The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clock synchronization significantly assists in enhancing the data quality during the data dissemination phase from sensors to the base station. The existing studies towards addressing time synchronization errors don't address the associated latent problems in it. Therefore, this paper introduces a novel technique called as LNLCS i.e. Leveraging Network Lifetime using Clock Synchronization. The technique...
Wireless Sensor network (WSN) has added a new dimension in the field of wireless communication. As the sensor nodes are placed at remote places and are equipped with limited sources of battery power, proper energy efficient routing algorithms as well as clustering protocols are highly needed to make the system more energy efficient. Such an energy efficient clustering algorithm has been presented...
Wireless sensor networks require protocols which are energy efficient to improve the network lifetime. This work mainly focuses on the cross-layer implementation that takes routing module and MAC module for the required application. At the routing layer unequal clustering is taken, which employe tunable range for cluster radius and eliminates the burden on nodes which are near to base station. At...
Wireless Sensor networks (WSN) is basically comprised of sensors that are spatially distributed with self-ruling capability, which monitors physical or environmental conditions such as, pressure, temperature, motion, sound and so on. Sensors also passes all the related information throughout the network. As the number of nodes and size of the network increases, there will be rapid increase in internet...
To solve problems that existed in wired water monitoring system, such as high cost and restricted monitoring water range, a kind of Lijiang River water environment monitoring system is designed based on WSN. In order to ensure long survival time of the sensor node and a high performance of routing node, MSP430 and ARM32F107 processor are employed respectively. After preprocessing data, MU709 3G module...
Firefly algorithm is a new nature inspired algorithm for optimization that needs to be explored further to solve a number of problems to show its real potential. Routing is a well known techniques for prolonging the life of the wireless sensor networks. The current work focuses on solving aforementioned related problem using firefly algorithm. The Routing algorithm is developed with novel fitness...
Bacterial Foraging Optimization Algorithm (BFOA) is a widely accepted nature inspired global optimization algorithm. CH selection and Routing are well known techniques for enhancing the life of the wireless sensor networks (WSN). In two tired routing architecture, CH demises earlier due to its extra function. Therefore, proper care taken while selection of CH's. The current study focuses on solving...
In recent time, Wireless Sensor Networks (WSNs) is getting popular in wide range of applications. WSN is the network of Sensor Nodes (SNs) in which each node have sensing, communication and computation facility. The main limitation of WSN is that SNs have limited energy. So the main focus of research in WSN is to improve the Network Lifetime by plummeting energy consumption. Several locations aware...
In Wireless Sensor Networks (WSNs), sensor nodes are power constrained and have restricted lifetime. This necessitates understanding how much long the network prevails its networking operations as it is first concern of mission critical applications. In recent years, to increase network life, proper uses of routing protocols have been proposed. Soft-computing (SC) technique highly addresses their...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
The sensor nodes are independent and work as sender, receiver and intermediate node in Wireless Sensor Network (WSN). The sensor nodes are forming the small network in which the one or more sender is sending data to one destination/s through intermediate nodes or sending information to Base Station (BS). The information collect by base station is further analyzed. The nodes are also static or mobile...
A synchronized network time is always necessary for scheduling to achieve energy efficiency, data fusion, localization for WSN applications. The major limitation in a WSN is the battery usage and lifetime of the nodes. Due to the power restriction of nodes, efficient routing is very important to save the battery of sensors to enhance the lifetime of the sensor area. The multi-head chain concept is...
A WSN consist of a large number of small, low cost devices called sensor nodes deployed in an area. These sensor nodes are used for the purpose of monitoring different physical parameters of that particular area. The sensor nodes consist of a low power, irreplaceable battery which has a limited lifetime. To achieve long lifetime of the sensor network, it is necessary to reduce energy consumption by...
The need for large scale communication and the advancement in information technology has invoked the area of Wireless Sensor Networks (WSN's) in petroleum industry. Adhoc network is a set of nodes, which communicate with all other without using several predefined framework, access point before unified supervision. WSN's are equipped with more than thousands of sensors, actuators and controller. Each...
A number of improvements in WLAN leads to the deployment of Wireless Sensor Networks. Generally, WS N is a collection of a number of sensor nodes. Because it is very easy to deploy these sensor nodes so WS N gets popularity very quickly. The main applications of WS N are rescue mission & monitoring the temperature of environment etc. But as WS N has open access so security is very important. A...
Security in wireless sensor networks is critical due to its way of open communication. Packet modification is a common attack in wireless sensor networks. In literature, many schemes have been proposed to mitigate such an attack but very few detect the malicious nodes effectively. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its...
In remotely deployed Wireless Sensor Networks (WSN) software faults may occur due to sensor nodes process failures. Fault diagnosis remains a challenging task due to physical inaccessibility of sensor nodes, energy constraints and varying application requirements for latency and reliability. WSN once deployed resort to fault management mechanisms to ensure continued operation. While fault detection...
An optimized coverage algorithm based on the improved PSO is put forward targeted at the issue of coverage and energy consumption in the data-collection-oriented wireless sensor network (WSN). Through improving the valid position of the PSO's computational nodes, the work nodes covering the monitoring zone are chosen according to the network coverage quality to be properly moved. The simulation experiment...
In a Wireless Sensor Network, the medium access control (MAC) layer protocol design is very important due to the constraint of the limited processing capability and the power on wireless sensors. Recently, the IEEE released a revised version of the IEEE 802.15.4, referred to as IEEE 802.15.4e, which defined the Slotted Channel Hopping (TSCH) mechanism. The TSCH then adopted the slotframe structure...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.