The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent enhancement of sensor devices, such as the Micro-Electro Mechanical Devices (MEMs) used for information collection and dissemination, has led to the emergence of the Internet of Things (IoT). This new paradigm overlaps with many research area such as the Wireless Sensor Networks (WSNs) where sensor nodes are deployed over an area to perform local computations based on information gathered...
Improvements to sensor devices including micro-electro mechanical devices that are used for information collection and dissemination has led to the introduction of Wireless Sensor Networks (WSN). Sensor nodes in a WSN are deployed over an area to collect data from the surroundings and to perform additional actions including data aggregation and storage, computations and data transmission to gateway...
Recent years, Vehicular ad hoc Network (VANET) attracts tremendous attention due to its broad application prospects. However, channel fading, frangible link, unstable network topology caused by vehicles' high mobility and strict requirements to the quality of service (QoS) have become major challenges of VANET. Many algorithms have been proposed to ensure a stable network topology and it has been...
Wireless Sensor Network (WSN) is considered as one of the networks that are usually used in a harsh environment. In most cases, a WSN consists of a large number of sensor nodes, which are deployed in a particular environment for the gathering of information, and for sending it to a base station (BS). Usually, sensor nodes have limited energy resources since it is impossible to recharge and change...
Fountain codes are a type of erasure codes which are characterized by their global acknowledgement and used as a solution to reduce the use of feedback channel as well as the number of transmissions and then minimize the energy consumption. With the multi-hop transmission, fountain codes raise the problem of overflow leading to a waste of energy, the most critical issue and the big challenge in the...
Energy efficiency is an active research area in WSNs technology. There is an extensive research work going towards this direction and existing mechanisms fail to address the problem completely due to its limited specificity. This work focuses on the idea of enhancing the network lifetime on the basis of cluster-heads (CHs) remaining energy levels. Thus, instead of changing CHs at every round for dynamic...
For dense ad hoc networks, clustering is an appropriate strategy for improving scalability. Moreover, dense networks such as public safety or military networks are also structured through a hierarchical organization via operational groups. This organization usually impacts both the mobility of nodes which move in group, and the data flow since the traffic is mainly intra-group rather than inter-group...
The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. In this paper, we propose a homogeneous and secure weighted clustering algorithm which is an extended version of our previous algorithm (ES-WCA) for mobile WSNs using a combination of five metrics. Among these metrics lie the behavioral...
This paper proposes a clustering algorithm for heterogeneous wireless sensor networks, addressing energy dissipation as a key issue. Energy dissipation required by sensor nodes to transmit data depends on the distance between sensor nodes and cluster heads or a base station. Clustering is one of the best techniques for reducing energy consumption and extending sensor network lifetimes. Desirable features...
In the area of network performance and discovery, network tomography focuses on reconstructing network properties using only end-to-end measurements at the application layer. One challenging problem in network tomography is reconstructing available bandwidth along all links during multiple source / multiple destination transmissions. The traditional measurement procedures used for bandwidth tomography...
We consider the problem of implementing transactional memory in large-scale distributed networked systems. We present and analyze {\sf Spiral}, a novel distributed directory-based protocol for transactional memory. {\sf Spiral} is designed for the {\em data-flow} distributed implementation of software transactional memory which supports three basic operations: {\sl publish}, allowing a shared object...
Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in WMANET and when a node leaves or joins it need to generate new session key to maintain forward and backward secrecy. This paper reviewed technological solutions for managing keys by divide the network into clusters...
Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices. The IEEE 802.11 standard provides at least three non-overlapping channels and thus it's possible for a node equipped with more than one network interface card (NIC) to operate on different channels simultaneously. This may increase the aggregate bandwidth available...
Network traffic classification is an essential component for network management and security systems. To address the limitations of traditional port-based and payload-based methods, recent studies have been focusing on alternative approaches. One promising direction is applying machine learning techniques to classify traffic flows based on packet and flow level statistics. In particular, previous...
Because the network connection information contains nominal and linear attributes, and linear attributes are divided into continuous and discrete attributes, the network connection information is the heterogeneous data. The heterogeneous distance functions are used to cluster data in this paper. The cooperative network intrusion detection based on semi-supervised clustering algorithm is proposed....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.