The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Infrastructure monitoring is an important class of wireless sensor network (WSN) applications. When the topology of a WSN designed for infrastructure monitoring is linear in nature, such as bridges, highways and pipelines, this kind of WSN is known to be linear WSN (LWSN). To achieve the high-reliable infrastructure monitoring services, hybrid LWSN has been designed where a limited number of support...
Data muling using UAVs/drones is currently emerging as an alternative to the traditional traffic engineering techniques used in wireless sensor networks, when wireless communication is not an option or the least cost-efficient solution. This paper revisits the issue of traffic engineering in Internet-of-Things (IoT) settings, to assess the relevance of using UAVs for the persistent collection of sensor...
Wireless sensor networks (WSNs) are usually deployed in insecure remote and open environments. Nodes could be attacked and compromised. The attacker can use compromised sensor nodes to disrupt communications or inject misleading sensor values. Misleading data can corrupt the entire decision making process, which depends upon WSN data. We propose a trust mechanism, which evaluates communication trust...
5G and Internet of things (IOT) develop rapidly, but the major applications of IOT-wireless sensor networks(WSNs) have numerous data, resulting in serious transmission load. In order to reduce the number of transmitted packets, this paper focuses on data aggregation for WSNs and proposes a novel event-based data aggregation mechanism using both principle component analysis(PCA) and support vector...
In the Internet of Things (IoT), small-scale embedded devices monitor and control real-world objects with different kinds of sensors and actuators. Often, devices communicate measurements and states using proprietary encodings, with the benefit of having all data stored in a central location, e.g., the Cloud. The drawbacks are that all data needs to be collected in advance, even if it is not used...
Sensor nodes are inherently unreliable and prone to hardware or software faults. Thus, they may report untrustworthy or inconsistent data. Assessing the trustworthiness of sensor data items can allow reliable sensing or monitoring of physical phenomena. A provenance-based trust framework can evaluate the trustworthiness of data items and sensor nodes based on the intuition that two data items with...
Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In this paper, a trust management model for centralized...
In this paper, we address the maximal lifetime scheduling problem in sensor surveillance systems with directional sensors. The sensors are directional in sensing objects (or watching targets) and their sensing orientations can be adjusted dynamically. Given a set of sensors and a set of targets in a plane, each target needs to be watched all the time and a sensor can watch all the targets within its...
Recent advances in technology realize small devices which have been enabled wireless communication among sensors. Wireless sensor network is used for monitoring such as environment, earthquake and disaster. In sensor network, real-time end-to-end data communication is very important. If we use traditional First Come First Serve(FCFS) scheduler, which needs a lot of time to send if a packet generated...
The unplanned and random deployment of a Wireless Sensor Network (WSN) may impose a high node density on a specific region. This concentration can be exploited by density control mechanisms to increase network lifetime, by deactivating temporarily redundant sensor nodes. Previous approaches for density control in WSN focus in guaranteeing full sensing coverage of monitoring area. This work presents...
Recently, wireless sensor network has been widely used in many sensing applications. In these applications, skyline cube, as an important operator for data analysis, plays a more and more important role. Though skyline cube computation has been well studied in traditional database literature, the existing approaches are not directly applicable to sensor environment due to the traits of wireless sensor...
In the field of mobile wireless communication, energy efficient protocols are crucial in order to ensure a widespread use of wireless technologies. These protocols determine the sending strategy, i.e. the decision when, where and how much data is transmitted, as well as the packet size and field strength of the sending antenna. We defined a model for the energy household of smart sensors, who are...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.