The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Optimization Wireless Sensor Network (WSN) is necessary to reduce redundancy and energy consumption. To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed. Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data...
In wireless sensor networks, the clustering routing protocol is commonly used for energy efficiency. However, routing protocols without proper security suffer from many security vulnerabilities. Hence, a key renewal scheme based on the clustering routing protocol is proposed. To apply the key renewal scheme with sensor authentication, sensor nodes are first authenticated during the key establishment...
Due to the diversification in application and very challenging characteristics the Wireless Sensor Networks (WSN) considered to be an important and fast growing technology in the field and hence it gains attention from the researchers. While focusing on the advancement in the development of technology, the energy efficiency and effective computation methods plays a crucial role in determining the...
Due to their limited software and hardware capabilities, wireless sensor nodes are vulnerable against radio jamming. This becomes even worse if energy-efficient jamming is achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent or restrict the jamming. However, due to the nature of the MAC (Media Access Control) protocols, the jammer may take advantage and...
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. In this paper, we present performance requirements architecture of upper and lower layers design for WSNs. Our goal is to develop a framework that provides parameter requirements that are crucial to applications in WSNs, which are vulnerable to physical...
Selective encryption for video streaming was proposed for efficient multimedia content protection. However, the issues on joint optimization of video quality, content protection, and communication energy efficiency in a wireless sensor network (WSN) have not been fully addressed in the literature. In this paper, we propose a scheme to optimize the energy, distortion, and encryption performance of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.