The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents considerations of using wireless sensor networks for monitoring conditions within wind farms, taking into considerations the specific of such applications. In these scenarios, which are intended to cover a lot of ground or even operate in difficult radio environments with strong attenuation, the simple and direct communication between source and destination is not always possible,...
Wireless Sensor Networks (WSN) are low power networks which have many small nodes. The nodes are low power sensors interconnected to each other to receive and transmit data from source to sink. By the transferring of data, the power of these nodes reduces and eventually the system dies. In this paper we introduce an efficient load sharing routing technique to increase the life time of all the nodes...
Triage is a emergency life-saving process to prioritize patients based on severity of their condition in disasters. Triage has been introduced to medical treatment scenes in recent years. In Triage, patients are classified into 4 groups according to their priority based on their condition. Researches of emergency life-saving systems to monitor and collect patients' location and changes of their condition...
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides...
In this paper, we propose a dynamic route construction method based on measured characteristics of radio propagation in a real environment. Our method first measures characteristics of radio propagation for each link, and determines a communication route from every node to the sink node and its transmission power based on the measured characteristics. While operating the system, our method dynamically...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Wireless sensor networks (WSNs) are applied to various applications, ranging from military to civilian fields. Due to the critical nature of such applications, security issues are of significant importance. WSNs are vulnerable to different types of attacks since they are often deployed in hostile and unprotected environments. In this paper, we present a novel distributed intrusion detection approach,...
Agro-meteorological parameters monitoring plays an important role in orchard management. For a project named `Digital Orchard' funded by local provincial government of China, a wireless sensor network was designed and developed with the aim of remote real-time monitoring and collecting of soil and atmospheric data. The system utilizes a wireless technology for data communication and data transmission...
We investigate link-state advertising in multi-domain networks with dynamic traffic. A novel triggering scheme is proposed to monitor a subset of domain links, and thereby achieve a balance between salability and accuracy.
This paper presents a cross-platform solution of smartphone-based mobile sink for wireless sensor networks, named uSink. With a cross-platform SD card, named uSD card, any smartphone with SD interface can be empowered with the capability to communicate with wireless sensor nodes. Furthermore, a middleware on mobile phone, named uSinkWare, is also designed to provide a typical mobile sink's functionalities,...
It is important that balancing the node's energy consumption effectively in wireless sensor network. We propose a novel double cluster-head routing policy based on clustering hierarchy routing. According to balancing the number of neighbor nodes, surplus energy and distance weights, we adopt first and second cluster-head mode. Cluster heads are responsible for data collection and transmission respectively...
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting. By eavesdropping the sensor nodes' transmissions and tracing the packets' trajectories in the WSNs, an adversary can capture the location of a source or sink eventually. Thus, the location privacy of both source and sink becomes a significant issue...
In this paper we explore the mobility of a mobile sink in a wireless sensor network (WSN) to prolong the network lifetime. Since the mechanical movement of mobile sink is driven by petrol and/or electricity, the total travel distance of the mobile sink should be bounded. To minimize the data loss during the transition of the mobile sink from its current location to its next location, its moving distance...
Since we are not able to replace the battery in a wireless sensor network, energy and lifetime are the most important parameters. Common sensors are not able to connect directly with the central station due to their limited ranges in asymmetrical wireless networks, therefore, we utilize super nodes. A super node has more energy, processing power and a wider range of communication. It does connectivity...
Internet is known as the net of networks. It is a huge decentralized network composed by smaller inter-connected networks named autonomous systems (AS). The autonomous systems's interconnection is done by the Border Gateway Protocol (BGP). Several tools have been proposed to monitor BGP problems. Even though there is no long term indicator to rank Internet routes's health based on long term BGP problems...
This paper examines the possibility of MPLS-based network to perform adaptive routing based on traffic engineering and the possibilities of using the network simulator for testing network architectures that are capable of adaptive routing. The analysis of existing architectures and mechanisms for traffic engineering showed that the considered architecture shown stationarity and can not follow the...
On-line monitoring and diagnosis of wind power generation is not easy because of its discrete distribution. In this paper, a new monitoring and diagnosis system for this problem is presented, which is based on ad-hoc networks. The reliability and maintenance is improved dramatically and some special functions for components failure alert are also added. Finally, a small ad-hoc network for simulation...
The Multi Interface Communications Software (MICS) is a robust messaging platform for heterogeneous communications equipment. MICS can provide message delivery in networks that lack essentials required by traditional TCP/IP-solutions, like end-to-end connectivity or compatible addressing methods. MICS abstracts the used communications medium, that is the network and link layer, from applications....
Wireless Sensor Network(WSN) is widely used in Emergency Management System(EMS) to assure requirement of safety in current society. When emergency happens, timely transmitting emergency information in changing environment should be assured. But this requirement can not be satisfied by conventional approaches which are based on static situations and centralized management. In this paper, to assure...
Congestion removing performance has been investigated in IP-over-CWDM networks with ROADMs under the best-effort transmissions specified by the service level agreement (SLA). Two approaches were tried to remove congestion, and the experimental results clarified that the approaches could remove congestion by adding a lightpath automatically or adding a static bypass route automatically. The degraded...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.