The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large-scale wireless sensor networks (WSNs) often need to be partitioned for efficient data acquisition. To enhance the scalability and reliability of publish/subscribe (pub/sub) systems implemented on a large-scale in WSNs, dedicated broker devices with large storage and computation capacities can be replaced with virtual brokers (VBs), each formed by multiple co-located sensor nodes that shared...
Wireless localization with received signal strength (RSS) measurements catches a lot of attention for its simplicity and low cost. How to improve location estimation precision is a critical issue for localization applications with RSS measurements. In this paper, sensor selection method is involved. First, the optimal number of anchors to reach good performance is analyzed. Second, a quadratic program...
ZigBee networks, with their characteristics of high availability, low power consumption and cost-effective devices, are perfectly appropriate to construct Wireless Sensor Networks (WSNs). Also, the natures of WSN listed above bring significant benefits over traditional communication networks used in smart home systems. A smart home system is meant to improve the quality of life through offering various...
Group sparsity is extensively used in developing Compressed Sensing recovery algorithms, but it is ignored in dimensionality reduction. In this paper, we define supervised group distance based on group sparsity to measure the similarity between recovered sparse coefficients from Compressed Sensing for signal classification, especially the sparse coefficients intra-class. And a graph embedding dimensionality...
This paper proposes an efficient method for optimal joint precoding-postcoding design in a multi-input multi-output (MIMO) multi-sensor noisy observation context — a problem that is of great interest to the multi-relay MIMO transmission system. A set of wireless sensors, each provisioned with a different number of antennas and a different power constraint, precode and send their noisy observations...
In wireless sensor networks (WSNs), since many basic scientific works heavily rely on the complete sensory data, data recovery is an indispensable operation against the data loss. Several works have studied the missing value problem. However, existing solutions cannot achieve satisfactory accuracy due to special loss patterns and high loss rates in WSNs. In this work, we propose a multiple attributes-based...
Data loss is ubiquitous in wireless sensor networks (WSNs) mainly due to the unreliable wireless transmission, which results in incomplete sensory data sets. However, the completeness of a data set directly determines its availability and usefulness. Thus, sensory data recovery is an indispensable operation against the data loss problem. However, existing solutions cannot achieve satisfactory accuracy...
There has been an increasing investigation in distributed radar sensor network (RSN) and MIMO-RSN, including waveform design, antenna strategy and spacetime coding, etc. However, distributed-RSN and MIMO-RSN are more like two parallel paths other than one research field in current literature. In this paper, we address the comparison between distributed-RSN and MIMO-RSN for target detection. We first...
This paper considers wireless sensor networks with limited bandwidth, where sensors must transmit sensing results that are distorted with noise uncertainty, to the fusion center reliably and efficiently. A class of rate-1 linear complex-field coding (CFC) transmission strategy is developed, to effectively protect the noisy observation of the signals without any bandwidth expansion. Pairwise error...
Reconstructing the environment in cyber space by sensory data is a fundamental operation for understanding the physical world in depth. A lot of basic scientific work (e.g., nature discovery, organic evolution) heavily relies on the accuracy of environment reconstruction. However, data loss in wireless sensor networks is common and has its special patterns due to noise, collision, unreliable link,...
Data centricity is a key characteristic that distinguishes wireless sensor networks (WSNs) from other types of wireless networks. In traditional WSNs, sensors detect environmental attributes or events, which are transmitted to and stored on dedicated base stations or sinks at the network edge for further processing. With advances in data storage technologies, it becomes possible for embedded sensor...
Recent years have witness booming interests of using wireless sensor networks (WSNs) for structural health monitoring (SHM). In a WSN, it has been widely regarded that wireless data transmission is one of the most energy consuming operations. To address the limitations of wireless sensor nodes in terms of power supply, in-network processing has been regarded as an effective way to decrease the energy...
In our previous work, a node self-localization algorithm based on virtual central node (VCN) for wireless sensor network (WSN) is proposed. This method is adapted to WSN that anchor nodes present a uniform distribution in three dimensional spaces. During the localization process, by deducing a 3D special node, which is called virtual central node, unknown nodes can compute their own positions automatically...
Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach...
Most researchers encountered the following two problems when working with real Wireless Sensor Networks (WSNs): (1) Sensor nodes cannot satisfy application requirements even though the nominal sensing/transmission rates of these nodes are much higher than required. (2) In a WSN deployed in a large area, it is difficult or infeasible to get runtime performance evaluation of sensor nodes. We found out...
Routing is an essential operation in wireless sensor networks. Most existing routing protocols are designed for homogeneous sensor networks. Recent studies show that a homogeneous sensor network has a poor fundamental performance limit. To achieve better performance, we adopt a Heterogeneous Sensor Network (HSN) model. In this paper, we present an efficient NEar-optiMal rOuting (NEMO) protocol for...
With the rapid progress of the whole computer technology, the wireless sensor networks gestated by the MEMS, wireless communication and low-consumption embedded technology construct the blueprint of the pervasive computing gradually for the people. This paper syncretizes the core thought of the context-aware technology and the WSN routing protocol with bringing forward the protocol CATRP adapting...
Brokers are critical elements for many publish and subscribe (pub/sub) systems. They are dedicated devices with large computation and storage capacities, but they could suffer from scalability problems when comes to actual large-scale implementations in wireless sensor networks. Inspired by the recent virtual MIMO concept for wireless sensor networks, this paper proposes the idea of `virtual brokers'...
Due to uncertainties in target motion and limited sensing regions of sensors, collaborative target tracking in wireless sensor networks (WSNs) suffers from low tracking accuracy and lack of reliability when a target cannot be detected by a scheduled sensor. Generally, actuating multiple sensors can achieve better tracking performance but with high energy consumption. Tracking accuracy, reliability,...
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attack detection and reporting in WSNs. In our approach, some ADS capable nodes are chosen for judging the behavior of their neighbors and conveying alarms to an administration sink when attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.