The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Load balancing and energy conservation techniques are one of the important constraints in the design of in wireless sensor network (WSN). Usually, clustering technique helps the network in the minimum utilization of energy that results in enhancing network lifetime. Moreover, various nodes in the multihop network that are near to the base station drain their battery very quickly thus result in creating...
Nowadays Sensor-cloud has received a lot of interests among researchers in the field of Wireless Sensor Networks (WSN) as well as Cloud Computing. An integral part of the Sensor Cloud platform is the Collaboration of WSN providers which improves the utilization of sensor resources. The physical sensors in such a collaborative environment are shared among multiple applications from different administrative...
The present era of wireless communication system has witnessed a maximized score of interest in adopting a specialized branch called as Wireless Sensor Network. Although, the research on the concept is more than a decade old, still WSN is shrouded by various types of operational loopholes, which decreases the technical adoption of the commercial practices of the protocols. The proposed paper has addressed...
Limited resources (such as energy, computing power, storage, and so on) make it impractical for wireless sensor networks (WSNs) to deploy traditional security schemes. In this paper, a hierarchical key management scheme is proposed on the basis of identity-based encryption (IBE). This proposed scheme not only converts the distributed flat architecture of the WSNs to a hierarchical architecture for...
Wireless sensor network (WSN) is usually considered as a large-scale network with thousands of tiny sensors and deployed in hostile environment for military application to gather the sensitive data from the field. The crucial objective of WSNs routing protocol is to gather the sensed information in energy efficient way since the wireless sensor node is resource constrained node. The power consumption...
Wireless Sensor Networks (WSN) easily suffers various attacks because of the vulnerable environment, low computation capability, limited energy resources, and open communication channel. So the security of the key distribution and management for WSN is a basic requirement for its wide applications, so we propose a key management based on secret sharing scheme (KMSS)in WSN. KMSS make the best use of...
Wireless Sensor network has emerged as a promising technique that revolutionizes the way of sensing information. Dense deployed sensor nodes at a specific region are likely to transfer redundant data to the base station. This increase the communicational overhead and affects network lifetime. Since energy conservation is the key issue in WSNs, data aggregation should be incorporated in order to save...
Recent advances in wireless communications and electronics have enabled the development of low cost, low power, multi-functional sensor nodes that are small in size. These nodes coordinate to perform distributed sensing in various fields such as health, military, home etc. But these small devices in Wireless Sensor Network (WSN) are still limited with some constrains, and efforts are required to increase...
To cope with the increasingly diversifying services, QoS, and network architectures, network virtualization is a promising technology that enables the concurrent deployment of multiple network technologies on a shared network. However, traditional research on network virtualization preliminarily focuses on a wired environment and network virtualization for a wireless environment is not well studied...
Wireless sensor networks have been researched extensively over the past few years. They were first used by the military for surveillance purposes and have since expanded into industrial and civilian uses such as weather, pollution, traffic control, and healthcare. One aspect of wireless sensor networks on which research has been conducted is the security of wireless sensor networks. These networks...
This paper shows different issues found in the real implementation of either a WSN or its data exploitation system for an environmental monitoring application. A generic software architecture for interfacing both is proposed and tested on a real case.
Wireless Sensor Networks (WSNs) are widely applied to monitor environments such as military surveillance and reconnaissance. However, individual sensor nodes are vulnerable to some types of attacks because they are usually deployed in open and unprotected environments. Once sensor nodes are compromised, malicious nodes can send erroneous data to the base station, and possibly mislead monitoring results...
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hierarchically. The framework encompasses schemes for establishing and managing trust between these different entities. We demonstrate that the proposed...
Recently, Sensor network have gained popularity for a variety of applications such as patient monitoring, military sensing and tracking, etc. When performing monitoring tasks in hostile environments, security requirements become vital important due to the vulnerability of various attacks. Contemporary wireless sensors have limited battery, computation and memory capacity. The energy-constrained nature...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
In this paper, we propose a secure architecture for healthcare wireless sensor networks. After a careful examination of the security requirements and the security threats to healthcare sensor networks, we argue that security measures for Wireless Sensor Networks (WSN) must take application context in consideration rather than seek security solutions in a one-size-fits-all fashion. We integrate security...
Sensor networks are gaining popularity in pervasive environment for tracking events such as habitat monitoring, weather monitoring, hazard detection etc. These sensor nodes are very much power constrained and therefore requires energy efficient protocol to well manage their energy resources. An architecture based on biologically-inspired (botany) mobile agent based sensor (BIMAS) is proposed to tackle...
When deploying a sensor network into a harsh environment the need for high levels of fault tolerance and maximising the usage of available resources become extremely important. This has been achieved by implementing a highly fault tolerant system based on our Gumsense boards. These combine an ARM-based Linux system with an MSP430 for sensing and power-control. It also allows for dynamic schedule modifications...
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important components of ubiquitous computing. They have different advantages and application areas. The RFID sensor network, which integrates RFID into WSN, has both the advantage of RFID and WSN. In this paper, three common and one new compound network architectures are described in detail. Targeting RFID sensor network...
To achieve the proper management of WSN and for its limited resources is highly desirable for an effective and efficient functioning of the network, we propose a low overhead, hierarchical wireless sensor network management architecture. The proposed mechanism provides the methods to monitor the network states by collecting management data and accordingly control and maintain the network resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.