminate the processing constraints of static sensor nodes and the need for static reference beacons. Our mathematical contribution is the use of a Robust Extended Kalman Filter (REKF)-based state estimator to solve the localization. Compared to the standard extended Kalman filter, REKF is computationally efficient and also more robust. Finally, we have implemented our localization scheme on a hybrid sensor network test bed and show that it can achieve node localization accuracy within 1m in a large indoor setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sensor networks, once deployed, are expected to continue to function unmanned. However, energy of the sensors is typically unrenewable thus making it a very scarce resource. Therefore, in order to extend the life of the sensor networks for the duration of a particular mission, energy has to be managed wisely. In this paper, we consider the problem of energy conservation for grid-based sensor networks. A wireless sensor network architecture that is based on mobile base station is presented. Based on this architecture, we propose an asynchronous duty-cycle scheduling scheme for extending the lifetime of the grid-based wireless sensor networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: The objectives of this study were to define appropriate criteria for assessing the presence of lymphedema, and to report the prevalence and risk factors for development of upper limb lymphedema after level I-III axillary dissection for melanoma.
Summary Background Data: The lack of a consistent and reliable objective definition for lymphedema remains a significant barrier to appreciating its prevalence after axillary dissection for melanoma (or breast carcinoma).
Methods: Lymphedema was assessed in 107 patients (82 male, 25 female) who had previously undergone complete level I-III axillary dissection. Of the 107 patients, 17 had also received postoperative axillary radiotherapy. Arm volume was measured using a water displacement technique. Change in volume of the arm on the side of the dissection was referenced to the volume of the other (control) arm. Volume measurements were corrected for the effect of handedness using corrections derived from a control group. Classification and regression tree (CART) analysis was used to determine a threshold fractional arm volume increase above which volume changes were considered to indicate lymphedema.
Results: Based on the CART analysis results, lymphedema was defined as an increase in arm volume greater than 16% of the volume of the control arm. Using this definition, lymphedema prevalence for patients in the present study was 10% after complete level I-III axillary dissection for melanoma and 53% after additional axillary radiotherapy. Radiotherapy and wound complications were independent risk factors for the development of lymphedema.
Conclusions: A suggested objective definition for arm lymphedema after axillary dissection is an arm volume increase of greater than 16% of the volume of the control arm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In spite of greater awareness of the need for action to reduce obesity, the evidence on sustainable community approaches to prevent childhood and adolescent obesity is surprisingly sparse. This paper describes the design and methodological components of the Sentinel Site for Obesity Prevention, a demonstration site in the Barwon-South West region of Victoria, Australia, that aims to build the programs, skills and evidence necessary to attenuate and eventually reverse the obesity epidemic in children and adolescents.

The Sentinel Site for Obesity Prevention is based on a partnership between the region's university (Deakin University) and its health, education and local government agencies. The three basic foundations of the Sentinel Site are: multi-strategy, multi-setting interventions; building community capacity; and undertaking program evaluations and population monitoring. Three intervention projects have been supported that cover different age groups (preschool: 2–5 years, primary school: 5–12 years, secondary school: 13–17 years), but that have many characteristics in common including: community participation and ownership of the project; an intervention duration of at least 3 years; and full evaluations with impact (behaviours) and outcome measures (anthropometry) compared with regionally representative comparison populations.

We recommend the Sentinel Site approach to others for successfully building evidence for childhood obesity prevention and stimulating action on reducing the epidemic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we consider wireless sensor networks designed to collect and store data. In a path-based attack, both sensor nodes and the database containing collected data can be compromised. We propose a recovery method using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes along with the database.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.