The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Localization for wireless sensor networks (WSNs) is a challenging research topic. Let the set of sensor nodes that are close to each other be a “patch”, in this paper, we propose a new manifold learning method named local patches alignment embedding (LPAE), and then present a computationally efficient range-based WSNs localization approach using LPAE. Unlike the existing range-based localization methods...
Data centricity is a key characteristic that distinguishes wireless sensor networks (WSNs) from other types of wireless networks. In traditional WSNs, sensors detect environmental attributes or events, which are transmitted to and stored on dedicated base stations or sinks at the network edge for further processing. With advances in data storage technologies, it becomes possible for embedded sensor...
Recent years have witness booming interests of using wireless sensor networks (WSNs) for structural health monitoring (SHM). In a WSN, it has been widely regarded that wireless data transmission is one of the most energy consuming operations. To address the limitations of wireless sensor nodes in terms of power supply, in-network processing has been regarded as an effective way to decrease the energy...
In our previous work, a node self-localization algorithm based on virtual central node (VCN) for wireless sensor network (WSN) is proposed. This method is adapted to WSN that anchor nodes present a uniform distribution in three dimensional spaces. During the localization process, by deducing a 3D special node, which is called virtual central node, unknown nodes can compute their own positions automatically...
Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach...
Most researchers encountered the following two problems when working with real Wireless Sensor Networks (WSNs): (1) Sensor nodes cannot satisfy application requirements even though the nominal sensing/transmission rates of these nodes are much higher than required. (2) In a WSN deployed in a large area, it is difficult or infeasible to get runtime performance evaluation of sensor nodes. We found out...
Routing is an essential operation in wireless sensor networks. Most existing routing protocols are designed for homogeneous sensor networks. Recent studies show that a homogeneous sensor network has a poor fundamental performance limit. To achieve better performance, we adopt a Heterogeneous Sensor Network (HSN) model. In this paper, we present an efficient NEar-optiMal rOuting (NEMO) protocol for...
With the rapid progress of the whole computer technology, the wireless sensor networks gestated by the MEMS, wireless communication and low-consumption embedded technology construct the blueprint of the pervasive computing gradually for the people. This paper syncretizes the core thought of the context-aware technology and the WSN routing protocol with bringing forward the protocol CATRP adapting...
Brokers are critical elements for many publish and subscribe (pub/sub) systems. They are dedicated devices with large computation and storage capacities, but they could suffer from scalability problems when comes to actual large-scale implementations in wireless sensor networks. Inspired by the recent virtual MIMO concept for wireless sensor networks, this paper proposes the idea of `virtual brokers'...
Due to uncertainties in target motion and limited sensing regions of sensors, collaborative target tracking in wireless sensor networks (WSNs) suffers from low tracking accuracy and lack of reliability when a target cannot be detected by a scheduled sensor. Generally, actuating multiple sensors can achieve better tracking performance but with high energy consumption. Tracking accuracy, reliability,...
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attack detection and reporting in WSNs. In our approach, some ADS capable nodes are chosen for judging the behavior of their neighbors and conveying alarms to an administration sink when attacks...
Wireless sensor network (WSN) has been considered to be the next generation paradigm of structural health monitoring (SHM) systems due to its low cost, high scalability and flexibility. However, some inherent limitations of WSN such as low-bandwidth wireless communication, limited resources on wireless sensor nodes, must be addressed to meet the generally high requirements of SHM. Distributed in-network...
Wireless sensor networks (WSNs) play an increasingly important role in civilian and military settings. With the limited energy supply, sensor nodes do neither large calculations nor further transmissions. Data aggregation can reduce the redundancy of packets and save energy to prolong the lifetime of sensor networks. This paper proposes a novel mechanism for the delay-ranged feedback timing control...
The cluster-based routing of wireless sensor networks (WSNs) requires secure, robust protocols for wireless communication. Unfortunately, existing protocols are unsuitable due to the limited storage space of nodes. Although symmetric-key-based solutions have been available, all of them suffer from possible severe attacks, and the problem of limited storage space. These issues are truly critical in...
During the recent years, numerous utilities have experienced catastrophic rupture of critical Prestressing Concrete Cylinder Pipe (PCCP) lines throughout the world. Because PCCP is usually used throughout many water and wastewater utilities as critical mains with high flow rates, sudden failures can have significant negative consequences. Much attention has been focused on reliably assessing the condition...
PCCP is usually used throughout many water and wastewater utilities as critical mains with high flow rates, sudden failures can have significant negative consequences. The world has experienced a number of failures of prestressing concrete cylinder pipe (PCCP) lines and as a result during the past ten years, much attention has been focused on reliably assessing the condition of PCCP mains. In this...
With the deep prevalence of the wireless network and sensor technology, the real time monitoring system with some application environment comes true gradually. This article designs a feasible intelligent home-hospital system (IHHS) to a certain extent through the pivotal context-aware technology which plays an important role in the area of the pervasive computing and the wireless sensor network (WSN)...
According to the effect of water with suspended particles to light propagation and temperature to turbidity and pressure, a multi-parameter measuring system with wireless transceiver and automatic temperature compensation is designed. The measured value of turbidity, temperature and pressure are transmitted to host computer (its monitor system software is written under VisualBasic6.0 program) by radio...
For Wireless Sensor Networks (WSN), target tracking is a canonical problem that collaborates signal and information processing to dynamically manage sensor resources and efficiently process distributed sensor measurements. This paper proposes an adaptive sensor scheduling strategy that jointly sets up distribute dynamic clustering, selects the tasking sensor, and determines the sampling interval....
Wireless sensor networks (WSNs) are vulnerable to various attacks since they are distributed in unattended environments and have limited energy, storage and computation abilities. Preventive approaches can be applied to protect WSNs from some kinds of attacks. However, preventive methods are not efficient on specific attacks. So it is necessary to develop some mechanisms for intrusion detection. Intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.