The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, application development for wireless sensor networks (WSN) depends mainly on event-based programming models, making it difficult for programmers to write and maintain WSN applications. Further, the lossy wireless communication channel between nodes within these networks create the need for protocols that take advantage of asynchronous message passing. To address these issues, we present an...
This paper considers the introduction of switched beam directional antennas in wireless sensor networks. The paper compares the performance of an existing solution based on S-MAC. It is shown that the introduction of directional antennas reduces interference, transmission delay and flooding and consequently improves throughput and energy consumption.
In wireless sensor networks, resource-constrained nodes are expected to operate in unattended highly dynamic environments. Hence, the need for adaptive and autonomous resource/task management in wireless sensor networks is well recognized. We present Distributed Independent Reinforcement Learning (DIRL), a Q-learning based framework to enable autonomous self-learning/adaptive applications with inherent...
Wireless mesh networks (WMN) are supposed to provide flexible and high-performance wireless network access for large indoor and outdoor areas, e.g., community networking and metropolitan area networks. However, these claims are mostly substantiated by simulation studies only as real testbeds are inflexible and associated with high maintenance effort. In this work we present a hybrid, i.e., partly...
In this paper, we present a flexible and mathematically rigorous modeling framework for analyzing the security of sensor network routing protocols. Then, we demonstrate the usage of this framework by formally proving that INSENS (Intrusion-Tolerant Routing in Wireless Sensor Networks), which is a secure sensor network routing protocol proposed in the literature independently of our work, can be proven...
We present a protocol for query authentication in a sensor network where there is multi-hop communication and the queries are broadcasted by the base station into the network. Authenticating the queries is important so attackers cannot modify existing queries because this would lead to wrong readings; or insert new ones into the network because this would lead to waste of energy. We propose a layered...
HWMP, the default routing protocol of IEEE 802.11s has been revised during the comment resolution of the first letter ballot. The paper gives an update on three areas where major changes have been introduced to HWMP: support for interworking with other networks; revised concept for proactive routing trees to root MPs; and a better aligned extensible path selection framework.
In this paper, we present a monitoring assisted routing scheme for wireless mesh networks which exploits the broadcast nature of wireless transmissions at special routers with added monitoring functionalities. These routers listen to the transmissions in neighborhood and compare the routing behavior against the routing state collectively maintained by them. If any inconsistency is found, as a result...
In the near future, wireless local area networks (WLANs) will overlap to provide continuous coverage over a wide area. In such ubiquitous WLANs, a mobile node (MN) freely moves between WLANs with different IP subnets during VoIP communication. In such situations, since an MN experiences several handovers, the communication quality is degraded. In previous studies, in order to solve this problem, we...
Mesh routing protocols are specifically designed to meet the challenges resulting from frequent topology changes. In addition, they must generate and maintain reliable routes that are optimized with respect to QoS or energy efficiency. Routing protocols are usually developed for a set of scenarios with a certain traffic pattern and network architecture. Some protocols can be configured to achieve...
In a Wireless Mesh Network (WMN), Mesh Routers (MRs) are interconnected by wireless links and form a wireless backbone to provide ubiquitous high-speed Internet connectivity for mobile clients. The wireless backbone is tightly integrated with the Internet by nodes called as Internet gateways (IGWs). In this paper, we address the IGW deployment problem which is shown to be NP-hard. We first formulate...
In sensor networks with mobile access points (MAs), distant sensor nodes cannot communicate directly with the MA when it is path-constrained and sensor area is very wide. For these nodes, we propose a relaying operation based on overhearing, which is very simple and compatible with the conventional operation of MAs. The simulation results show that it enhances coverage and energy efficiency.
A key component of intelligent transportation systems (ITS) is the provision of adequate network infrastructure to support vehicular communication. In this paper we present the results of an extensive measurement campaign evaluating the performance of IEEE 802.11 in different vehicular communication scenarios: vehicle-to-vehicle (V2V) and infrastructure- to-vehicle (I2V). We concentrate our evaluation...
In this paper we consider how vehicular networking technology can be used to support roadside-to-roadside (r2r) communications. In this form of communication vehicles traveling along a road or highway are used to transport data between two fixed roadside locations that are too far apart to be connected. The basic idea is to have a roadside station give data to a moving vehicle as it gets close and...
In this paper, we illustrate the design of a cross-layered MAC and clustering solution for supporting the fast propagation of broadcast messages in a Vehicular Ad Hoc Network (VANET). A distributed dynamic clustering algorithm is proposed to create a dynamic virtual backbone in the vehicular network. The vehicle-members of the backbone are responsible for implementing an efficient messages propagation...
We propose a contention-free medium access control (MAC) protocol for inter-vehicle communication systems that share information for the improvement of safety drive on the highway. In the proposed system, contention-free medium access is achieved by periodical one-way token transmissions. The token contains the frame information about the transmission/reception phase. While the token is relaid by...
This demonstration presents a data-centric opportunistic dissemination platform. The proposed platform achieves system wide delivery of data exploiting opportunitic communcations among mobile nodes. The prototype is developed over java-enabled smartphones and relies on Blue-tooth connectivity for achieving proximity communications. The platform is described in all its functional components, together...
This paper presents a middleware architecture to support location-based services (LBSs) based on heterogeneous localization systems. A GEOlNFO gateway is implemented to hide the discrepancy of different localization systems from application developers. Hence, application developers can deploy their LBSs easily without considering the underlying localization techniques. To demonstrate the detailed...
Opportunistic networks are mainly characterized by nodes intermittently connected among them. Available applications designed for mobile ad hoc networks are not suitable for such an environment since we cannot assume to have a stable path between pairs of nodes. Network protocols and applications themselves must be enhanced to exploit all possible communication opportunities to deliver messages on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.