The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data gathering is a major function of many applications in wireless sensor networks (WSNs). In real world applications, it is unrealistic to guarantee all sensors have the same energy because they have different energy consumption. Moreover, sensor redeployment also results in the heterogeneous energy capacities. In this paper, An effective data gathering scheme for heterogeneous energy WSNs (EDGA)...
Wireless sensor network consisting of a large number of small sensors is effective for gathering various data in a variety of environments. Since each sensor operates on battery, energy efficient data transfer is indispensable to maximize the lifetime of the network. In this paper we propose a new data transfer protocol employed in large-scale wireless sensor network. Here only one designated cluster-head...
In this paper, we discuss the framework of cognitive radio network, analysis motivations for cross-layer design and security in cognitive radio network (CRN) first. Secondly, we proposed a novel architecture in which the dynamic channel access is achieved by a cross-layer design between the PHY and MAC layers for cognitive radio network. Moreover the resolution of cross-layer security problem is proposed...
Sensors have limited resources in terms of memory, energy and computational resources. Clustering has been proposed by researches to group a number of nodes to form a cluster that managed by cluster head. The advantage of this strategy is to minimize the number of message transmissions. In this paper, we propose clustering protocol called Centralized Dynamic Clustering CDC. Each cluster selects a...
With the advent of unbounded small-scale dust sensors being deployed in wireless sensor networks, existing authentication protocols for ordinary wireless sensor networks are becoming less efficient for dust sensors. Resource constrained dust nodes must do anything in cooperation with other nodes. Existing key management protocols require large key storage in each node, which cannot be stored in smart...
Actually, wireless sensor networks (WSNs) are used for various applications, such as habitat monitoring, automation, agriculture, and security. Since numerous sensors are usually deployed on remote and inaccessible places, and these nodes are battery powered, the deployment and maintenance should be easy and scalable. Energy effectiveness is a crucial factor in these networks. So, its software and...
In cognitive radio systems, cooperative spectrum sensing in the physical layer is highly desired to detect the primary user accurately and to guarantee the quality of service (QoS) of the primary user. Due to the energy consumption in sensing the channels, the selfish users may not be willing to contribute to the cooperative sensing while they want to occupy more idle channels observed. To deal with...
The coverage problem in sensor networks studies how to turn redundant sensors off while maintaining a required level of coverage. The existing algorithms and protocols are proven to be effective to conserve energy and prolong network lifetime, but only support a static level of sensing coverage. In contrast, many sensor network applications may require a dynamic level of coverage, which changes from...
Power consumption is an important design criterion in the design of wireless sensor networks. Hybrid radio frequency/free space optical wireless sensor networks (RF/FSO WSN) have been proposed to reduce the energy consumption of traditional RF-based sensor networks. This paper compares the performance of such a hybrid sensor network against the well-known RF-based low energy adapting clustering hierarchy...
This paper presents SSP ( Sleep Scheduling Protocol), a centralized scheme for extending the lifetime of densely deployed wireless sensor networks by keeping only a necessary set of sensor nodes active. We present an algorithm for finding out which nodes should be put into sleep mode, and the algorithm preserves coverage and connectivity while trying to put as much nodes as possible into sleep mode...
Power management for WSNs can take many forms, from adaptively tuning the power consumption of some of the components of a node to hibernating it completely. In the later case, the competence of the WSN must not be compromised. In general, the competence of a WSN is its ability to perform its function in an accurate and timely fashion. These two, related, Quality of Service (QoS) metrics are primarily...
This paper is proposing a new protocol for uniformly clustering distributed wireless sensor networks based on fuzzy inference system. The objective of this protocol is increasing the lifetime of the sensor network by uniformly distributing the clusters on the wireless sensor network by reclustering the whole network repeatedly. The uniform distribution of clusters on the network provides efficient...
Wireless Sensor Networks (WSNs) are highly distributed networks of small, light weighted, wireless nodes deployed in large numbers. These sensor nodes are immobile, non rechargeable with limited energy. The cluster-based protocols make judicious use of this limited energy. LEACH-C (Low Energy Adaptive Clustering Hierarchy-Centralized) has a drawback, a lot of energy is consumed by the nodes to send...
In the application of environment integrated surveillance, sensors are different in many aspects, such as category, initial energy and energy consume rate, etc. A lot of clustering protocols are proposed to distribute the energy consumption among nodes in each cluster and extend the network lifetime. However, most of them are not completely fit for environment integrated surveillance sensor network...
In wireless sensor networks, malicious sensor nodes send false data reports to distort aggregation results. Existing trust systems rely on general reputation to mitigate the effect of this attack. This paper presents a novel reliable data aggregation protocol, called RDAT, which is based on the concept of functional reputation. Functional reputation enables data aggregators to evaluate each type of...
Adaptability is a key strategy in the design of effective wireless sensor networks. Communication schemes need to adapt to dynamic topologies and fluctuating traffic rates. Applications have to alter their behavior to respond to mutated necessities or to cope with environmental changes. The network, as a whole, has to tolerate the disappearance of faulting nodes or the appearance of additional ones...
Wireless sensor networks consisting of spatially distributed autonomous devices required to survive in unprotected environments. They are always susceptible to attack by malicious behavior of its routers (nodes) or external enemy nodes which could negatively affect secured routing and QoS and hence, vital wireless multimedia applications. In recent times, a lot of specific severe attacks have been...
The unplanned and random deployment of a Wireless Sensor Network (WSN) may impose a high node density on a specific region. This concentration can be exploited by density control mechanisms to increase network lifetime, by deactivating temporarily redundant sensor nodes. Previous approaches for density control in WSN focus in guaranteeing full sensing coverage of monitoring area. This work presents...
Body area network (BAN) is an emerging technology which receives significant interest recent years. Typical BAN applications include healthcare, military, sports and first-responder. There is a great need to make BAN data transmission secure, accurate and protected. This paper presents a two-tier secure group communication framework (SG-BAN) for BAN data exchange, file sharing and remote display....
In the field of mobile wireless communication, energy efficient protocols are crucial in order to ensure a widespread use of wireless technologies. These protocols determine the sending strategy, i.e. the decision when, where and how much data is transmitted, as well as the packet size and field strength of the sending antenna. We defined a model for the energy household of smart sensors, who are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.