The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A neighborhood area network (NAN) is part of the advanced metering infrastructure (AMI) in smart grid. A NAN is considered as the last-mile connection in AMI from the metering data management system (MDMS) to the customers, and is widely adopted to apply wireless technologies. In this paper, we propose a NAN design which is powered by green energy and rechargeable batteries for flexible and low-cost...
In the recent past, we witnessed to a dramatic growth of networks with a huge number of interconnected wireless nodes exchanging large amounts of information. This has brought to the need of ad-hoc, energy-aware protocols suitable for low-power and lossy networks. Among these, Routing Protocol for Low Power and Lossy Networks (RPL) is surely one of the most interesting ones. It chooses the optimal...
A Mobile Ad hoc Network (MANET) consists out of a collection of mobile nodes capable of sending and/or receiving wireless communications. MANETs are generally unstructured networks with no centralized administration. MANETs use routing algorithms to establish routes among nodes. This unstructured nature presents the opportunity for misbehaviour among nodes. Trust based MANET routing protocols have...
In recent years group-oriented services are one of the primary application classes that are addressed by Mobile Ad hoc Networks (MANET). To support such services, multicast routing is used. Multicast routing is the simultaneous delivery of data stream to multiple destinations without sending duplicate copies over any one link with the objective of resource optimization. It can significantly improve...
Large scale wireless sensor networks, consisting of thousands of nodes spread over a large geographical area, are being planned for a number of monitoring and control applications. The individual nodes in such networks would be severely limited in their capabilities - they will have limited memory and CPU resources and would typically run on batteries. A suitable routing protocol for large wireless...
Sensor networks are wireless networks with peculiar properties that require specific attention to be properly managed if their performance and dependability have to be taken care of. In fact, both the usually hard environmental conditions where sensors are deployed and the scarcity of node resources determine overall critical working conditions that dramatically impact on parameters such as reliability,...
Position based routing protocols are kinds of routing protocols, which use nodes location information, instead of links information to routing. In position based routing protocols, it supposed that the packet source node has position information of itself and it's neighbors and the packet destination node. Greedy is a very important position based routing protocol. In one of it's kinds, named MFR...
In wireless sensor networks, both real time and reliable transmission are the big research challenge. But current approaches in these research fields have not been well explored because there are so many restrictions on respective sensor node. In this paper, we propose a new reliable real time routing protocol in sensor networks. For real time delivery, we introduce a time-based forwarding scheme...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.