The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aimed at the disadvantages of traditional monitoring system, an underground pipeline security early warning system based on wireless sensor network was designed. The system employed a dynamic cluster head election of the clustered network structure, taking CC2530 as the core of wireless sensor nodes. The sensor nodes stored and analyzed the data, using a new type of optical fiber temperature sensor...
Topology control is important for heterogeneous sensor networks in order to minimize the total network power consumption under the constraint that all sensor nodes’ connectivity requirements are satisfied. To address this issue, an optimization problem is first formulated, which is formally proved to be NP-hard. For practical applications, an effective solution, named topology adaptation algorithm...
Network connectivity is a critical property that provides communication foundation for most wireless sensor network (WSN) applications to operate successfully. Existing results on the WSN connectivity analysis are primarily based on a uniform distribution of sensors in a bounded field of interest. However, the sensor distribution can be non-uniform in practice due to diverse deployment strategies,...
This paper proposes a methodology for detecting intrusion in wireless sensor networks using Weak Hidden Markov Models (W-HMM). W-HMM is a non-parametric version of Hidden Markov models (HMM), wherein state transition probabilities are reduced to rules of reachability. In particular, we introduce scoring scheme and deviation alarm mechanisms to detect intrusion. Simulation results show that the methodology...
There has been significant development in wireless technology which has enabled us to connect devices with conveniences. This paper makes an effort to utilize one of the wireless technologies ZigBee to programmable logic controller (PLC) so that the remote field devices can be controlled without wiring.
Research in wireless sensor networks often involves simulation systems as a large number of sensor nodes always are unavailable so far, and the operation of them is expensive as well. Unfortunately, the widely used simulators do not scale for sensor networks with 2000 nodes or less. In this paper, we propose a scalable simulation system VWSN (virtual wireless sensor network), to meet the needs of...
This paper takes advantages of the symmetrical key and asymmetrical key technologies, and proposes a key distribution scheme based on public key cryptography. The scheme does not need to pre-distribute pair-wise keys. Pair-wise key is established between two nodes after deployment according to a specific routing algorithm. The scheme can guarantee there is a direct pair-wise key between two nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.