The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) usually build from huge number of randomly deployed sensor nodes in certain area. The sensors are mainly utilized to monitor physical and environmental conditions, gather information, process this data locally and transfer the sensed data back to the Base Station (BS). The main objective of this paper is to simulate, evaluate and observe the behavior of developed clustering...
Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of constructing a shortest path overhearing tree with the maximum lifetime. We propose three approaches. The first one is a polynomial-time heuristic. The second one uses ILP (Integer Linear Programming) to iteratively find a monitoring...
In this paper we propose a greedy probabilistic approach for localization in Wireless Sensors Network (WSN). This topic has received much attention since the WSN are considered as the basis in the emerging area of Internet of Things (IoT). The proposed method aims at increasing the performance of the grid based Compressed Sensing (CS) localization algorithm. This latter is based on the sparse nature...
In Wireless Sensor Networks, Sensors are generally battery powered devices. This networks is used to gather various kinds of information to Base station (BS). They consist of computational power, storage capacity, energy supply are the important issues in their energy constraint. To maximize the network lifetime, we need not only to minimize total energy consumption and also balance WSN load. In this...
In a typical monitoring system, physiological parameters such as Electrocardiography (ECG), Electromyography (EMG), and Electroencephalography (EEG) from various sensors placed strategically on human body are monitored for providing real-time feedback to the patient and medical staffs. For traditional point-to-point WBAN communication systems, sensors data are sent directly to the central sensor....
In this work, we study the construction of a data gathering tree to maximize the network lifetime, which is defined as the minimum of the lifetime of all the nodes in the sensor network. The problem of finding the optimal data gathering tree is known to be NP-complete [9]. Most works in this area aim to give an heuristic to find a data gathering tree and compare the lifetime obtained with other existing...
WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. We investigate the problem of minimising the failure rate of packet delivery in the presence of the modification attacks and the selective forwarding attacks in a static WSN with one base station without using expensive encryption/decryption algorithms. We propose a novel heuristic...
There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This...
One of the major issues of Wireless Sensor Networks is developing an energy efficient routing strategy. In this paper, we present one such protocol having Meshed Multipath Routing with Levelling and Sectoring. We first perform the levelling and sectoring of the network, where each node is assigned a Level id and Sector id with respect to the destination node. Then, we use this information in route...
For the prevalent research in wireless sensor networks, the main objective is to maximize the lifetime of a sensor network subject to the battery-energy at the sensor nodes. Various heuristic approaches have been proposed to achieve this objective and many simulation results have been presented in the existing literature. However, hardly exists any analytic framework to govern this network lifetime...
This paper presents a clustering hierarchy protocol based on Energy Efficient Cluster Head Selection (EECHS), which aims to reduce energy consumption within the wireless sensor network and prolong the lifetime of the network. Simulation result shows that the proposed protocol (EECHS) has better performance than Based Energy Clustering (BEC) protocol in reducing energy consumption and prolonging lifetime...
The deployment of wireless sensor networks in many application areas requires self organization of the network nodes into clusters. The clustering Algorithm is a kind of key technique used to reduce energy consumption. Efficient way to enhance the lifetime of the system is to partition the network into distinct clusters with a high energy node as cluster head. The different methods of node clustering...
Extending the lifetime of the wireless sensor networks has always been a crucial challenge for the researchers. Most of the energy is consumed in data transmission to the sink. In the recent past some researchers have suggested mobile sink method to minimize energy consumption in wireless sensor networks. The movement of sink is governed by fuzzy logic based mechanism. In this work base station is...
Highlighting that connectivity and communication are two separate concepts in a Wireless Sensor Network (WSN), we propose a novel model for connectivity of a WSN using first order Reed Muller codes. For communication, we choose to work with a model that utilizes Partially Balance Incomplete Block Designs (PBIBD). Two suitable cryptosystems can now be applied for the two different models. As a result,...
An increasing number of applications based on Wireless Sensor Networks assume mobile environments(Mobile WSNs). Mobile WSNs propose several converging issues with Mobile Ad-hoc Networks (MANETs) but the peculiarities of their technology and application domain advise a specific theoretical analysis of mobility impact on network connectivity. Network performance depends by several factors; there is...
In this paper we present a novel algorithm, implemented in a wireless sensor network environment, for the study of fire in a natural environment. This algorithm can offer two kinds of information: the risk of a fire and, in case of an active fire, the propagation direction of the flames and their velocity. This information is useful for fire rangers in order to obtain escape ways and determine strategies...
This paper presents a comparative study of clustering techniques and cluster quality of a single criterion cluster heads election and cluster formation in Wireless Sensor Networks. The HEED, LEACH and Energy-based LEACH protocols are simulated and their performance are compared in terms of the number of cluster head generated, cluster size, cluster head distribution, scalability and coverage. The...
Wireless sensor networks have become one of the most tempting networking technologies since it can be deployed without the need of a communication infrastructure. In general, there are some major concerns with this technology. That is, sensor node should have a long lasting system lifetime. And the system should keep the livability of nodes in a received level during the using process. In such systems...
Wireless Sensor Networks (WSNs) are widely applied to monitor environments such as military surveillance and reconnaissance. However, individual sensor nodes are vulnerable to some types of attacks because they are usually deployed in open and unprotected environments. Once sensor nodes are compromised, malicious nodes can send erroneous data to the base station, and possibly mislead monitoring results...
Data gathering is a major function of many applications in wireless sensor networks (WSNs). In this paper, An Effective Data Gathering scheme for heterogeneous energy WSNs (EDGA) is proposed. EDGA achieves a good performance in terms of lifetime by minimizing energy consumption for in-network communications and balancing the energy load. EDGA adopt a simple but efficient method to solve the area coverage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.