The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless sensor networks, many studies on data dissemination to individual mobile sinks traditionally rely on a strategy that consists of a virtual infrastructure to serve current location of the mobile sinks and a per-sink foot-print chaining mechanism to support local mobility after location update. To adapt the strategy for supporting mobile sink groups, it may be simply considered to exploit...
Web Service technologies are state of the art in current enterprise distributed applications. To integrate highly resource-constrained devices, such as sensor nodes, into enterprise applications via Web Services, gateways are commonly used. Our aim was to investigate the intermediate, homogeneous communication between enterprise applications and highly resource-constrained devices. We therefore present...
Rumor Routing is one of the routing algorithm categories in wireless sensor networks which is well extended and optimized in the recent years. Common principal ideas in all rumor routing algorithms are conjunction of query-agents with the traversed path of event information propagator agents in the network. In this paper we propose a new method to reduce the number of routing agents to consequently...
Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our scheme has two phases, key computation phase...
Clock synchronization is of critical importance for several applications in wireless and mobile sensor networks; for example to determine the order and time of events. Although several protocols to achieve clock synchronization have been developed, they may not be secure. For instance, a link controlled by an attacker could delay packets it forwards in ways which would cause the nodes sharing that...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
Efficient deployment of sensors is one of important issues in wireless sensor networks. Several self- deployment schemes based on Voronoi diagram have been proposed. These schemes distribute sensors uniformly over the covered area, but they cannot make the sensing area fully covered and their coverage expansion speed is not high. We propose a new grid-base self-deployment scheme. The proposed scheme...
In this paper, we describe the cognitive radios sharing the spectrum with licensed users and its effects on operational coexistence with unlicensed users. Due to the unlicensed spectrum band growing needs and usage by many IEEE 802.11 protocols, normal wireless radio operation sees high interference leading to high error rates on operational environments. We study the licensed bands and the characteristics...
IP based Wireless Sensor Networks (IP-WSN) are gaining importance for its broad range of applications in health-care, home automation, environmental monitoring, security & safety and industrial automation. In all of these applications mobility in sensor network with special attention to energy efficiency is a major issue to be addressed. Host based mobility management protocol is inherently unsuitable...
In many applications of Wireless Sensor Networks (WSNs), the sensing data are disseminated from a source to multiple mobile sinks. Since WSNs consists of a number of sensor nodes with limited capabilities, previous studies mainly discuss on how to send the data efficiently and do not consider the group mobility of mobile sinks that move together staying closely and randomly move within a geographically...
The innovation in wireless technology is to support in the areas of Intelligent Transport System (ITS). Wireless technology can be used in Vehicle-to-Vehicle and vehicle-to-infrastructure in transport applications. ZigBee is the key protocol for sensor network applications because of the long battery life, low-cost for installation, eases maintenance and small footprint. ZigBee enables mesh networking...
Denial-of-Service (DoS) attacks are recognized as a biggest threats due to the resources constrained property in wireless sensor networks(WSN). Especially, using some mobile nodes, we can attack the cluster heads in clustering network, this jamming can cause a serious damage in performance of WSNs. Because the cluster head collect and fuse the data from all nodes in cluster, and forward to the base...
Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day...
The following topics are dealt with: mobile network; I/V communication; features scene categorization; texture classification; image classification; video surveillance sequences; wireless sensor network and protocol; face recognition; cryptography and watermarking; video coding; content based indexing and retrieval; signal and speech processing; and biomedical image processing.
Low-power personal area networks (LoWPANs) are still in its early stage of development, but the range of conceivable usage scenarios is tremendous. The numerous possible applications of Wireless Sensor Networks (WSNs) make obvious that mesh and multi-technology topologies will be prevalent in LoWPAN environments and mobility support will be a necessity. Mobility based communication can prolong the...
The widespread use of electronic equipments and their integration into the vehicular system have become a necessity in the automobile industry. The Smart Transducer concept -along with IEEE Standard 1451- improves the scalability of these networked electronic devices into a vehicular system. This paper describes the design and implementation of a real-time environmental wireless sensor network that...
The paper is devoted to logical implication of MANet's protocols for gateway discovery in IPv6 Wireless Sensor Networks (IPv6-WSN). We implement three approaches in NS-2 simulator and evaluate its performance under the specified field of the networks of gateway discovery. The performance results present the packet delivery ratio and delay of end to end communication networks. The AODV protocol is...
Wireless sensor network which is composed of a large number of low-cost, low-power, multifunctional sensor nodes deployed in a remote environment to monitor and analyze the data collected in the physical world in a timely manner. Based on the feature of nodes with limited energy, people have done some deep research on the prolongation of the lifetime in the WSN. In this paper, we focus on reducing...
This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-to-catch/observe wildlife in their natural habitat. CARNIVORE consists of a network of mobile and static nodes that have sensing, processing, storage, and wireless communication capabilities. One of CARNIVORE'S notable novel features is its robustness to intermittent node connectivity since, depending...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.