The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) are usually deployed in insecure remote and open environments. Nodes could be attacked and compromised. The attacker can use compromised sensor nodes to disrupt communications or inject misleading sensor values. Misleading data can corrupt the entire decision making process, which depends upon WSN data. We propose a trust mechanism, which evaluates communication trust...
Wireless sensor networks (WSNs) usually build from huge number of randomly deployed sensor nodes in certain area. The sensors are mainly utilized to monitor physical and environmental conditions, gather information, process this data locally and transfer the sensed data back to the Base Station (BS). The main objective of this paper is to simulate, evaluate and observe the behavior of developed clustering...
Embedded systems with integrated sensing, processing and wireless communication are driving future connectivity concepts such as Wireless Sensor Networks (WSNs) and Internet of Things (IoTs). Because of resource limitations, there still exists a number of challenges such as low latency and energy consumption to realize these concepts to full potential. To address and understand these challenges, we...
A wireless sensor network (WSN) is a collection of sensor nodes which can monitor the physical activities and attributes of a whole spectrum of objects and environments. The purpose of collecting this data and processing it in a meaningful manner requires that it adds significant value to the end user. WSN are deployed ever more frequently and applications vary from providing an early alert system...
Wireless Sensor Networks has evoked a lot of attention in recent years as it offers a broad horizon of applications in environmental monitoring. Security of such networks is a key area of research as traditional techniques cannot be employed due to their low energy and memory constraints. The cornerstone of security primitives in cryptography is a key exchange. In this paper Elliptic Curve Cryptography...
The role of Internet of Things (IoT) in facilitating connectivity of the wireless sensor network (WSN) to the remote server or cloud over the Internet encourages the formation of a highly complex system. This has significant potential for WSN softwarization or open flow through software defined network (SDN). It enables the interaction between the physical and virtual sensor networks resulting in...
The Wireless sensor network (WSN) deployment areas in real time environment are often inaccessible and unreliable communication resulting in degradation of network performance. The critical issues in any WSN are QoS and energy. Post deployment, it may not always be feasible to replace the batteries in a WSN. Long hops of transmission maintaining the QoS with more energy consumption results in reduction...
Wireless Sensor Networks (WSNs) consists of large number of spatially distributed configurable sensors, to meet the requirements of industrial, military, precision agriculture and health monitoring applications with ease of implementation and maintenance cost. Transmission of data requires both energy and quality of service (QoS) aware routing to ensure efficient use of the sensors and effective access...
Trust is a soft security solution for Ad-hoc Wireless Networks such as Mobile Adhoc Networks (MANETs), Wireless Sensor networks (WSNs). Due to openness of the networks a malicious node can easily join and disrupt the network. Trust models are used to discriminate between legitimate and malicious nodes in the network. The characteristics of MANETs and WSNs are different so, there are some significant...
Indoor localization is a basic process in Wireless Sensor Networks (WSN) monitoring. This paper presents a new approach for localization of mobile nodes in WSNs. The proposed approach is based on the design of an adaptive fuzzy localization system. First proposed contribution is to consider the rooms of the target environment as a fuzzy sets made by adjacent zones described by a Fuzzy Location Indicator...
Many applications of wireless sensor networks depend on the location information of sensor nodes and how to obtain the localization has become the focus of research activities in WSN. In order to solve the problem the log-normal shadow model and the trilateration method is used to estimate location of a sensor node in the paper. Many Experiments have been done to reduce the distance error and the...
This paper reports the power consumption and resource utilization of a trust and reputation model deployed in a wireless sensor network (WSN). The impact of sensor augmentation parameter for static and dynamic WSN with trust and reputation models has been examined. In particular, we present a novel WSN framework-based investigations on peer trust and linguistic fuzzy trust model (LFTM) for trust and...
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 802.15.4 has emerged for WSNs in which the legacy operations are based on the principle that the power-operated battery is ideal and linear. However, the...
Trust management plays a significant role for guaranteeing the reliability and security of wireless sensor networks. A hierarchical trust model for cluster-based wireless sensor network is proposed. According to the differences between cluster heads and general nodes, the distributed and centralized trust management mechanisms are combined in this paper. In the proposed model, the computation of node...
Wireless sensor network (WSN) is composed of tiny nodes. The nodes are deployed randomly over an area in order to sense various physical phenomena related parameters. The nodes sense the data within their vicinity and forward the data to the neighboring nodes so as to forward the data towards the base station. However, there may be few malicious nodes present in the network and these nodes falsify...
This paper focuses on the simple radio frequency transceiver model of the sensor node. We have combined the effect of realistic analytical model with the HEED and H-HEED protocol for wireless sensor network. Under this impact, the performances of the HEED and H-HEED protocol have been evaluated.
Certain Wireless sensor network (WSN) applications such as military and e- health care require the inter-node communication to be secure. The tiny WSN nodes have limited computational power, memory and finite energy source. These constraints restrict the implementation of highly secure models on the devices as they demand more memory and involve compute intensive operations. Several protocols have...
Secure Communication has become an important aspect in wireless sensor network applications such as military, medical and industrial fields. The nodes in WSN have limited computational ability and limited energy. These device constraints dictate the choice of various crypto primitives for the security model. This work considers a stream cipher algorithm, RC-4, which is easy to implement on the sensor...
Biological Immune Systems have intelligent capabilities of detecting foreign bodies which attack our body. Moreover they have inherent insightful capabilities to remember them, when they hit the body again. Primary response is the initial response instantiated by the body to the attack and secondary response is the response hence forth. Secondary response is naturally faster because of its characteristic...
In this paper a novel localization technique is proposed using fuzzy logic and genetic algorithm to get nearly precise location of sensor nodes, in a range free localization system. This localization technique gives a stable system in which both magnitude and range of the error are very low. Various membership functions (MF) are tested among which the Sinc MF provides the best results for the system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.