The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we explore the design of multi-modal MAC for wireless ad hoc and sensor networks that dynamically adapt its behavior in order to minimize the energy to delivery ratio under a wide variety of network loads. The prime motivation is to balance the inherent trade-off between the energy wasted in collisions and the energy expended by collision avoidance handshake mechanisms. Towards this...
One of the most important issues in sensor enabled emergency applications is the QoS provisioning. Wireless LANs plays critical role in providing anywhere and anytime connectivity for many sensor enabled emergency applications. This paper addresses the issue of provisioning QoS over the wireless channel between the sensor enabled emergency application and the wireless access points (e.g., wireless...
Wireless sensor networks (WSN) are a subset of wireless networking applications focused on enabling sensor and actuator connectivity without the use of wires. Energy consumption among the wireless devices participating in these networks is a major constraint on the deployment for a broad range of applications enabled by WSNs. This paper introduces, for the first time, a novel methodology based on...
Optimizing the energy consumption in monitoring and communication protocols for wireless sensor networks has become the most important performance objective. We explore the problem of maximizing sensor network lifetime, i.e., time during which the set of targets is covered. We propose centralized algorithms for lifetime maximization with provable approximation ratio for the realistic model studied...
This paper deals with a natural disasters management system based on location aware distributed sensor networks. Optimal path discovery for routing of information packets is an essential means to achieve maximum life-time in wireless sensor networks. The authors propose a system based on hierarchical transmission of packets from sensor nodes to the base station by identifying a path from one head...
Network-wide broadcast (NWB) is a common operation in mobile ad hoc networks (MANETs), which are used to discover routes in routing protocols and to disseminate information in group communication operations. NWB is commonly performed via flooding, which has been shown to be expensive in dense MANETs due to its high redundancy. Existing NWB algorithms target reducing the overhead of NWB operations...
Majority of papers in the area of wireless sensor networks (WSNs) have an element of energy-efficiency and associated with it an analysis of network lifetime. Yet, there is no agreement on how to analyze the lifetime of a WSN. As a result, errors are frequently made on both sides. Some underestimate the network lifetime by an order of magnitude, while others end up overestimating the lifetime by a...
We present an innovative MAC protocol (Q-MAC) that minimizes the energy consumption in multi-hop wireless sensor networks (WSNs) and provides quality of service (QoS) by differentiating network services based on priority levels. The priority levels reflect application priority and the state of system resources, namely residual energy and queue occupancies. The Q-MAC utilizes both intra-node and inter-node...
The irregularities of a low cost wireless communication interface, changing environmental conditions, in-situ deployment and scarce resources make management, monitoring and troubleshooting performance of a sensor network a challenging task. In this paper we present the design of a decentralized fault diagnosis system for a wireless sensor network. Our system distinguishes between multiple root causes...
Many routing protocols have been proposed for wireless sensor networks in recent years. For some special applications, not only energy aware but link reliable is needed. Historical link status should be captured while making routing decisions. In this paper, we design a reliable link quality estimation based routing protocol (LQER), which integrates the approach of minimum hop field and (m, k). The...
This work presents an analytical approach for determining the relative coordinates of a receiver with respect to the source node. The source is assumed to be location aware. Statistics of the received signal are used to estimate the orientation and distance of the receiver with respect to the source. The received signal power is used as a distance estimator and the orientation is determined using...
Location-based services are using information about where a mobile device is located. Such services bring convenience to mobile user but also provide criminals with powerful weapons to compromise the privacy of mobile user. To address the location privacy issue, much architecture for location privacy control was presented and experimented. Qi He proposed a special and feasible architecture, using...
In this paper a modified neighbor aware medium-access control protocol is proposed designed for wireless sensor networks. Wireless sensor networks are generally comprised of battery powered nodes. These nodes are densely deployed in an ad-hoc structure. The main objective for sensor networks is low power consumption while latency is less important. This leads different MAC layer design for wireless...
Flooding algorithm is one of the most significant algorithms used in sensor networks. Although simple, this algorithm causes a large amount of energy and bandwidth to be wasted. The most important application of flooding is RREQ flooding in initial step of most routing algorithms. Although simple, this algorithm causes a large amount of energy and bandwidth to be wasted. Most previous efficient flooding...
Embedded sensors are envisioned to provide information about a variety of environments. One use of sensors is for military intelligence gathering in the field. Typically, these sensors are manually placed in an environment. In order to know whether the appropriate domain is covered by the sensor arrangement, we build an interface that provides visualizations of the sensor domains and coverage. To...
Next generation networks (3G & beyond) will support real-time multimedia applications through traditional wide-area networking concepts as well as hot-spot (WLAN) and ad hoc networking concepts. In order to fulfill the vision of next generation networks a method of maintaining a real-time flow despite frequent topology changes and irregularity in user movement is required. Mobility prediction...
Globally unique ID allocation is usually not applicable in a sensor network due to the massive production of cheap sensor nodes, the limited bandwidth, and the size of the payload. However, locally unique IDs are still necessary for nodes to implement unicast communications to save power consumption. Several solutions have been proposed for locally unique ID assignment in sensor networks. However,...
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorithms run on planar graphs only. To efficiently construct a planar graph, they require a unit-disk graph. To make the topology unit-disk, the maximum link length in the network has to be selected conservatively. In practical...
In this paper, we present a framework that improves the reliability and reduce the power consumption of a wireless ad hoc network through the deployment of supplementary nodes called agents. Agents are stationary nodes that have less stringent power constraints than the battery-operated mobile nodes. Placed in a mesh-like formation, agents enhance the connectivity of an ad hoc network by reducing...
A typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths. The search for reliable communication methodologies in this area in combination with appropriate security mechanisms has become a main research activity in the networking community. In this paper we describe a new approach and an according protocol for usage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.