The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most important goal in event-driven wireless sensor networks(EWSNs) is to transmit the event information to users timely. One of the most important factors that would make it possible to reach this goal is the design of efficient detecting protocols. In this paper we present an efficient event detecting protocol(EEDP) designed for event monitoring applications based on geographical routing. In...
The network measurement is an effective way to understand and acquaint the performance and the operational state of the network. We present some methods to measure the identifier mapping, mobility and security of the Universal Network that some important characteristics are the separation of identifier and locator, authentication, and so on. In identifier mapping measurement, we propose a new indictor...
The Delay Tolerant Mobile Sensor Network distinguishes itself from conventional sensor networks by several unique characteristics such as node mobility, intermittently connectivity, and frequent changing topology. The traditional approaches for sensor networking cannot be applied in DTMSN directly. Hence, routing in DTMSN has attracted a great interest recently. In this paper, we propose an energy-aware...
IPsec as a very popular security protocol solves the increasing problems of network security. The IPsec-gateway cluster as a solution of large-scale IPsec implement improves the availability of IPsec-gateway. The traditional IPsec-gateway cluster needs to use a large number of hardware resources to keep availability of IPsec-gateway. However, the low utilization rate of resources restricts the scalability...
In wireless sensor networks, some areas often become unavailable due to the exhaustion of nodes’ energy, congestion, or disaster. In this paper, we propose a new micro sensor multi-path routing protocol (MSMRP) to avoid the unavailable areas when constructing the routes. A neighbor node table exchanging mechanism in MSMRP is used to avoid the multiple paths intersect and to build a new route around...
In wireless sensor networks (WSNs), location information plays an important role in many fundamental services which includes geographic routing, target tracking, location-based coverage, topology control, and others. One promising approach in sensor network localization is the determination of location based on hop counts. A critical priori of this approach that directly influences the accuracy of...
In monitoring wireless sensor networks (WSNs), the occurrence of an emergency will generate a large amount of data in a very short time. Among them, some urgent information is more critical and needs to be transmitted out reliably as soon as possible. In this scenario, congestion is inevitable due to the limited resources, especially near the sink. To address this problem, we propose a novel reliable...
Most recent efforts have focused on providing many kinds of novel naming systems, including DNS improvements and clean-slate design. This paper proposes a novel DHT-based naming system called SIDMAP which provides decentralization self-organization, failure-resilience, and good worst-case lookup performance naming architecture, allowing self configuration and local mapping entries update. We evaluate...
In monitoring wireless sensor networks (WSNs) with event-driven applications, the generated traffic usually has bursty characteristics when an event occurs. Transient congestion in the networks would increase delay and packet loss rate severely, reducing the network performance greatly. Through the analysis on delay and packet loss rate in congestion, this paper proposes a congestion-aware mac protocol...
With the evolving of the network technology, the number of terminal equipping with multiple network interfaces keeps increasing because of the deploying of various access methods and the price descending of access devices. However, the terminals can not make full use of multiple interfaces concurrently in conversional network. In this paper, we motivate the advantages of simultaneously using multiple...
The DHT-based locator/ID separation paradigm has been widely discussed to solve the serious scalability issue that today's Internet is facing. However, the identifier-to-locator mapping schemes have high resolution latency because each lookup need contact several servers in sequence, typically O(logN) hops. In this paper, we present a one hop DHT-based identifier-to-locator mapping service to achieve...
This article analyzes the hop-distance relationship in a shadow fading environment. Assuming the sensor nodes are randomly deployed in a circular region according to a planar Poisson process, we present the close relationship between the hop counts and their geographic distance. An improved localization algorithm based on the hop-distance relationship, called ILA_HDR, has been proposed. The ILA_HDR...
Wireless sensor networks are suffering from serious frequency interferences. In this paper, we propose a channel assignment algorithm based on graph theory in wireless sensor networks. The channel assignment problem is equivalent to the generalized graph-coloring problem; we first model the conflict graph for channel assignment with the goal of global optimization minimizing the total interferences...
This paper presents an analytical method to evaluate the hop-distance relationship for quasi-UDG (Unit Disk Graph) model in wireless sensor network, where sensor nodes are randomly and independently deployed in a circular region by a Poisson process. Different from the UDG model, quasi-UDG model has the non-uniformity property for connectivity. We derive an approximate recursive expression of the...
The state of the art rate control algorithms for wireless multi-hop networks respond to feedback regarding available capacity in the bandwidth constrained networks. However, the accurate estimation of link capacity is challenging in wireless channel since the interference reduces the link capacity obviously. In, a receiver capacity model is proposed, which associates capacities with nodes instead...
Wireless sensor network is the core support technology in the framework of the Internet of Things. Environmental monitoring and devices control of intelligent building based on wireless sensor network is considered as one of the most crucial applications. It can perceive several environmental parameters and feedback control information to devices to provide more comfortable environment for people...
Flexible superior peer selecting techniques are of particular interest for the study of scalability of the P2P system, especially in many structured P2P systems, such as KAD, Chord, and CAN etc., since most of these systems need to change flat topology to hierarchical topology to reduce lookup time delay and maintenances overhead as more and more users join into them, here the fundamental challenge...
The distributed hash tables (DHTs) exhibit several interesting properties, such as self-configuration, self-maintenance, scalability and robustness that are clearly desirable for many kinds of applications in the Internet. However, Most of DHT approaches have high resolution latency because each lookup need contact several servers in sequence, typically O(log n) hops (n is the number of peers in the...
In this paper, we propose an improved gradient-based micro sensor routing protocol (GMSRP) using a node sleep scheduling mechanism, to save energy for sensor nodes, called the GMSRP-SLE. This algorithm takes into account the characteristic of most applications in WSNs, i.e.,the sensor nodes are deployed randomly with some areas covered by many sensor nodes at same time. During network initialization,...
Target tracking, which has been applied popularly in military and civil aspects, is one of the important applications in wireless sensor network. In this paper, we propose a new kind of target tracking system based on camera sensor networks considering the tracking accuracy as the key performance metric. The designed tracking system is composed of four basic components: Object Detection, Neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.