The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The traffic characteristics of Internet of Things and machine type devices differ significantly from that of smart phone applications. The connection oriented approach in Long Term Evolution (LTE) that involves establishing a bearer prior to data transmission is inefficient for small burst traffic because of the signaling involved. We propose a connectionless access method for efficient small burst...
Wireless sensor networks (WSNs) are increasingly becoming preferred in global applications. Due to the top features of the resource-constrained and battery-aware sensors; in WSNs energy use has found to be a key fascinating subject of research. WSNs composed of battery-powered nodes that happen to be connected with the base station to help for several measures and also task. Since sensor nodes will...
Using energy efficient way transmission is very important for extend the life of the sensor network. LEACH is a based on cluster protocol, it uses the local cluster random rotation mechanism will be the energy load is evenly distributed to all sensor nodes in the network. The cluster head will be collected and fusion data for base station. This paper proposes an improved scheme, using the random clusters...
Wireless sensor networks consist of small battery powered devices with limited energy resources. The small sensor nodes are usually inaccessible to the users due to their remote deployment. Non functioning of any sensor due to its loss of battery power not only deteriorates the network performance but also a challenging job for replacement of energy source. Hence, energy efficiency is a key design...
Wireless sensor networks are susceptible to clone attack due to open deployment of sensor nodes in hostile environment and lack of physical shielding. Node clone is an attempt where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network...
This paper focuses on the simple radio frequency transceiver model of the sensor node. We have combined the effect of realistic analytical model with the HEED and H-HEED protocol for wireless sensor network. Under this impact, the performances of the HEED and H-HEED protocol have been evaluated.
The strong development of the Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. In this vision e-health applications are one of the most promising applications in IoT. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected...
Based on LEACH Protocol, an improved LEACH Protocol (LEACH-H) is proposed based on Genetic Algorithm (GA) in this paper. The weight values of the three influencing factors--the current residual energy of nodes, the number of the neighbor nodes and the distance between nodes and base station are used as its optimization variable. The maximum lifetime of the first and half of the nodes is used as the...
Wireless sensors are small devices that have the functions of sensing, communicating, and information processing. The critical issue among Wireless Sensor Networks is energy efficient utilization of sensor nodes in order to enhance the network survivability. This paper proposes a protocol i.e. (Distance Adaptive Threshold Sensitive Energy Efficient Sensor Network) DAPTEEN based on Threshold-Sensitive...
In this paper, a cognitive machine-to-machine (M2M) communication network is considered, in which a cellular network shares the spectrum with the M2M communication network with M machine-type devices (MTDs), one half-duplex relay, and one MTD gateway for data gathering. One key challenge is that in the future 5G wireless networks, there will be billions of those small MTDs, and therefore, a MTD selection...
In this era wireless technology gaining more popularity, people prefer wireless communication over wired communication due to mobility, scalability and ease of access. However, the traditional wireless network is complex, vendor dependent and inadequate feasibility to incorporate new services, protocols, and APIs. The rapid growth in wireless network raises many thoughtful challenges for network and...
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes...
Sleep scheduling mechanisms have been widely used in wireless sensor networks so as to extend the lifetime of networks. Sensors are able to decide to be either in active or sleep mode to save the energy. Sensing coverage area is an important factor for some applications such as Intrusion Detection. It is necessary to have the full-sensing-covering set of active nodes on these applications. In this...
Recent trends in wearable applications demand flexible architectures being able to monitor people while they move in free-living environments. Current solutions use either store-download-offline processing or simple communication schemes with real-time streaming of sensor data. This limits the applicability of wearable applications to controlled environments (e.g, clinics, homes, or laboratories),...
As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation between successful data delivery ratio and transmission...
The primary issue in Wireless Sensor Networks (WSNs) is to minimize energy consumption to extend network lifetime. Generally, sensor nodes are distributed randomly. Clustering technique helps to prolong the lifetime of a sensor network. It can also increase network scalability. In these networks, a few nodes are elected as Cluster Heads (CHs) whose main goal is to aggregate data from member nodes...
Wireless Sensor Network is a network of small battery powered sensing devices (known as sensing nodes), capable of sensing the physical parameters like temperature, humidity, pressure, motion, etc. from its environment of deployment and report it to a central node called base station. These nodes collaborate with each other to fulfill their task. As the energy source is constrained in WSNs, it should...
Energy efficiency is resent issue in wireless sensor network (WSN). Hierarchical routing or Clustering is best solution for reducing energy consumption in WSN. LEACH (Low energy adaptive clustering hierarchy) is good hierarchical protocol. There are many protocols introduced based on LEACH but still have issue of energy efficiency. Lots of research is going on CH (cluster head) election algorithm,...
This research expands the scope of wireless sensor network (WSN) optimization from single objective to multi objective optimization. It introduces a WSN's energy-aware and coverage preserve hierarchal clustering and routing model based on multi-objective bat swarm optimization algorithm. Two objectives are taken into consideration; coverage and nodes residual energies. The proposed model optimizes...
Wireless Sensor Networks offer several applications but limit in their energy resource. Efficiency and lifetime of these networks depend on the proper use of their energy. Energy in these networks can be efficiently consumed using mechanism of clustering. Any clustering mechanism depends upon the criteria used in the cluster head selection. In order to select a Cluster Head, this paper presents a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.