Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Physical Sciences and Mathematics

A Survey Of Wearable Devices Pairing Based On Biometric Signals, Jafar Pourbemany, Ye Zhu, Riccardo Bettati Jan 2023

A Survey Of Wearable Devices Pairing Based On Biometric Signals, Jafar Pourbemany, Ye Zhu, Riccardo Bettati

Electrical and Computer Engineering Faculty Publications

With the rapid growth of wearable devices, more applications require direct communication between wearable devices. To secure the communication between wearable devices, various pairing protocols have been proposed to generate common keys for encrypting the communication. Since the wearable devices are attached to the same body, the devices can generate common keys based on the same context by utilizing onboard sensors to capture a common biometric signal such as body motion, gait, heartbeat, respiration, and EMG signals. The context-based pairing does not need prior information to generate common keys. As context-based pairing does not need any human involvement in the …


Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung Jan 2023

Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung

Electrical and Computer Engineering Faculty Publications

The use of network connected devices has grown exponentially in recent years revolutionizing our daily lives. However, it has also attracted the attention of cybercriminals making the attacks targeted towards these devices increase not only in numbers but also in sophistication. To detect such attacks, a Network Intrusion Detection System (NIDS) has become a vital component in network applications. However, network devices produce large scale high-dimensional data which makes it difficult to accurately detect various known and unknown attacks. Moreover, the complex nature of network data makes the feature selection process of a NIDS a challenging task. In this study, …


5g Security Challenges And Solutions: A Review By Osi Layers, S. Sullivan, Alessandro Brighente, Sathish Kumar Jan 2021

5g Security Challenges And Solutions: A Review By Osi Layers, S. Sullivan, Alessandro Brighente, Sathish Kumar

Electrical and Computer Engineering Faculty Publications

The Fifth Generation of Communication Networks (5G) envisions a broader range of servicescompared to previous generations, supporting an increased number of use cases and applications. Thebroader application domain leads to increase in consumer use and, in turn, increased hacker activity. Dueto this chain of events, strong and efficient security measures are required to create a secure and trustedenvironment for users. In this paper, we provide an objective overview of5G security issues and theexisting and newly proposed technologies designed to secure the5G environment. We categorize securitytechnologies usingOpen Systems Interconnection (OSI)layers and, for each layer, we discuss vulnerabilities,threats, security solutions, challenges, gaps …


3d Face Reconstruction From Single 2d Image Using Distinctive Features, H. M. Rehan Afzal, Suhuai Luo, M. Kamran Afzal, Gopal Chaudhary, Manju Khari, Sathish Kumar Oct 2020

3d Face Reconstruction From Single 2d Image Using Distinctive Features, H. M. Rehan Afzal, Suhuai Luo, M. Kamran Afzal, Gopal Chaudhary, Manju Khari, Sathish Kumar

Electrical and Computer Engineering Faculty Publications

3D face reconstruction is considered to be a useful computer vision tool, though it is difficult to build. This paper proposes a 3D face reconstruction method, which is easy to implement and computationally efficient. It takes a single 2D image as input, and gives 3D reconstructed images as output. Our method primarily consists of three main steps: feature extraction, depth calculation, and creation of a 3D image from the processed image using a Basel face model (BFM). First, the features of a single 2D image are extracted using a two-step process. Before distinctive-features extraction, a face must be detected to …


Nsdroid: Efficient Multi-Classification Of Android Malware Using Neighborhood Signature In Local Function Call Graphs, Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, Chushu Liu Jan 2020

Nsdroid: Efficient Multi-Classification Of Android Malware Using Neighborhood Signature In Local Function Call Graphs, Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, Chushu Liu

Electrical and Computer Engineering Faculty Publications

With the rapid development of mobile Internet, Android applications are used more and more in people's daily life. While bringing convenience and making people's life smarter, Android applications also face much serious security and privacy issues, e.g., information leakage and monetary loss caused by malware. Detection and classification of malware have thus attracted much research attention in recent years. Most current malware detection and classification approaches are based on graph-based similarity analysis (e.g., subgraph isomorphism), which is well known to be time-consuming, especially for large graphs. In this paper, we propose NSDroid, a time-efficient malware multi-classification approach based on neighborhood …


Experiences With Implementing Parallel Discrete-Event Simulation On Gpu, Janche Sang, Che-Rung Lee, Vernon Rego, Chung-Ta King Aug 2019

Experiences With Implementing Parallel Discrete-Event Simulation On Gpu, Janche Sang, Che-Rung Lee, Vernon Rego, Chung-Ta King

Electrical and Computer Engineering Faculty Publications

Modern graphics processing units (GPUs) offer much more computational power than recent CPUs by providing a vast number of simple, data-parallel, multithreaded cores. In this study, we focus on the use of a GPU to perform parallel discrete-event simulation. Our approach is to use a modified service time distribution function to allow more independent events to be processed in parallel. The implementation issues and alternative strategies will be discussed in detail. We describe and compare our experience and results in using Thrust and CUB, two open-source parallel algorithms libraries which resemble the C++ Standard Template Library, to build our tool. …


Fpc: A New Approach To Firewall Policies Compression, Yuzhu Cheng, Weiping Wang, Jianxin Wang, Haodong Wang Feb 2019

Fpc: A New Approach To Firewall Policies Compression, Yuzhu Cheng, Weiping Wang, Jianxin Wang, Haodong Wang

Electrical and Computer Engineering Faculty Publications

Firewalls are crucial elements that enhance network security by examining the field values of every packet and deciding whether to accept or discard a packet according to the firewall policies. With the development of networks, the number of rules in firewalls has rapidly increased, consequently degrading network performance. In addition, because most real-life firewalls have been plagued with policy conflicts, malicious traffics can be allowed or legitimate traffics can be blocked. Moreover, because of the complexity of the firewall policies, it is very important to reduce the number of rules in a firewall while keeping the rule semantics unchanged and …


Short-Term Wind Speed Forecasting Via Stacked Extreme Learning Machine With Generalized Correntropy, Xiong Luo, Jiankun Sun, Long Wang, Weiping Wang, Wenbing Zhao, Jinsong Wu, Jenq-Haur Wang, Zijun Zhang Nov 2018

Short-Term Wind Speed Forecasting Via Stacked Extreme Learning Machine With Generalized Correntropy, Xiong Luo, Jiankun Sun, Long Wang, Weiping Wang, Wenbing Zhao, Jinsong Wu, Jenq-Haur Wang, Zijun Zhang

Electrical and Computer Engineering Faculty Publications

Recently, wind speed forecasting as an effective computing technique plays an important role in advancing industry informatics, while dealing with these issues of control and operation for renewable power systems. However, it is facing some increasing difficulties to handle the large-scale dataset generated in these forecasting applications, with the purpose of ensuring stable computing performance. In response to such limitation, this paper proposes a more practical approach through the combination of extreme-learning machine (ELM) method and deep-learning model. ELM is a novel computing paradigm that enables the neural network (NN) based learning to be achieved with fast training speed and …


Cmaps: A Chess-Based Multi-Facet Password Scheme For Mobile Devices, Ye Zhu, Jonathan Gurary, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang Sep 2018

Cmaps: A Chess-Based Multi-Facet Password Scheme For Mobile Devices, Ye Zhu, Jonathan Gurary, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang

Electrical and Computer Engineering Faculty Publications

It has long been recognized, by both security researchers and human-computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fAcet Password Scheme (MAPS) for mobile authentication. MAPS fuses information from multiple facets to form a password, allowing MAPS to enlarge the password space and improve memorability by reducing memory interference, which impairs memory performance according to psychology interference theory. The information fusion in MAPS can increase usability, as fewer input gestures are required for passwords of the same security strength. Based on the idea of …


An Optimization Of Virtual Machine Selection And Placement By Using Memory Content Similarity For Server Consolidation In Cloud, Huixi Li, Wenjun Li, Haodong Wang, Jianxin Wang Jul 2018

An Optimization Of Virtual Machine Selection And Placement By Using Memory Content Similarity For Server Consolidation In Cloud, Huixi Li, Wenjun Li, Haodong Wang, Jianxin Wang

Electrical and Computer Engineering Faculty Publications

Optimizing the virtual machine (VM) migration is an important issue of server consolidation in the cloud data center. By leveraging the content similarity among the memory of VMs, the time and the amount of transferred data in VM migration, as well as the pressure of network traffic, can be reduced. There are two problems in server consolidation: (1) determining which VMs should be migrated from the overloaded hosts (VM selection problem) and (2) how to place these VMs to the destination hosts (VM placement problem). By exploiting the content similarity, we redefine the above two problems into one problem to …


On Threshold-Free Error Detection For Industrial Wireless Sensor Networks, Jianliang Gao, Jianxin Wang, Ping Zhong, Haodong Wang May 2018

On Threshold-Free Error Detection For Industrial Wireless Sensor Networks, Jianliang Gao, Jianxin Wang, Ping Zhong, Haodong Wang

Electrical and Computer Engineering Faculty Publications

One of the important sources for big data is the datasets collected by wireless sensor networks. However, errors in sensor data could result in serious damages in industrial applications. Therefore, error detection plays a crucial role in industrial wireless sensor networks (IWSNs). Existing approaches of error detection are generally threshold-based, which rely on a predetermined threshold to judge whether a reading is erroneous. The threshold-based approaches, however, often fail to balance between detection accuracy and false alarm rate. It is thus difficult, if not impossible, to obtain a proper threshold for various errors in real-world applications. Motivated by this consideration, …


Reducing Transport Latency For Short Flows With Multipath Tcp, Pingping Dong, Wenjun Yang, Wensheng Tang, Jiawei Huang, Haodong Wang, Yi Pan, Jianxin Wang Apr 2018

Reducing Transport Latency For Short Flows With Multipath Tcp, Pingping Dong, Wenjun Yang, Wensheng Tang, Jiawei Huang, Haodong Wang, Yi Pan, Jianxin Wang

Electrical and Computer Engineering Faculty Publications

Multipath TCP (MPTCP) has been an emerging transport protocol that provides network resilience to failures and improves throughput by splitting a data stream into multiple subflows across all the available multiple paths. While MPTCP is generally beneficial for throughput-sensitive large flows with large number of subflows, it may be harmful for latency-sensitive small flows. MPTCP assigns each subflow a congestion window, making short flows susceptible to timeout when a flow only contains a few packets. This condition becomes even worse when the paths have heterogeneous characteristics as packet reordering occurs and the slow paths can be used with MPTCP, causing …


Design And Validation For Fpga Trust Under Hardware Trojan Attacks, Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Krishna, Swarup Bhunia Jun 2016

Design And Validation For Fpga Trust Under Hardware Trojan Attacks, Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Krishna, Swarup Bhunia

Electrical and Computer Engineering Faculty Publications

Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical to outsource device production to off-shore facilities. This introduces many opportunities for the insertion of malicious alterations of FPGA devices in the foundry, referred to as hardware Trojan attacks, that can cause logical and physical malfunctions during field operation. The vulnerability of these devices to hardware attacks raises serious security concerns regarding hardware and design assurance. In this paper, we present a taxonomy of FPGA-specific hardware Trojan …


Stackless Multi-Threading For Embedded Systems, William P. Mccartney, Nigamanth Sridhar Oct 2015

Stackless Multi-Threading For Embedded Systems, William P. Mccartney, Nigamanth Sridhar

Electrical and Computer Engineering Faculty Publications

Programming support for multi-threaded applications on embedded microcontroller platforms has attracted a considerable amount of research attention in the recent years. This paper is focused on this problem, and presents UnStacked C, a source-to-source transformation that can translate multithreaded programs written in C into stackless continuations. The transformation can support legacy code by not requiring any changes to application code; only the underlying threading library needs modifications. We describe the details of UnStacked C in the context of the TinyOS operating system for wireless sensor network applications. We present a modified implementation of the TOSThreads library for TinyOS, and show …


Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao Jan 2015

Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao

Electrical and Computer Engineering Faculty Publications

In this paper, we present a security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and does not require a device be jailbroken or utilize a custom operating system. We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable. Based on this policy, SPE provides enhancements to native controls that currently exist on the platform for privacy and security sensitive components. SPE allows access to these components in a way that allows the framework …


Evaluating Throughput And Delay In 3g And 4g Mobile Architectures, Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, Ye Zhu Aug 2014

Evaluating Throughput And Delay In 3g And 4g Mobile Architectures, Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, Ye Zhu

Electrical and Computer Engineering Faculty Publications

The third generation (3G) system was officially completed in 1997 by the International Telecommunications Union Radio communication Sector (ITU-R). This technology was a leader for more than a decade in the cellular network architecture. When 4G was introduced as an upgrade of the existing architecture, it was driven by the increasing demand for mobile broadband services with higher data rates and Quality of Service (QoS) [1]. The 4G infrastructure market in 2014 is predicted to reach $11.4 billion. According to AT & T the number of 4G subscribers will reach 440 million


On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks, Ye Zhu, A. Vikram, Huirong Fu, Yong Guan Jun 2014

On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks, Ye Zhu, A. Vikram, Huirong Fu, Yong Guan

Electrical and Computer Engineering Faculty Publications

In this paper, we propose an approach to track multiple non-cooperative targets with wireless sensor networks. Most existing tracking algorithms can not be directly applied to non-cooperative target tracking because they assume the access to signals from individual targets for tracking by assuming that: 1) there is only one target in a field; 2) signals from different co-operative targets can be differentiated; or 3) interference caused by signals from other targets is negligible because of attenuation. We propose a general approach for tracking non-cooperative targets. The tracking algorithm first separates the aggregate signals from multiple indistinguishable targets via the blind …


On Topology Of Sensor Networks Deployed For Multi-Target Tracking, Ye Zhu, A. Vikram, Huirong Fu Feb 2014

On Topology Of Sensor Networks Deployed For Multi-Target Tracking, Ye Zhu, A. Vikram, Huirong Fu

Electrical and Computer Engineering Faculty Publications

In this paper, we study topologies of sensor networks deployed for tracking multiple targets. Tracking multiple moving targets is a challenging problem. Most of the previously proposed tracking algorithms simplify the problem by assuming access to the signal from an individual target for tracking. Recently, tracking algorithms based on blind source separation (BSS), a statistical signal-processing technique widely used to recover individual signals from mixtures of signals, have been proposed. BSS-based tracking algorithms are proven to be effective in tracking multiple indistinguishable targets. The topology of a wireless sensor network deployed for tracking with BSS-based algorithms is critical to tracking …


Energy Prediction Based Intrusion Detection In Wireless Sensor Networks, Nancy Alrajei, George Corser, Huirong Fu, Ye Zhu Feb 2014

Energy Prediction Based Intrusion Detection In Wireless Sensor Networks, Nancy Alrajei, George Corser, Huirong Fu, Ye Zhu

Electrical and Computer Engineering Faculty Publications

A challenge in designing wireless sensor networks is to maximize the lifetime of the network with respect to limited resources and energy. These limitations make the network particularly vulnerable to attacks from adversaries. Denial of Service (DOS) is considered a severely damaging attack in monitoring applications when intruders attack the network and force it to lose its power and die early. There are intrusion detection approaches, but they require communications and calculations which waste the network’s limited resources. In this paper, we propose a new intrusion detection model that is suitable for defending against DOS attacks. We use the idea …


Supporting The Specification And Runtime Validation Of Asynchronous Calling Patterns In Reactive Systems, Jiannan Zhai, Nigamanth Sridhar, Jason O. Hallstrom Jan 2014

Supporting The Specification And Runtime Validation Of Asynchronous Calling Patterns In Reactive Systems, Jiannan Zhai, Nigamanth Sridhar, Jason O. Hallstrom

Electrical and Computer Engineering Faculty Publications

Wireless sensor networks (“sensornets”) are highly distributed and concurrent, with program actions bound to external stimuli. They exemplify a system class known as reactive systems, which comprise execution units that have “hidden” layers of control flow. A key obstacle in enabling reactive system developers to rigorously validate their implementations has been the absence of precise software component specifications and tools to assist in leveraging those specifications at runtime. We address this obstacle in three ways: (i) We describe a specification approach tailored for reactive environments and demonstrate its application in the context of sensornets. ( …


Efficient Refinement Checking In Vcc, Sumesh Divakaran, Deepak D’Souza, Nigamanth Sridhar Jan 2014

Efficient Refinement Checking In Vcc, Sumesh Divakaran, Deepak D’Souza, Nigamanth Sridhar

Electrical and Computer Engineering Faculty Publications

We propose a methodology for carrying out refinement proofs across declarative abstract models and concrete implementations in C, using the VCC verification tool. The main idea is to first perform a systematic translation from the top-level abstract model to a ghost implementation in VCC. Subsequent refinement proofs between successively refined abstract models and between abstract and concrete implementations are carried out in VCC. We propose an efficient technique to carry out these refinement checks in VCC. We illustrate our methodology with a case study in which we verify a simplified C implementation of an RTOS scheduler, with respect to its …


On Privacy Of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, Anil Vikram Jul 2012

On Privacy Of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, Anil Vikram

Electrical and Computer Engineering Faculty Publications

Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmissions when silence is detected. However, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new class of traffic analysis attacks to encrypted speech communications with the goal of detecting speakers of encrypted speech communications. These attacks are based on packet timing information only and the attacks can detect speakers of speech communications made with different codecs. We evaluate the proposed attacks with …


The Eigenvalues Of A Tridiagonal Matrix In Biogeography, Boris Igelnik, Daniel J. Simon Sep 2011

The Eigenvalues Of A Tridiagonal Matrix In Biogeography, Boris Igelnik, Daniel J. Simon

Electrical and Computer Engineering Faculty Publications

We derive the eigenvalues of a tridiagonal matrix with a special structure. A conjecture about the eigenvalues was presented in a previous paper, and here we prove the conjecture. The matrix structure that we consider has applications in biogeography theory.


Traffic Analysis Attacks On Skype Voip Calls, Ye Zhu, Huirong Fu Jul 2011

Traffic Analysis Attacks On Skype Voip Calls, Ye Zhu, Huirong Fu

Electrical and Computer Engineering Faculty Publications

Skype is one of the most popular voice-over-IP (VoIP) service providers. One of the main reasons for the popularity of Skype VoIP services is its unique set of features to protect privacy of VoIP calls such as strong encryption, proprietary protocols, unknown codecs, dynamic path selection, and the constant packet rate. In this paper, we propose a class of passive traffic analysis attacks to compromise privacy of Skype VoIP calls. The proposed attacks are based on application-level features extracted from VoIP call traces. The proposed attacks are evaluated by extensive experiments over different types of networks including …


A Dynamic System Model Of Biogeography-Based Optimization, Daniel J. Simon Jan 2011

A Dynamic System Model Of Biogeography-Based Optimization, Daniel J. Simon

Electrical and Computer Engineering Faculty Publications

We derive a dynamic system model for biogeography-based optimization (BBO) that is asymptotically exact as the population size approaches infinity. The states of the dynamic system are equal to the proportion of each individual in the population; therefore, the dimension of the dynamic system is equal to the search space cardinality of the optimization problem. The dynamic system model allows us to derive the proportion of each individual in the population for a given optimization problem using theory rather than simulation. The results of the dynamic system model are more precise than simulation, especially for individuals that are very unlikely …


Correlation-Based Traffic Analysis Attacks On Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, Wei Zhao Jul 2010

Correlation-Based Traffic Analysis Attacks On Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, Wei Zhao

Electrical and Computer Engineering Faculty Publications

In this paper, we address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures to defeat traffic analysis attacks. In this paper, we focus on a particular class of traffic analysis attacks, flow-correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our …


A Majorization Algorithm For Constrained Correlation Matrix Approximation, Daniel J. Simon, Jeff Abell Feb 2010

A Majorization Algorithm For Constrained Correlation Matrix Approximation, Daniel J. Simon, Jeff Abell

Electrical and Computer Engineering Faculty Publications

We desire to find a correlation matrix of a given rank that is as close as possible to an input matrix R, subject to the constraint that specified elements in must be zero. Our optimality criterion is the weighted Frobenius norm of the approximation error, and we use a constrained majorization algorithm to solve the problem. Although many correlation matrix approximation approaches have been proposed, this specific problem, with the rank specification and the constraints, has not been studied until now. We discuss solution feasibility, convergence, and computational effort. We also present several examples.


A New Class Of Attacks On Time Series Data Mining, Ye Zhu, Yongjian Fu, Huirong Fu Jan 2010

A New Class Of Attacks On Time Series Data Mining, Ye Zhu, Yongjian Fu, Huirong Fu

Electrical and Computer Engineering Faculty Publications

Traditional research on preserving privacy in data mining focuses on time-invariant privacy issues. With the emergence of time series data mining, traditional snapshot-based privacy issues need to be extended to be multi-dimensional with the addition of time dimension. We find current techniques to preserve privacy in data mining are not effective in preserving time-domain privacy. We present the data flow separation attack on privacy in time series data mining, which is based on blind source separation techniques from statistical signal processing. Our experiments with real data show that this attack is effective. By combining the data flow separation method and …


Compromising Anonymous Communication Systems Using Blind Source Separation, Ye Zhu, Riccardo Bettati Oct 2009

Compromising Anonymous Communication Systems Using Blind Source Separation, Ye Zhu, Riccardo Bettati

Electrical and Computer Engineering Faculty Publications

We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorithms widely used to recover individual signals from mixtures of signals in statistical signal processing. Since the philosophy behind the design of current anonymity networks is to mix traffic or to hide in crowds, the proposed anonymity attacks are very effective. The flow separation attack proposed for wired anonymity networks can separate the traffic in a mix network. Our experiments show that this attack is effective and scalable. By combining the flow separation method with frequency spectrum …


Failure Detectors For Wireless Sensor-Actuator Systems, Hamza A. Zia, Nigamanth Sridhar, Shivakumar Sastry Jul 2009

Failure Detectors For Wireless Sensor-Actuator Systems, Hamza A. Zia, Nigamanth Sridhar, Shivakumar Sastry

Electrical and Computer Engineering Faculty Publications

Wireless sensor-actuator systems (WSAS) offer exciting opportunities for emerging applications by facilitating fine-grained monitoring and control, and dense instrumentation. The large scale of such systems increases the need for such systems to tolerate and cope with failures, in a localized and decentralized manner. We present abstractions for detecting node failures and link failures caused by topology changes in a WSAS. These abstractions were designed and implemented as a set of reusable components in nesC under TinyOS. Results, which demonstrate the performance and viability of the abstractions, based on experiments on an 80 node testbed are presented. In the …