Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Adaptive Neural Network Control And Wireless Sensor Network Based Localization For Uav Formation, H. Wu, Jagannathan Sarangapani
Adaptive Neural Network Control And Wireless Sensor Network Based Localization For Uav Formation, H. Wu, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
We consider a team of unmanned aerial vehicles (UAV's) equipped with sensors and motes for wireless communication for the task of navigating to a desired location in a formation. First a neural network (NN)-based control scheme is presented that allows the UAVs to track a desired position and orientation with reference to the neighboring UAVs or obstacles in the environment. Second, we discuss a graph theory-based scheme for discovery, localization and cooperative control. The purpose of the NN cooperative controller is to achieve and maintain the desired formation shape in the presence of unmodeled dynamics and bounded unknown disturbances. Numerical …
Secrout: A Secure Routing Protocol For Sensor Networks, Jian Yin, Sanjay Kumar Madria
Secrout: A Secure Routing Protocol For Sensor Networks, Jian Yin, Sanjay Kumar Madria
Computer Science Faculty Research & Creative Works
In this paper, we present a secure routing protocol for sensor networks (SecRout) to safeguard sensor networks under different types of attacks. The SecRout protocol uses the symmetric cryptography to secure messages, and uses a small cache in sensor nodes to record the partial routing path (previous and next nodes) to the destination. It guarantees that the destination will be able to identify and discard the tampered messages and ensure that the messages received are not tampered. Comparing the performance with non-secure routing protocol AODV (ad hoc on demand distance vector routing), the SecRout protocol only has a small byte …