The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) gain popularity these days. WSNs have been one of key technologies for the future with broad applications from the military to everyday life. There are two kinds of WSNs model models with sensors for sensing data and a server for receiving and processing queries from users, and models with special additional nodes, their common names are storage nodes, between the sensors...
Intrusion detection system (IDS) is one of the basic components of network security. IDS can use signatures or abnormal behaviors to detect attacks. When IDS uses signatures, in order to detect more attacks, we have to implement more attack signatures on IDS. However, in resource-constrained wireless sensor networks, it is not efficient to implement all of attack signatures. And it is hard to maintain...
With research effort of Ubiquitous computing development, Wireless Sensor Networks have also been studied and deployed in many places. Recently various works for sharing the existing sensor data have been tried. In this paper we propose a P2P based system for sharing sensor data. It uses a structured P2P - Pastry to provide DHT based routing without server and has been deployed in KOREN. We classify...
Wireless sensor networks (WSNs) based on TCP/IP can easily directly communicate with IP networks. Thus, implementing TCP/IP in sensor networks attracts much interest nowadays. In this paper, based on the existing researches, we propose a configurable tiny TCP/IP protocol stack integrated with session initiation protocol (SIP) module for a WSN, which supports the mobility of sensor nodes. Using it,...
Reasoning the sensor data is necessary in context-awareness of home network. For sensing data usually was sent by hex code, it can't directly reason with this data type. So we convert this sensor data into ontology to reason using DOM of XML. We convert the environments information, temperature, humidity, and time, among many sensors into ontology through receiving sensor data every minute. Through...
The key problem of location service in indoor sensor networks is to quickly and precisely acquire the position information of mobile nodes. Traditional positioning algorithms, such as two-phase positioning (TPP) algorithm, are too complicated to be used in a mobile node and they cannot satisfy the time constraints. We analyze the localization error and draw the conclusion that the localization error...
In indoor sensor networks, due to resource limitation of the sensor nodes, some of the traditional positioning algorithms, such as two-phase positioning (TPP) algorithm, are too complicated to be implemented and they can't satisfy the real-time localization of the mobile node. We analyze the localization error and draw the conclusion that the localization error is the least when three reference nodes...
Securing wireless sensor networks (WSNs) in a fully self-organized way is effective and light-weight, but traditional trust mechanisms can't efficiently provide a security for sensor nodes with resources limited in many applications, especially in a complex and varying military environment, sensor networks can be easily attacked by malicious and hostile nodes using the natural cooperation characteristic...
Smart home is getting popular. An essential element of smart home is sensor network to convey environment information to the control station. There have been many communication protocols for this sensor network. One problem of previous protocols is unbalanced energy consumption among sensor nodes. Even though they tried to overcome energy unbalanced consumption, they could not solve this problem satisfactorily...
In wireless sensor networks (WSNs), nodes assist each other by passing data and control packets from one node to another. In a complex WSN, malicious nodes are well disguised so that they can purposely attack the whole network using the natural cooperations of sensors. In additional, the error-prone of sensors always cause the system instability of WSNs. To overcome this, we study trust mechanism...
Wireless sensor networks (WSNs), which consist of spatially distributed autonomous sensing and computing devices to monitor physical conditions such as temperature and motion. Under a hostile military environment, sensor networks can be easily attacked by malicious nodes and hostile nodes using the natural cooperation of WSNs. In this paper, we introduce the trust mechanism in the human society into...
Wireless sensor networks (WSNs) is drawing a lot of attention as a method for realizing a ubiquitous society, which needs more than one sensor to accomplish the task together. Malicious nodes are well disguised in a hostile military environment, so they can attack the whole network using the natural cooperations of WSNs. Therefore, how to choose one or more suitable sensor nodes to cooperate in a...
In indoor environment, one of the major challenges for researchers is to localize the sensor nodes with relatively high localization precision. Many traditional positioning algorithms dealt with the node localization issues, such as two-phase positioning (TPP) algorithm, without taking into account the "reference node" parameter, however which also strongly affects the quality of spatial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.