The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communication capabilities. Wireless Sensor Network (WSN) is a promising data mining solution for precision agriculture. Instrumented with wireless sensors, it will become available to monitor the plants for real time, such as air temperature, soil water content, and nutrition stress. This real time information...
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist in...
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). It is defined as the mechanism to detect moving intruder(s) by single-sensing or jointly-sensing detection. To date, related works focus on the problem of network configuration for detecting intruder(s) within a pre-specified time/distance threshold by assuming a straight line intrusion...
In large scale wireless sensor networks, clustering is an effective technique for the purpose of improving the utilization of limited energy and prolonging the network lifetime. However, the problem of unbalanced energy dissipation exists in the multi-hop clustering model, where the cluster heads closer to the sink have to relay heavier traffic and consume more energy than farther nodes. Unequal clustering...
We propose a new tracking framework by organizing nodes into a polygonal spatial neighborhood in order to detect and track unauthorized traversals in surveillance wireless sensor networks. During a tracking, the neighborhood is further constructed ahead of the target traversal, and this features a timely forwarding with guaranteed delivery property. Instead of estimating future movement and position...
Wormhole attack is a severe threat against wireless ad hoc and sensor networks. It can be launched without compromising any legitimate node or cryptographic mechanisms, and often serves as a stepping stone for many serious attacks. Most existing countermeasures often make critical assumptions or require specialized hardware devices in the network. Those assumptions and requirements limit the applicability...
The problem of state estimation with quantized measurements is considered. Due to the nonlinearity of the quantizer, estimating the system state is a nonlinear and non-Gaussian estimation problem even if the system is linear and Gaussian. A novel algorithm for approximate minimum mean square error (MMSE) state estimation with quantized measurements is proposed. The algorithm is based on the information...
Data dissemination and discovery is critical for ad-hoc wireless sensor networks. Most existing research depends on location information that is not always obtained easily, efficiently and accurately. We propose the concept of Contour-cast, a location-free data dissemination and discovery approach for large-scale wireless sensor networks. One important property of Contour-cast is that it does not...
The main objective of sensor deployment problem in Wireless Sensor Network (WSN) is to use minimum number of sensor nodes with given sensing range that can cover any target in the coverage area to monitor the environment. The optimal sensor deployment enables accurate sensing information on target behavior with minimum sensing range and number of sensor nodes. The target coverage terrain in a locality...
Underwater wireless sensor networks (UWSNs) are prone to message loss due to their poor link condition with high bit error rate (BER). Retransmission-based mechanisms such as ARQ can be used for the reliability, however, they are not suitable for UWSNs due to the inherent long propagation delay of UWSNs. Therefore, a forward error correction (FEC) mechanism might be an alternative in order to guarantee...
Wireless sensor networks (WSNs) have become a very active and important area of research due to their potential in civil and military applications. A lot of research works focus on energy efficient routing protocols due to the limited energy of battery-powered nodes. Resource constraints on nodes in the network coupled with considerable redundancy in the data generated mean that applications have...
This paper presents a scheme, in which the collaborative efforts of limited number of sensor nodes provide the social guidance for localization process to be used for uniform distribution of the clusters, over the network area. Utilizing the information provided in the form of gbest value and the direction for position update as social guidance, the sensor nodes localize them iteratively adjusting...
The body area sensor network is widely regarded as a key technology that holds promise of enabling low-cost healthcare to be accessible to the fast growing aging sector of the population. The popularity of smartphones with their open operating systems provides a powerful platform for developing very low-cost personalized healthcare applications. In addition to the requirement of low cost, the limited...
K-coverage is a classic issue in wireless sensor network (WSN) deployment. Existing works typically assumes that every position in the monitoring field is covered by at least k sensor nodes at any given time. This may not always be necessary because certain events to be monitored will last only for a short period of time. Based upon such observation, we include the time dimension in the original k-coverage...
Navigation with wireless sensor networks (WSNs) can help people escape safely from an emergency. Previous navigation algorithms attempt to find safe and efficient escape paths for individuals under various environmental dynamics but ignore possible congestion caused by the individuals rushing for the exits. Moreover, all the previous works have overlooked the fact that the emergency rescue force can...
Localization is an important research issue in Wireless Sensor Networks (WSNs). Recently, hop-count-based localization has been proposed as a cost-effective alternative to range-based localization algorithms. Traditionally, hop-counts between any pair of nodes can only take on integer values regardless of relative positions of nodes in the hop. We show that by partitioning a node's one-hop neighbor...
Currently, the field of wireless sensor networks (WSNs) is becoming increasingly important and a challenging research area. Advancements in sensor networks enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop routing in WSN is affected by new nodes constantly entering or leaving the network. Therefore, nature based self-organized and independent mechanisms...
The mobility of nodes with a purpose called as robotic-mobility is used for replenishing energy to strategic military applications. Assuming a CDS based backbone in place, we give a technique of maintaining the location of mobile node for a given topology setting. We show that using a weighted CDS reduces the maintenance of location updates for mobile node. The complexity of our mobile-node maintanence...
The Voronoi diagram is the one of most fundamentals in computation geometry. The coverage control, especially the barrier coverage, will benefit from this diagram. Using the Voronoi diagram, the coverage holes can be detected in short time. In the lax demands which only include the influence of two neighbor sensors, the minimal exposure track based on the Voronoi can approach the optimal. But, because...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.