Gatewaying theWireless Sensor Networks
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 10
Abstract
With the dev elopmen t of Internet of Things (IoT), bridging wireless sensor netw orks (WSNs) with other netw orks has become importan t. We divide bridging solutions into tw o categ ories: the hardw are solutions and the middlew are solutions. The hardw are solutions have both low pow er short distance wireless interf aces and other types of transmission interf aces, e.g. GPRS, 3G/4G, via hardw are implemen tations, which is more stable and applicable for the depl oyed sensor netw orks. In the middlew are solutions, the whole system processes appropria te protocol conversion, and independence of hardw are, making it easier to be reused in dieren t applica tions and netw orks. This paper brief y presen ts the implemen tation details and key poin ts of each solution. Particular ly, we deriv e the most appropria te situa tion for each solution from our comparisons and discussions in terms of evaluation applied to dieren t criteria.
Authors and Affiliations
Ming Zhu, Zhaoshu Tang, Wenlong Yue, Lei Wang, Zhenquan Qin, Lei Shu, Liang Sun
Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding
Gaussian Bayes classifiers are widely used in machine learning for various purposes. Its special characteristic has provided a great capacity for estimating the likelihood and reliability of individual classification dec...
Comparison of Different Neural Network Training Algorithms with Application to Face Recognition
Research in the field of face recognition has been popular for several decades. With advances in technology, approaches to solving this problems haves changed. Main goal of this paper was to compare different training al...
Ant Colony Optimization Based Model Checking Extended by Smell-like Pheromone
Model Checking is a technique for automatically checking the model representing software or hardware about whether they satisfy the corresponding specifications. Traditionally, the model checking uses deterministic algor...
Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security
In this paper, we study the secure communication of cognitive energy harvesting relay networks when there exist multiple eaves droppers who can overhear the message of the second hop, and multiple primary users are prese...
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or nationa...