Technische Universitat Clausthal

Displaying 41-57 of 57 results

  • White Papers // Oct 2010

    SFHC.KOM: Stateful Header Compression for Wireless Sensor Networks

    Nodes in wireless sensor networks are generally confined in the energy budget available for their operation, hence energy-aware application design is mandatory to achieve long node lifetimes. Radio transmissions represent an inherent, but energetically costly characteristic of sensor networking. Significant reductions in the overall energy consumption can thus be achieved...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2010

    A Concept for Cross-Layer Optimization of Wireless Sensor Networks in the Logistics Domain by Exploiting Business Knowledge

    Energy is limited in wireless sensor networks due to mostly battery-operated wireless sensor nodes. Consequently, an efficient energy usage significantly enhances the lifetime of a wireless sensor network. In this paper, the authors propose a cross-layer optimization concept that exploits business knowledge in the logistics domain to adapt communication by...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Towards Declarative Query Scoping in Sensor Networks

    In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach for accessing sensor data has gained great popularity because of both its simplicity and its energy-efficient implementation. At the same time another declarative abstraction made...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Iterative Dual Downlink Beamforming for Cognitive Radio Networks

    The authors address the problem of multi-user downlink beamforming and power allocation in a Cognitive Radio (CR) Secondary Network (SN) with constraints on the total interference in the Primary Network (PN). They derive the Lagrange dual of the problem and show that both problems are equivalent. Two algorithms are proposed...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Describing Packet Payload Structures Using Lightweight Semantic Data Type Annotations

    In the majority of wireless sensor networks, packet structures are statically defined at design time. At runtime, sensed data is then inserted into the payload fields prior to packet transmission. While this is efficient in terms of the required processing, the packet structure cannot be modified during runtime. However, in...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Deployment of Wireless Sensor Networks in Logistics - Potential, Requirements, and a Testbed

    With the growing demand for extensive monitoring of transport processes in logistics and approaches for an event-based management of logistics processes, wireless sensor network technology has become a promising technology for this domain. In the first part of this paper, the authors describe such application possibilities for wireless sensor networks...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Exploring the Applicability of Participatory Sensing in Emergency Scenarios

    In emergency scenarios, rescuers need specific information about the affected areas. Such information are normally collected by sensors, but sometimes they could not be available because, as a consequence of a disaster, the pre-deployed infrastructure might be damaged, and rescue teams could not easily deploy new sensors in unfavorable conditions....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Fine-Grained Access Control Enabling Privacy Support in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed to cover a wide range of scenarios ranging from environmental monitoring to medical applications. However, some deployments raise privacy concerns. The threats to privacy are directly identifiable in people-centric scenarios. However, environment-centric scenarios may also threaten the privacy of persons located in the monitored...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2010

    An On-Line Piecewise Linear Approximation Technique for Wireless Sensor Networks

    Many sensor network applications observe trends over an area by regularly sampling slow-moving values such as humidity or air pressure (for example in habitat monitoring). Another well-published type of application aims at spotting sporadic events, such as sudden rises in temperature or the presence of methane, which are tackled by...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2010

    On Distributed SLA Monitoring and Enforcement in Service-Oriented Systems

    For the integration of systems across enterprise boundaries, the application of Web service technology and the Service-Oriented Architecture (SOA) paradigm have become state of the art. Here, the management of the quality delivered by third party services is crucial. In order to achieve high service quality, requirements therefore need to...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks

    Conditions such as wireless data transmission and lack of a communication infrastructure turn Mobile Ad-hoc NETworks (MANETs) into a challenging environment from the perspective of security. Various kinds of misbehavior were identified. The authors present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2009

    Cross-Organizational Service Security - Solutions for Attack Modeling and Defense

    Security is an important aspect of Service-Oriented Architectures (SOAs), enabling the service-based integration of partner IT systems across organizational boundaries, i. e., in the Internet of Services. Current trends in SOA security, e. g., reducing it to Web service security, do not take into account SOA-specific threats, vulnerabilities, and attacks....

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2011

    Re-Synchronizing Audio Watermarking After Non-Linear Time Stretching

    Digital audio watermarking today is robust to many common attacks, including lossy compression and digital-to-analogue conversion. One robustness and security challenge, still, is time-stretching. This operation speeds up or slows down the playback speed while preserving the tone pitch. Although inaudible for an uninformed listener if smoothly applied, time-stretching can...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2010

    Linear Recurring Sequences for the UOV Key Generation

    Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in the post-quantum world. Due to its high efficiency and modest computational requirements, multivariate cryptography seems especially appropriate for signature schemes on low cost devices. However, multivariate schemes are not much used yet, mainly...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2013

    Automatic Protocol Selection in Secure Two-Party Computations

    Performance of secure computation is still often an obstacle to its practical adoption. There are different protocols for secure computation that compete for the best performance. In this paper the authors propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2009

    Cross-Organizational Service Security - Solutions for Attack Modeling and Defense

    Security is an important aspect of Service-Oriented Architectures (SOAs), enabling the service-based integration of partner IT systems across organizational boundaries, i. e., in the Internet of Services. Current trends in SOA security, e. g., reducing it to Web service security, do not take into account SOA-specific threats, vulnerabilities, and attacks....

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2011

    Lightweight Remote Attestation Using Physical Functions

    Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, the authors present a lightweight remote...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Designing a Sensor Network Testbed for Smart Heterogeneous Applications

    Future buildings and environments are envisioned to provide ambient intelligence, adapting to a user's preferences based on information about his context and status. Smart heterogeneous sensor networks are well suited data sources for such environments, because they allow for dynamic adaptation to newly added sensor types and novel tasks. Realistic...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Methodology for Wireless Sensor Network Prototyping With Sophisticated Debugging Support

    In this paper, the authors present a methodology for rapid prototyping of wireless sensor networks that allows embedding sophisticated debugging functionality in a mote prototype and thereby monitoring entire networks. They achieve this goal by combining two fundamental concepts: the use of a re-configurable sensor node prototype platform, and an...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Reconfigurable Prototyping Platform for Smart Sensor Networks

    In this paper, a new concept for a very flexible and modular prototype platform for rapid prototyping of wireless sensor networks is presented. The authors propose to use a FPGA with high gate count as core of the platform. The FPGA is utilized to attain 3 major goals for the...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Developing a Debugging Interface for Reconfigurable Wireless Sensor Nodes

    Wireless Sensor Networks (WSNs) consist of small, autonomous nodes (motes) which combine sensing, computing and wireless transmitting capabilities. Deployed in an application scenario, the motes can take sensor measurements, process the gathered data, and subsequently send the results to other motes or external devices using the on-board radio transmitter. Many...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Allowing Early Inspection of Activity Data From a Highly Distributed Bodynet With a Hierarchical-Clustering-of-Segments Approach

    The output delivered by body-wide inertial sensing systems has proven to contain sufficient information to distinguish between a large numbers of complex physical activities. The bottlenecks in these systems are in particular the parts of such systems that calculate and select features, as the high dimensionality of the raw sensor...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2012

    Trainspotting: Combining Fast Features to Enable Detection on Resource-Constrained Sensing Devices

    This paper focuses on spotting and classifying complex and sporadic phenomena directly on a sensor node, whereby a relatively long sequence of sensor samples needs to be considered at a time. Using fast feature extraction from streaming data that can be implemented on the sensor nodes, the authors show that...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    Fast Indoor Radio-Map Building for RSSI-Based Localization Systems

    Wireless Indoor localization systems based on RSSI-values typically consist of an offline training phase and online position determination phase. During the offline phase, geo-referenced RSSI measurement, called fingerprints, are recorded to build a radiomap of the building. This radiomap is then searched during the position determination phase to estimate another...

    Provided By Technische Universitat Clausthal