The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless underground sensor networks (WUSNs) based on magnetic induction (MI) have been recently proposed as a promising candidate for underground networking. The benefit of the MI-WUSNs compared to other solutions (e.g. so-called Through-The-Earth communication) is related to the substantially lower path loss and lower vulnerability to the changes of the soil properties. In the past, some efforts...
Wireless Body Area Network (WBAN) applications are becoming popular today. To protect patients' private data during transportation, secure wireless communications are mandatory in WBANs. Encryptions and secret keys are the base of secure communications over insecure wireless environments. Given most wireless nodes in WBANs are resource-constrained, efficiency is an implicit requirement of the key...
In an augmented information (Agi) service, users consume information that results from the execution of a chain of service functions that process source information to create real-time augmented value. Applications may include real-time analysis of remote sensing data, real-time computer vision, personalized video streaming, and augmented reality, among others. We consider the problem of optimal distribution...
As wind energy continues to expand to new frontiers in terms of the location, number, and size of wind turbines, the industry has begun to seek smarter operations and management solutions. Wireless sensing nodes could provide a low-cost platform to support a variety of applications designed to reduce the levelized cost of energy and increase the safety of wind turbines. However, a wireless sensor...
In this article, we propose to use game theory to model our WSN network. In this setting, the goal of the compromised node is to keep disrupting the network while remaining alive. The game studied is a two-player quantitative infinite game on a finite graph, where each transition can change some energy levels and some reward. The goal of the compromised node is hence to maximize its reward while maintaining...
Wireless Sensor Networks(WSNs) are expected to be used in a variety of different applications. One of the most important problems in WSNs is sweep coverage. Sweep coverage utilizes mobile sensor nodes to monitor Points Of Interests (POIs). Thanks to the mobility, sweep coverage can cover more POIs using fewer sensor nodes. In practice, mobile sensor nodes can often collect the data from POIs at a...
Wireless sensor networks (WSN) based on unmanned aerial vehicles (UAV) are ideal platforms for monitoring dynamics over larger service area. On the other hand, aerial sensor networks (ASNs) are often required to be connected with a command center for sending data and receiving control messages in real time. In this paper, we study the problem of path planning for ASNs with connectivity constraints...
The evolution of industrial wireless sensor networks (IWSNs) is driven by various factory automation applications with strict demands on latency and reliability, which requires flexible network resource allocation to support diverse QoS requirements of different applications. To this end, we propose an application-driven virtual network embedding (AVNE) scheme to facilitate the QoS provisioning for...
To enforce surrounding surveillance efficiently and reduce the heavy cost to deploy various infrastructures, mobile sinks are perceived to have potentials for utilization by wireless multimedia sensor networks (WMSNs). However, since high-mobility usually causes communication disconnections and the high re-transmission rate will consume more network resources, quality of experience (QoE) monitoring...
In recent years, Vehicular Ad hoc Networks (VANETs) has been emerged an enabling technology to provide a wide range of applications for safety and convenience of drivers. However, traditional architecture of VANETs lack of flexibility, scalability, and easy deployment of services. In this context, Software-defined networking (SDN) has emerged as a rapid innovation in the area of networking for both...
We propose a new approach towards wireless localisation related to scenarios where the device positions are known a priori, however the device IDs are not, and therefore need to be matched using RF methods. We propose a maximum-likelihood based matching algorithm called MLMatch for resolving this problem based on measured RSSI values. Since the search space of node-to-positions permutations grows...
Localization in Industrial Wireless Sensor Networks (IWSNs) promotes innovations in manufacturing applications, such as structural status mapping, instrument fault diagnosing and oriented automation system associating. However, dispersive distortion, impulse noise and interference effects causing unpredictable and time-variant effects of the signal, decrease the localization accuracy in harsh manufacturing...
In this paper we consider Underwater Sensor Networks (UWSNs) employing nodes that move freely with water currents. Localization of nodes in UWSNs depends on collaborative work of nodes in the network since GPS signals fade quickly underwater. Using the concept of probabilistic graphs to capture node location information, we formalize a problem called the Probabilistic Localization Problem (P-LOC)...
This paper considers a delay tolerant network consisting of nodes equipped with sensors, some of them producing outliers. A distributed faulty node detection (DFD) algorithm, whose aim is to help each node in estimating the status of its sensors, has been proposed recently by the authors. The aim of this paper is to analyze the robustness of the DFD algorithm to the presence of misbehaving nodes performing...
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
In concert with advances of wireless technologies in facilitating internet connectivity of Internet of Things (IoT) devices, mobile edge computing can provision and distribute computing resources at the cloudlets to efficiently process a high volume of IoT data. Among the IoT applications, multi-party data sharing among IoT devices, wireless access nodes and cloudlets is becoming increasingly critical,...
Since more than a decade, wireless sensor networks is a very attractive field in computer science and networking. Battery management is a crucial issue in the area of wireless sensor networks. The communication between a source node and a destination one may fail if both nodes are located inside a deep shadow-fading zone. Relay-selection strategy has been used in order to extend amplify-and-forward...
There is a big error in the classic DV-Hop localization algorithm in average hop distance and unknown point coordinates. We propose an improved DV-Hop location algorithm, by improving the average hop distance and introducing a checkout algorithm in the second and third stages of the classic DV-Hop localization algorithm, to improve the position accuracy. The MATLAB simulation shows that in the same...
This paper proposes a channel allocation scheme for Wide-Area Low-Rate Wireless Personal Area Networks (LR-WPAN) based on a cooperative centralized spectrum sensing approach. We refer here to a three-tiers LR-WPAN architecture, where we can distinguish the sensor devices level, the Child-coordinators level and, finally, the super LR-WPAN coordinator level. In the proposed scheme, channels allocation...
This is a brief reflexion on the life and personality of abeloved colleague, Professor Ivan Stojmenović, who left usin 2014. His achievements, his students, and the scientificand personal relationships he built will impact our community for a long time.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.