The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Power Transfer (WPT) is an attractive technology because it can supply power to IoT devices where battery replacement is difficult or the maintenance cost is high. Polarization Switching WPT antenna (PS-WPT antenna) is proposed in this paper. The polarization switching characteristic makes this design a good candidate for 5G-IoT sensors powered by using wireless power transfer. The 3GPP had...
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication...
Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes. By summarizing the existing wireless sensor networks attack measures, this paper proposes a way to attack wireless sensor networks by wireless injection, at different times fake nodes is disguised as acquisition nodes and transmission...
Source-location privacy (SLP) is a critical security property in event-surveillance systems. However, due to the characteristics of surveillance systems, e.g., resource constraints, diverse privacy requirements and large-scale network, the existing anonymity mechanisms cannot effectively deal with the problem of source location privacy protection. This paper proposes the dynamic optimal mix-ring-based...
Key management is one of the key security technology in wireless sensor networks. Key management in wireless sensor networks due to the arrangement of the position, limited the calculation, limited storage capacity, making the design faces many challenges, so the scheme propose a key-management scheme based on identity and cluster layer in wireless sensor network. The scheme use Identity authentication...
Energy efficiency has become an important research issue for wireless sensor networks. Sensor nodes, thus, need to make use of their limited energy to keep active time as small as possible to prolong the whole network lifetime while meeting the performance requirement. In this work, we reinvestigate the overhearing problem, which occurs when an awake node overhears the transmission nearby, and this...
It is common to deploy stationary sensors in large geographical environments for monitoring purposes. In such cases, the monitored data are subject to data loss due to poor link quality or node failures. Fortunately, the sensing data are highly correlated both spatially and temporally. In this paper, we consider such networks in general, and jointly take into account the link quality estimates, and...
Wireless sensor networks (WSNs) have wide range of applications in military, health-monitoring, smart-home applications, and in other commercial environments. The computation of data aggregation functions like MIN/MAX is one of the commonly used tasks in many such WSN applications. However, due to privacy issues in some of these applications, the individual sensor readings should be kept secret from...
Wireless sensor networks consists of hundreds or thousands of sensor nodes supported by small capacity battery. For environmental monitoring purposes, sensor nodes must have high endurance capabilities. Therefore, selecting suitable cluster heads (CH) location becomes a challenging issue. In this work, cluster heads distribution based on adaptive particle swarm (PSO) is proposed. PSO is one of the...
This research aims to complement security vulnerability of Flooding Time Synchronization Protocol (FTSP), which is currently one of the most sophisticated approaches for time synchronization in wireless sensor networks (WSNs). FTSP has advanced features like implicitly dynamic topology and high accuracy time, but its original design does not consider security issues. In order to defend against attacks...
We propose ReXOR, a lightweight and density-aware reprogramming protocol for wireless sensor networks using XOR. It employs XOR encoding in the retransmission phase to reduce the communication cost. In sparse and lossy networks, it delivers much better performance than Deluge, a typical reprogramming protocol for sensor networks. Compared to prior coding-based reprogramming protocols, it has two salient...
Wireless sensor network (WSN, Wireless Sensor Network) is a kind of autonomous network with sensor nodes. It is different from traditional RFID system that the WSN is through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing to compensate the shortage...
A new data fusion algorithm based on improved leach protocol and gauss membership function of fuzzy theory in wireless sensor networks is presented. The improved leach protocol is utilized second-level cluster head to transmit fused data which can reduce energy consumption and prolong the network life cycle. The proposed fusion algorithm with the gauss distribution characteristic chart and the gauss...
This paper presents an improved clustering routing protocol, ILEACH which based on the characteristic of limited energy of wireless sensor networks to prolong the lifetime of the whole networks. It takes nodes' residual energy into consideration during the process of cluster heads being elected. The constraint threshold of distance is used to optimize cluster scheme. Furthermore, it also constructs...
Current secure authentication scheme is typically assumed to be the same communication ranges of all nodes in WSN. Howerver, due to the influence of environment and dynamic topology, the communication radius of all nodes are no strictly consistent, which may cause different neighbor number and redundant neighbors for one central node. As a result, energy consumption of each node is unbalanced and...
The upper and lower bounds for capacity of hybrid multi-channel wireless networks with single-interface are investigated. The network under consideration consists of two types of nodes, base stations and ad hoc nodes, and base stations are connected by high-speed wireless networks or wired networks, ad hoc nodes can communicated with each other by ad hoc ways or the help of base station node. Moreover,...
In cognitive radio systems, cooperative spectrum sensing in the physical layer is highly desired to detect the primary user accurately and to guarantee the quality of service (QoS) of the primary user. Due to the energy consumption in sensing the channels, the selfish users may not be willing to contribute to the cooperative sensing while they want to occupy more idle channels observed. To deal with...
Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because...
This paper examine the problem of adding security to cluster based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution where clusters are formed dynamically and periodically. Our solution describes re-keying function protocol for wireless sensor networks security. We proposed the local administrative...
Wireless sensor networks (WSNs) are expected to play an essential role for our society in the near future. In this paper, we propose a data adaptive transmission mechanism, DAT in short, for clustering-based wireless sensor networks. Sensor nodes do not always have data to send all the time. The data obtained at a time by the sensor nodes are expected to be transmitted as a whole to the cluster-head...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.