The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although most research in lattice wireless sensor networks are focus on determining the optimal deployment pattern to provide full sensing coverage while maximizing the deployment efficiency, we study the partial sensing coverage problem and the corresponding node saving rate in 3D lattice WSNs. Two popular 3D deployment patterns including cube and triangular prism are considered. The partial sensing...
We consider the clock synchronization problem in wireless mobile ad hoc networks in the presence of Byzantine nodes. The communication topology is dynamic: nodes move randomly within a geographical area. We propose a clock synchronization protocol which is based on the linear approximate consensus method. Periodically each correct node broadcasts its current timestamp and gathers the timestamps provided...
In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc Networks (MANETs). Specifically, we consider two node mobility models: (1) two-dimensional i.i.d. mobility, (2) one-dimensional i.i.d. mobility. Two mobility time-scales are included in this paper: (i) Fast mobility where node mobility is at the same time-scale as data transmissions; (ii) Slow mobility...
For geographic routing in 2D ad hoc networks, greedy algorithm is efficient if no holes exist. However, greedy forwarding fails when a message reaches a local-minimum. Thus, face routing is used to solve the problem of local-minimums. Unfortunately, few research results can be applied to geographic routing in 3D environments. This paper proposes an algorithm GSG (Greedy Surface routing Greedy), for...
Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade the performance of applications such as localization and data collection. A wormhole attack is one of the most severe threats to an ad hoc network. Unfortunately,...
Object tracking is one of the fundamental applications in Wireless Sensor Networks (WSNs). To detect and track the appearance and movement of malicious object(s), a number of sensors are usually deployed randomly in the area of interest specially for hostile application scenarios. Following random deployment strategy, the resulting WSNs conform to Poisson or Gaussian distribution, depending on specific...
Intrusion detection in a Wireless Sensor Network (WSN) is of significant importance in many applications to detect malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a unusual environmental change in a chemical industry etc. With uniform distribution, the detection probability is the same for any point in a WSN. However, some applications may require different degrees...
Wireless sensor networks (WSN) have attracted a lot attention recently. How to maintain the properties of both the full coverage and the connectivity is a hot research topic. The current research results proved that a WSN is connected when the target area is fully covered and Rc (sensor's transmission radius) is larger than twice of Rs (sensor's sensing radius). In this paper, we propose a new concept...
Sensor localization is used by many position dependent applications in wireless sensor networks (WSNs), where ranging from sensor nodes to beacon nodes plays a fundamental role. Most ranging methods rely on the assumption that the deployed WSNs are isotropic, so that adjustment on measured distance is equal in all directions. However, this assumption does not stands in practice. In order to obtain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.