scholarly journals CRAM: A Conditioned Reflex Action Inspired Adaptive Model for Context Addition in Wireless Sensor Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-24 ◽  
Author(s):  
Majid Hussain ◽  
Muhammad Farrukh Shafeeq ◽  
Sana Jabbar ◽  
Ali Hammad Akbar ◽  
Shahzad Khalid

In Wireless Sensor Networks (WSNs), Context Awareness is typically realized through Context Aware Systems (CASs). Although almost each CAS follows sense-decide-adapt cycle, the notion of context is hardwired into the applications; that is, when an event is triggered, the sense-decide-actuate cycle runs and performs required actuation. In situations, for instance, whenever the same event is triggered, the cycle produces the same actuation through mechanical use of the same resources, posing the same processing and time. In this paper, we propose CRAM, a context added system in which actuations once performed by the system help it to internally evolve by serving as new contexts. As the system is exposed to more situations overtime, its context repository is enriched through such retrospective contexts, gradually letting it perform internal actuation through improved introspective contexts. This internal actuation leads the system towards the evolution of intelligent processing by reducing the independent function of decision in sense-decide-actuate cycle and merging it with new context. Finally, the system reaches a juncture where recurrence of each event proves to be a stimulus for the system to respond impulsively, through priming memory of introspective contexts, to achieve an imitation of learned reflex action resulting into reduced time and energy expenditure.

2013 ◽  
Vol 22 (1) ◽  
pp. 50-74 ◽  
Author(s):  
Wenjia Niu ◽  
Jun Lei ◽  
Endong Tong ◽  
Gang Li ◽  
Liang Chang ◽  
...  

Sensor Review ◽  
2018 ◽  
Vol 38 (3) ◽  
pp. 369-375 ◽  
Author(s):  
Sathya D. ◽  
Ganesh Kumar P.

PurposeThis study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.Design/methodology/approachNowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Bonehet al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.FindingsThe combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.Practical implicationsThe secured data aggregation is useful in health-related applications, military applications, etc.Originality/valueThe new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.


Author(s):  
Enamul Haque ◽  
Norihiko Yoshida

Applications of Wireless Sensor Networks (WSN) have been expanded from industrial operation to daily common use. With the pace of development, a good number of state-of-the-art routing protocols have been proposed for WSN. Among many of these protocols, hierarchical or cluster-based protocol technique is adopted from the wired network because of its scalability, better manageability, and implicit energy efficiency. In this chapter, the authors have surveyed Low Energy Adaptive Clustering Hierarchy, Power-Efficient Gathering in Sensor Information Systems, Adaptive Periodic Threshold-Sensitive Energy Efficient Sensor Network, and Hybrid Energy-Efficient Distributed Routing Protocols. These protocols exhibit notable characteristics and advantages compared to their contemporaries. Again, context aware computing and applications have been greatly emphasized in recent articles by renowned technologists. This approach is considered as a momentous technology that will change the way of interaction with information devices. Accordingly, context aware clustering technique carries a great deal of importance among WSN routing protocols. Therefore, the authors have investigated noteworthy context aware routing protocols such as: Context Adaptive Clustering, Data-Aware Clustering Hierarchy, Context-Aware Clustering Hierarchy, and Context-Aware Multilayer Hierarchical Protocol. Their investigation and analysis of these protocols has been included in this chapter with useful remarks. Context awareness is considered an integral part of Body Sensor Networks (BSN), which is one kind of WSN. Thus, the authors have also discussed issues related to context aware techniques used in BSN.


2011 ◽  
Vol 3 (2) ◽  
pp. 1-15 ◽  
Author(s):  
Ricardo S. Alonso ◽  
Dante I. Tapia ◽  
Juan M. Corchado

The significance that Ambient Intelligence (AmI) has acquired in recent years requires the development of innovative solutions. In this sense, the development of AmI-based systems requires the creation of increasingly complex and flexible applications. The use of context-aware technologies is an essential aspect in these developments in order to perceive stimuli from the context and react upon it autonomously. This paper presents SYLPH, a novel platform that defines a method for integrating dynamic and self-adaptable heterogeneous Wireless Sensor Networks (WSN). This approach facilitates the inclusion of context-aware capabilities when developing intelligent ubiquitous systems, where functionalities can communicate in a distributed way. A WSN infrastructure has been deployed for testing and evaluating this platform. Preliminary results and conclusions are presented in this paper.


Sign in / Sign up

Export Citation Format

Share Document