The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sweeps is a well-known localization algorithm based on the consistent connection constraints in WSN, and utilizes the concept of finite localization to relax the constraint conditions from trilateration to bilateration. In this paper, we deeply analyze the finite localization in various localization environments, and uniquely localize the finitely localized node without flip ambiguities using iterative...
The paper shows the gravure printing technology is used as deposition method to pattern a graphene film on flexible polyimide substrates for a wireless strain sensor (WSS). According to the inductive coupling between the reader antenna and the graphene pattern (GP), a change in the GP characteristic can be detected wirelessly by a corresponding change in the complex impedance of the reader antenna...
Energy efficiency is always an essential concern in modern wireless communication systems. Energy harvesting is a promising technique and can substantially extend the lifetime of power-critical wireless systems such as wireless sensors. Unlike the traditional battery powered system, the system utilizing energy harvesting usually has a smaller battery or merely a super-capacitor. Rather than the limitation...
Key Management is a major challenge to achieve security in wireless sensor networks. Considering both wireless sensor node's limited energy and the security requirement for WSN applications, In this paper, We propose a New Group Key Management Scheme with simple hash based authentication method, which develops the random pair-wise key pre-distribution scheme. With grouping design and identity authentication...
Wireless sensor networks routing protocols always neglect security problem at the designing step, while plenty of solutions of this problem exist, one of which is using key management. Researchers have proposed many key management schemes, but most of them were designed for flat wireless sensor networks, which is not fit for cluster-based wireless sensor networks (e.g. LEACH). In this paper, we investigate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.