The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cognitive radio networks (CRNs), spectrum sensing data falsification (SSDF) is one of the most typical attack which hugely degrades the detection performance of cooperative spectrum sensing (CSS). SSDF and defense strategies have been an active field of research, but countermeasures of existing researches are sensitive to the number of malicious users (MUs). In this paper, we propose a two-stage...
Recent advances in self-interference cancellation techniques enable in-band FDR systems, which transmit and receive simultaneously in the same frequency band with high spectrum efficiency. Meanwhile, wireless virtualization enables abstraction and sharing of infrastructure and radio spectrum resources in wireless networks. Both in-band FDR and wireless virtualization are promising technologies for...
Recently, induced by incorporating the ubiquitous data gathering capability of wireless sensor networks (WSNs) as well as the powerful data storage and data processing abilities of cloud computing (CC), WSN-CC integration is attracting growing interest from both academia and industry. However, WSN-CC integration is still in its infancy and a lot of research efforts are expected to emerge in this area...
Wireless Sensor Networks (WSNs) have been widely deployed in monitoring and surveillance areas. With the improvement of sensor nodes' processing capability, multi-media transmission in WSNs has become a new trend. Since multi-media has strict Quality of Service (QoS) requirements, which calls for efficient scheduling algorithm that could guarantee the end-to-end delay and reduce the energy consumption...
Energy efficiency is a critical issue in wireless sensor networks (WSNs). In order to minimize energy consumption and balance energy dissipation throughout the whole network, a systematic energy-balanced cooperative transmission scheme in WSNs is proposed in this paper. This scheme studies energy efficiency in systematic view. For three main steps, namely nodes clustering, data aggregation and cooperative...
Established a wireless sensor networks and a concrete plan is brought forward based On ZigBee technology. Corrected the time of network by Time Protocol. The hardware and software of the system is designed. Finally, the application effects of the system are analyzed and compared. The System realized the goals such as low cost, low consumption, high stability, high flexibility and expansibility. The...
This paper considers multi-hop cellular networks in which nodes use accumulation for cooperative broadcasting in order to save total energy with low delay. Our purpose is to build up Green Cellular Networks (GCN) which represent the trend of Next-Generation Networking (NGN) and cater for people's demand for health and energy savings. Therefore, we assume a radiation and harmful region and show that...
Although some reputation schemes have been proposed for ad hoc networks, they are still not the most suitable for WMNs due to the special infrastructure and communication mode in WMNs. In this paper, a hierarchical reputation management framework for WMNs is presented. We show how to collect and query reputation values in an accurate, secure and efficient manner. The correlation validation algorithm...
In this project our goal is to create a health monitoring system that can transmit the vital signs of a patient through an ad-hoc wireless sensor network for a mass causality emergency application. The health monitoring device is to be placed on an injured victim during an emergency and act as a sensor node to connect to a wireless ad-hoc network to transmit the patient's vital sign data. The target...
In most applications of wireless sensor network, the acquired information is useful only when their locations are known. Compared with ACT (alternating combination trilateration), IACT (improved alternating combination trilateration) has reduced its calculation overhead greatly. In IACT, The value of m, which determines how many triangles are used in calculations, is static. In this paper, the value...
Sensor nodes can be compromised by attackers to launch various attacks, one of which is false data injection attack The attacker injects large amount of bogus data through the compromised node. This will lead to network resources exhaustion. We propose a novel contact-based approach (CTrace) to traceback to the attack origins. In CTrace, each node maintains information of its neighbors in proximity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.