摘要:
All-to-all communication is carried out in a wireless mesh network using a relaying packet that is routed through the network. In at least one embodiment, the relaying packet includes aggregated information that is made available to all nodes in the mesh network.
摘要:
Techniques related to coordinating power management for multiple devices are discussed. Such techniques may include establishing communications between devices, inventorying the components of each device, and implementing a power management plan to eliminate any redundancy in the components and reduce the total power consumed by the devices.
摘要:
A lightweight security framework is disclosed that combines PKI with symmetric key cryptography to exploit the system asymmetry in hierarchical sensor networks. The framework provides protocols for public key exchange, session and group key generation, pair-wise key generation, and network resource protection in a low-cost security architecture. The security framework shifts much of the security-related computational load off of the resource-constrained sensor nodes and on to resource-rich base station nodes. The method is based on the generation and management of two kinds of symmetric keys from a set of bootstrapping asymmetric keys on each node.
摘要:
Some embodiments disclosed herein provide novel approaches for rapidly sensing sense line cross-point interaction in a textile such as a carpet or rug. A textile may comprise transmit and receive sense lines configured so that when an object contacts the textile and depresses one or more transmit lines against one or more receive lines, the object may be detected by monitoring unique signals produced by the transmit sense lines into the receive sense lines to detect the object.
摘要:
Nodes of a multichannel mesh network generate channel-metric matrices for routing packets to destinations based on a bottleneck channel identified for the source-destination pair. The identification of bottleneck channels increases the diversity among the different communication channels used along a route. This link-state routing approach may allow better paths to be found.
摘要:
A lightweight security framework is disclosed that combines PKI with symmetric key cryptography to exploit the system asymmetry in hierarchical sensor networks. The framework provides protocols for public key exchange, session and group key generation, pair-wise key generation, and network resource protection in a low-cost security architecture. The security framework shifts much of the security-related computational load off of the resource-constrained sensor nodes and on to resource-rich base station nodes. The method is based on the generation and management of two kinds of symmetric keys from a set of bootstrapping asymmetric keys on each node.
摘要:
A sensor device may use battery power to operate a sensor node by taking sensor readings and transferring data onto or out of a set of queues. A radio frequency identification (RFID) tag may be used to wirelessly communicate data into and/or out of the sensor device without using power from the battery. The sensor node may be placed in a low-power mode without respect whether the RFID tag is communicating. In some embodiments, the sensor device may be used as a store-and-forward node for other devices by placing data received from one RFID reader into the set of queues and later transmitting the data from the set of queues in response to a poll from another RFID reader.
摘要:
Embodiments of methods and apparatus for providing a dynamic on-demand routing protocol are generally described herein. Other embodiments may be described and claimed.
摘要:
An embodiment of the present invention provides an apparatus, comprising a transceiver capable of dynamic cluster-based node sleep/wake scheduling by integrating application information such as scheduled data transfers with the sleep/wake scheduling, wherein the nodes may sleep immediately after a scheduled data transmission. Further, the nodes may intelligently and automatically choose to sleep based on the ongoing communication of its neighbors and the apparatus may be part of a wireless sensor network. The nodes may consist of battery-operated computing and sensing devices that collaborate to deliver sensed data and the delivery of the sensed data may be over multiple hops between multiple nodes.
摘要:
Embodiments of methods and apparatus for identifying a distance-vector route associated with a wireless mesh network are generally described herein. Other embodiments may be described and claimed.