The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently with the sharing economy of WiFi, IEEE 802.11 Wireless Mesh Networks (WMNs) have been deployed exponentially in more places. With the booming increase of density of APs as well as mobile clients (MCs), the handoff between MCs and APs becomes more frequent than ever before. One problem of most existing network-assisted fast handoff mechanisms is that an AP needs to switch to different channel...
Recent breakthroughs in wireless energy transfer-based rechargeable batteries enable a promising application of Wireless Charging Vehicles (WCVs) in Wireless Rechargeable Sensor Networks (WRSNs). This paper studies cooperative WCV schedules in WRSNs to optimize sensor recharging. The objective is to minimize the number of WCVs under the constraint that all sensors must be periodically recharged before...
Internet-of-Things (IoT) is revolutionizing the healthcare by providing high-quality services, lowering the costs, and increasing the efficiency of management by allowing the physical objects to integrate with computer systems to collect the sensed data and process as per the need. Healthcare industries will also get benefited due to reduced investments and management, automated services, better disease...
Vehicle-to-vehicle channel characteristics differ significantly from those of conventional cellular channels, especially in terms of fading statistics due to varying environmental conditions, link types, vehicle types, and objects that result in complex propagation effects. Accurate modeling of the vehicular channel remains a complex challenge. In this paper, existing, common vehicular channel models...
Wi-Fi Direct is a promising technology for the support of device-to-device communications (D2D) on commercial mobile devices. However, the standard as-it-is is not sufficient to support the real deployment of networking solutions entirely based on D2D such as opportunistic networks. In fact,WiFi Direct presents some characteristics that could limit the autonomous creation of D2D connections among...
Machine Type Communications (MTC) collectively refers to the exchange of data among devices that operate without human intervention. A significant number of such devices are currently served by cellular networks, and that number is expected to grow in the near future. However, cellular networks, including current fourth generation LTE networks, face several challenges when it comes to handling MTC...
Most of the routing protocols for wireless networks have focused on finding a feasible route from a source to a destination. Routing Protocols in Multi-hop Wireless Networks (MHWNs) face more serious security and reliability challenges. Radio jamming attacks are especially harmful to the reliability of links, as they can effectively disrupt communication between any node pairs result in that links...
Geomagnetism is promising for indoor localization due to its pervasive presence, high signal stability and unnecessity of extra infrastructure support. It can be fused with a pedometer (step counter) to further improve accuracy. Traditional fusions based on particle filter, however, are computationally complex. Their accuracy is barely satisfactory for large open indoor spaces (such as airports or...
Wireless cameras can be used to gather situation awareness information (e.g., humans in distress) in disaster recovery scenarios. However, blindly sending raw video streams from such cameras, to an operations center or controller can be prohibitive in terms of bandwidth. Further, these raw streams could contain either redundant or irrelevant information. Thus, we ask "how do we extract accurate...
Wireless sensor networks (WSNs) are used in many mission-critical applications, such as target tracking on a battlefield, emergency alarms, and disaster detection. In such applications, QoS provisioning in the timeliness domain is indispensable. Moreover, because of the diversity of sensory data, QoS provisioning should support not only one but multiple levels of end-to-end delay constraints. As a...
In this paper, we propose 3DLoc, which performs 3-dimensional localization on the tagged objects by using the RFID tag arrays. 3DLoc deploys three arrays of RFID tags on three mutually orthogonal surfaces of each object. When performing 3D localization, 3DLoc continuously moves the RFID antenna and scans the tagged objects in a 2-dimensional space right in front of the tagged objects. It then estimates...
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to a number of protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life is still limited, in part due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel ad hoc protocol named...
The problem of coverage in three-dimensional (3D) wireless sensor networks is challenging and hard. In this paper, we focus on the problem of k-coverage of a 3D field of interest (FoI), where every point is covered by at least k sensors. First, we propose three sensor placement strategies to guarantee k-coverage of a 3D FoI. Second, we compute the corresponding sensor density. Third, we investigate...
Social sensing has emerged as a new application paradigm in networked sensing communities where a colossal amount of observations about the physical world are contributed by people or devices they use. Our work solves a critical challenge in social sensing applications where the goal is to estimate the reliability of social sensors and the truthfulness of observed variables (typically known as claims)...
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.