The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
A Flying Ad-hoc Network (FANET) is a wireless ad-hoc network specifically designed for the communication of Unmanned Aerial Vehicles (UAVs). Multicast routing is one of the vital aspects in wireless ad-hoc networks. Research works have been proposed to tackle the challenges in multicast routing in ad-hoc network environments with multi-hop communication. Nevertheless, the conventional multicast routing...
We consider the problem of group secret key generation through a multi-hop network modeled by a pair-wise independent network and propose a low complexity scheme which can guarantee strong secrecy. We assume that the legitimate transmitter only has the knowledge of the maximum number of precoded keys known to any helpers, where the precoded keys are the output of a precoder at the transmitter to be...
In this poster, we consider software-defined wireless sensor networks (SDWSNs) and present a lightweight flow management to reconfigure flow entries in flow-table when link fault occurs in the data plane of SDWSNs.
Aggregating common-path network flows (in the network interior) helps in improving the applications delivery performance. From the network edge perspective, the sender and receiver-ends of the respective applications need to have a typical one-to-one mapping. An aggregation framework in the network therefore needs an effective forking to maintain the one-to-one mapping of the flows. In this demo,...
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
Opportunistic Networks have been designed for transmitting data in difficult environments, characterized by high mobility, sporadic connectivity, and constrained resources. To sustain these networks, the literature describes methods such as Epidemic and Spray&Wait, which do not learn from the network behaviour, and Gossiping-based algorithms that collect historical network data to improve efficiency...
Wireless Sensor Networks need energy efficient protocols for communication and data fusion to consolidate data and prolong the lifetime of the network. In this paper, an adaptive hierarchical clustering and routing method has been proposed. This clustering and routing method is based on maximum bottleneck energy routing (MBER) from a node to the sink. This method favors the routes with the highest...
Due to the constraints of satellite platforms and Inter-Satellite Links (ISL), very limited ISLs can be equipped on the satellites, making the ISLs intermittently available. Meanwhile, the Ground-Satellite Links (GSL) are also intermittent due to the rotation between the constellation and the earth. Intermittent connectivity of both ISLs and GSLs makes the satellite constellation network a typical...
Spectrum sensing is one of the most mandatory mechanisms of Cognitive Radio (CR) to find the unused Spectrum. Spectrum sensing has renewed on a very active scrutiny area over recent years. As it is one of the most important tasks performed using cognitive radio and the implementation of the other functions of the cognitive radio is based on the spectrum sensing. So it is mandatory for cognitive radio...
We consider wireless sensor networks (WSN) powered by energy harvested from the environment, which is assumed to be sporadic and random in nature. Wireless nodes in such networks experience random active and sleep periods depending on their energy availability, leading to intermittent connectivity in the network. This paper addresses the problem of minimizing the multi-hop transmission delay in such...
This paper, addresses to the issues arising during the application of ITS. In this context, a study is done about chain collision and Intelligent Traffic Light Systems (ITLS). There is a need for these methods because nowadays, traffic causes traffic congestions which remain for long that is generally due to the inefficient management of road congestions. Vehicular Ad hoc Networks (VANETs) is a rising...
Even in the absence of a physical network infrastructure, it is important that mobile devices can take advantage of the opportunities presented to them to maintain communication. Opportunistic networks are a class of mobile networks that must rely on unscheduled sporadic meetings between nodes to achieve communication. The main challenge in these networks is to route messages towards a destination...
Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way since the energy is limited. The clustering algorithm is a technique used to reduce energy consumption. It can improve the scalability and lifetime of wireless sensor network. In this paper...
In the era of the Internet of Everything, users with handheld or wearable devices equipped with sensing capability have become producers as well as consumers of information and services. The more powerful these devices get, the more likely it is that they will generate and share content locally, through ad hoc opportunistic connectivity, leading to the presence of distributed information sources and...
In this work, an energy efficient routing technique for WSNs is introduced. Here the routes between the source nodes and the base station are formed considering the energy levels of the intermediate nodes. These routes are refreshed dynamically to recover topology changes and to keep the energy level of the nodes close to each other. The technique introduced together with data aggregation are implemented...
Future dynamic wireless and online social networks will require more agile and efficient infrastructures to support the anticipated user traffic and service requirements. In response, in this work, we propose a novel spectrum-agile resource allocation approach that combines Markov Random Field (MRF) cross-layer decisions for the allocation of resources at the lower protocol layers with Back-pressure...
With the rapid increase in deployment of smart meters across North America, utility resources such as water, gas and electricity consumption data is being collected at a much higher granular level. The huge amount of data is being used to make demand-response applications smarter. A large part of this deployment of smart utility networks and Advanced Metering Infrastructure (AMI) is being done using...
Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols...
Passive attacks have caused a great threat to Wireless Sensor Networks (WSN), therefore the research of communication nodes and the stealthiness of communication relationship is crucial. Due to the problem of node hidden mechanism, a secure anonymous routing named Node-Uncorrelated Pseudonym Pairwise Mechanism (NUCPP) is proposed in this paper. Instead of using the traditional pseudonym node correlation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.