The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless sensor networks, secure MAX/MIN query processing is a challenging issue, and it is useful in fields, where security is necessary. In this paper, we propose a secure MAX/MIN query processing method in two-tiered wireless sensor networks. To the best of our knowledge, it is the first work that can achieve data privacy protection and query result integrity verification simultaneously. Three...
Forest fire is caused by burning weeds in the field or burning paper as sacrificial offerings in the graveyard, so that the forest fire early warning system is designed and developed with GIS and WSNs. A number of sensor nodes which constitutes the Wireless sensor networks were developed in the region which can measure the concentration of CO and smog and detect flame and gauge the temperature and...
Aiming at the wireless sensor network (WSN) positioning of the centroid localization algorithm with the problem of inaccurate positioning, this paper proposes an improved weighted centroid localization algorithm based on RSSI. This algorithm regard the distance between the unknown node and the reference of anchor nodes as the weight in centroid localization algorithm, make full use of the unknown...
To date, researchers have utilized energy harvesters to power wireless sensor nodes as self-powered wireless sensors to create many innovative wireless sensors network applications such as medical monitoring, machining-condition monitoring, and structural-health monitoring. Regarding to energy harvesters, some researchers demonstrated wideband or frequency up-converted vibrational energy harvesters...
Due to the unattended nature of wireless sensor networks, they are susceptible to replicas attack. The existing replicas detection schemes need to be further improved as to detection probabilities, detection overheads and the balance of detection overheads among the sensor nodes. A new replica detection scheme by mobile sink is proposed. The mobile sink patrols around the network deployment area,...
According to the relative position of intermediate nodes to the direct transmission path, in this paper, an energy efficient data relaying (EEDR) algorithms is proposed to decide which intermediate nodes can be selected to relay data in wireless sensor networks (WSNs). The EEDR is proposed to effectively decide the relaying decision for the intermediate nodes based on the energy efficiency analysis...
An Unattended Wireless Sensor Network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors close to the base station deplete their power earlier than others. An UWSN can save the battery power and prolong the network lifetime. Unfortunately, MSs would be given too much privilege...
Space-time algorithm based on cyclic correlation matrix is introduced and the cyclostationarity of signals is taken into account. Numerical simulation shows that it can considerably improve the performance of the software defined antenna and therefore be widely used in variant fields.
This paper studies the problem of correlated data gathering in wireless sensor networks. For a maximum network utility, a efficient data capture and transmission framework is proposed for correlated sources, where localized S-W source coding, network coding based flow control and opportunistic routing are jointly optimized. To increase the throughput and guarantee the decodability simultaneously,...
Sensor nodes are prone to produce faulty sample data because of poor quality and harsh environment. In this paper we put forward STCOD algorithm which uses spatial and temporal correlations between sensor nodes to distinguish faulty sample data from outlier data. STCOD algorithm includes three child algorithms which are outlier self-detection algorithm, neighbor-voting algorithm and outlier confirming...
Skyline is an important query in many applications such as environment monitoring and industrial controlling. Lots of achievements of skyline query have been made in traditional database. But they can not be used directly to wireless sensor network. In this paper we study continuous skyline query in wireless sensor network and put forward an energy efficient algorithm named ORSSQ. ORSSQ sets up filters...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
LEACH exhausts a few nodes much earlier than others, which remarkably decreases the lifetime of whole network. An improved method based on time slots to prolong the minimum lifetime of nodes in LEACH is presented, in which a cluster-head selecting approach decreases the difference in cluster size of LEACH and responsibility mechanism for active node makes the energy consumption uniform in cluster...
In wireless sensor network, one of the main design challenges is to obtain long network lifetime by turning off some redundant nodes while maintaining sufficient sensing coverage and connectivity. In this paper, we investigates the criterion to decide whether a sensor is redundant, and propose a improved method to determine if a sensor is completely covered by its neighbors, especially for boundary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.