The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a survey on the MAC and network layer of Wireless Sensor Networks. Performance requirements of the MAC layer are explored. MAC layer protocols for battery-powered networks and energy harvesting-based networks are discussed and compared. A detailed discussion on design constraints and classification of routing protocols is presented. Several routing protocols are compared in terms...
The emerging field of wireless sensor networks (WSNs) allows novel methods of designing surveillance and tracking systems. Tracking moving targets in WSNs is a canonical application of practical importance to military as well as civilian fields. Since WSNs are highly constrained in computation, communication and energy resources, the application is required to be designed with minimal resource consumption...
Cognitive radios (CR) offer the promise of being a disruptive technology innovation that will enable the future wireless world. CR techniques are being applied in many different communications systems. They promise to improve the utilization of radio frequencies making room for new and additional commercial data, emergency, and military communications services. Today's wireless networks are characterized...
The low power wireless communication technology has enabled the development of next generation low cost wireless sensor network. One important performance index of routing mechanism in sensor networks is sensor life span. How we utilize limited energy in wireless sensor network, directly affects the lifetime and cost of the network. As sensors are energy constrained by batteries and located for away...
ATIM (Ad hoc traffic Indication Message) window can be used effectively to enhance the potential energy savings at static sensors nodes during data dissemination in wireless sensor networks. Doze and awake are two states a sensor node may be in during ATIM window. We consider a traditional wireless sensor network system consisting of resource-rich static sink and resource-constrained multiple static...
We propose a four-layer architecture model (FLAM) to obtain the potential energy savings for sensor nodes in large scale wireless sensor networks. The very first layer, the bottom layer is a network of a resource-constrained sensor nodes deployed in the field. The second layer is ad hoc network formed by resource-rich dynamic sink nodes, also knows as cluster sink nodes. The third layer consists of...
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network consists of resource-rich mobile sink node and resource-constrained sensor nodes forming a square grid. Sink may be multihop away from the sensor nodes and in order to collect the data,...
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contains a set of resource-rich dynamic sink nodes forming an ad hoc network. The sinks at layer second are responsible to monitor and collect data from a region, called cluster. So the sinks...
Collision leads to the development of retransmission algorithms for random access protocols. However their performance degrades in the case of malicious attacks. The need of a MAC protocol with the ability to identify threats and capability to discard these useless packet is required otherwise performance of shared medium may be degraded. We Focus Our Efforts on further improving the channel allocation...
Security in wireless ad hoc network (WAN) is very important issue. Due to dynamic topology and mobility of nodes, Wireless Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless networks. Nodes of Wireless Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.