The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) consist of an enormous number of tiny sensor nodes deployed in huge numbers which are able to sense, process and transmit environmental information to the base station (BS) for a variety of applications. Energy efficiency is one of the primary concerns for maintaining WSN in operation. In this study, an energy efficient clustering protocol based on K-means algorithm...
In this document, a protocol LEACH-1R meant for energy efficient & mobility aware congestion control is provided for MWSN. A LEACH-1R that transforms the LEACH by making use of first clustering round & performing the inter-cluster choosing of new CHs (cluster head) rather than aggregated reclustering. A MWSN is termed as a set of wireless mobile nodes & base station that generates an ad-hoc...
WSNs are often besieged with issues related to interference when transmissions of two or more closely located sensor nodes interfere with each other. This forces the data aggregating nodes to receive distorted, faulty or interference ridden signals, which severely affects the fidelity of data being aggregated. If such faults are not arrested at the source, interference laden transmissions or Interference-Faults...
The impact of various mobility models like flag mobility and random waypoint mobility models on QoS issues in MANET and WSN are studied. The performance of the MANET and WSN are evaluated for the mobility models using QualNet 6.1 simulator. Performance is concerned with the Average End to End delay, Jitter, Throughput and also total messages received. which are studied for the various mobility models,...
Generally the data sensed by the sensors are collected and routed to the sink in a specific manner for further processing. In this proposed work, the sink node is dynamic rather than being mobile. The dynamic sink collects the data from the pervasive environment continuously. The dynamic route (path) to the sink is established, maintained and updated. Finally the comparison is made between the mobile...
Nowadays the energy consumption has become a critical challenge in Wireless Sensor Network (WSN). Wireless connection suffer from some weaknesse chiefly fault detection and energy efficiency which stay again the main problems in (WSN). Both was under the scope of research communities and industry engineers. We are interested to the IEEE 802.15.4 standard with beacon enabled mode. IEEE802.15.4 is a...
Industrial systems demand high degree of reliability and real-time requirements in communications. To meet the stringent real-time performance requirements of control systems, there is a critical need for estimation system schedulability before system running. Concerning this issue, in this paper, we propose a supply/demand bound function analysis approach based on earliest deadline first scheduling...
Wireless Sensor Network (WSN) based acoustic monitoring is useful for ecologists for the purpose of monitoring real-time wildlife behavior across remotely located large areas, for long periods and under variable weather/climate conditions. However, stringent requirements for intense data processing and data bandwidth across network nodes makes applicability of WSN based monitoring limited. This paper...
Geographic Routing is suitable for the limited resource in wireless sensor networks and Ricci flow-based methods have been employed. Unfortunately, iterative process through previous methods may spend abundant energy in order to discovery route, which obviously effect their advantageous of this sort of schemes. In this paper, we focus on avoiding unnecessary iterations and propose an algorithm through...
Embedded systems with integrated sensing, processing and wireless communication are driving future connectivity concepts such as Wireless Sensor Networks (WSNs) and Internet of Things (IoTs). Because of resource limitations, there still exists a number of challenges such as low latency and energy consumption to realize these concepts to full potential. To address and understand these challenges, we...
With the advancement of technology, a surge of research interest in cognitive radio based networks in smart communities has been mounting. It is anticipated that CR-enabled networks will play a vigorous role in the enrichment of communication efficiency in neighborhood sensor area network. This paper presents a framework for Cognitive Radio based event anomaly detection mechanism. A skeleton for intelligent...
The lifetime of Energy-harvesting Wireless Sensor Networks (EH-WSNs) is ideally infinite. However, these networks are costly to implement, and unreliable due to unstable ambient energy. Consequently, Hybrid Wireless Sensor Networks (HWSNs) consisting of Energy-harvesting Sensor Nodes (EHSNs) and Battery-powered Sensor Nodes (BPSNs) gain the spotlight. Nevertheless, HWSNs confront the volatility of...
The aim of a wireless Structural Health Monitoring (SHM) system is to monitor and assess structural integrity using wireless sensor networks (WSNs). Careful node placement in wsn can be a very effective optimization means for achieving the desired SHM. In this paper, we developed the different strategies of node deployment, therefore, we report on the current state of the research on optimized node...
Healthcare applications based on WSN are gaining high popularity all over the world due to their features like flexibility, mobility and ease of constant monitoring of the patient. The main focus of such system is remote monitoring of patient, inside and outside the hospital room and in ICU.
We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim...
In this article, we consider software-defined wireless sensor networks (SDWSNs) and propose a scheme for sleep scheduling with low control overhead-based flow-entry in flow-table to overcome the limitation of control traffic in SDWSNs.
Commercialisation of the Internet of things has generated a large area of research into a variety of new applications of sensor networks. While research has been conducted into the application of wireless sensor networks for ocean monitoring. Substantial challenges exists for the reliable performance of low cost, low power wireless sensor networks operating in Gigahertz frequency spectrum on the sea...
As the devices in Wireless Sensor Networks (WSNs) are small in size, and have resource constraints such as memory utilization, power consumption, and processing speed that needs to be taken in consideration. The security and life span of sensor nodes is compromised with these restraints. The purpose of this paper is to assess the performance of the Secure Force algorithm on an 8-bit microcontroller...
In this era of wireless communication, Wireless Sensor network (WSN) has drawn considerable attention to the researchers. This paper proposes a new scheme of energy efficient routing technique in WSN for surveillance of agricultural field from a distance place. In this scheme, a crop field is equipped with different types of sensor nodes with limited power source, placed randomly for sensing various...
Wireless Sensor Networks (WSNs) consist of multiple sensors distributed in a certain geographic area. The goal of using WSNs is to monitor certain phenomena such as; environmental or physical. The nodes in WSNs transmit data through a wireless network that lacks infrastructure, which makes those networks exposed to security threats. One of those security threats is the black-hole attack which can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.