The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without base station and without centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted...
Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of constructing a shortest path overhearing tree with the maximum lifetime. We propose three approaches. The first one is a polynomial-time heuristic. The second one uses ILP (Integer Linear Programming) to iteratively find a monitoring...
In the context of multi-robot exploring, we work on the particular problem of maintaining communication links between an explorer robots and a base station using autonomous robot routers. In this paper, we propose and describe a kind of exploring application which considers a variable amount of robots over time. This problem opens various research challenges. Afterwards, we focus on the problem of...
WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. We investigate the problem of minimising the failure rate of packet delivery in the presence of the modification attacks and the selective forwarding attacks in a static WSN with one base station without using expensive encryption/decryption algorithms. We propose a novel heuristic...
A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes are mobile. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, AOMDV, DSDV, DSR, ZRP, GZRP and TORA, LAR so far to improve the routing performance...
One of the major issues of Wireless Sensor Networks is developing an energy efficient routing strategy. In this paper, we present one such protocol having Meshed Multipath Routing with Levelling and Sectoring. We first perform the levelling and sectoring of the network, where each node is assigned a Level id and Sector id with respect to the destination node. Then, we use this information in route...
Extending the lifetime of the wireless sensor networks has always been a crucial challenge for the researchers. Most of the energy is consumed in data transmission to the sink. In the recent past some researchers have suggested mobile sink method to minimize energy consumption in wireless sensor networks. The movement of sink is governed by fuzzy logic based mechanism. In this work base station is...
Data gathering is a major function of many applications in wireless sensor networks (WSNs). In this paper, An Effective Data Gathering scheme for heterogeneous energy WSNs (EDGA) is proposed. EDGA achieves a good performance in terms of lifetime by minimizing energy consumption for in-network communications and balancing the energy load. EDGA adopt a simple but efficient method to solve the area coverage...
LEACH is one classical protocol in wireless sensor network, which is a clustering-based protocol with good performance. In this paper, an improved routing algorithm based on LEACH protocol will be proposed, which involves cluster head choosing, multi-hop routing and the building of its path. Simulation in MATLAB, an improved routing algorithm has higher energy utilizing rate, and it helps prolong...
In a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute...
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended which causes serious security concerns. Insecure...
One of the main challenges for a sensor network is conserving the available energy at each sensor node and then prolonging the network lifetime. Many energy efficient/conserving routing protocols have been proposed to the issue; however, the ldquofunnelling effectrdquo in multi-hop communications which describes the convergence of data traffic towards the static sinks (Base Stations) remains a major...
The Wireless Sensor Network technology has been used widely; however the limited energy resource is one of the bottlenecks for its application. To enhance the robustness and accuracy of the information which is obtained by the entire network, certain redundancy exists in the data collected from the sensor node and thus data fusion processing is needed to reduce the redundant information. Firstly the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.