The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low Power Wide Area Networks (LPWAN) are used in a number of applications, including disaster monitoring and recovery networks. LPWAN sensors capture data bits and transmit them via dedicated gateways, which are connected to public carrier networks (e.g., cellular networks). One of the challenges encountered in disaster management scenarios revolves around the carry/forward sensed data and geographical...
Crowd sensing exploits users' smart devices and human mobility to collect information on a large scale. To realize a crowd sensing campaign, sensing tasks with spatio-temporal requirements are distributed to the devices that can provide the requested information. Typically, the distribution of sensing tasks relies on a centralized communication infrastructure such as cloud servers. However, such an...
In order to solve the problem of instability clustering in Ad Hoc Networks with complex and changeable node motion, this paper proposes a weighted clustering algorithm based on node stability(SA-WCA). In this algorithm, we propose a node stability factor based on node received power, which does not need to calculate the specific distance between nodes and can only judge the relative motion between...
Software-defined networking paradigms have found their way into wireless edge networks, allowing network slicing, mobility management, and resource allocation. This paper presents dynamic role assignment as a novel approach to software-defined network topology management for wireless edge devices, such as laptops, tablets and smartphones. It combines the centralized control of wireless Network Interface...
Ad hoc smartphone networks can be used to augment communications degraded by disasters provided that the individual ad hoc clusters can reach some "connection gateways" to get out to the Internet. This capability can be provided by devices in the surrounding area that retain cellular connectivity in addition to the connectivity provided by the specially deployed emergency equipment, if any...
In several community scenarios, people share benevolently their spare broadband Internet access connectivity with other people who cannot afford it. Although laudable, this sharing process can negatively affect the service received by the primary users, thus jeopardizing the continuity of this community service. In this paper we propose the use of a gateway that separates the traffic of the primary...
Cooperative forwarding has shown a substantial network performance improvement compared to traditional routing in multi-hop wireless networks. To further enhance the system throughput, especially in the presence of highly congested multiple cross traffic flows, a promising way is to incorporate the multi-radio multi-channel (MRMC) capability into cooperative forwarding. However, it has been said that...
On-board commercial passenger aircraft Wireless Sensor Networks (WSNs) are anticipated to be used for implementing machine-to-machine communication also referred to as Wireless Avionics Intra-Communications (WAIC). These systems enable safety-related wireless avionics and aim to reduce electrical wiring harness contributing by 5% of the total weight of an aircraft. The globally harmonized frequency...
Broadcasting is a crucial part of ad hoc routing protocols. Designing efficient forwarding scheme can reduce redundancy and collisions. Recently, we have proposed an Energy-Efficient Adaptive Forwarding Scheme (EEAFS) that uses 1-hop neighbourhood knowledge, in addition to a transmission power classification scheme to group mobile devices based on their transmission power level. Based on this classification...
This paper addresses the problem of unreliable internet access in Intelligent Transportation System through a secure acknowledgement routing protocol. Identity-Based Digital Signature scheme is preferred over traditional certificate based Digital Signature due to underlying resource constrained Vehicular Ad-Hoc Network. Verifiable hash chains paired with IBS are used in the protocol to increase the...
With the increasing availability of mobile devices that natively support ad hoc communication protocols, we are presented with a unique opportunity to realize large scale ad hoc wireless networks. Recently, a novel ad hoc protocol named WiFi Direct has been proposed and standardized by the WiFi Alliance with the objective of facilitating the interconnection of nearby devices. However, WiFi Direct...
Monitoring and analysis of animal behavior are two of the prominent applications of Wireless Sensor Networks (WSN) in modern Dairy Farming. Behavioral information collected by sensor devices worn by the animals is expected to provide early detection of stress and onset of specific diseases. Animal mobility coupled with farm-based contextual information is expected to automate and increase efficiency...
A computer worm is malicious software that can spread rapidly between interconnected devices and perform malicious actions. In an Advanced Metering Infrastructure (AMI), smart meters may communicate in an ad-hoc fashion to perform many functionalities like remote metering and demand response. However, the AMI is susceptible to cyber-physical threats caused by malware like worms. The speed at which...
Attack graphs enable system stakeholders to understand the stepping stones or exploitation procedures that an adversary could potentially execute to impact the confidentiality, integrity, and availability of a network system. These graphs are used to assess risk and to determine components that, when hardened, contribute most to risk reduction. While these graphs are powerful and widely used in enterprise...
Since the near-far problem is expected to be a significant issue in the context of tactical communications, the tolerable amount of adjacent channel interference (ACI) is an important design requirement. We describe a numerical simulator which has been developed in order to evaluate the level of ACI arising in mobile ad hoc networks (MANET) in the VHF band when a large number of nodes and radio networks...
Integration of mobile ad-hoc networks (MANETs) into infrastructure-based networks allows mobile users to access other networks. At a network boundary, some node with multiple interfaces plays an important role as a gateway. Gateway discovery mechanism is necessary for mobile nodes to discover nearby gateways but causes message exchange overhead. In order to control the overhead, we present a novel...
Recently, wireless communications technologies have invaded several daily life fields such as Vehicular Ad-hoc Networks (VANETs). VANET networks are characterized by their high mobility. Clustering seems to be as one of the control schemes used to make this global topology less dynamic. In this sight, our paper introduces a clustering mechanism based for connectivity maintenance in VANET AODV-CV....
Often times there is a need to do remote monitoring. The remote sites may be located far away; thus, traditional connectivity, such as fiber, is not possible. This paper proposes to use unmanned aerial vehicles (UAVs) to provide connectivity to ground sensor clusters on a suburban industrial area. Very small, commercial scale UAVs can be used to monitor a bunch of ground sensor nodes without the dependency...
This paper presents the high-level architecture (HLA) of the research project DEWI (dependable embedded wireless infrastructure). The objective of this HLA is to serve as a reference for the development of industrial wireless sensor and actuator networks (WSANs) based on the concept of the DEWI Bubble. The DEWI Bubble is defined here as a high-level abstraction of an industrial WSAN with enhanced...
Nowadays, the LED industry has witnessed an ever-growing development. LED intelligent lighting system, which is highly-efficient, environment-friendly, intelligent, and user-friendly, has become a new trend in the lighting industry. Formed by LED lamps, wireless sensor network needs a large amount of nodes. To realize its IP, a large number of IP addresses are needed. But the wireless sensor network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.