The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Time synchronization is a crucial component of WSN. As the rapid development of mesh network, firefly-inspired synchronization algorithm comes out for solving the synchronization issue of large-scale networks. But it usually has a short cycle for improving the sync rate. In this paper, a multiscale cycle synchronization strategy is proposed based on firefly-inspired algorithm for long cycle. First,...
Wireless sensor networks (WSNs) comprise a large number sensor devices with limited power and resource. One of the key design challenges in the sensor networks is to efficiently utilize limited local storage capacity at individual sensor nodes to store historical data and produce fast and approximate responses to user queries. In this article, we propose a hierarchical data caching technique which...
Wireless sensor networks (WSNs) have been widely used in many applications. Under outdoor surveillance, limited power supply to nodes in WSN systems is usually difficult to maintain operations for a long period of time. Previous studies have indicated that the load-balanced first layer nodes cannot extend the duration of WSN; more energy is consumed when nodes' loadings are heavy. The objective of...
The power of nodes in the first layer of a wireless sensor network (WSN) cannot last due to their frequent relay tasks. One possible solution to this disadvantage is to adopt the first order load-balanced algorithm (LBA) to redistribute the loading of the first layer node uniformly. The balanced low-latency convergecast tree (BLLCT) algorithm, a LBA, is generally utilized in route planning in ecological...
Denial of service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of wireless sensor networks (WSNs). In this paper, we propose a solution using one-way hash function to generate dynamic keys ensuring that even if the adversaries may acquire the current or earlier keys, they have no ability to...
Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide...
Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which...
In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network...
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH)...
There has been proliferation of research on seeking for distributing the energy consumption among nodes in each cluster and between cluster heads to extend the network lifetime. However, they hardly consider the hot spots problem caused by heavy relay traffic forwarded. In this paper, we propose a distributed and randomized clustering algorithm that consists of unequal sized clusters. The cluster...
Object tracking in wireless sensor networks is to track moving objects by scattered sensors. These sensors are typically organized into a tree to deliver report messages upon detecting object's move. Existing tree construction algorithms all require a mobility profile that is obtained based on historical statistics. In this paper, we propose an analytic estimate of such mobility profile based on Markov-chain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.