The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The MIL-STD-188-220 is the military tactical wireless mobile ad-hoc communication standard which makes a smooth data and voice communication possible. This standard is known as the Interoperability Standard for Digital Message Transfer Device Subsystems. However, the standard has the problem to generate the meaningless traffic due to the failure of topology update, in the case of transmitting the...
Node placement plays a significant role in the effective and successful deployment of Wireless Sensor Networks (WSNs), i.e., meeting design goals such as cost effectiveness, coverage, connectivity, lifetime and data latency. In this paper, we propose a new strategy to assist in the placement of Relay Nodes (RNs) for a WSN monitoring underground tunnel infrastructure. By applying for the first time...
A critical aspect of applications with wireless sensor networks is network lifetime. Sensing and communications consume energy particularly in wireless multimedia sensor networks (WMSN) due to huge amount of data generated by the multimedia sensors. Therefore, judicious power management and sensor scheduling can effectively extend network lifetime. In this paper we consider the problem of scheduling...
Solutions for Vehicular Ad-Hoc Network (VANET) are challenging due to the intrinsic nature of the network which involves, by definition, node mobility, scarce or null fixed nodes and, at the current state of art, lack of solutions for the real-time tracking of positions. Moreover VANETs are meant to provide primarily a solution for the improvement of road safety, by the proper forwarding of messages:...
Broadcast is a critical component in ad-hoc wireless networks. Some vehicular network (VANET) applications in particular use broadcast communications extensively. VANETs exhibit a wide variety of node density and distribution patterns, so broadcast protocols designed to support these applications must be adaptive to those conditions. We show that the distance method of statistical broadcast can be...
Wireless Sensor networks (WSN) have become a focus of research in the last few years. WSN is composed of small battery-powered devices that has sensors and wireless communication capabilities. Energy management is one of the key issues in WSNs because it directly impacts the network life-time. In order to overcome this restriction, several energy-efficient approaches for different layers have been...
A Wireless Video Sensor Network (WVSN) consists of a set of sensor nodes equipped with miniaturized video cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. In this paper, we study the problem of coverage by video sensors in randomly deployed WVSN. We focus on the performance of various fast cover set construction strategies...
Reliable data transfer (RDT) is one of the key issues in wireless sensor networks (WSNs) and can be achieved by using link-level re-transmissions and multi-path routing. Another key issue is the scalability of WSNs. In this paper, we try to better understand and characterize/quantify the relationships between reliability and scalability, and identify possible design options for the future RDT protocols...
Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replicas back into the network for further malicious activities. Although a number of protocols have been proposed to tackle such node replication attacks, few of these schemes are suitable...
Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining a certificate management...
Space division multiple access aided orthogonal frequency division multiplexing (SDMA-OFDM) is a promising technique for high data rate future wireless communications. In this paper, a minimum bit error rate (MBER) differential evolution (DE) algorithm based multiuser detector (MUD) for SDMA-OFDM system is proposed. The proposed algorithm directly minimizes the bit error rate (BER) cost function by...
Wireless mesh networks usually deploy multiple gateways to enhance the capacity. This paper studies how to maintain forwarding paths in 802.11s wireless mesh network. A Multi-Gateway Multipath routing protocol (MGMP) is proposed to explore path diversity. MGMP constructs multiple paths between source and destination using a proactive tree architecture as HWMP. In order to make MGMP more efficient,...
Live monitoring of athletes during sporting events can help maximise performance while preventing injury, and enable new applications such as referee-assist and enhanced television broadcast services. A major challenge is the extraction of athlete physiological data in real-time, since the radio range of body-worn sensor devices is limited, necessitating multi-hop routing mechanisms. However, little...
In this paper we propose a system architecture for telemonitoring system. The proposed architecture is not limited to only indoor environment. By employing a mobile phone that implements a personal server, the system also supports the monitoring of old people while away from home. In addition to the system architecture, we also propose the middleware architecture for the personal server and the cross-layer...
The IEEE Wireless Access in Vehicular Environments (WAVE) family of standards is the leading worldwide standardisation effort in terms of Dedicated Short Range Communications (DSRC). WAVE aims at defining a common set of requirements and functionalities, in order to enable intercommunication and interoperability between nodes in a Vehicular Ad hoc Network (VANET). Despite the concept of service as...
Vehicular Communication Networks (VCNs) provide a promising communication platform for Intelligent Transportation System (ITS) services as well as for value added services in different road systems. Despite the high demand on test fields for VCN related technical solutions and services, there are currently very few test fields for the immense requirement on test and R&D activities. Moreover, the...
Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) has recently been introduced to avoid coded-OFDM's high decoding complexity. Various sub-optimal ZP-OFDM receivers have been developed in the literature to tradeoff performance with implementation complexity. In this paper, we propose a new iterative detection scheme for ZP-OFDM transmissions tailored to broadband cooperative networks...
Privacy and security are two important issues in vehicular networks. Users wish to maintain location privacy and anonymity, meaning the identity, location/direction of move of their vehicles remains unknown to everybody with possible exception law enforcement authorities responsible by law to know and maintain such private information. In this paper, we propose a Pre-broadcast based Time Efficient...
The tremendous growth in mobile and wireless communications comes with more pervasive applications. Current mobile device platform does not allow a local or remote user to attest the target platform. The limitation of using existing software-based protection alone can be easily affected by malicious codes and it cannot assure its own integrity. In this paper, we explore a new approach of anonymity...
Wireless networks are characterized by having limited resources accessed by a large number of mobile stations with distinct capabilities. In such challenged environment the dynamic control of resources is of major importance to mitigate the limitations of wireless networks, such as the impact of low data rate stations and wireless channel oscillations. Such augmented usage of wireless resources can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.