The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use of tamper resistant hardware on tiny sensor nodes. Hence, sensor nodes deployed in open areas can be compromised and used to carry out various attacks on the network. In this paper, we consider the collision attack that can be easily launched...
The existing routing protocols designed for real-time multimedia applications in sensor networks adopt comparatively simple routing models where fewer service metrics are considered. Furthermore, for the sake of route discovery or the acquisition of a target location, they usually need extra locating equipments or beacon exchanges to construct a coordinate system for each sensor node, which imports...
This paper presents an application platform for heterogeneous wireless sensor networks (WSNs) and a management architecture to this network. The purpose of this platform is to provide both academia and industry a large-scale experimental environment to test and to verify their newly developed WSN systems in the future. In a first step two types of application scenario have been depicted. The next...
Sensor networks are envisioned to have important applications in military and homeland security. For sensor networks deployed in such hostile environments, security is critical to ensure privacy, integrity, authenticity, and availability of communications. Routing is a fundamental operation in sensor networks. Past researches on sensor network routing focused on efficiency and effectiveness of data...
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward a hierarchical trusted architecture for wireless sensor network, and establishes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.