The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level context and inferenced information. This paper considers the visualization of such large, heterogeneous and complex integrated information, especially for real-time deployments facilitating rapid understanding leading to decision making....
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks due to their higher consumption of resources such as memory and power. In this work, we propose a new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering. Our approach reduces the cost of trust evaluation. Also, theoretical...
Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that...
A simple methodology for computational and scientific rapid prototyping in Haskell is proposed. The methodology is based on identifying abstractions that are defined over entire list data structures combined with identifying a set of processes that initially construct a list data structure and subsequently modify that data structure in iterative steps leading to a final post modification process to...
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network level privacy. Providing full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes, sensor networks and QoS issues. In this paper, we propose full network level privacy...
Simple, fast, low energy consumption time synchronization protocol is needed by sensor networks. Mutual interaction synchronization is highly attractive for wireless sensor network for its simplicity, self-organization and good scalability. The proposed selective coupling synchronicity algorithm (SCSA) addresses the problem of low efficiency caused by the phase swing actions in the original all pulse...
Recent technological advances in wireless sensor networking have opened up new opportunities in healthcare systems. Future medical systems are expected to benefit the most in such areas as in-home assistance, smart nursing homes, and clinical trial. However the network system including body sensor networks and environmental sensor networks are normally comprised of energy constrained nodes. Furthermore,...
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problems in Mobile Ad hoc Networks (MANETs). The network information can be collected and updated in a decentralized and dynamic way through the localized cooperation among these swarm agents. In this paper, we, for the first time,...
Autonomic computing has attracted large amount of attention as a novel computing paradigm in the past few years. In this paper, we explore the inherent accordance between autonomic computing and swarm intelligence. Then, we propose a swarm intelligence inspired autonomic routing scenario with a targeting application area in ubiquitous sensor network. This scenario covers most of the characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.