The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most applications require high reliability with low delay in wireless sensor networks (WSNs). Unfortunately, it is a challenge issue to achieve reliable communication because of the lossy nature of wireless channels. In this paper, a novel unequal redundancy level (URL) data collection scheme is proposed to achieve high reliability for wireless sensor networks while long lifetime can be still guaranteed...
Wireless sensor networks have been studied extensively for their broad range of applications, especially in an environment with no infrastructure. And the nodes failures, link errors, and malicious node attacks are likely to occur quite frequently in wireless sensor networks. It affects the stability and reliability of data transmission. In this paper, we present a security fault-tolerant routing...
Intra-vehicular wireless sensor network (IVWSN) enables the integration of the wireless sensor network technology into the vehicle architecture through either eliminating the wires between the existing sensors and the corresponding electronic controller units (ECUs) or empowering new sensor technologies that are not currently implemented due to technical limitations. Ultra-wideband (UWB) has been...
A wireless sensor network (WSN) is composed of a large number of tiny sensor nodes. Sensor nodes are very resource-constrained, since nodes are often battery-operated and energy is a scarce resource. In this paper, a resource-aware task scheduling (RATS) method is proposed with better performance/resource consumption trade-off in a WSN. Particularly, RATS exploits an adversarial bandit solver method...
This paper is concerned with distributed estimation of a scalar parameter using a wireless sensor network (WSN) that employs a large number of sensors operating under limited bandwidth resource. A semi-orthogonal multiple-access (MA) scheme is proposed to transmit observations from K sensors to a fusion center (FC) via N orthogonal channels, where K≥N. The K sensors are divided into N groups, where...
One of the challenging issues in a distributed computing system is to reach on a decision with the presence of so many faulty nodes. These faulty nodes may update the wrong information, provide misleading results and may be nodes with the depleted battery power. Consensus algorithms help to reach on a decision even with the faulty nodes. Every correct node decides some values by a consensus algorithm...
When a wireless sensor network (WSN) is employed to monitor environmental data, efficient energy usage is demanded so that the WSN lifetime can be extended. In this context, we propose a distributed energy conservation algorithm (DECA). DECA considers the known past to make predictions on the measurement change over time in order to put sensor nodes into sleep mode, saving energy. Sensor nodes compute...
Target tracking applications in wireless sensor networks need to achieve energy efficiency, tracking accuracy, and certain real-time constraints in response to fast-moving targets. From a layer view, an energy-efficient cross-layer communication protocol that consists of a medium access control layer and network routing layer is necessary for joint optimization. Due to the interference and contention...
Jamming attack is a serious security threat in wireless sensor networks. Therefore, it is important to frame a mechanism to protect wireless sensor networks from various jamming attacks. Jammer intrusion detection and jamming detection are two separate issues. In this paper, a novel jammer detection framework to detect the intrusion of jammer and the presence of jamming in a cluster-based wireless...
With the development and widespread application of wireless sensor networks (WSNs), the amount of sensory data grows sharply and the volumes of some sensory data sets are larger than terabytes, petabytes, or exabytes, which have already exceeded the processing abilities of current WSNs. However, such big sensory data are not necessary for most applications of WSNs, and only a small subset containing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.