The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless ad hoc networks, one hard issue for each participating node is how to meet its own interest (e.g., reducing network workload in order to preserve its energy provision) with that of the whole network (e.g., keeping all participating nodes "alive" as long as possible)? This paper proposes a distributed approach that tries to find a "fair" balance between all nodes based...
In this paper, we address the problem of wasting bandwidth resources due to waiting for the backoff time and propose using multiple channels to achieve the goal of a high performance MAC design. In order to have better bandwidth utilization in multiple channels, we also propose a bandwidth allocation strategy for control channels and data channels
To the best of our knowledge, there are only few security schemes for ad hoc networks. In this study, we work on a practical security mechanism for ad hoc networks. To balance both security and performance, we evaluate different encryption/decryption algorithms suitable for ad hoc networks. We extend the 802.1X infrastructure mode security mechanism by adding X.509. We implement and test the prototype...
This paper proposes a new traffic-aware routing metric, PPTT, which considers both neighboring traffic and self-traffic interference jointly. Real time communication (RTC) over wireless multi-hop networks has two major challenges: strong QoS provision and severe interference in wireless networks. In wireless multi-hop net works, interference is the key factor impacting the network performance. Two...
The energy efficiency is a substantial key design issues in such networks. An efficient routing protocol is critical to prolong the life of sensor nodes. This work presents a hierarchical multiple-choice routing path protocol (HMRP) for wireless sensor networks. According to HMRP, the wireless sensor network is initially constructed as a layered network. Based on the layered network, sensor nodes...
Energy conservation (EC) is an important issue in the design of mobile devices that are characterized by limited battery energy. This paper concentrates on EC strategies for the MAC of the 802.11 WLAN. A novel architecture, which we call split FIFO-buffer architecture (SFBA), is proposed for the 802.11 MAC to achieve the goal of EC. Circuits of the SFBA are designed using the VHDL code. An Altera...
Physical devices are increasingly regulated by embedded computers rather than analog controllers. Embedded computers are essentially computational engines capable of sensing the environment, actuating physical devices, carrying out data analysis and planning actions. Embedded computers can thus enable machines to become intelligent and autonomous. The next technological revolution will follow from...
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme is quite similar to Hwang et al's scheme; the modified scheme is secure against the attack. The time complexity of computing the parameter a requires just one more modular multiplication...
Ubiquitous computing application scenarios include clients and sentry nodes in a smart space, where clients request for services from the sentries. Providing services is subject to context, which is information derived from the system and environment. These client-sentry interactions and the evolving context of the system dictate the behavior of the application. We provide a framework for rapid-prototyping...
Mobile ad hoc network (MANET) is kind of wireless networks architecture, which is an infrastructureless, autonomous, stand-alone network. Therefore, MANET can be flexibly and simply deployed in almost any environment. But it has a limited wireless coverage and limited connectivity that is exclusive to the MANET boundary. The growth of the Internet and its services and applications and the trend in...
The average level crossing rates (LCR) and the average channel capacity are evaluated for the correlated Nakagami fading channel with multi-branch antenna diversity and the maximal ratio combining (MRC). An upper bound and a lower bound on the average channel capacity are derived. Numerical results are presented to illustrate the performance of the correlated Nakagami fading channel using the spatial...
Sensing coverage is viewed as one of the critical measures of the performance offered by a sensor network. In previous studies, the sensing range of a node is generally assumed to be a determinate value in all directions. For most types of sensing signals emitted from a far field, the obstructions in the propagation path will induce an extra loss in the received signal power, and cause a large variation,...
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the complicated indoor environment, where the Global Positioning System (GPS) is not available. RFID technology makes the building up of indoor localization system with low cost possible. LANDMARC is an indoor localization system...
With recent advances in computer and communication technologies, computing systems find applications in large-scale control systems, including vehicular traffic control systems. An interesting observation for traffic control systems is that the coordination problem at intersections can be mapped to that of scheduling jobs in real-time systems. In this paper, we develop a real-time scheduling based...
RFID-enabled application is identified as a new breed of application that is capable of taking full advantage of RFID data collected in real-time fashion. There are some common capability exists among RFID-enabled applications. A basic architecture of an integrated software platform is described. It is a good practice to use an integrated software platform with support of these common capabilities...
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors by integrating controlled mobility to realize a networked system of mobile sensors that functions collectively as an integrated unit. The All-teRrain Advanced Network of Ubiquitous mobile Asynchronous Systems (TARANTULAS)...
Knowing available energy in each part of a wireless sensor networks (WSN) is undoubtedly essential information. A simple approach to achieve this would be for sensor nodes to periodically report to the sink node on their available energy. This approach is expensive however in terms of energy consumption. In this work we apply several sampling techniques for obtaining such information in WSNs. The...
In peer-to-peer (P2P) environments, trust is a very important issue when transactions/interactions occur between peers. In general, the trust evaluation on transactions/interactions relies on the recommendations from other peers, which may be inaccurate. This paper presents Dynamictrust, a P2P trust evaluation system. It is based on our peer trust evaluation model, which measures the credibility of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.