The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an...
Emerging Software Defined Networking (SDN) technology has provided excellent flexibility to large-scale networks in terms of control, management, security, and maintenance. With SDN, network architectures can be deployed and maintained with ease. New trends in computing (e.g., cloud computing, data centers, and virtualization) can seamlessly be integrated with the SDN architecture. On the other hand,...
Starting from the application perspective, this paper addresses on the needs for sensor node architecture, wireless communication, security and infrastructure for IoT.
Starting from the application perspective, this paper addresses on the needs for sensor node architecture, wireless communication, security and infrastructure for IoT.
Information transmission in the marine scenario utilizing wireless communications is unique method that empowering the technology for the evolution of imminent marine-surveillance systems and sensory networks. Under-water wireless sensor network (UWSN) in one of the auspicious technology for marine observation. The applications of underwater sensing has several domain that range from oil industry...
Cyber-Physical Systems (CPS) appear to be of paramount importance due to their increasing use on critical infrastructure. New challenges have occurred because of the nature and the complexity of such systems in supporting heterogeneous physical and cyber components simultaneously. Failures or attacks on system components decrease system reliability creating severe consequences to CPS and the attached...
The development of miniaturized implantable bio-sensors is an emergent technology resulting from various fields of human endeavour such as engineering, computer science, telecommunication, instrumentation, nano-technology etc. Wireless Body Area Sensor Network (WBASN) is a network of implanted biosensors on/inside the human body for remote health monitoring. Considering the need for a reliable health...
Near Field Communication technology is an emerging concept in the field of data transfer and is rapidly catching on the market by replacing technologies such as Bluetooth, infrared and other modes of data sharing because of its ease of use and diverse scopes that are available using this technology. The NFC technology basically is a descendant of RFID (Radio Frequency Identification) technology, which...
Distributed network of sensors form a deployable key to information with self organizing capabilities from smart environments (building, home, utilities, industrial, transportation etc). In this paper we present the vision of wireless sensor network (WSN) which enables the interconnectivity that extends the reach of cyberspace out into the physical world with the low cost, high sensing fidelity, flexibility,...
For more than 40 years, military strategists and astro-politicians have studied evolutionary and revolutionary needs for the protection of commercial SATCOM. In light of many valid reasons to protect user access to jamming, interference, direction finding, interception, intrusion, physical attack and nuclear effects, it is also necessary to recognize information warfare threats and vulnerabilities,...
Nowadays security plays the major role in the network. Growing size of such proprietary networks creates increased opportunity for successful attack. Supervisory control and data-acquisition (SCADA) networks are more secure and vulnerable to attach from both internal and external intruders. It is the mechanism which is used to provide continuous monitoring and authentication to the network. Authentication...
Doing research on mobile ad hoc network (MANET) security involves several constraints, some of which are wireless environment's attributes, such as bandwidth and delay, and the correctness of network topology. Testing and evaluating using real wireless devices are costly and somehow impractical, so many tools have been developed in order to create media by which researchers can deeply investigate...
Future buildings and neighborhoods are expected to combine a manifold of Energy using Products (“EuP”) ranging from electrical lighting to HVAC with locally available renewable energy sources and energy storages. Until now, advanced techniques for energy management are not yet applicable in an economically reasonable way in the smaller entities like in energy-positive buildings and neighborhoods....
A new-generation access network should be able to transport various kinds of dynamically changing sensor information about specific localities or private individuals to different destination servers in a secure manner for processing so that the various processed information can be used in an integrated manner to provide advanced context-aware services. After classifying the various kinds of sensor...
This paper presents a conceptual framework of an electric power microgrid with a distributed control architecture comprising a sensor network of hierarchical agents. The salient sensory features of the different constituent types of intelligent agents are presented. The concept of a minimal microgrid is introduced for the purpose of defining the microgrid architecture. Inroads leveraging the state-of-the-art...
Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific wireless technology. In this paper, we propose a Multi-Agent Based Methodology, which not only detects...
In this paper, we tried to enable a mobile device as a resource to access to the grid network. By improved Internet technique, the use of mobile devices is rapidly increased. And some researches in grid computing tried to combine grid computing with mobile devices. However, according to properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected...
The paper discusses the characteristics of UWB and Bluetooth technology separately at first. Then the paper presents an available method for design and analysis of integrated UWB&BT wireless sensor network, which can realize low-power, low cost, high speed data rates transmission. In this design, an ultra-low power SCM is used for distinguishing useful information, while a Power-Down mode is used...
The combination of the wireless sensor network (WSN) and grid computing in wireless sensor grid (WSG) architecture enables the strengths and characteristics of wireless sensor network and grid computing to be realized on a single integrated platform. This paper analyzes the necessity and key problems of combining the WSN and grid computing and shows a sensor grid architecture which is based on an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.