The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent past, researchers have shown a lot of interest in Under Water Sensor Networks (UWSNs) because of its application in wide range of domains. UWSN, actually a sub body of Wireless Sensor Networks (WSN), facilitate with radio communication with high-precision of information to a sink node from any of the source node. The Role of any-casting is of significant importance in the context of routing...
Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper,...
Internet of Things becomes one of the main trends in development of future networks. It introduces new challenges to network operator, like exponential growth of the traffic, large amount of network nodes to manage or variety of services. Some IoT services include the control of critical processes such as remote manipulation of a robotic arm in tele-surgery. In such processes, keeping very low end-to-end...
Flooding Peer-to-Peer (P2P) networks form the basis of services such as the electronic currency system Bitcoin. The decentralized architecture enables robustness against failure. However, knowledge of the network's topology can allow adversaries to attack specific peers in order to, e.g., isolate certain peers or even partition the network. Knowledge of the topology might be gained by observing the...
Nowadays, monitoring per-flow metrics, such as throughput and delay, in OpenFlow networks represents an important input to implement traffic engineering approaches. Per-flow monitoring mechanisms require to uniquely identify the complete network path followed by all the packets of the corresponding flow. For example, in order to measure path delay, monitoring mechanisms regularly inject probe packets...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
Real time monitoring and control of wind power farms (WPFs) require a high reliable communication network infrastructure. The WPFs monitoring and control can be guaranteed through the communication network by using redundant resources and quality of service (QoS) for different applications. In this paper, we study and simulate resilient network architecture for monitoring and control WPFs. The communication...
Surgical Site Infection (SSI) imposes a significant burden clinically and compromises patient recovery. Anastomosis in the gastrointestinal (GI) tract is a particularly challenging case where failure of the anastomosis can lead to leakage, resulting in an increase in mortality rates. However early diagnosis and intervention are hampered by a lack of continuous sensing and long diagnostic intervals...
With the deepening of wireless sensor network (WSN) applied in various services in smart substation, high data rate and quality of service has become the new research focus. For smart substation equipment condition monitoring, the paper designs clustered smart substation equipment monitoring network based on wireless sensor network. Reference to Zigbee protocol and IEC 61850 relevant regulations,...
In this paper, we investigate a distributed encirclement control problem of multi-agent systems. A neighbor-based rule is used to estimate the distributed center of all targets and make all agents encircle the targets. Finally, numerical simulation results are provided to demonstrate the obtained theoretical results.
The use of synchrophasor data for observation and control is expected to enhance the operation and efficiency of the next generation of power transmission systems. The synchropha-sor measurement data is usually transferred over public domain networks such as the Internet, thereby making it susceptible to a number of attacks. This paper focuses on packet dropping or gray hole attacks on networks carrying...
Wireless Sensor Networks (WSNs) are anticipated to become the preferred tools of choice for monitoring and controlling power utility assets in the smart grid due to their versatility. However, in some smart grid monitoring applications, data generation rates could fluctuate rapidly due to the sudden occurrence of critical faults or failures in the monitored equipment. As a consequence, critical data...
In recent years, Wireless Sensor Network (WSN) is considered as a potential solution for real time applications in industrial automatic control. However, there are several challenges to develop real time WSN due to its wireless nature, limited resources (power, processing and memory), low node reliability and dynamic network topology. Several researches have been carried out, but there has been little...
The Quality of Service (QoS) in smart grid communications especially in monitoring smart grid assets is becoming significantly important for emerging smart grid applications. Wireless Sensor Networks (WSNs) are expected to be widely utilized in a broad range of smart grid applications due to their numerous advantages along with their successful adoption in various critical areas including military...
In critical infrastructure monitoring applications, the packet arrival rates of a Wireless Sensor Network (WSN) may abruptly increase when cascaded failures are observed in the monitored environment. WSNs with cluster-tree topologies could experience excessive delays because of this increase in packet arrival rates. Therefore, there should be an optimum operating point in the network where the network...
In Wireless Sensor Network (WSN) based smart grid condition monitoring applications (e.g., the detection of a Partial Discharge (PD) event in high voltage transformers), network traffic dramatically increases when cascaded faults occur. Reliability and delay are among the main issues that are affected by this increase in the traffic rates. In this paper, we present an adaptive Quality of Service (QoS)...
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSNs are susceptible to various attacks, in which misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In misdirection attack, the intruder misdirects the incoming packets to a node other than the intended node. Due...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.