The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are susceptible to clone attack due to open deployment of sensor nodes in hostile environment and lack of physical shielding. Node clone is an attempt where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network...
Wireless Sensor Network is a network of small battery powered sensing devices (known as sensing nodes), capable of sensing the physical parameters like temperature, humidity, pressure, motion, etc. from its environment of deployment and report it to a central node called base station. These nodes collaborate with each other to fulfill their task. As the energy source is constrained in WSNs, it should...
For providing efficient data security, sensitive data has to be doubly encrypted in public clouds. Recent approaches to perform the two layer encryption the data owners carry out coarse grained encryption, whereas the cloud implements a fine-grained encryption on top of the owner encrypted data. But in this for searchable encryption points, it was done using Plaintext keyword search or Single keyword...
For proper and efficient design of wireless sensor network, minimum energy consumption within the sensors and a longer lifespan of sensor network has been posing a serious challenge for the engineers and scientists. Clustering infrastructure which allows efficient use of available resource has great potential in solving the problems of resource limited wireless sensor network. Attempts are made in...
The need for building large networks is on the rise due to rapid growth of number of internet users and also in data centers where large number of switched networks are formed. Hierarchical structure is the most preferable way of handling complex systems of any kind. Hence in this paper we devise a large hierarchical switched network using OpenFlow and propose the concept of adaptive replacement in...
Using wireless sensor networks in residential building electrical monitoring changes the style of wire-based measurement and facilitates the design of the system. The wireless communication mode takes new problems such as the transmission efficiency and energy consumption of data transmission. To solve these problems, this paper discusses the characteristics of the network topology for energy measurement,...
The inevitability of IPv6 has come to fore. How to resolve the problem of IP address registration has been a great challenge for network management. The existing solution uses manual registration mechanism, not suitable for dealing with massive IPv6 addresses. Based on the Extensible Provisioning Protocol, we propose an “EPP-IP” mechanism to achieve a flexible and automatic registration management...
An accurate model of network topology is the fundamental to design a new network protocol. Recent efforts have been made to produce many topologies for the Internet, but few can give attention the power-law distribution characteristic in each tier of the Internet. We propose Leetar, a new Internet topology generator, which can generate topologies that contains many tiers and each tier match the power-law...
Due to the hostile environment and the limitations of the wireless sensor networks (WSN for short), a feasible and efficient key management scheme becomes one of the critical issues in WSN. Many protocols proposed before didn't pay much attention to the key protection and revocation issues. So, to address these problems, we put forward a new dynamically clustering key management scheme based on secret...
Large-scale P2P systems typically have hundreds of thousands of peers that involve frequent dynamic activities. Empirical studies have shown that participating nodes in P2P systems are not equivalent. Such heterogeneity has been taken into account in the design of P2P systems. In this paper, to achieve better scalability and improve the routing performance of REIK, we design a novel hierarchical REIK...
To balance energy consumption for nodes in wireless sensor network (WSN) is an important considering factor. A simple model is set up to analytically evaluate the energy consumption in WSN by using aggregation mechanism. It is show that energy consumption of an aggregation node increases so rapidly in the neighborhood of the sink node. A modified hierarchical data aggregation strategy is proposed...
Time Stamp Protocol (TSP) is a basic security component in e-world, and Time Stamping Server (TSS)as a Trusted Third Party (TTP) generally is implemented on Internet other than in LAN. The acquiring reliability of the existing time-stamp protocols has been mainly focused by researchers in recent years, but the time delay problem produced by frequent time-stamp request has not been paid enough attention...
Real-time transport control protocol (RTCP) is the control protocol of real-time transport protocol (RTP), with responsibilities such as quality of service (QoS) adaptation, implementation, and troubleshooting. Various problems with RTCP have led to alternative designs, one of which is a hierarchical design named scalable-RTCP (S-RTCP). In this article, we explain about the weaknesses associated with...
Routing is the main research issue in the development of wireless mesh networks (WMNs). Many of the routing approaches have been borrowed from mobile ad hoc networks (MANETs) to achieve routing solutions in WMNs but are not ideal or optimal and do not utilize the characteristics of WMNs to their benefits. In this paper, we propose an improved hierarchical AODV routing protocol (IH-AODV), which exhibits...
In this paper, we purpose a new routing protocol based on applications of hierarchical routing protocols, named as ldquoMulti-Level Cluster-based Hierarchical Protocolrdquo (MLCP) for large-scale mobile ad hoc networks. Our approach organizes nodes into different levels of clusters. MLCP maintains a hierarchical topology, where elected cluster-heads at lower level do not participate to next cluster-head...
Clustering allows for data aggregation which reduces congestion and energy consumption. Recent study in battery technology reveals that batteries tend to discharge more power than needed and reimburse the over-discharged power if they are recovered. In this paper, we first provide an online mathematical battery model suitable for implementation in sensor networks. Using our battery model, we propose...
This paper presents algorithms that (1) facilitate system-independent synthesis of timing-interfaces for subsystems and (2) system-level selection of interfaces to minimize CPU load. The results presented are developed for hierarchical fixed-priority scheduling of subsystems that may share logical recourses (i.e. semaphores). We show that the use of shared resources results in a tradeoff problem,...
In a two-level chord-based hierarchical peer-to-peer system, nodes from the first-level overlay network, called supernodes, act as gateways to peers organized in the second-level overlay. Collision occurs when peer-to-peer operations create more than one supernode with the same node identifier in the first-level overlay. Collisions are reported to enlarge first-level overlay by more than 12 times...
Time synchronization in wireless sensor networks (WSN) is important for accurate time stamping of events and fine-tuned coordination of duty cycles to minimize power consumption. This paper presents a novel chained-ripple time synchronization (CRIT) protocol that is fast, flexible, and high-precise in WSN. CRIT adopts hierarchical and multi-hop time synchronization architecture with supporting the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.