sensors-logo

Journal Browser

Journal Browser

Selected Papers from The 11th International Workshop on Knowledge Management and Acquisition for Smart Systems and Services (PKAW 2010)

A special issue of Sensors (ISSN 1424-8220).

Deadline for manuscript submissions: closed (31 January 2011) | Viewed by 94342

Special Issue Editors

Department of Multimedia Engineering, Hannam Universtiy, 133 Ojeong-dong, Daedeok-gu, Daejeon 306-791, Korea
Interests: information technology; information security; IT applicaion in disaster management
Special Issues, Collections and Topics in MDPI journals
School of Computing and Information Systems, University of Tasmania, Private Bag 100, Hobart, TAS 7000, Australia
Interests: expert systems; knowledge acquisition; web services; eHealth systems

Special Issue Information

Dear Colleagues,

"The 11th International Workshop on Knowledge Management and Acquisition for Smart Systems and Services (PKAW 2010)" has provided a forum for the past two decades for researchers and practitioners working in the area of machine intelligence. PKAW covers a spectrum of techniques and approaches to implement smartness in IT applications. With the growing recognition of the pivotal role that smartness plays in the sustainability, competitiveness and growth of an organisation, together with the difficulties associated with effectively managing knowledge, finding solutions to address the knowledge acquisition bottleneck is even more important in today’s society than in the early beginnings of this field. This workshop will explore and disseminate the latest solutions. Machine intelligence solutions incorporating other areas of AI such as ontological engineering, agent-based technology, robotics, image recognition and the Semantic Web are common, as are knowledge acquisition methods related to other fields of computing such as software engineering, security, databases, the Internet, information retrieval, language technology and game technology. Many solutions are application focussed addressing real world problems such as knowledge reuse, sharing, merging and reconciliation within a wide range of problem domains.

Dr. Byeong Ho Kang
Prof. Dr. Tai-hoon Kim
Guest Editors

Conference website: http://sersc.org/PKAW2010/

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

348 KiB  
Article
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by Hsiu-Lien Yeh, Tien-Ho Chen, Pin-Chuan Liu, Tai-Hoo Kim and Hsin-Wen Wei
Sensors 2011, 11(5), 4767-4779; https://doi.org/10.3390/s110504767 - 02 May 2011
Cited by 322 | Viewed by 14175
Abstract
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited [...] Read more.
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. Full article
Show Figures

1300 KiB  
Article
Study on the Context-Aware Middleware for Ubiquitous Greenhouses Using Wireless Sensor Networks
by Jeonghwang Hwang and Hyun Yoe
Sensors 2011, 11(5), 4539-4561; https://doi.org/10.3390/s110504539 - 27 Apr 2011
Cited by 26 | Viewed by 11314
Abstract
Wireless Sensor Network (WSN) technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural [...] Read more.
Wireless Sensor Network (WSN) technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural sector. Middleware, which can connect WSN hardware, applications, and enterprise systems, is required to construct ubiquitous agriculture environment combining WSN technology with agricultural sector applications, but there have been insufficient studies in the field of WSN middleware in the agricultural environment, compared to other industries. This paper proposes a context-aware middleware to efficiently process data collected from ubiquitous greenhouses by applying WSN technology and used to implement combined services through organic connectivity of data. The proposed middleware abstracts heterogeneous sensor nodes to integrate different forms of data, and provides intelligent context-aware, event service, and filtering functions to maximize operability and scalability of the middleware. To evaluate the performance of the middleware, an integrated management system for ubiquitous greenhouses was implemented by applying the proposed middleware to an existing greenhouse, and it was tested by measuring the level of load through CPU usage and the response time for users’ requests when the system is working. Full article
Show Figures

751 KiB  
Article
Distributed Dynamic Host Configuration Protocol (D2HCP)
by Luis Javier García Villalba, Julián García Matesanz, Ana Lucila Sandoval Orozco and José Duván Márquez Díaz
Sensors 2011, 11(4), 4438-4461; https://doi.org/10.3390/s110404438 - 18 Apr 2011
Cited by 27 | Viewed by 12589
Abstract
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each [...] Read more.
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. Full article
Show Figures

Graphical abstract

345 KiB  
Article
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors
by Ben Townsend, Jemal Abawajy and Tai-Hoon Kim
Sensors 2011, 11(4), 4231-4243; https://doi.org/10.3390/s110404231 - 08 Apr 2011
Cited by 11 | Viewed by 10486
Abstract
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their [...] Read more.
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. Full article
Show Figures

851 KiB  
Article
New Finger Biometric Method Using Near Infrared Imaging
by Eui Chul Lee, Hyunwoo Jung and Daeyeoul Kim
Sensors 2011, 11(3), 2319-2333; https://doi.org/10.3390/s110302319 - 24 Feb 2011
Cited by 219 | Viewed by 13652
Abstract
In this paper, we propose a new finger biometric method. Infrared finger images are first captured, and then feature extraction is performed using a modified Gaussian high-pass filter through binarization, local binary pattern (LBP), and local derivative pattern (LDP) methods. Infrared finger images [...] Read more.
In this paper, we propose a new finger biometric method. Infrared finger images are first captured, and then feature extraction is performed using a modified Gaussian high-pass filter through binarization, local binary pattern (LBP), and local derivative pattern (LDP) methods. Infrared finger images include the multimodal features of finger veins and finger geometries. Instead of extracting each feature using different methods, the modified Gaussian high-pass filter is fully convolved. Therefore, the extracted binary patterns of finger images include the multimodal features of veins and finger geometries. Experimental results show that the proposed method has an error rate of 0.13%. Full article
Show Figures

Graphical abstract

1127 KiB  
Article
Study on an Agricultural Environment Monitoring Server System using Wireless Sensor Networks
by Jeonghwan Hwang, Changsun Shin and Hyun Yoe
Sensors 2010, 10(12), 11189-11211; https://doi.org/10.3390/s101211189 - 08 Dec 2010
Cited by 142 | Viewed by 15488
Abstract
This paper proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural environment monitoring server system collects environmental and soil information on the outdoors through WSN-based environmental and [...] Read more.
This paper proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural environment monitoring server system collects environmental and soil information on the outdoors through WSN-based environmental and soil sensors, collects image information through CCTVs, and collects location information using GPS modules. This collected information is converted into a database through the agricultural environment monitoring server consisting of a sensor manager, which manages information collected from the WSN sensors, an image information manager, which manages image information collected from CCTVs, and a GPS manager, which processes location information of the agricultural environment monitoring server system, and provides it to producers. In addition, a solar cell-based power supply is implemented for the server system so that it could be used in agricultural environments with insufficient power infrastructure. This agricultural environment monitoring server system could even monitor the environmental information on the outdoors remotely, and it could be expected that the use of such a system could contribute to increasing crop yields and improving quality in the agricultural field by supporting the decision making of crop producers through analysis of the collected information. Full article
Show Figures

Review

Jump to: Research

215 KiB  
Review
Auto-Configuration Protocols in Mobile Ad Hoc Networks
by Luis Javier García Villalba, Julián García Matesanz, Ana Lucila Sandoval Orozco and José Duván Márquez Díaz
Sensors 2011, 11(4), 3652-3666; https://doi.org/10.3390/s110403652 - 25 Mar 2011
Cited by 28 | Viewed by 15957
Abstract
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but [...] Read more.
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. Full article
Show Figures

Graphical abstract

Back to TopTop