Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Missouri University of Science and Technology

2006

Wireless Sensor Networks

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Adaptive Neural Network Control And Wireless Sensor Network Based Localization For Uav Formation, H. Wu, Jagannathan Sarangapani Jun 2006

Adaptive Neural Network Control And Wireless Sensor Network Based Localization For Uav Formation, H. Wu, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

We consider a team of unmanned aerial vehicles (UAV's) equipped with sensors and motes for wireless communication for the task of navigating to a desired location in a formation. First a neural network (NN)-based control scheme is presented that allows the UAVs to track a desired position and orientation with reference to the neighboring UAVs or obstacles in the environment. Second, we discuss a graph theory-based scheme for discovery, localization and cooperative control. The purpose of the NN cooperative controller is to achieve and maintain the desired formation shape in the presence of unmodeled dynamics and bounded unknown disturbances. Numerical …


Secrout: A Secure Routing Protocol For Sensor Networks, Jian Yin, Sanjay Kumar Madria Jan 2006

Secrout: A Secure Routing Protocol For Sensor Networks, Jian Yin, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

In this paper, we present a secure routing protocol for sensor networks (SecRout) to safeguard sensor networks under different types of attacks. The SecRout protocol uses the symmetric cryptography to secure messages, and uses a small cache in sensor nodes to record the partial routing path (previous and next nodes) to the destination. It guarantees that the destination will be able to identify and discard the tampered messages and ensure that the messages received are not tampered. Comparing the performance with non-secure routing protocol AODV (ad hoc on demand distance vector routing), the SecRout protocol only has a small byte …