The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ABSTRACT Currently, Delay Tolerant Networking (DTN) research community urgently needs a credible and flexible platform to setup large scale DTN networks to accurately evaluate the performance of algorithms and protocols. In this work, we present such an emulation testbed. By using network virtualization and OpenFlow technologies to generate virtual DTN nodes and to simulate the opportunistic links...
Wireless traffic has two features: people have common interests in the hottest contents, and a large amount of traffic belongs to non-realtime services. Exploiting these two features, we propose a content dissemination system, integrating broadcast network and opportunistic network. In the proposed system, popular contents are broadcasted through broadcast network and then disseminated to users through...
Recent advances in technology and algorithms for smart environments have made it possible to collect and store large amounts of data about many aspects of human life and the surrounding environment with limited effort and cost. However, such data become useful to lay users with no background in data analysis only if they are presented in a fashion that supports intuitive interaction to spot the patterns...
Deployment of relay nodes to existing wireless net-works recently has received much attention since the channel capacity from sources to destinations through the cooperation of relay nodes is greatly enhanced. However, choosing appropriate relay nodes is critical to maximize the overall network performance. In this paper, we consider the assignment problem of relay nodes in a cooperative wireless...
Partial Delaunay triangulation (PDT) is a well-known subgraph construction that has already been used for years in the context of geographic routing and topology control. So far, it has been unknown if partial Delaunay triangulation is a network spanner. Network spanners are those subgraph constructions which maintain the length of the shortest path between any pair of nodes up to a constant factor...
Evolved Multimedia Broadcast Multicast Services (eMBMS) in LTE standards provides Raptor code as Forward Error Correction (FEC) scheme in application layer. Hybrid automatic repeat request (HARQ) is also used to increase reliability at MAC layer for packet recovery. The two mechanisms, with no interactions between them, may either lead to more redundancy in download link (DL) network resource or meaningless...
The Constrained Application Protocol (CoAP) is a lightweight application layer protocol for the Internet of Things. CoAP is based on HTTP mechanisms to build RESTful web services. In contrast to HTTP, CoAP was designed for machine-to-machine (M2M) communication and uses a binary representation. This allows efficient transport and processing in resource-constrained networks such as Wireless Sensor...
In recent years there has been growing interest for the vision of a so-called Web of Things, which pursues the access to a wide variety of everyday objects through a regular web browser. We believe that this vision is right now at a key moment in its realization, analogous to the '90 for the World Wide Web. The Constrained Application Protocol (CoAP), a web protocol optimized for constrained networks...
Most IP routing solutions have been designed to work well for a single communication technology. How?? ever, many communication networks consist of a multitude of legacy and new devices using heterogeneous technologies, such as copper wires, optical fibers, wireless and power line communication. In order to leverage the existence of multiple technologies between two devices to achieve availability...
This work focuses on consensus networks consisting of a group of mobile agents in the presence of noise and time delays. Due to noise, exact consensus is never reached. Hence, we propose fully distributed and local Kalman filters that filter only a subset of all system states while maintaining a filter quality close to a global Kalman filter. Feasibility is guaranteed by communicating measurements...
As we are moving towards to the Internet of Things (IoT) era, Wireless Sensor Networks (WSN) in smart buildings delineate the heart of such systems?? architecture. WSN systems are mature enough to support the IoT vision and different architectural designs and communication protocols are developed to realize this vision. In this paper, two different WSN architectural approaches for smart building systems...
Three dimensional wireless sensor networks have been extensively studied due, in part, to their applications in underwater sensing. Often algorithmic solutions to analogous problems in two and three dimensions, respectively, can be significantly different. Though there have been many algorithms proposed for two dimensional sensor movement problems, there are very few in the case of three dimensional...
This paper introduces an effective solution against Denial of Service (DoS) implemented by byzantine attack in a fully distributed ad-hoc wireless network employing IEEE 802.11. Byzantine attack is the attack performed by a fully trusted node that's turned rogue and already has passed all the authentication and verification processes. When a trusted node is turned rogue, it can easily perform DoS...
We investigate the capability of ad-hoc sensor networks equipped with simple sensor devices to enable a more accurate spatial event localization in order to support smart camera networks. We present a novel algorithm named Orthogonal Cut which is suitable for many different event detection scenarios, especially when large interferences occur. It estimates the spatial position of a detected event by...
Security is considered a challenge for Wireless Sensor Networks (WSNs) due to the critical information transferred through the collection of smart sensor nodes forming the network. However, due to the energy limitation of these nodes, clustering these nodes can prolong the lifetime of the network. One of the famous clustering algorithms is Hybrid Energy Efficient Distributed Clustering protocol (HEED)...
Broadcast authentication is a fundamental security ser- vice in wireless sensor networks (WSNs). Recently, sev- eral public-key-based schemes have been proposed to achieve immediate broadcast authentication with signifi- cantly improved security strength. While the public-key- based schemes obviate the security vulnerability inherent to symmetric-key-based μTESLA-like schemes, their signature verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.