The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wide deployment of Wireless Sensor Networks along with the proliferation of applications that use WSN-generated data has led to the design of WSN architectures and systems that support multiple applications over the same WSN infrastructure. Different Quality of Service requirements imposed by different applications impose the use of appropriate routing metrics to decide the data path. Although...
As the applications of wireless sensor networks proliferate, the efficiency in supporting large sensor networks and offering security guarantees becomes an important requirement in the design of the relevant networking protocols. Geographical routing has been proven to efficiently cope with large network dimensions while trust management schemes have been shown to assist in defending against routing...
Recently, Routing Protocol for Low Power and Lossy Networks (RPL) has been proposed by IETF ROLL WG in order to cope with Low Power and Lossy Networks (LLN) requirements implied by different application domains. In this paper, we present RPL modeling in J-Sim simulation environment, providing a complete simulation framework for performance evaluation as well as experimentation on open issues, such...
Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application domains. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Trust-aware routing is an...
A lot of effort has been spent in securing the routing procedure in wireless sensor network (WSNs) since this is accomplished in a cooperative way and is vital for the communication of the sensors with the base station which collects the sensed data. The communication over wireless links in combination with the ad hoc organization introduces vulnerabilities. Each node monitors the behaviour of its...
Security has been recognised as a key issue for the expansion of wireless sensor network applications. To defend against the wide set of security attacks, legacy security solutions are not applicable due to the very limited memory and processing resources of the sensor nodes as well as due to the reason that sensor networks are required to operate in an autonomous infrastructureless manner. Trust...
The primary requirements of a successful wireless sensor network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash functions and cryptography schemes. By applying these mechanisms, the energy consumption increases, shortening the sensor node lifetime. On the other hand, the selection of a highly secure...
The range of applications of wireless sensor networks is so wide that it tends to invade our every-day life. In the future, a sensor network will surveil our health, our home, the roads we follow, the office or the industry we work in, or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security...
Ad-hoc wireless sensor networks (AWSN) are quickly gaining popularity due to the fact that they are potentially low-cost solutions that can be used in a variety of application areas including emergency response, medical monitoring, homeland security and environmental monitoring. On the other hand, AWSN introduce severe node resource constraints due to their lack of data storage capabilities, power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.