The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The well known many–to–one data routingparadigm [1] in wireless sensor networks (WSNs) demands non–uniform medium access and forwarding strategy to achieve theultimate node level fairness. Since nodes closer to the sink havemore traffic than that of far–away nodes, close–by nodes needto employ different frequency of media access and forwardingprobability such that sink receives almost equal number...
Key management is considered as the fundamental part of any secure communication. In previous work, we propose RKPH scheme that was improved based on connectivity and resiliency compared to some other schemes. In this paper, we propose ARKPH, a modified scheme of RKPH that decrease impact of node compromise on sensor network security. In this scheme that we name it as alternative shared key replacement,...
Video-based communications are becoming more important within domains, such as health care, that have stringent security and privacy requirements for data. VPN-based encryption is a now common part of organizational security architectures. It is expected that the time required to perform encryption at a VPN concentrator and decryption at the client side video may add significant overhead to the transmission...
Key establishment is a critical security issue for wireless sensor networks. Due to resource constraints on the sensors, public key based protocols are not suitable. In addition, conventional symmetric encryption based protocols require significant sensor memory. In this paper, we propose a new hybrid key establishment protocol based on a scheme by Blom and random key pre-distribution. In the proposed...
Sensor networks are composed of many sensorsusually far from the region is available. Routing method inwireless sensor networks to transfer information from sensornodes to base station is especially important. Optimumconsumption of energy is important requirements in wirelesssensor networks because sensor systems typically use batterypower. In this paper, we have presented a routing algorithm todetermine...
In this paper, we propose an intrusion detection framework for smartphone systems. We formulate the intrusion detection problem into a two-player, non-cooperative, complete-information, constant-sum game. The attacker and the security server are the players of the game. The security server wants to maximize the value of the system but the attacker wants to minimize it. We present the Nash equilibrium...
The main concerns of network performance are throughput, end-to-end packet delay and packet loss. A high-performance network is characterized by high throughput, small delay, and low packet loss. A larger transmission radius increases the probability of finding a receiver with large progress, but simultaneously increases the probability of collision with other transmissions. Transmission range and...
Recently, cooperative communication is shown to be a promising approach to improve the transmission’s bandwidth without additional antennas on each node. Under this communication paradigm, the selection of relay nodes significantly affects the network throughput. As interfer-ence will greatly decrease the link’s rate, this paper stud-ies the interference-aware relay node assignment problem for multiple...
Novel beam-forming methodology is proposedthat employs passive RF devices in order to enhance thereceived signal. This paper demonstrates the feasibility of suchbeamforming and the realization methodology for a randomlyplaced set of passive devices. Typically, a beamforming isrealized by employing an antenna array at a receiver ortransmitter. The signals from antenna elements are processedin order...
Mobile ad hoc network (MANET) can be the best option in developing seamless communication environment in various application scenarios where there is no any pre-defined infrastructure. A mobility model which represents movement behavior of considered application scenarios should incorporate important features that may change characteristics of mobile nodes. In most of the cases, mobile nodes used...
Broadcasting is an elementary problem in wireless networks in general, and energy-efficient solutions are important to resource-limited wireless sensor networks. This paper presents two contributions: (1) an (off-line) algorithm to produce an efficient wireless broadcast schedule, and (2) an (on-line) opportunistic recovery strategy from link failures that might occur during the execution of the broadcast...
A key component of an efficient multipath routing is theoptimal resource allocation strategy that deals with how thetraffic should be distributed amongst the multiple paths. Inthis paper, an intelligent traffic distribution policy thatminimise the maximum delay in a multipath routing scenariois proposed. It would be proved that such delay minimisationcan be achieved through delay synchronization....
The analysis of scalability of wireless sensornetworks is a challenging performance issue. In this paper,we employ an analytical method based on probabilitydensity function Signal-to-Interference-plus-Noise-Ratio(SINR) of links to evaluate the performance of a wirelesssensor network in terms of bit-error-rate (BER). We derivean analytical formula for the average of BER according tothe physical resources...
Long-haul traffic accounts for a large percentage of the total data carried on the Internet. Due to the rapid changes of the Internet in terms of access technologies and core network bandwidth, the performance of long-haul transmission in the current Internet environment has not been well understood. In our research, we chose three typical long-haul paths (national, international yet continental,...
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to satisfy authentication of entities. We outline some important aspects that must be guaranteed given the existence of low-cost and resource-constrained RFID components. Appropriate solutions must, therefore, enable several nodes,...
Future envisions universal and uninterrupted access to information owing to the widespread use of heterogeneous wireless technologies. The integration of heterogeneous wireless technologies and existence of multi-mode terminals enable users get associated to the best available networks according to user preferences over different application specific requirements, prices and network technologies....
For guaranteeing the right design of SOA(Service-oriented Architecture), it is the critical step that the transfer from Choreography to Orchestration. This paper present a new mapping algorithm from Choreography to Orchestration based on role correlation, which right fits the projection granularity, deduces the complexity of generated Orchestration, therefore, development, maintenance, and adaptability...
One of the most attractive topics today is servervirtualization. Virtualization is a method of running multipleindependent virtual operating systems on a single physicalcomputer. It is a way of maximizing physical resources tomaximize the investment in hardware. This concept can help toconsolidate servers, improve hardware utilization and reducethe consumption of power and physical space in the datacenter...
The IEEE 802.15.4/ZigBee standard is considered as a potential candidate for wireless sensor and actuators networks. Several commercial platforms with IEEE 802.15.4/ZigBee support have been made available in the last few years, and an increasing number of operating systems specifically designed for sensor and actuator networks are evolving. Underground mining is considered to be one of most hazardous...
This paper deals with the routing optimization in IPV6 networks. It's the key processes of traffic engineering and network planning. Routing optimization provides a means to balance the traffic load in the network with the goal to improve the quality of service. The main objective of our routing optimization procedures is the minimization of the end-to-end delay, which is the total time of an individual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.