The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existing methods of Web Service Composition (WSC) seldom consider the initiative and dynamic adaptability of Web Service (WS), which cannot make WS perceive the change of users' requirements in the changeable network environment. The result leads to the failure of Automatic Web Service Composition (AWSC). Meanwhile, the quantity of WS is so large in the existing network environment that the result...
A new cable wireless monitoring temperature scheme is proposed, which can monitor cable parameters of various cable, and can be monitored dynamically and transmitted to the dispatch center through the network which consisted with ZigBee network and CAN bus. Then, cable failures early warning function is realized. Simulation and piracies proved that reliability and flexibility of the system is increased,...
A new tire monitoring scheme is proposed in light of the defects of the existing tire pressure monitoring system. Parameters of various automobile tires can be monitored dynamically and transmitted to the driver meter through the network which consisted with ZigBee network and CAN bus. Then, auto tire failures early warning function is realized. Simulation and piracies proved that reliability and...
WSNs are a physical impossibility to be deployed into the area of absolute plane in the context of real-world applications. For all kinds of applications in WSNs accurate location information is crucial. In this article, we focus on 3D location accuracy in WSNs. We quantify the estimation accuracy for the TOA measurements by deriving the Cramer-Rao bound (CRB), and discuss the performance in two application...
Many localization methods for wireless sensor networks (WSN) have been proposed by far. These methods are usually aimed at how to locate unknown nodes or how to improve performance of localization under a certain density of anchor nodes. However, localization method for anchor nodes is limited to GPS or hand-placing method merely. It is imperative to explore another method that is efficient and cost-effective...
Sensor nodes being small in size and distributively deployed, are vulnerable to physical attacks that attempt to physically destroy sensors in the sensor network. Generally speaking, physical attacks in sensor networks can be classified into two types: blind physical attacks and search-based physical attacks. In blind attacks, sensors are destroyed using brute-force approaches (like bombs/grenades...
In this paper we study the defense of sensor networks against search-based physical attacks. We define search-based physical attacks as those, where an attacker detects sensors using signal detecting equipment and then physically destroys the detected sensors. In this paper, we propose a sacrificial node-assisted approach to defend against search-based physical attacks. The core principle of our defense...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.