The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, wireless sensor network (WSN) achieved many accomplishments in theoretical studies and practical applications. However, WSNs are facing with many challenges, one of the biggest challenges that the energy source is limited and difficult to recharge. Clustering is the efficient technique used to extend the network lifetime through data aggregation. In this paper, we propose a new approach...
Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance...
Wireless sensor networks have scarce energy resources. Improvement in power saving and network lifetime is of great significance. Idle sensors do contribute to power consumption as good as the working sensors. Wireless communication systems power consumption and network lifetime can be improved if idle sensors are brought to sleeping state. We explored state of the art in sensor sleeping strategies...
Congestion is a problem of paramount importance in resource constrained Wireless Sensor Networks, especially for large networks, where the traffic loads exceed the available capacity of the resources. Sensor nodes are prone to failure and the misbehavior of these faulty nodes creates further congestion. The resulting effect is a degradation in network performance, additional computation and increased...
In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate Count, Sum) in spite of message losses...
Key management for wireless sensor networks meets new challenges due to its special properties. However, key distribution is a key problem for wireless sensor networks key management. In this paper, literature researches on WSN key distributions are reviewed at first, and the popular key pre-distribution schemes and protocols are analyzed. Then, a new key management scheme based on the novel cryptographic...
In a mobile ad hoc network, nodes that are close to one another may need to have exclusive access to a shared resource, which means that only one node can access the resource at the same time. This mutual exclusion algorithm requires nodes to communicate with only their current neighbors, this paper provides a solution to this problem and it is an extension to mobile networks of the dining philosopher's...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
In this paper, we propose a cross-layer optimization approach that exploits retransmission diversity in wireless CDMA communications. Conventionally, data packets that are not correctly detected are usually dropped. These dropped packets can be used to help data packet detection. By exploiting all the retransmitted packets, data packets can be correctly detected with higher probability. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.