The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many protocols have been emerged for facing the problem of energy consumption in the wireless sensor network (WSN). Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is one of these protocols, which achieved a lot of spreading. In this paper, a dynamic multi-hop technique (DMHT-LEACH) protocol is proposed based on the LEACH protocol. The DMHT-LEACH protocol suggests a dynamic technique for...
Low-cost technology that can monitor a wide range of environments, Wireless Sensor Network (WSN) has become increasingly common and studies on it have increased a lot. Due to the cost and time required to deploy a WSN in physical environments, the network simulators, such as the popular Network Simulator 2 (NS-2), have been adopted for evaluation of WSNs. NS-2 is a widely accepted and used network...
A distributed and collaborative nature of wireless sensor network cause many challenges to provide security in network. Most of the outsider's attacks are prevented by encryption and authentication technology, but to control insider attacks are difficult. A malicious sensor node causes lot of packet losses, energy wastage and increase in time to reach final destination. In this paper, Enhanced Beta...
Deploying Wireless Sensor Networks (WSNs) in hostile and remote environments are often lead to vulnerabilities and prone to various security attacks. These attacks can disrupt the regular network operations such that the dependable metrics of routing protocols can be seriously affected. Conventional cryptography techniques have proved their strength in communication security rather than the routing...
In Wireless Sensor Networks (WSNs), multi-objective optimization comprises more than one objective function to be improved simultaneously where there is a compromise between two or more contradictory objectives. The optimization method must be energy competent in terms of utilization and communication. This paper proposes a novel multi-objective optimization method known as Green (Energy Efficient)-Multi-Objective...
Secure Communication has become an important aspect in wireless sensor network applications such as military, medical and industrial fields. The nodes in WSN have limited computational ability and limited energy. These device constraints dictate the choice of various crypto primitives for the security model. This work considers a stream cipher algorithm, RC-4, which is easy to implement on the sensor...
Adaptive Trust Model (ATM) for secure geographic routing has been presented in this paper. Unlike conventional weight based trust models, ATM adjusts the weights associated with the network activities. In this model, direct trust has been considered to restrict the reputation based attacks. Due to the flexibility of weights adjustment, ATM dynamically identifies malicious nodes and directs the route...
We evaluate a routing metric, called TXPFI, which captures the expected number of frame transmissions needed for successful delivery of data in Wireless Sensor Networks (WSNs) featuring non-fully cooperative nodes and unreliable links. The study, which addresses the exploitation of the TXPFI in routing protocols of distance-vector type, assesses the impact of different network settings on the performance...
Black hole attack has long been a problem in wireless in data routing. Although numerous solutions have been proposed, they all have drawbacks. The main reason is that formal modeling techniques have not been employed to confirm whether the solutions are immune from black hole attacks. We have earlier shown how formal modeling can be utilized efficiently to detect the vulnerabilities of existing routing...
This paper presents the magnetic field modeling-based energy efficient routing for WSN which models the routing problem as a current-carrying solenoid and a free to turn magnet put into a uniform magnetic field respectively. The optimal routing is then performed through the path with the maximum generated magnetic field intensity for the solenoid technique and with minimum torque for the magnetic...
BACR is a new hierarchical routing protocol based on LEACH designed for WSN. It introduced energy-involved voting and back-off announcement to control the number of cluster-heads to vary within a small range and evenly locate the cluster-heads thus to prolong the network lifetime. This work also employed the technology of cluster reappointment to minimize the energy consumed in cluster set-up phase...
The increasing penetration of smartphones, i.e., smart devices with multiple sensing and communication interfaces, creates the possibility to build novel types of networks. Wireless adaptors are, after the terminal screen, the strongest source of power consumption. It is therefore common for a node to occasionally turn off the networking device to save energy. The effect of the presence of nodes in...
This paper gives a brief idea about wireless sensor networks and energy efficient routing in wireless sensor networks. Sensor networks are deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. Sensor Networks are generally battery constrained. They are prone to failure, and therefore the...
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a particular challenge. This paper proposes to use formal methods to investigate the security of the INSENS protocol, in respect of its capability to withstand several denial of service attacks. The paper is an extension to...
In this paper, we study the performance of the Greedy Perimeter Stateless Routing (GPSR) [1] and the Greedy Routing for Maximum Lifetime (GRMax)[2] which is our proposal, in wireless sensor networks in random topology and grid topology wireless sensor network. We decide to compare the performance of GPSR and GRMax in different topology of networks using the same simulation environment. Evaluation...
In Wireless Sensor Network (WSN), one of the primary issues is energy conservation for extending network lifetime. Communication protocols for WSN help reduce the energy consumption via adopting sleep scheduling in the network. Random sleep scheduling is a desirable mechanism for its simplicity and steady duty cycle. However, the low duty cycle sleeping of nodes may destroy the connectivity of network,...
Swarm intelligent algorithms have been used to design distributed and fault tolerant routing protocols for Wireless Sensors Networks (WSN), able to self-adapt to environmental changes. The principle is that each sink emits a message with the highest pheromone intensity (with reference to ant colonies) and with a limited transmission range. Pheromone spreads to the sensors and at the same time is subject...
Ultra-wide bandwidth (UWB) is a prospective radio technology for wireless networks. As being approval by FCC, UWB radio has received much attention. In this paper, we introduce the architecture of Ultra-Wideband Wireless Sensor Networks (UWB WSN) and a Location-aware Ultra-wideband based on Dynamic Source Routing protocol (LUDSR) for a UWB WSN. In our routing protocol, we let each node gather location...
Wireless Sensor and Actuator Networks (WSANs) combine sensors and actuators interconnected by wireless networks in order to perform distributed sensing and acting tasks. Closed-loop controllers can therefore be deployed on WSANs; such systems have to meet specific requirements in terms of performance, dependability, energy and cost which raises great challenges due to the unreliability of wireless...
Wireless multimedia sensor networks (WMSNs) are expected to find wide applicability in target tracking in the near future. This paper proposes a dynamic capacity multi-path routing protocol (DCM), based on improved Ford-Fulkerson algorithm, to solve the problem of data transmission from anchor nodes to base station (BS). By adjusting the parameter of flow capacity in max-flow model, a multi-path routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.