Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this document, a protocol LEACH-1R meant for energy efficient & mobility aware congestion control is provided for MWSN. A LEACH-1R that transforms the LEACH by making use of first clustering round & performing the inter-cluster choosing of new CHs (cluster head) rather than aggregated reclustering. A MWSN is termed as a set of wireless mobile nodes & base station that generates an ad-hoc...
In smart factory applications, sensors, actuators, field devices, and supervision systems often require a high degree of reliability and timeliness in information exchange. The quality of service provided by the underlying industrial communication network is a key requisite for quality of control. In this context, the WirelessHART, ISA100.11a, and IEEE802.15.4e time-slotted channel hopping standards...
The Internet-of-Things (IoT) envisions a world where billions of everyday objects and mobile devices communicate using a large number of interconnected wired and wireless networks. Maximizing the utilization of this paradigm requires fine-grained QoS support for differentiated application requirements, context-aware semantic information retrieval, and quick and easy deployment of resources, among...
Some key features of the end-systems impact on the way communications happen within the IoT: available objects' resources are limited, different objects may provide the same information (e.g. sense the same physical measure), the number of nodes in the IoT is quickly overcoming the number of Internet hosts with greater reliability issues. This entails for a new paradigm of communication with respect...
This paper presents a new way of providing privacy for Internet of Things (IoT) in a multi-trust-domain environment. The key idea is to develop a privacy-aware slotted channel access mechanism using which IoT nodes from multiple operators or trust domains can share wireless channel without mutually exposing their identities, thus alleviating threats from cross-trust-domain traffic analysis geared...
In a technology where multiple networks are often deployed in concurrency, significant resource underutilization is witnessed in Wireless Sensor Networks (WSNs). As the manufacturing and deployment costs drop, multiple networks are introduced in overlapping vicinities to satisfy new functional requirements. Mostly with dedicated goals and deterministic operation schemes, practitioners seldom investigate...
The complexity of handling multiple - often conflicting - tasks, coupled with the collaboration required by wireless sensor network (WSN) nodes to accomplish such tasks, exacerbate concerns about the effectiveness and longevity of the network. Handling multiple dynamic contexts and offering autonomic context-aware WSN management are severely limited by the network's resource constraints. This may...
In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper, we refine slot allocation to the nodes in dynamic convey tree and design an energy efficient MAC protocol called D-TDMA, which avoids collisions and interferences and allocates contiguous...
IEEE 802.15.4 standard is designed to achieve low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). For the sake of reducing the control overheads, the modified CSMA/CA protocol used by 802.15.4 does not have the hidden device protection mechanism, such as RTS/CTS mechanism. Previous studies indicate that the probability of any two devices in a infrastructure...
Addressing is an important research topic for wireless sensor networks (WSNs) because addressing makes it possible to guarantee basic levels of network communication, such as unicast. Addressing approaches focus on dynamic autoconfiguration of addresses to sensors. A large variety of schemes have been presented, whereby different schemes typically focus on different performance metrics. This paper...
We propose a new type of wireless sensor network system named die-hard sensor network. Conceptually, this system performs continuous monitoring without any maintenance, even if some sensor nodes die. A significant difference between our system and the ordinary wireless sensor networks is that each sensor node in our system should have an automatic sensing-function alternation mechanism in addition...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
In this paper, we address the issue of transmission power control (TPC) in wireless ad hoc networks. Power control plays an important role in energy saving and network performance enhancement. However, the existing TPC schemes either face the problem of hidden and exposed terminal or have additional hardware requirements. We propose a novel distributed power control protocol, called Receiver Initiated...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.