The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The coverage is a critical issue in WSNs and considered as a measure of the service quality of WSNs. We proposed a coverage optimal algorithm based on Virtual Distance (VD) to enhance the coverage of WSNs after initial random placement. We define the ideal position of node related to its neighbor, and then the distance vector of one node's real position to ideal position is defined as virtual distance...
Using wireless sensor network to carry out status monitoring for floating bridge structure will improve the reliability and effectiveness of monitoring system greatly. To solve power supply problem of the network nodes, this paper designs a kind of self-sustaining piezoelectric power supply. It converts the mechanical energy which produced in the floating bridge's work environment into vibration excitation...
How to improve the energy utilization efficiency and prolong survival time of network has been an important issue in the field of wireless sensor network. In view of the energy-constrained situation in wireless sensor networks, we introduce game theory with non-cooperative game mode to optimize the network energy distribution. Regard the sensor nodes as rational participants in the decision-making...
Denial-of-Service (DoS) attacks are recognized as a biggest threats due to the resources constrained property in wireless sensor networks(WSN). Especially, using some mobile nodes, we can attack the cluster heads in clustering network, this jamming can cause a serious damage in performance of WSNs. Because the cluster head collect and fuse the data from all nodes in cluster, and forward to the base...
Object tracking is an important application in wireless sensor networks. To get the accurate location of a given object timely, designing an efficient routing protocol and incorporating it with the location response is the key. While limits of wireless sensor networks propose challenge for the routing of object tracking. This paper constructs a cluster-based routing tree, which makes balance between...
A new kind of electronic and mechanical antitheft lock using digital code based on the technologies of DSP, serial communication and wireless data transmission is introduced. This lock has several functions with good security, identification and alarm-giving. It is simple and has wide application and high reliability. Hardware frame and software flowchart of the system are presented as its function,...
Based on the analysis to the phenomenon and methods of denial-of-sleep attacking in wireless sensor network, a scheme is proposed employing fake schedule switch with RSSI measurement aid. The sensor nodes can reduce and weaken the harm from collision, exhaustion and broadcast attack and on the contrary make the attackers lose their energy quickly so as to die. Simulation results show that at a bit...
This paper designs a monitoring system for coal mine safety based on Zigbee wireless sensor network. The monitoring system collects temperature, humidity and methane values underground of coal mine through Zigbee sensor nodes around the mine, and then transmits the data to information processing terminal based on ARM. The terminal sends the data to the ground through Ethernet, and then the monitoring...
Secure data transmission and data aggregation are critical in designing wireless sensor networks. This paper presents a hash based secure aggregation protocol for sensor network. It uses one way hash function to generate pattern code for the real sensor readings which help aggregator eliminate redundant message without known any raw plaintext data. The scheme also requires aggregator provide commitment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.