The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to compare several location-based routing protocols in wireless sensor networks. Although location-based routing protocols have apparent limitations, it can support multi-hop data transmission. In addition, location-based routing protocols need to consume a lot of energy to transmit location information.
This article analyses the primary design goals and challenges for routing protocols in wireless sensor networks. And it discuss various routing strategies and describe some important routing protocols. Finally, the article concludes with evaluation methods that are capable of effectively managing the trade-off between optimality and efficiency.
IP lookup plays a significant role in networking. The rapid development of the Internet brings new challenges to IP lookup in recent years. To deal with these challenges, we propose the first algorithm that we are aware of to use Minimal Perfect Hash (MPH) filters in IP lookup. It achieves the information theoretic optimum on-chip memory storage and O(1) worst case on-chip lookup speed. To overcome...
Satellite networks can provide global coverage and broadband access to end users, thus enabling human communication worldwide. In satellite communication networks, routing is the key issue encountered by support services. Therefore, a novel Quality of Service (QoS) routing method (QRM) is proposed and evaluated in this study based on the characteristics of the low Earth orbiting satellite rosette...
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.