The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A blueprint for an experimental low-power communications device (wireless mote) suitable for ad-hoc and networking applications is presented. The proposed device implements a random access packet-based communications protocol that exploits a special packet structure which is composed of separate header and payload portions. To enable robust packet detection, the headers consist of a preassigned spreading...
We propose a method to track an unknown and variable number of targets without assuming the knowledge of the locations of the sensor nodes in the network. Then, the multitarget tracking and the localization of sensor nodes is performed jointly. As low-power consumption is a requirement in sensor networks, a collaborative estimation scheme is presented, where only a small set of sensors are active...
Wireless sensor networks have been used for many delay-sensitive applications, e.g., emergency response and plant automation. In such networks, delay measurement is important for a number of reasons, e.g., real-time control of the networked system, and abnormal delay detection. In this paper, we propose a measurement architecture using distributed air sniffers, which provides convenient delay measurement,...
In this work, we consider a multi-hop cognitive radio network with multiple flows. The challenges induced by the random behaviors of the primary users are investigated in a stochastic network utility maximization framework. To fully utilize the scarce network resource, we propose an optimal traffic splitting scheme for each source node to explore multiple paths effectively. In addition, the algorithm...
Extremely small, very low cost and very low power yet smart tactical sensors are commonly proposed. We have investigated the design patterns and algorithms that are capable of on-sensor dimensionality reduction so forwarding information rather than the raw data across these tactical sensor networks where data flows are hampered by a disconnected, intermittent and low bandwidth (DIL) operational domain...
Wireless sensor networks (WSNs) are becoming increasingly important because of their reduced cost and a range of real world military applications. The ability to update the code wirelessly is important for their highly dynamic environments. The need to re-program a wireless sensor network may arise from changing application requirements, bug fixes, or during the application development cycle. However,...
Relay network is proposed as a means of improving the error performance and energy efficiency of the wireless networks. Inspired by the battery power efficiency (BPE) analysis in Duan et al. (2009), relay selection from the battery energy efficiency perspective turns out to be an interesting topic. Under the general network setup which integrates typical transmission and reception modules, we adopt...
As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One of the approaches in data-centric storage is that the nodes that collected data will transfer their data to other neighboring nodes that store the similar type of data. However, when the nodes are mobile,...
The Network Centric Warfare (NCW) model is currently attracting attention in modern warfare research. In this model, data processing issues, such as efficiently determining enemies of high threat, are critical for optimizing war tactics. In this paper, by adopting the concept of skyline queries which have been extensively studied in database research, we address the problem of searching highly threatening...
Recent advances in distributed in-network data storage and access control have led to active research in efficient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs...
The opportunistic large array (OLA) with transmission threshold (OLA-T) is a simple form of cooperative transmission that limits node participation in broadcasts. Performance of OLA-T has been studied for disc-shaped networks. This paper analyzes OLA-T for strip-shaped networks. The results also apply to arbitrarily shaped networks that have previously limited node participation to a strip. The analytical...
In this paper, we consider the reliable data fusion problem in a tactical environment in the presence of adversary. First, we characterize malicious behavior of compromised sensors assuming probabilistic models. Performance of the fusion process, in the presence of malicious sensors, is then quantified. The performance analysis shows that malicious sensors incur significant degradation on the fusion...
Wireless sensor networks (WSNs) can be used by the military for a number of purposes such as monitoring or tracking the enemies and force protection. Unlike commercial WSNs, a tactical military sensor network has different priority requirements for military usage. Especially in the remote large-scale network, topology, self-configuration, network connectivity, maintenance, and energy consumption are...
Friendly force tracking systems (FFTS) are the lowest echelon of command and control information systems (C2IS) in any army command and control architecture. Their initial goal is to provide near real-time information about own troops position. However, in foreseeable current empty battlefields as well as in asymmetric confrontations at least two extra functionalities are required: 1) sensor integration...
One of the fundamental differences between the terrestrial radio frequency (RF) signal and underwater acoustic signal is long propagation delay. This paper is focused on a scheduling scheme for regional data collection in underwater acoustic sensor networks. Long propagation delay of the acoustic signal causes a serious problem for transmission scheduling. In this paper, we propose an efficient transmission...
Technology advancement has allowed submarines to evade standard sonar detection. A viable alternative is to place magnetic or acoustic sensors in close proximity to possible underwater pathways of submarines. This approach may require deploying large-scale underwater sensor networks to form 3-dimensional barriers. We devise an energy-conserving scheme to construct 3-dimensional barriers using mobile...
The foray of wireless sensor networks into time-sensitive applications demands support for emergency services with guaranteed quality of service (QoS) bounds. We introduced CP-EDCA, a channel preemptive enhancement to the IEEE 802.11e EDCA standard, for guaranteed emergency medium access in distributed wireless environments. The performance results for emergency traffic depicted 50% uniform decrease...
Wireless sensor networks (WSNs) developed for the monitoring of critical military or civilian infrastructures are expected to have long life cycle with ultra-low power consumption. An ultra-low power wireless sensing scheme is developed by exploiting the unique features of infrastructure monitoring systems, which usually have long latency tolerance, low data rate, and strong correlation among data...
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
In large networks of nodes with mobility, such as certain tactical wireless networks, overall system behaviors can be difficult to predict given the number of interactions between nodes and the number of possible behavior outcomes. Agent-based modeling is seen as an attractive method for representing and analyzing tactical wireless networks. This paper investigates the use of agent-based models to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.