The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to flexibility, low cost and rapid deployment, wireless sensor networks (WSNs)have been drawing more and more interest from governments, researchers, application developers, and manufacturers in recent years. Nowadays, we are in the age of industry 4.0, in which the traditional industrial control systems will be connected with each other and provide intelligent manufacturing. Therefore, WSNs can...
In recent years, Internet of things (IoT) is widely used in various domains. However, the security of the IoT system becomes a challenge. If the IoT system is attacked, a great property loss will happen. In this paper, a denial of service (DoS) attack to an IoT system is shown. The attack tool is Kali Linux, A Denial of Service (DOS) attack is launched by using 3 different methods. The comparison...
Due to the serious air pollution, the renewable energy sources had attracted more and more attention. In order to manage the renewable energy sources, the concept of microgrid is introduced. The IoT system can also be used in microgrid for the monitoring and control. However, how to verify the reliability of the system is still a problem. In this paper, the probabilistic model checking is used to...
Wireless Local Area Networks (WLANs) are gaining more and more attention in enterprise. The advantages WLANs provide over wired LANs are mobility, range of coverage, ease of use, scalability, low cost and so on. In recent years, more and more enterprises set up WLANs environment in the information system. However, the introduction of the WLANs brings an additional exposed vulnerability point. The...
Risk assessment and management for information system are very important for assuring the system security. It requires not only careful but also systematic analysis of threat and vulnerability information. Depending on the analysis result, we could determine the extent to which events could adversely impact the organization and the likelihood that such events will occur. Under FISMA(Federal Information...
The reliable transmission problem in Wireless Sensor Networks (WSNs) is quite different from that in traditional networks. Especially in event-driven wireless sensor networks, the most critical goal is to transmit the event alarm to users reliably and timely. For most current protocols, the raw event packets are periodically sent to the destination. However, the occurrence of the emergency event is...
Vehicular Sensor Network (VSN) is being seriously considered as a key enabling technology as it allows vehicles to communicate with each other (v2v) and/or with roadside infrastructure (v2r). Effectively use of wireless communication can enhance various types of traffic applications. Dedicated Short-Range Communication (DSRC) standard is an ideal candidate for supporting wireless access in VSN environment...
This paper gives out a survey on event monitoring in Event-driven wireless sensor networks (EWSNs). In EWSNs, there are mainly two tasks, one is accurate event detection with higher detection probability and lower false-alarm probability. The other is reliable dissemination of the event information after accurate detection. In this paper, we firstly address the design issues for event detection and...
The most important goal in event-driven wireless sensor networks(EWSNs) is to transmit the event information to users timely. One of the most important factors that would make it possible to reach this goal is the design of efficient detecting protocols. In this paper we present an efficient event detecting protocol(EEDP) designed for event monitoring applications based on geographical routing. In...
In monitoring wireless sensor networks (WSNs), the occurrence of an emergency will generate a large amount of data in a very short time. Among them, some urgent information is more critical and needs to be transmitted out reliably as soon as possible. In this scenario, congestion is inevitable due to the limited resources, especially near the sink. To address this problem, we propose a novel reliable...
In monitoring wireless sensor networks (WSNs) with event-driven applications, the generated traffic usually has bursty characteristics when an event occurs. Transient congestion in the networks would increase delay and packet loss rate severely, reducing the network performance greatly. Through the analysis on delay and packet loss rate in congestion, this paper proposes a congestion-aware mac protocol...
The state of the art rate control algorithms for wireless multi-hop networks respond to feedback regarding available capacity in the bandwidth constrained networks. However, the accurate estimation of link capacity is challenging in wireless channel since the interference reduces the link capacity obviously. In, a receiver capacity model is proposed, which associates capacities with nodes instead...
Target tracking, which has been applied popularly in military and civil aspects, is one of the important applications in wireless sensor network. In this paper, we propose a new kind of target tracking system based on camera sensor networks considering the tracking accuracy as the key performance metric. The designed tracking system is composed of four basic components: Object Detection, Neighbor...
Power control technology in wireless sensor network (WSN) is of great significance to ensure the network coverage, reduce the power consumption of the nodes, and optimize network performance. In this paper, a new power control based on routing protocol (PCBRP) in the MAC layer is proposed. It operates with the help of routing protocol and calculates optimal transmission power according to the distance...
In wireless sensor networks (WSNs), some unavailable areas often formes because some sensor nodes become unavailable due to energy exhausted, congestion, or disaster. In this paper, we propose a new micro sensor multi-path routing protocol (MSMRP) to cross around the unavailable areas when building up the routes. And we design a neighbor node table exchanging mechanism that can avoid the multiple...
In most of existing routing protocols of wireless sensor networks (WSNs), a route is set up through broadcasting the route request (RREQ) messages throughout the entire network, which often brings broadcast storm. In this paper, we propose a new gradient-based micro sensor routing protocol (GMSRP) to alleviate the broadcast storm. With the GMSRP, during the network initialization, the sink node broadcasts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.