The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Network (WMN) is an upcoming technology that supplements wired infrastructure with wireless backbone to provide Internet connectivity to mobile nodes (MN) or users in residential areas and offices. Here the each wireless backbone node operates both as a wireless router that forwards packets of other nodes & as a wireless bridge transmitting the packets of its clients WMN has the...
Wireless Body Area Network (WBAN) applications are becoming popular today. To protect patients' private data during transportation, secure wireless communications are mandatory in WBANs. Encryptions and secret keys are the base of secure communications over insecure wireless environments. Given most wireless nodes in WBANs are resource-constrained, efficiency is an implicit requirement of the key...
Localization systems for outdoor areas using GNSS based systems (like GPS, GLONASS and more) are nowadays widespread and commonly-available in devices like smartphones. For indoor localization, on the other hand, several methods has been proposed in the latest years, like inertial navigation systems (INS) or wireless positioning systems (WPS, like wireless trilateration or fingerprinting methods),...
A group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In this work, we propose and implement two Fuzzy Based Actor Selection Systems (FBASS): FBASS1 and FBASS2 for actor selection in WSANs. The systems decide whether the actor will be selected for the required...
Content centric network Is a kind of promising architecture of future internet. When implementing the CCN architecture in the energy-constraint wireless scenarios, there is a great challenge that is not considered in the original design of C-CN, that is, the energy saving problem. In this paper, we propose a lightweight energy-aware probabilistic forwarding strategy. Unlike the existing approaches...
This paper studies the impact of soil medium properties and network parameters on the topological connectivity of wireless sensor nodes communicating with each other via electromagnetic wave under the ground. The sensor nodes are deeply buried under the ground and randomly deployed in a square sensing area. Through two simulation scenarios, we investigate the path connectivity between two arbitrary...
Wireless Mesh Network has the ability to provide broadband access dynamically to anyone anywhere in the world by setting up nodes in the network. It provides the wide scale connectivity with less cost than the wired network. In addition to the cost advantage, wireless mesh networks (WMNs) are easy to sustain, robust and provide reliable service coverage. Wireless mesh networks (WMN) are multi-hop...
In this paper, we discover the channel allocation in obliging multichannel multiradio wireless webs and non obliging networks. In that every single node is fixed and set alongside one or extra radios. Additionally we focus on static channel allocation, vibrant channel allocation and hybrid channel allocation in multichannel multiradio wireless networks. And it deals alongside jamming attacks and its...
The localization of passive targets has been widely investigated in the field of security applications. In such a context, the target is non-cooperative, i.e. transceiver-free and not actively associated to any monitoring system. These constraints make the detection and localization process challenging from the sensing technology viewpoint. Standard solutions adopt dedicated and complex sensors (e...
The Eschenauer-Gligor (EG) random key predistri-bution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of k-connectivity in WSNs employing the...
Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though purposive, there are some constraints of the sensor...
Wireless sensor network is a communication network across the sensors nodes. A sensor node collects information about the physical environment. Now-a-days one main issue in wireless sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. One new type of attack called vampire attack, which occurring at network layer. It leads...
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh keys. These operations incur huge computation and communication cost that reduces the network life time. To minimize energy consumption and improve network...
In order to upgrade the conventional remote monitoring service, the two embedded system design and implementation methods for the wireless remote monitoring service, which provide a wireless image observation with temporary ad-hoc network, are proposed in this paper. The first method is based on the embedded system design technique for a nearly real-time wireless image observation application service...
This paper describes the mobile Ad-Hoc (wireless) network (MANET) for emergency scenarios in nuclear power plant (NPP). Authors proposed the system with such properties as flexibility and a self-forming and self-healing network topology that dynamically adjusts to the moving configuration per each intermediate routing node. It is also proposed to integrate MANET and Bluetooth-like technologies to...
Practical intrusion detection in Wireless Multihop Networks (WMNs) is a hard challenge. It has been shown that an active-probing-based network intrusion detection system (AP-NIDS) is practical for WMNs. However, understanding its interworking with real networks is still an unexplored challenge. In this paper, we investigate this in practice. We identify the general functional parameters that can be...
Wireless Sensor Networks is a grouping of wireless networking and entrenched system technology that monitors the physical or environmental situation, such as temperature, sound, quivering, strain, motion or pollutant, at different locations and a spoofing attack is a one of the most common online attack in which one person or program successfully masquerades as another by falsifying data and thereby...
This study approaches a new proposal for “the wireless power networks (WPNs)”. Injecting the wireless ad-hoc networks with newly bi-directional power transfer has the advantage of stabilizing networks operation when a power source happens to broke down. This research putting network at forefront, proves that make a fundamental demonstration for bi-directional wireless power transfer (BD-WPT) system...
Passive attacks have caused a great threat to Wireless Sensor Networks (WSN), therefore the research of communication nodes and the stealthiness of communication relationship is crucial. Due to the problem of node hidden mechanism, a secure anonymous routing named Node-Uncorrelated Pseudonym Pairwise Mechanism (NUCPP) is proposed in this paper. Instead of using the traditional pseudonym node correlation...
Due to the nature of wireless transmission, communication in wireless mesh networks (WMNs) is vulnerable to many adversarial activities including eavesdropping. Pair-wise key establishment is one of the fundamental issues in securing WMNs. This paper presents a new matrix-based pairwise key establishment scheme for mesh clients. Our design is motivated by the fact that in WMNs, mesh routers are more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.