The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays one of the issues hindering the potential of federating cloud-based infrastructures to reach much larger scales is their standard management and monitoring. In particular, this is true in cases where these federated infrastructures provide emerging Future Internet and Smart Cities-oriented services, such as the Internet of Things (IoT), that benefit from cloud services. The contribution of...
The wide deployment of Wireless Sensor Networks along with the proliferation of applications that use WSN-generated data has led to the design of WSN architectures and systems that support multiple applications over the same WSN infrastructure. Different Quality of Service requirements imposed by different applications impose the use of appropriate routing metrics to decide the data path. Although...
As the applications of wireless sensor networks proliferate, the efficiency in supporting large sensor networks and offering security guarantees becomes an important requirement in the design of the relevant networking protocols. Geographical routing has been proven to efficiently cope with large network dimensions while trust management schemes have been shown to assist in defending against routing...
Wireless sensor networks offer inexpensive solutions in a wide variety of applications ranging from health, home, roads and public area monitoring to industry and aircraft control. As sensors proliferate, scalable communication protocols with low implementation requirements are pursued. Another key issue for the wider deployment of these solutions is security since the wireless sensor networks themselves...
Recently, Routing Protocol for Low Power and Lossy Networks (RPL) has been proposed by IETF ROLL WG in order to cope with Low Power and Lossy Networks (LLN) requirements implied by different application domains. In this paper, we present RPL modeling in J-Sim simulation environment, providing a complete simulation framework for performance evaluation as well as experimentation on open issues, such...
As the applications of Wireless Sensor Networks proliferate, security issues raised in this uncontrolled, self-organised systems comprising a large number of nodes with very low processing, buffering and communication capabilities become mandatory as they need to cooperate with each other, even for routing data messages to the desired destination. A solution that has been widely pursued to detect...
Wireless Sensor Networks are becoming more and more popular and offer a wide set of solutions invading our life. As the research community is working towards integrating them in the so-called “Internet of Things”, the capability to reconfigure them provides an unprecedented flexibility allowing for the flexible use of all available resources of different types. However, the desired reconfiguration...
Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application domains. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Trust-aware routing is an...
A lot of effort has been spent in securing the routing procedure in wireless sensor network (WSNs) since this is accomplished in a cooperative way and is vital for the communication of the sensors with the base station which collects the sensed data. The communication over wireless links in combination with the ad hoc organization introduces vulnerabilities. Each node monitors the behaviour of its...
Security has been recognised as a key issue for the expansion of wireless sensor network applications. To defend against the wide set of security attacks, legacy security solutions are not applicable due to the very limited memory and processing resources of the sensor nodes as well as due to the reason that sensor networks are required to operate in an autonomous infrastructureless manner. Trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.