Deploying a voice capture sensor network system for a secure ubiquitous home environment

نویسندگان

  • Luis E. Palafox
  • J. Antonio García-Macías
چکیده

In this paper we present a novel voice capture sensor network architecture proposal, we detail the implementation procedure that we followed to build a working prototype. The prototype is oriented towards a secure ubiquitous home environment but can be extended to other similar scenarios. Our approach is based on reducing data redundancy while maintaining node redundancy for reliability and providing at the same time basic security services without sacrificing a considerable amount of resources. We further show that our approach is energy-efficient compared to the capture-send approach used traditionally. More importantly, through our experiences in the real-world deployment of the system we also provide a roadmap for the development of efficient voice-based smart home applications. Copyright c © 2009 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor

Recently home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. In this paper, we focused on user’s context based intelligent security management for home safety application using RFID and WSN(Wireless Sensor Network). We propose a context aware home safety application model. The proposed context service support security and ...

متن کامل

Security Technologies Based on Home Gateway for Making Smart Home Secure

As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in open network. In general deployment of home network, a secure home gateway is located at the boarder of each home and regarded to be a core entity providing services and controlling traffic. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Int. J. Communication Systems

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2009