The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the existing works, a Kalman filter with recursive covariance estimation (KF-RCE) was proposed by Bo Feng et al. to sequentially estimating process noise covariance matrix. However, there may be a singular matrix existed in the KF-RCE algorithm, which would lead to unreasonable system state estimation in the system initial stage. In this paper, a threshold-based Kalman filter with recursive covariance...
Wireless sensor networks (WSNs) are susceptible to most security attacks. There are some limitations such as reliability, energy efficiency, and scalability, which affect sensor nodes. These limitations mostly affect the security of wireless networks. Also, limited capacity of sensor nodes accounts for the security attacks on WSNs. Applications such as military surveillance, traffic surveillance,...
Information plays an important role in today's world. For transmitting this information, we use a lot of different kind of network system. Among this the most widely used medium is the wireless sensor network. But due to the high end traffic of the transmission of this information, some failure takes place. Detecting this wireless sensor network failure is very important. For detecting these failure,...
One important issue associated with spectrum management in heterogeneous cognitive radio network is: how to appropriately allocate the spectrum to the secondary senderdestination (S-D) pair for sensing and utilization. In this work, the authors investigate the spectrum allocation problem under a more practical scenario, taking the heterogeneous characteristics of both secondary S-D and PU channels...
Internet of Things (IoT) is considered to be the next revolution in the field of wireless communications. This concept involves mapping of physical world to virtual (cyber) world. It is achieved by interconnecting devices having sensing capabilities using unique addressing scheme and passing their collective information to the IoT cloud. However at present, these devices belonging to different technologies...
In this paper, considering the mobility of the sensor network, a novel mobility aware medium access control protocol is discussed, which applies to the problem of utilizing mobile nodes to collect data from underwater sensor networks. The proposed underwater mobility aware medium access (UW-MMAC) protocol, based on a hybrid of random and deterministic access, can be divided into two phases. The first...
Wireless Sensor Networks (WSNs) have generated a great interest for industrial and have enabled new applications in different domains. In this paper, we present a PHY/MAC/Network analytic model for asymmetric multihop WSNs using the unslotted IEEE802.15.4 protocol and a weighted fair queuing (WFQ) scheduling that models the forwarding capability of sensors. This model can be used for cross-layer optimization...
The rise of the Internet of Things and the growth of the IP cameras market are making Wireless Video Sensor Networks (WVSNs) popular. In turn, Wi-Fi is becoming the enabling technology for WVSNs due to its flexibility, high bitrates provided and low cost; however, these networks suffer from three major problems: bad performance, throughput unfairness, and energy inefficiency. In order to address the...
Wireless sensor network is one of the developing ranges of research in present situation. A Wireless sensor network comprises of geographically dispersed self-governing tiny sensor nodes with little battery life to screen and control over the physical parameters or ecological conditions, for example, temperature, sound, pressure, humidity and so on and this data is gone by the sensor nodes in the...
Reliability optimization in Wireless Sensor Network (WSN) is obviously an important problem. The basic function of a WSN is to provide an adequate and quality data transmission as economically as possible with a reasonable level of reliability with minimum power consumption. To make the system more reliable, solar energy has been considered as energy harvesting strategy. In this paper, an algorithm...
The sensor node reporting plays a important role in the propose of wireless sensor networks. In addition to coverage, shape and region is also important in WSN to limit the power utilization which is taken as the current research work for successful sensor network structure. Neighbor Position Verification strategy with the help of fully distributed cooperative scheme enabled each node to acquire the...
Broadcast nature of Wireless Sensor Networks subjects them to assortment of various attacks. Denial of service is the most common class of attack launched against wireless sensor networks. To mitigate these attacks it gets imperative to comprehend their circumstances and end results. In this paper, we simulate and analyze DOS attacks by RREQ flooding. The study is based on a generic WSN model made...
Large propagation delay, high error rate, low band-width and limited energy in Underwater Sensor Networks (UWSNs) attract the attention of most researchers. In UWSNs, efficient utilization of energy is one of the major issue, as the replacement of energy sources in such environment is very expensive. In this paper, we have proposed a Cluster Depth Based Routing (cDBR) that is based on existing Depth...
Because of the recent advances in wireless technologies and, consequently the fast growing number of wireless devices that are being deployed in consumer houses, there is a growing demand from manufacturers to develop and deploy tools able to diagnose problems and evaluate the performance of their products prior to releasing them to the market. Such testing tools are required to be quickly deployable...
In Wireless Sensor Networks (WSN), Quality of Service (QOS) plays a significant role as networks performance is dependent on QoS only. WSN is very popular because of its wide application range. WSN has limited resources such as computational power and energy constraint. Congestion is one important subject which has drawn attention of many researchers. Congestion results into reduced throughput and...
In this paper we evaluate the performance of the new algorithm of the TCP protocol for a long distance wireless link in the Galapagos Islands. In order to achieve this goal, it has been started from a study of different standards and tools for this project, besides of the amendments to the TCP protocol for wireless environments. Finally, the network was implemented and preceded to inject traffic to...
Application-oriented underwater wireless sensor networks (UWSNs) are planned to design in such a way that they can monitor and transfer information efficiently. Therefore, quality data routing schemes are required to achieve certain goals. Many routing protocols are designed for application oriented networks. These types of networks require deployment strategies with quality data routing. Application...
Low power and lossy networks (LLNs) consist of devices having limited battery power, less memory, reduced processing capability. RPL (Routing Protocol for low power and Lossy networks), is an approved Internet Engineering Task Force (IETF) standard routing protocol for IPv6-based LLNs. RPL uses a proactive routing approach and the sink or controller node within the network creates a Directed Acyclic...
The energy in wireless sensor networks is a restrictive resource which primarily affects the life of nodes. Many routing protocols use clustering mechanism to optimize the network lifetime. A problem can occur if the allocation of cluster members is not uniformly distributed. In case of LEACH protocol there are great differences in cluster sizes. Consequently, the energy load of such network becomes...
Aiming at uninterrupted sensor network, we consider a radio frequency (RF) harvesting cooperative communication scenario, where the field nodes (information sources) are powered by RF energy transfer (RFET) from a relay. The relay node can be either connected to the power grid or positioned at some ambient energy harvesting favorable location for the desired energy supply. To further reduce the field...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.