The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
The following topics are dealt with: data security; pattern classification; mobile computing; text-to-speech synthesis; user interfaces; Web services; medical computing; customer relationship management; optimisation; genetic algorithms; learning; data mining; computer aided instruction; software engineering; watermarking schemes; wireless sensor networks; educational administration; evolutionary...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
Selfishness detection is becoming a hot issue in mobile ad hoc networks and wireless sensor networks. We use Dempster-Shafer theory of evidence in a novel way to incorporate data-centric trust evaluation for detection of nodes' selfish forwarding behavior. Within the proposed D2S2T2 framework, trust is considered in regard to forwarding, as part of routing support, as well as in regard to recommendations,...
A lot of research has been done in finding range-based methods such as computing RSSI, time of arrival, angle of arrival or time difference of arrival and range-free methods such as centroid computation, DV-hop and approximate position in triangle, for localization in wireless sensor networks. Range-based methods estimate location more precisely than range-free methods. However, range-free methods...
Wireless sensor networks (WSNs) have been of high interest during the past couple of years. One of the most important aspects of WSN research is location estimation. As a good solution of fine grained localization Reichenbach et al. introduced the distributed least squares (DLS) algorithm, which splits the costly localization process in a complex precalculation and a simple postcalculation which is...
Providing forward and backward secrecy is still a big challenge in unattended wireless sensor networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic encryption and key-evolution based scheme for efficient and secure data storage, which supports both forward and backward...
This paper addresses the problems of barrier coverage and sweep coverage in a corridor environment by a network of self-deployed mobile autonomous sensors. Using the ideas of nearest neighbor rules, we propose a decentralized motion coordination algorithm for the sensors to solve the coverage problems. Numerical simulations illustrate the effectiveness of the proposed algorithm. The results in this...
In sensor network applications, data gathering mechanisms, which are based on multi-hop forwarding, can be expensive in terms of energy. This limitation challenges the use of sensor networks for applications that demand a predefined operational-lifetime. To avoid this problem, using of mobile element (ME) as a mechanical data carrier has emerged as a promising approach. However, practical considerations...
Aiming at the problem of limited resource and unbalanced load in WSN, the paper proposes a novel role switching management mechanism by importing mobile agent. The sensor nodes can be scattered freely, which adapt actual military situation. We design a mobile agent immigrating randomly and working method among inner-cluster and inter-cluster, meanwhile put forward 'inner-cluster role table' and 'inter-cluster...
The mobility of nodes with a purpose called as robotic-mobility is used for replenishing energy to strategic military applications. Assuming a CDS based backbone in place, we give a technique of maintaining the location of mobile node for a given topology setting. We show that using a weighted CDS reduces the maintenance of location updates for mobile node. The complexity of our mobile-node maintanence...
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network consists of resource-rich mobile sink node and resource-constrained sensor nodes forming a square grid. Sink may be multihop away from the sensor nodes and in order to collect the data,...
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead, energy efficiency and detection probability are the main technical concerns for any replication detection protocol...
Recently, wireless sensor networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies...
Data forwarding in the wireless networks typically employs a sender-oriented approach in which the next hop node is pre-selected based on neighbor or network information. This method incurs large overhead when accurate information is needed for making the optimal forwarding decision. In this paper, a receiver-oriented robust data delivery scheme (RRDD) is proposed for mobile sensor networks. In RRDD,...
In this paper we proposed a new approach for improving distribution and coverage of mobile sensors in a target filed. The goal is to deploy sensors such that a target area is optimally covered by them. Proposed method works based on number of neighbors. The nodes which have the minimum overlaps with its neighbors start to move away according to summation of forces from their neighbors, boundaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.