The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Localization services are very critical for many applications of wireless networks. The use of the received signal strength (RSS) is quite popular in the localization process. RSS-based methodologies fall into two categories based on whether the RSS measurements are used to estimate distance or simply to infer relative proximity to certain anchors. In this paper, we analytically derive the probability...
Recent years have witnessed massive growth in the popularity of smart portable devices. These devices are fully powered with a number of network interfaces, such as Wi-Fi, Bluetooth, and 4G, etc., in order to facilitate connectivity and enable the realization of computing and reachability everywhere and all the time. However, in areas with degraded cellular services and lack of Wi-Fi coverage, these...
Recent advances in microelectronics have enabled the realization of Wireless Body Area Networks (WBANs). However, the massive growth in wireless devices and the push for interconnecting these devices to form an Internet of Things (IoT) can be challenging for WBANs; hence robust communication is necessary through careful medium access arbitration. In this paper, we propose a new protocol to enable...
Acoustic Underwater Networks (AUNs) operate in a dynamic and inhomogeneous medium where acoustic signals tend to refract causing difficulty in sustaining connectivity and locating lost nodes. Such inhomogeneity is usually apprehended by observing sound speed variations in aquatic mediums, which is obtained by taking measurements at discrete depths, using historical samples, or by applying ocean acoustic...
Underwater environments are categorized as inhomogeneous habitats which complicates determining long range propagation losses. Basically, transmitted signals tend to refract and change direction in accordance to the encountered sound speed profile (SSP). Therefore, a uniform spreading beam quickly loses its uniformity and complicating the estimation of the signal strength at a beam's wave front. Such...
Wireless sensor networks (WSNs) serving in hostile environments are susceptible to multiple collocated failures due to explosives and natural calamities such as avalanches, landslides, etc., which can partition the network into disjoint segments. In such a scenario, federating the segments becomes essential for reestablishing communication among segments and resuming the WSN operation. Placing relays...
In this paper, we propose privacy-preserving route reporting schemes for traffic management for both infrastructure-supported and self-organizing vehicular ad hoc networks (VANETs). Using only pseudonyms and anonymous authentication to conceal the real identity of the drivers cannot fully preserve the drivers' privacy because the reported future positions can be used to link pseudonyms and identify...
The performance of wireless body area networks (WBANs) may be degraded due to co-channel interference, i.e., when sensors of different coexisting WBANs transmit at the same time-slots using the same channel. In this paper, we exploit the 16 channels available in the 2.4 GHz unlicensed international band of ZIGBEE, and propose a distributed scheme that opts to avoid interference through channel to...
Wireless sensor networks are valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for...
In applications of Wireless Sensor Networks (WSNs), all data packets are directed towards a single base-station (BS) over multi-hop routes. The BS is usually responsible for processing the collected data and interfacing the WSN to remote users. The continuous flow of packets towards the BS enables the adversary to analyze the traffic and uncover the BS position. In this paper, we present a technique...
In most Wireless Sensor Network (WSN) applications the sensors forward their readings to a central sink or base station (BS). The unique role of the BS makes it a natural target for an adversary's attack. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to locate the BS. This motivates a significant need...
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
Wi-Fi Direct has been gaining popularity in recent years as a mean for device-to-device communications. Adopting such technology allows portable devices, such as smart phones, to form groups for data sharing without the need for any infrastructure support. Interconnecting multiple groups allows broader coverage and enables the use of Wi-Fi direct in applications such as disaster recovery. However,...
When sensors of different coexisting wireless body area networks (WBANs) transmit at the same time using the same channel, a co-channel interference is experienced and hence the performance of the involved WBANs may be degraded. In this paper, we exploit the 16 channels available in the 2.4 GHz international band of ZIGBEE, and propose a distributed scheme that avoids interference through predictable...
A Wireless Body Area Network (WBAN) provides health care services. The performance and utility of WBANs can be degraded due to interference. In this paper, our contribution for co-channel interference mitigation among coexisting WBANs is threefold. First, we propose a distributed orthogonal code allocation scheme, namely, OCAIM, where, each WBAN generates sensor interference lists (SILs), and then...
Wireless sensor networks have become an attractive choice for many monitoring applications in an unattended setups; some of these applications such as pipeline, railroad and highways monitoring require the sensors to be placed in a linear topology. These sensors need to be placed as far apart while still maintaining a minimum required coverage in order to minimize the required node count and reduce...
Wireless sensor networks (WSNs) may consist of a large number of resource-constrained sensor nodes. These nodes probe their surroundings and transmit their measurements over multi-hop routes to an in-situ Base-Station (BS). Given the critical role of the BS, it can be targeted by an adversary's attack. Basically, the adversary may intercept transmissions made by the individual nodes, even without...
In most Wireless Sensor Network (WSN) applications the sensors forward their readings to a central sink or base station (BS). The unique role of the BS makes it a natural target for an adversary's attack. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to locate the BS. This motivates a significant need...
Wi-Fi Direct (WFD) has become almost a standard for peer-to-peer networking on smart devices. Typically, WFD allows a user to search for and connect to other devices, which results in creating a group of devices that can exchange data. In certain applications like alert dissemination in disaster areas, it is required to form groups dynamically and to share data across the group boundaries. However,...
A growing interest in Internet of things (IoT) paradigm has enabled a wide range of physical objects and environments to be monitored in fine detail by using pervasive sensing and communication devices. In this paper, we develop an IoT framework that targets one of the biggest challenges in modern cities, namely, Parking Management. Populating parking facilities with sensors imposes unwarranted installation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.