The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The area of wireless sensor network (WSN) is shrouded with the issues of routing protocol that has been witnessed in the last few decade in the research community. One of the direct influences of routing protocol is the performance of data aggregation in WSN. This paper presents a novel routing protocol that performs a cost effective, reliable and robust routing mechanism in wireless sensor network...
This paper elucidates an Energy Efficient Cluster Based Routing Protocol (EECBRP) for wireless sensor networks. It accomplishes ameliorate performance by means of network lifetime and energy efficiency. It is used to pile up data from scattered sensor nodes and transmit the same to a base station. EEBCRP is designed to shore up the remote monitoring in sensor networks, periodically. Major issues here...
Energy efficiency is one of the key requirements in Wireless Sensor Networks (WSNs). In order to optimize energy usage at sensor nodes, this paper proposes a new WSN architecture that relies on concepts of Software Defined Networking (SDN). Since SDN is a relatively new technology, originally envisioned for wired networks, it can't be expected to get immediately adopted in WSN domain, regardless of...
Energy efficiency is the most challenging topic in Wireless Sensor Networks (WSN). Because of the increasing demands of various applications, and the constraints of energy, memory and computational power of the WSN nodes, many studies have focused on these areas in recent years. Researchers have proposed a variety of protocols such as LEACH, PEGASIS, HEED, TEEN, etc. In this paper, we will discuss...
In WSNs (Wireless Sensor Networks), sensor nodes are typically battery powered. As a result, network lifetime becomes a major optimization objective in the design of a WSN. We investigate the problem of lifetime-aware data collection in a WSN with only one base station. We propose an efficient distributed algorithm for constructing a routing DAG (Directed Acyclic Graph), namely, R-DAG, for data collection...
In this paper, we propose an Extended-LEACH protocol that integrates an efficient multi-hop routing scheme in distributed clustering algorithms. In addition to energy saving, Extended-LEACH solves the issue of isolated cluster head nodes. The latter appear especially when distributed clustering protocols are deployed in wide wireless sensor networks. In contrast to some earlier work, Extended-LEACH...
Delay-tolerant networks (DTNs) are a promising network architecture which can provide reliable multi-hop message transmission between participating mobile nodes in an unfavorable environment that is prone to link disruption and disconnection by replicating and relaying messages without any need of physical infrastructure. Additionally, DTNs can also operate as cooperative DTNs to extend the coverage...
With the spread of mobile devices and development of the network, the user can use the data anytime anywhere. Especially, most users have become more sensitive to the quality of communication for the use of real-time video services. In this paper, we propose the SDN-based device-assisted network that improves network environment by device's feedback on the status of the network. When low network performance...
In this paper, we consider the use of device-to-device (D2D) communications for extending the coverage area of active base stations in the case of public safety communications with partial coverage. A 3GPP standard compliant system level simulator is developed for D2D and heterogeneous network (HetNet) technologies considering public safety scenarios. The simulator is used to evaluate the performance...
One of the significant constraints of sensor nodes is their limited battery power due to which they are prone to fail. The sensor nodes may also get damaged due to various natural hazards or other reasons. Due to these constraints the wireless sensor networks become unreliable. This paper proposes a distributed clustering approach with state-full architecture; a protocol, RS-HEED (Reliable, State-full...
Delay Tolerant Networks (DTNs) have attracted significant interests due to the adaptability in areas without infrastructures. In such scenarios, moving data from one place (landmark) to another place (landmark) is essential for data communication between different areas. However, current DTN routing algorithms either fail to fully utilize node mobility or have additional requirements that cannot be...
Data aggregation at the bottom station with entity nodes act as the root for overflow of the information which consequences in peak power utilization. To diminish this dilemma a new data aggregation technique has been proposed called ERA which has improved the performance of the WSNs by using the group based data aggregation but even then it has some limitations. In order to overcome the drawbacks...
A wireless sensor network (WSN) composed of a enormous quantity of multifunctional wireless sensor nodes. General Self-Organized Tree-Based Energy-Balance Routing Protocol (GSTEB) is a protocol which is proposed for wireless sensor networks and is used to reduce the entire energy utilization and to balance the wireless sensor networks load. Although GSTEB wants base station to determine the topography,...
The wireless sensor network routing strategies determine the lifetime and the energy consumption of the sensor networks. An algorithm on calculating the approximate maximum network lifetime is presented by establishing the wireless sensor network routing strategy planning model. Through the simulation, the amount of information acquired during the network lifetime could account for 98.2% of the maximum...
The unprotected surroundings of a sensor network makes relatively easy for an adversary to eavesdrop the network. Even though there is wide range of protocols for providing content privacy, the contextual information remains exposed. So adversary will use this contextual information to perform attack on source node or sink node. The existing methods for location privacy protect the network only against...
Wireless sensor networks consist of small battery powered devices with limited energy resources. The small sensor nodes are usually inaccessible to the users due to their remote deployment. Non functioning of any sensor due to its loss of battery power not only deteriorates the network performance but also a challenging job for replacement of energy source. Hence, energy efficiency is a key design...
Wireless sensor networks are susceptible to clone attack due to open deployment of sensor nodes in hostile environment and lack of physical shielding. Node clone is an attempt where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network...
Future cellular networks will be owned by multiple parties, e.g., two mobile operators, each of which controls some elements of the access and backhaul infrastructure. In this context, it is important that as much traffic as possible is processed by the same party that generates it, i.e., that the coupling between traffic and network ownership is maximized. Software-defined backhaul networks can attain...
For many years, opportunistic networks have gained fame in research and industry as a natural evolution of mobile ad hoc networks (MANETs). It is a more common concept of delay tolerant networks, which opens an exciting path for connecting nodes opportunistically. It communicates wirelessly and at the similar time expands the possibilities for real-life application problems. In this paper, a base...
We develop the data transfer system on a connected network consisting of simple wireless mesh base stations which can be immediately deployed at the disaster-stricken areas at the super-wide area disaster. This system requires the mechanism to correspond a dynamic change of disconnection and connection of links, an ad-hoc network construction with easy operation, and a scalable and reachable wireless...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.