The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Wireless Sensor Networks (WSN) with a clustered hierarchical structure, Cluster-Head (CH) nodes are considered the interface between the leaf normal sensors and the Base Station (BS). The energy dissipation of the sensors, whatever their type, can be optimized by a load balancing in the packet TX/RX process in order to prolong the network lifetime and minimize the advertisement phase time for cluster...
Wireless Sensor Networks can play an important role in real-time monitoring of buried pipelines and reporting damages more efficient than traditional approaches (i.e. Wired Sensor Networks, and mechanical robots). Wireless pipeline monitoring sensor networks offer accurate, continuous, and real time data monitoring along the pipeline. This can be of a great help in planning preventive maintenance...
The basic purpose of wireless sensor network is to optimize residual energy of nodes and extend the life-time of network. This paper provides an improved algorithm for cluster head selection by reducing network overhead on clusters and transmits the data from source to sink through expanding nodes' life-time. This paper provides method for transmitting data by dividing nodes into different levels...
Problem of Congestion in Wireless Sensor Network (WSN) is an area which draws attention of various researchers in recent years. The challenge lies in developing a model for routing which can find the optimized route on the basis of distance between source and destination and the residual energy of the node. Various models have been proposed and developed from time to time and their merits and demerits...
In opportunistic networks, rather than accepting an end-to-end communication in the conventional Internet model. Opportunistic networking stems from the research area of mobile ad-hoc networks (MANET). Opportunistic networks are wireless networks in which a completely connected path from source to destination is not likely to exist. Mobile ad hoc routing protocol allows nodes with wireless adaptors...
In this paper1, we present a novel application specific routing protocol called LEADER (Leader Election in Wireless Ad hoc Networks for Efficient Routing) based on leader election and cluster head scheduling. The proposed algorithm is intended to be used for routing data in smart grid environment, e.g., monitoring events from the electrical power generators. The events may include different environmental...
Existing measurement frameworks typically assume that the communication protocols and mechanisms running on the devices do not change during network operation. However, recent research efforts show that by enabling devices to switch between protocols and mechanisms at runtime the overall network performance can be improved. In this paper, a novel measurement framework that enables the continuous and...
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means “for this purpose” formed network instantly when nodes are connected in network for communication. Ad hoc network is a temporary network built for specific purpose. It does not require any pre-established infrastructure. The dynamic nature of ad hoc networks makes them more utilisable. On the other hand, selfish...
Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user's network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric (i.e., the router implementing the decoy routing...
The IPv6 Routing Protocol for Low-power and Lossy networks (RPL) is a standard routing protocol to realize the Internet of Things (IoT). Since RPL is a tree-based topology network, an attacking node may falsely claim its rank towards neighbor nodes in order to be chosen as a parent of them and to collect more packets to tamper. In this paper, we propose a secure parent selection scheme so that each...
This paper describes a special class of Wireless Sensor Networks (WSN), called Linear WSN (LWSN), where nodes are deployed along narrowly stretched geographical areas and form a linear topology. LWSNs are characterized by sparse node deployment, long transmission distances and alignment of nodes a long a virtual line. This range of characteristics introduces new challenges, which makes solutions proposed...
In association with recent advancement in wireless communications as well as penetration of wireless devices with sensing, computation and wireless communication capabilities, the wireless sensor networks have become an important research area due to their potential for providing cheap and flexible solutions to data monitoring and device actuation. And, many studies have analyzed routing effectiveness...
There is advantage of fixed physical location for airfield lighting in airport lamp monitoring using WSN, but some lamps location is irregular, which caused large consumption of the cluster head nodes in this logic region, early death, the formation of voids during transmission, and these voids undermined the entire wireless sensor networks energy balance, reduced the WSN lifetime. To solve these...
Wireless Body Area Networks (WBANs) is a new technology for remote monitoring of patients. Sensor nodes are placed on different parts of the body such as implants and on body to collect data and transfer to the Sink node. Change in body posture, placement of sensors, priority of sensor data and energy consumption makes routing very difficult. Therefore, a Priority based Energy Aware (PEA) routing...
WSN (Wireless Sensor Networks) is a distributed sensor network, with its ends being the sensors able to sense and detect the external world. As the sensors in the WSN communicate in a wireless way, network setting is flexible and equipment location is uncertain. A wireless sensor network system typically includes end device, sink node and coordinator. The routing protocol in a wireless sensor network...
Different aspects of Wireless sensor networks (WSN) are currently being studied. Some of the important aspects would be clustering, routing and security. This paper looks at the problems arising due to wireless routing between nodes of a medical WSN. Here, the focus is on selective forwarding (SF) attacks. As a solution, we have described a secure routing protocol with test-bed simulation results...
NoC based high performance MP-SoCs can have multiple secure regions or Trusted Execution Environments (TEEs). These TEEs can be separated by non-secure regions or Rich Execution Environments (REEs) in the same MP-SoC. All communications between two TEEs need to cross the in-between REEs. Without any security mechanisms, these traffic flows can face router attacks in REEs. Both routing table and routing...
In the MPLS architecture, there is a strong argument to virtualize network functions ahead of implementing SDN. Because it is a relatively new investment, the MPLS represents an opportunity to create a foundation architecture that will scale over. Moreover, there are two other closely linked in networking occurring in the same time NFV and SDN who can deliver benefits to the MPLS backbone and edge...
Wireless sensor networks (WSN) face different security threats that disrupt the normal activities and degrade the performance of the networks. The wormhole attack is one of the most severe security attacks in WSN. In this paper, we analyze the effect of the wormhole attack in Optimized Link State routing (OLSR), which is a standard proactive routing protocol for WSN. A modified version of wormhole...
One advantage of content-centric networking lies in its built-in support for multipath forwarding. In this paper, we propose a multipath forwarding strategy in order to fully utilize available bandwidth in a content-centric network. Using the proposed strategy, each intermediate router sensibly adjusts the amount of traffic forwarded over a given face (among a set of faces) associated with a content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.