The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANET and WSN, both technologies are useful in emergency communication, but nowadays other techniques are also playing efficiently. IoT is one of them that can help in emergencies due to its quick data-transmitting capability, from the sensor to server, or application through the cloud or monitoring station, directly. This paper reviewed existing projects of WSN, MANET and IoT involved in sensing...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
In this article, we propose to use game theory to model our WSN network. In this setting, the goal of the compromised node is to keep disrupting the network while remaining alive. The game studied is a two-player quantitative infinite game on a finite graph, where each transition can change some energy levels and some reward. The goal of the compromised node is hence to maximize its reward while maintaining...
Clustering algorithm incurs significantenergy consumption for clusters and its ClusterHeads (CH) in Wireless Sensor Network(WSN). WSN brings a new attention over a real-timeintelligent system with its limitations and gainedmore research challenges. In last few years, WSNcan be used and seen in many real time applicationslike disaster management, pollution monitoring, temperature monitoring, traffic...
In this paper, a communication load balanced dynamic topology management algorithm (CLB-AODV) is proposed to extend the wireless sensor network (WSN) lifetime via managing the participation in communication process among all nodes in the network. The idea is that, each time there is a failure in the network topology; the topology is adjusted only on-demand by choosing the best path according to paths...
An Internet of Things (IoT) application that employs wireless transmission data such as Wireless Sensor Node need to be designed well enough, So its data doesn't loss in its transmission between the node. Therefore to build an IoT application such as Wireless Sensor Node path loss propagation model is a must. In this paper, we proposed a new path loss model to be used on a near ground 2.4 GHz Wireless...
Science of networking is still a relatively immature area. Proposing an efficient dynamic routing protocol for MANET is an arduous and provoking task. Various protocols for routing phenomenon have been proposed to IETF [1]. Considering an ad-hoc network which is specified by frequently changing topology and infrastructure less connectivity, a protocol must be tested under realistic conditions but...
Within wireless networks, an unauthorized or malicious wireless device can receive broadcasted messages or broadcast its own messages at any time provided it is within signal range of other wireless network nodes. Wireless networks have a higher rate of bit errors (BER) when compared to wired networks. The frequency of attacks on networks has grown in parallel with development of wireless networking...
Because the wireless sensor network (WSN) has the characteristics of dynamic change of network topology, wireless link interference, and many-to-one, it is easy to cause congestion in wireless sensor networks. Analyzing the current congestion detection algorithms, Aiming at the characteristics of wireless sensor networks with limited data source, proposed congestion control algorithm based on a small...
Self-stabilizing systems have in theory the uniqueand provable ability, to always return to a valid system stateeven in the face of failures. These properties are certainly desirablefor domains like wireless ad-hoc networks with numerousunpredictable faults. Unfortunately, the time in which the systemreturns to a valid state is not predictable and potentially unbound. The failure rate typically depends...
Wireless Sensor Networks (WSNs) have become prolific in the past few years as low cost and easily deployable means to collect environmental data. With the increased scope of applications of WSNs it is imperative to assure security of the network itself against attacks, as well as to assure privacy and integrity of the data that is being collected and transmitted through the network. The I-TRM (Integrated...
The interconnection of distributed sensor nodes that is used to measure the sensor data in remote locations is called as Wireless Sensor Network (WSN). Each of the sensors is interfaced with a microcontroller to form wireless sensor node. Different types of devices like PDA'S, laptops, television etc., are used in consumer electronics that use different software and protocols. There is no common communication...
Forest is one of the most valuable and indispensible natural resource. The forest fire is one of the natural disasters that destroy the forest not only in India but countries like Australia, USA etc which is called as bush fire, wild fire respectively. Now in terms of deploying Wireless Sensor Networks for forest fire monitoring and detection, there is a need to investigate appropriate routing protocol...
Trust is a soft security solution for Ad-hoc Wireless Networks such as Mobile Adhoc Networks (MANETs), Wireless Sensor networks (WSNs). Due to openness of the networks a malicious node can easily join and disrupt the network. Trust models are used to discriminate between legitimate and malicious nodes in the network. The characteristics of MANETs and WSNs are different so, there are some significant...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
Localisation in wireless sensor network is the process of determining the geographical location of the sensor nodes. Conventional localization is space oriented which uses GPS (Global Positioning System) signal to obtain the location information of the nodes. But the GPS signals fail to work in indoor environments, the reason for which it becomes mandatory to opt for terrestrial localisation. The...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
Lately the use of wireless sensor networks for monitoring seismic events has increased; however, these networks depends on the previous acknowledge of the infrastructure and topology. This topology can’t be updated if any of the nodes is lost during a seismic event, in addition the orientation of the first seismic wave can’t be predicted; because of this, it is necessary to use a type of dynamic network...
WSNs are gradually penetrating all spheres of security, industry and civil sectors. Since the very inception of the concept, a need for enhancing energy efficiency and longevity of the networks is felt. Routing protocols designed for WSNs have evolved over the years in order to serve this purpose better. This paper summarizes the concerns of a WSN and discusses how these were addressed through innovations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.