The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lately, there has been a growing interest in connecting opportunistic routing (OR) and low duty-cycling methodologies in underwater sensor network (UWSNs) applications. This connection improves the data collection reliability and prolongs the network lifetime. When sensor nodes operate in a duty-cycling manner, the properly sleep interval selection and its on-the-fly adjustment should be addressed...
Current pre-silicon verification techniques can not guarantee error free designs for complex integrated circuits during their first fabrication. Some errors are only uncovered when the device is running at full clock speed. Using post-silicon debug techniques, the designer can monitor the device capturing errors that occur only after millions of clock cycles. However, in order to identify the cause...
In critical applications like military field, industrial safety methods, fire accidents and for particularly secured communications, many sensor nodes are used. These sensor nodes always maintain their battery power for a long time period so we can use a sleep scheduling method. Two known traffic paths are used for monitoring process. If an event occurs in a region, an alarm is carried through the...
Current cloud computing data centers are usually based on large-scale clusters, including thousands of servers. The monitoring and management of resource is very important to the operation of cloud systems, which usually employ the traditional centralized monitoring mechanisms. The main defects of the centralized management mechanism are the bottleneck of system, the communication traffic and the...
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become...
Middleboxes are adopted to enhance network functions, e.g., providing security and guaranteeing performance. Some applications require flows to sequence through several middleboxes, and such stateful policy routing is challenging for network administrators. The goal of the management is to distribute well middlebox resources and avoid overloads, thus protecting networks from malfunctioning. Furthermore,...
Vehicular environments are vulnerable to attacks because of the continuous interactions between vehicles despite authentication techniques deployed by communication standards. In fact, an authenticated node with a certificate could initiate an attack while complying with implemented protocols if it has malicious intentions and benefit from this always on connection to threaten the network accuracy...
Accurate and efficient network-wide traffic measurement is crucial for network management. Recently, Software-defined networking (SDN) has opened up new opportunities in network measurement and inference. In this work, we demonstrate an efficient flow measurement and inference framework which performs adaptive measurement with online learning. Using the reprogrammability of SDN, we assist network...
Network operators invest significant resources in monitoring and troubleshooting the infrastructure they run. Currently, the availability of large networks of probing devices, like, for example, RIPE Atlas, dramatically increases the amount of data an operator can rely on. In particular, the large amount of traceroutes they can produce are both an opportunity and a challenge. In this paper we provide...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
A lot of mobile network works in today network Mobile Ad-hoc Network is a special kind of network which works on variable (not fixed) networks. Due to dynamic characteristics and addictive functionality, these are suffers from various types of attacks. Black-hole and gray-hole attack is one type of attack which harms and attacks on MANET. In this attack the malicious (unwanted node) distract the data...
Network coding technique based wireless sensor network for environmental monitoring is described here. The network coding is implemented in CC2530 microcontroller and the performance of wireless sensor network is evaluated by analyzing packet delivery ratio (PDR) and packet error rate (PER). It is observed that the resources can be shared among the nodes with minimum number of transmission and repetition...
Cyber-Physical System on Chip (CPSoC) is a special class of MPSoC consisting on-chip sensor-actuator integration to achieve self-awareness. This design sophistication is acquired by implementation of traditional processor cores along with virtual sensing and actuating IPs and connecting them by means of Network on Chip (NoC). In case of NoC, the network topology and routing decides the throughput...
In today's era security is one of the main concern in every field also in wireless sensor networks. Resource limitation is main concern of sensor nodes in wireless sensor networks. There are many security threats which are affecting the, functionality, security and network life time of and wireless sensor networks. In this paper security threats, security goals, various attacks, classification of...
Underwater sensor networks are promising apparatus for the discovery of the ocean. For localization and networking protocol, this sensor network requires new robust solution. For terrestrial sensor network various localization algorithms and routing protocols have been proposed, there are very few localization and routing techniques for UWSN. Compare to terrestrial sensor network the features of underwater...
Ad-hoc Networks are multi hop network in which there is no need of central administration. Each and every nodes in Ad-hoc networks act as router to send and receive data. It means cooperation among the nodes is important for establishing communication between sender and corresponding receiver. It is not necessary that each node act as a cooperative node, some nodes can intentionally act as uncooperative...
Wireless sensor networks require protocols which are energy efficient to improve the network lifetime. This work mainly focuses on the cross-layer implementation that takes routing module and MAC module for the required application. At the routing layer unequal clustering is taken, which employe tunable range for cluster radius and eliminates the burden on nodes which are near to base station. At...
To solve problems that existed in wired water monitoring system, such as high cost and restricted monitoring water range, a kind of Lijiang River water environment monitoring system is designed based on WSN. In order to ensure long survival time of the sensor node and a high performance of routing node, MSP430 and ARM32F107 processor are employed respectively. After preprocessing data, MU709 3G module...
A distributed and collaborative nature of wireless sensor network cause many challenges to provide security in network. Most of the outsider's attacks are prevented by encryption and authentication technology, but to control insider attacks are difficult. A malicious sensor node causes lot of packet losses, energy wastage and increase in time to reach final destination. In this paper, Enhanced Beta...
The wireless sensor network (WSN) consist of wireless sensor nodes, which are deployed randomly in a surge of unforeseen applications. Topology Control (TC) is the most essential approach used for minimizing energy consumption that extends the in WSN time. Also increases the throughput of the topology and minimize the radio interference. The aim of the proposed context aware topology control is to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.