The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Geographic Routing is suitable for the limited resource in wireless sensor networks and Ricci flow-based methods have been employed. Unfortunately, iterative process through previous methods may spend abundant energy in order to discovery route, which obviously effect their advantageous of this sort of schemes. In this paper, we focus on avoiding unnecessary iterations and propose an algorithm through...
Compressive Sampling(CS) has been utilized to save transmission consumption of sensors. In spite of the remarkable efforts the community put to a variety of designs, a everlasting issue still remains that how sensors further economize energy through referring to their CS-based execution operations, motivating us to explore the answer from a point of real deployment platform view. In our work, we propose...
The node localization algorithm is one of the key technologies in WSN. In the paper, a Weighted DV-HOP algorithm is proposed based on traditional DV-HOP algorithm. And a improving simulation model is employed to confirm the changes of localization accuracy. Comparing DV-HOP algorithm, simulation shows that the WDV-HOP algorithm can increase localization accuracy by above 2% with the same conditions...
In order to save energy of sensors in the process of gathering data and transmitting information, Compressive Sensing (CS), as a novel and effective signal transform technology, has been used gradually in Wireless Sensor Networks (WSNs). In traditional usages of CS techniques in the previous literatures, the sparsities of the signals has to be known beforehand, which is much more importance for their...
Mobile video surveillance system based on ARM9 uses unique high-bandwidth business applications of 3G wireless network. The design of hardware and software of embedded monitoring system is described. The running platform of 3G network show that the system can work well in the circumstances of the limited bandwidth.
Wireless sensor networks can improve the efficiency for collecting information in underwater environments. In the past, researchers collected data under the sea by the way of both sending oceanographic equipments into water and recovering it at the end of mission. The whole process often took long time so real-time services cannot be supported. Wireless sensor networks can detect events and transmit...
False data injection is a severe attack that compromised sensor nodes ("moles"1) can launch. These moles inject large amount of bogus traffic that can lead to application failures and exhausted network resources. Existing sensor network security proposals only passively mitigate the damage by filtering injected packets; they do not provide active means for fight back. This paper studies...
In modern cellular networks, the channel quality is dynamic among users and also over time. The time-granularity for such dynamics is significantly diverse - either slow or fast compared to packet transmission time. Because of these issues most existing scheduling policies can not work consistently well. In this work, we propose a scheduling policy with performance relatively insensitive to the time-granularity...
Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enhances directed diffusion to operate in the presence of compromised sensors. Our proposed solution, secure diffusion, utilizes a novel security primitive called location-binding keys, and exploits the available end-to-end feedback...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.