The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In some harsh environment, wireless sensor networks without the sink are often deployed. In the network, the nodes just have limited energy and are easy to fail. In order to prevent the data loss due to the failure of nodes, each node disseminates its data to be stored at a subset of nodes in the network for preservation. However, each node just knows the information of its neighbors, and just has...
In sensor networks, the adversaries can inject false data reports from compromising nodes. Previous approaches for filtering false reports share keys between the source node and its upstream nodes on the path to sink, and rely on intermediate nodes to verify the reports generated by downstream nodes in a probabilistic manner. As a result, false reports have to travel several hops before detected....
We present an analytical model for end-to-end (e2e) channel systems with lossy communication (E2E-CSLC) of multihop wireless networks using Quasi-Birth Death models (QBDs). Moveover, we show that the state set of level 0 of E2E-CSLC model, i.e., S0, is an attractor according to the special structure of QBDs, which is the foundation of studying the probabilistic reachability for E2E-CSLC. Based on...
Content distribution systems, such as on-demand video services [6], file-sharing networks [8,1], and content clouds [2], provide ubiquitous data access and data sharing for large numbers of end-users. To efficiently provide content access across geographic locations, content storage nodes with limited capacity are conventionally organized in a multi-layer architecture to facilitate vertical as well...
Content cloud systems, e.g. CloudFront [1] and CloudBurst [2], in which content items are retrieved by end-users from the edge nodes of the cloud, are becoming increasingly popular. The retrieval latency in content clouds depends on content availability in the edge nodes, which in turn depends on the caching policy at the edge nodes. In case of local content unavailability (i.e., a cache miss), edge...
To minimize energy consumption in the Wireless Sensor Networks (WSNs), we propose a decentralized sensor coordination optimization scheme for Mobile Multi-Target Tracking (MMTT) in WSNs. Our scheme partitions the available sensor-nodes into clusters using the maximum-entropy based clustering criteria. For each tracked target, a number of neighboring clusters are activated based on their Hausdorff...
In wireless sensor networks, we usually need to detect interesting events based on the information gathered from multiple sensors. One useful detection is to test whether or not the average sensory value within an area is larger than a given threshold. Such type of query is called geo-range query. It should report the geographic centers where the average value of nearby sensors is greater than a certain...
Due to the communications and energy constraints, we propose the decentralized-detection based schemes for Mobile Multi-Target Tracking (MMTT) in Wireless Sensor Networks (WSN). Our developed WSN consists of a symmetric-tree structure and a set of target detection and estimation strategies, which achieve the optimal error-exponent decay in detecting the number of the tracked targets. The increase...
The fair allocation of the resources among different nodes is one of the critical problems in wireless mesh networks. Existing solutions mainly focus on rate-limitation policies or distributed fair MAC schemes at the potential expense of total network utilization. This paper investigates a special starvation problem among TCP flows that are different hops away from the BS, as well as the recently...
Since the unlicensed 60 GHz band has the extensively wide continuous spectrum and its corresponding millimeter-wave signal has high directivity gain, the 60 GHz band is a good option for the broadband wireless mesh networks. This paper focuses on link scheduling and routing over the 60 GHz multi-channel wireless mesh networks, where each mesh router has multiple radios and multiple directional antennas...
Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify...
Wireless network coding (NC) has emerged as a promising technology that improves network throughput and spectrum efficiency. How large can the coding gain be? In this paper, we study the network throughput gains of two types of wireless NC schemes, the conventional wireless NC and the analog NC, respectively, over the traditional non-NC scheme in multi-hop, multi-channel, and multi-radio wireless...
Compared to the other types of sensor networks, the wireless camera sensor networks can offer much more comprehensive and accurate information in mobile target tracking applications. We propose a dynamic node collaboration scheme for mobile target tracking in wireless camera sensor networks. Unlike the traditional sensing models, we develop a nonlinear localization-oriented sensing model for camera...
One of the critical problems for the wireless sensor networks is how to prolong the battery lifespan of the wireless sensor nodes. We proposed the cross-layer based battery-aware time division multiple access (TDMA) scheduling schemes for wireless sensor networks, which aim at maximizing the battery capacity utilization of wireless sensor nodes while satisfying the delay quality of service (QoS) requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.