The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advancements of microelectronics and network protocol research enable the vast applications of wireless sensor network in industry and home environments. For example, the research in this paper is part of a NASA hydrogen detection to provide early detection of hydrogen leaks in storage facilities and transportation processes. Reliability issues play a vital role to ensure the quality of service...
The intrinsically location-aware applications of sensor networks and the need for location-based optimized routing make efficient and accurate location determination of sensor nodes essential. It is practically and economically infeasible to equip all sensor nodes with GPS receivers. A few GPS equipped anchors are therefore used to determine the location of sensor nodes in the field. Localization...
This paper investigates the loss of sensing fidelity in a wireless sensor network resulting from a proposed novel attack. The active attack is carried out by a distributed malicious sensor actuator network (mSAN) which is able to actuate or change sensed parameters of the surrounding environment under observation. We show how the attack effectively produces a denial of service on the sensing (DoSS)...
The election of a malicious or compromised node as the cluster head is one of the most significant breaches in cluster-based wireless sensor networks. In light of this, we are introducing a distributed trust-based framework and a mechanism for the election of trustworthy cluster heads. Our proposed mechanism reduces the likelihood of compromised and or malicious nodes from being selected as cluster...
Visual sensor networks (VSNs) can be used to acquire visual data (i.e. images) for applications such as military reconnaissance, surveillance, and monitoring. In these applications, it is of utmost importance that visual data be protected against eavesdropping to uphold confidentiality and privacy rights. Furthermore, protection mechanisms for these sensor nodes must be efficient and robust to node...
In this paper, we introduce SensDep as a software design tool that incorporates several solution strategies to optimize sensor networks cost and coverage. The tool helps the designer answer many "what-if" questions that usually arise in the design of surveillance operations networks. Also, it considers several operation capabilities for the sensing devices including reliability, mobility,...
Wireless sensor networks are poised to increase the efficiency of many applications, such as target detection and disaster management. Typically sensors collect data about their surrounding and forward it to a command center, either directly or through a base-station (gateway). Due to inhospitable conditions, sensors may not always be uniformly deployed in the area of interest. Some sensors can be...
The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. The immense potential of wireless sensor networks (WSNs) has created a growing awareness of the need for reliability in such networks. A major concern in the design of WSN protocols, including those concerned with reliability, is energy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.