The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents wireless personal area networks with low transmission rate, utilized more and more often in industrial or alarm systems, as well as in sensor networks. The structure of these systems and available ways of transmission are defined by the IEEE 802.15.4 standard. The second part of the paper contains the description of simulation tests that have been realized. Their results make...
In this paper, the problem of clock synchronization is analyzed based on the two-way message exchange mechanism. In order to estimate the clock offset and the clock skew with unknown fixed delay, the maximum likelihood estimator (MLE) and a low-complexity estimator are proposed. Furthermore, their corresponding performance limits and complexities are analyzed. It is found that the MLE achieves the...
The duty cycle of a wireless sensor node is a key factor that determines the life time of a wireless sensor network. In general, sensor medium access control protocols reduce the duty cycle to achieve longer lifetime. However, we found out that their performance improvements substantially decrease under extremely low duty cycles (<0.1%). Our proposed W-MAC protocol targets achieving low energy...
There have been many time synchronization protocols proposed for sensor networks. However, the security problems related to time synchronization have not been fully solved yet. If malicious entities manipulate time synchronization, failures of many functionalities in the sensor networks would occur. In this paper, we identify various attacks against time synchronization and then develop a detection...
Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper proposes an attack-tolerant time-synchronization protocol (ATSP) in which sensor nodes cooperate to safeguard the time- synchronization service against malicious attacks. ATSP exploits the high temporal correlation existing among...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.