The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol,...
Overhearing and idle listening are two primary sources for unnecessary energy consumption in wireless sensor networks. Although introducing duty cycling in medium access control (MAC) reduces idle listening, it cannot avoid overhearing in a network with multiple contending nodes. In this paper, we propose an event-triggered sleeping (ETS) mechanism for synchronous duty-cycled (DC) MAC protocols in...
Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing...
To ensure end-to-end reliable multicast or broadcast transmissions in IEEE 802.15.4 based wireless sensor networks WSNs) is a challenging task since no retransmission and acknowledgment mechanisms are defined in such WSNs. In this paper, we propose three retransmission enabled multicast transmission schemes in order to achieve reliable packet transmissions in such networks. Different from the legacy...
Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose...
Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more...
One of the main challenges confronted by wireless sensor networks (WSNs) is to reduce energy consumption of nodes for the purpose of network lifetime extension. In the literature, many backbone based protocols such as connected dominating set (CDS) and broadcast or multicast based protocols are employed in order to improve network performance in terms of metrics like energy consumption, number of...
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme...
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper,...
To reduce energy consumption in wireless sensor networks, the concept of duty cycle is used in many MAC protocols. Although these protocols provide efficient energy-conservation solutions, they cannot resolve the energy hole problem in a multi-hop network, where a few nodes near the sink must relay the packets from the rest of the network, and consequently exhaust their batteries earlier. The previously...
How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks...
A major challenge for cooperative communication in distributed networks is to coordinate relay transmissions without introducing too much overhead. Targeting a clustered network, we propose a novel cooperative communication scheme including channel quality based relay selection and distributed space-time code allocation in this paper. Both analysis and simulations are carried out to investigate the...
Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example,...
Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion...
Cooperative spectrum sensing improves detection performance over fading and shadowing channels by using multiple cognitive radio (CR) users. Compared with local spectrum sensing with individual CR user, it can either reduce sensitivity requirements for each CR user or shorten the overall sensing duration. These advantages are from spatial diversity when all cooperative users sense a common primary...
An intelligent non-contact wireless patient monitoring system is presented in this paper. The monitoring system is capable of measuring the vital signs (respiration rate and heart beat) and detecting patients' motion without physically contacting them by using a miniature Doppler radar sensor system. The system can provide all-round near-real-time 24/7 monitoring, which can be used in hospitals and...
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission...
Data aggregation is an essential operation in wireless sensor network applications. This paper focuses on the data aggregation scheduling problem. Based on maximal independent sets, a distributed algorithm to generate a collision-free schedule for data aggregation in wireless sensor networks is proposed. The time latency of the aggregation schedule generated by the proposed algorithm is minimized...
Wireless Sensor Networks (WSNs) are expected to play an essential role in the age of pervasive computing. Wide deployments of mission-critical WSNs create concerns about security issues. Security of large scale densely deployed and infrastructure-less wireless networks of resource limited sensor nodes requires efficient key distribution protocols. Perring et al. developed SNEP capable of providing...
In this paper, we consider the problem of maximizing the lifetime of a target-covering sensor network in which each sensor can adjust its sensing range. The network model consists of a large number of sensors with adjustable sensing ranges being deployed to monitor a set of targets. Since more than one sensor can cover a target, in order to be energy efficient, one can activate successive subsets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.