The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Telesurgical Robot Systems (TRSs) address mission critical operations emerging in extreme fields such as battlefields, underwater, and disaster territories. The lack of wirelined communication infrastructure in such fields makes the use of wireless technologies including satellite and ad-hoc networks inevitable. TRSs over wireless environments pose unique challenges such as preserving a certain reliability...
Due to very sensitive and crucial nature of the collected data, any wireless sensor network (WSN) has to handle efficiently securing it as well as to employ energy-aware and delay-sensitive algorithms in its all layers from application to the physical. These key topics strictly related to each other are of high importance for building and maintaining reliable and long-lasting WSN applications. However,...
Mobile nodes must authenticate themselves in order to use network services. When mobile nodes roam into a new cell, they must re-authenticate to the new layer 2 and 3 devices. This re-authentication process can take as long as two seconds, which is unacceptable for applications such as voice over IP. In this article we present several recently developed authentication protocols that can reduce the...
The increasing popularity of WLANs-due to the use of license-free radio spectrum with low-cost, easily deployable and high-data-rate wireless services- has encouraged service providers to consider deploying them in high density usage areas, such as public hotspots, to provide complementary broadband access to their networks and services. This article proposes a Session Initiation Protocol based QoS...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In order to be able to evaluate the performance of the adversary, we define a set of security guarantees and requirements for an intrusion detection system and precisely define an...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Wireless sensor networks consist of a large number sensors spread across a given geographical area. Each sensor has its own communication capability as well as certain level of intelligence for signal processing and networking. As the sensor nodes are densely populated, communication range requirement for these nodes is smaller. After signal detection, a number of sensor nodes communicate over the...
This paper discusses the problem of achieving bandwidth and energy-efficient neighborhood group key distributions (NGKD) in tactical wireless sensor networks (TWSNs). We present new techniques that improve NGKD performance while also improving the resilience of TWSNs against attacks that combine node capture with message interception. This is accomplished without introducing additional communications...
The use of mobile phones and PDAs are increasing by the minute and the user demands and needs are also increasing. Usage of SIP protocol is also increasing. Thus combining the two by creating applications comply with the demands and needs of the mobile phone and PDA users and industry. This paper illustrates and describes a way of developing User Agents for wireless devices, such as handsets and PDAs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.