The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Physiological monitoring has been used in a wide range of scenarios to assist in disease diagnosis, athlete monitoring and other activities. There are also many opportunities in analysing aggregate data from groups of people rather than individuals such as public event monitoring or athletic team performance optimisation. Numerous difficulties exist pertaining to this, particularly concerning how...
This paper presents a monitoring system of building electricity using IPv6 to establish a network. This smart metering system consists of three parts: the host software, the network and the sensor nodes. The network, whose data transmits via Zigbee wireless communication protocol, is designed based-on IPv6 protocol, and builds the IPv6 protocol on IEEE 802.15.4 wireless network. The Sensor node has...
Beacon and event-driven warning messages are two important messages that are used by many Intelligent Transportation Systems (ITS) applications for improving road safety and traffic efficiency. Beacon messages are regularly broadcast by each vehicle to notify other vehicles of its presence and its status. Event-driven warning messages are emitted when a vehicle or the road infrastructure discerns...
Wireless monitoring employing distributed sniffers has been shown to complement wire side monitoring using SNMP and base station logs since it reveals detailed PHY (e.g., signal strength, spectrum density) and MAC behaviors (e.g, collision, re- transmissions), as well as timing information (e.g., back-off time), which are often essential for network diagnosis. Due to hardware limitations, wireless...
At present, water quality monitoring is the essential part to our country's aquaculture. In this paper, we developed a real-time water quality environment monitoring system based on wireless sensor network to acquire data of environmental factors of water quality. Also, the system can provide expert knowledge to deal with data for making control decision. Such a system is attractive because it ensures...
In the development of large ad-hoc Wireless Sensor and Actuator Agent Networks (SANETS), a multitude of disparate problems are faced. In order for these networks to function, software must be able to effectively manage: unreliable dynamic distributed communication, the power constraints of un-wired devices, failure of hardware devices in hostile environments and the remote allocation of distributed...
Wireless community networks are mesh networks built by volunteers which own, configure, and manage their wireless node. Such networks are prone to either unintentional (e.g. misconfiguration) or intentional node misbehavior. This paper proposes a fully distributed trust-based routing framework, tightly integrated with OLSR, which is the most exploited routing protocol in real world wireless community...
Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed...
In a future 'internet of things', an increasing number of every-day objects are connected with each other. Nowadays, connectivity between these devices is supported by assigning each device to an existing (wireless) network. However, these networks do not take into account the individual needs of these devices, even though all these devices are very different in terms of application requirements and...
Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely \cite{tian06RTAS, Bahl2000INFOCOM}. In this work, we study multiple objects tracking problem using WSNs, in which we assume no equipment is carried by the object and the tracking procedure is passive. We first show that without carefully design, Received Signal Strength Indicator (RSSI) and Link Quality...
In this work, we propose a small world model to design Heterogeneous Sensor Networks (HSNs). The proposed model takes into account the communication pattern of this network to create shortcuts directed to the monitoring node, decreasing data communication latency. The endpoints of these shortcuts are nodes with more powerful communication range and energy reserves to support the long communication...
Utilizing service oriented architectures to enhance seamless collaborations and information sharing among nodes in mobile ad hoc networks with limited communication capability is a challenging task. In this paper a novel tree-based service discovery mechanism, able to achieve high accuracy in the process of service discovery, is proposed, which affords wireless communication overheads nearly linear...
Wireless mesh Networks (WMNs) are a prominent paradigm of wireless communication that have been widely used in many applications. The growing popularity of such networks opened the door to a profusion of attacks that may target their core functioning leading to a harmful impact on their performance. Hence, the need of robust and fast detection of those attacks became a major prerequisite in order...
Currently in China the level of coal mine roadway roof abscission layer monitoring is low, especially in the most coal mine the transmission and observation of the underground separation data are by manual labor or by cable transmission, there is a high cost for coal mine. This paper introduces a roof abscission layer monitoring system based on ZigBee which is adapting to environment of coal mine...
A real-time H.264 video stream transmission system which based on standard RFC is designed and implemented in this paper. In order to overcome the adverse factors as high bit error and low bandwidth through the wireless channel, this paper proposes UDP / RTP virtual links that under the CDMA2000 EVDO to ensure real-time transmission. At the meantime, in order to make up the lack of AIMD algorithm,...
Wireless sensor networks (WSNs) are useful for gathering information from the environment, either periodically for monitoring purposes or when certain events need to be detected. Since the wireless communication range of each sensor node is limited, data is propagated in a multi-hop manner until it reaches one or more specific sink nodes. However, sensor nodes usually employ a sleep scheduling mechanism...
In this paper, a cross-layer collision-tolerant (CT) media access control (MAC) scheme is proposed to achieve reliable low power communications for one-hop asynchronous wireless sensor networks (WSNs). Unlike conventional MAC schemes that discard and retransmit signals colliding at a receiver, the CT-MAC extracts the salient information from the colliding signals by leveraging on the signal processing...
Efficient routing is a fundamental issue in multi-hop wireless ad hoc networks. In this paper, we study the limitation of traditional routing structure in multi-hop wireless ad hoc networks due to (a) the layered structure of a wireless protocol stack and (b) the lack of coordination between medium access control (MAC) and routing protocols. These limitations result in long processing delays in a...
We propose a simple scheme for detecting selfish behavior achieved by manipulating the 802.11 Medium Access Control (MAC) protocol. Specifically, attacks that exploit the Distributed Coordination Function (DCF) parameters and data rate adaption scheme to maximize individual throughput pose a denial of service threat against protocol abiding nodes. We detect this malicious behavior by employing a combination...
The topic on using reputation has received considerable research attention in the field of networking and communications. In this survey paper, we discuss the various ways the systems can benefit from using reputation information. We provide the examples of existing reputation-based systems discussing their functional implementations. Based on our observations, we list minimum requirements for benefiting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.