The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the important trends which is supposed to have more attention in the system of cognitive radio is wireless security models. Security requirements for CRNs are the same as the general wireless networks, taking into consideration that the frequency band changes dynamically adding a specific feature when we deal with security of CRNs. A new category of security issues and challenges have been...
Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has...
Smart Cities are considered recently as a promising solution for providing efficient services to citizens with the use of Information and Communication Technologies. With the latest advances on the Internet of Things, a new era has emerged in the Smart City domain, opening new opportunities for the development of efficient and low-cost applications that aim to improve the Quality of Life in cities...
In an emergency situation, the information availability, reliability, security and delay of its delivery are critical to the success of rescue operations. The use of wireless sensor networks (WSN) in this type of applications allows having an almost real situation about the supervised area by collecting relevant information. This paper proposes a new Framework Ad-M-QoS-DS (Adaptive Management of QoS...
In this paper, we report on the design and implementation of MBStar, a higher-frequency, real-time, reliable, secure protocol for wireless body area networks(WBAN). As in most proposals for body sensor networks, MBStar adopts the star topology for communication, and is designed to support a message rate as high as 400 Hz, which to the best of our knowledge, is the highest among low-power wireless...
While Wireless Sensor Networks (WSN) are starting to become more popular and used for many applications, developing these applications is still not a trivial task due to many technical challenges such as limited hardware capabilities, communication, and energy resources; high heterogeneity; security; and quality of service (QoS) issues. Recently Service-Oriented Middleware (SOM) has become a preferred...
Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information...
Wireless sensor networks (WSN) have recently achieved a great deal of attention due to its numerous attractive applications in many different fields. The focus of monitoring application is to acquire and verify information about enemy capabilities and positions of hostile targets. Monitoring applications related to security and reliability requires guaranteed k-coverage of the area at all times. A...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.