The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) come across various challenges when it comes to its design and operations which cause major degradation in their performance. With increasing number of applications having their own different limitations, make the challenge of application expectations even greater for such resource limited networks. These challenges appear at different layers of WSNs starting from physical...
Blackhole and greyhole attacks can cause severe problems in Delay- and Disruption-Tolerant Networks (DTNs), where connectivity is intermittent and long delays are actually the norm. Traditional security protocols cannot completely address such problems in DTNs, hence an efficient algorithm to detect malicious nodes in DTNs is imperative. In this paper, we propose a misbehavior detection system to...
This paper presents a novel pulse switching protocol framework for ultra light-weight wireless network applications. The key idea is to abstract a single Ultra Wide Band (UWB) pulse as the information switching granularity. Pulse switching is shown to be sufficient for on-off style event monitoring applications for which a monitored parameter can be modeled using a binary variable. Monitoring such...
In this paper, we present analytical study of routing overhead of reactive routing protocols for Wireless Multihop Networks (WMhNs). To accomplish the framework of generalized routing overhead, we choose Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO). Considering basic themes of these protocols, we enhance the generalized network models by...
The consistent performance, energy efficiency, and reliability are important factors for real-time monitoring of a patient's data, especially in a hospital environment. In this paper a routing protocol is proposed by considering the Quality of Service requirements of the body area network data packets. A mechanism for handling delay-sensitive packets is provided by this protocol. Extensive simulations...
ZigBee wireless technology is a global standard of short-range and low-data-rate for wireless sensor networks. To reduce the redundant overhead and to conserve nodes' energy in energy-constrained and multi-PAN ZigBee networks, we propose in this paper a cross-layer energy-balanced inter-PAN routing algorithm (CEIPR). The proposed algorithm has three key functionalities: (1) establishes the multipath...
Delay tolerant networks (DTNs), which are wireless networks prone to long delays and frequent disruptions are increasingly becoming common. We are exploring the challenges involved in designing effective event notification framework on DTNs. This paper presents the design and evaluation of a delay-tolerant event notification framework called DATEM based on the philosophy that failures and delays are...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
MANET nodes use cooperative multi-hope packet forwarding technique hence they also perform the functionality of router. The individual nodes are constrained by resources such as battery life, limited network bandwidth and CPU cycles. To save its resources a node may deny to forward packets to others for saving the resources. This could lead to degradation of network performance. To mitigate this problem,...
NoC (Network-on-Chip) has been proposed as a new solution to deal with the global communication problem of complex SoC(System-on-Chip). An evaluation tool is essential for optimizing the NoC design, through which the functionality and performance of the NoC are verified. This paper presents a coverage-driven and hierarchical NoC verification platform based on System Verilog language. It is applicable...
Wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, bandwidth demands causes severe performance degradation in WMNs. Link failure will lead to produce a sequence of disruptions to deliver the packets to the destination. To overcome this ART rerouting the traffic via an alternative path from a node whose local link is down without the need to wait until the...
In the recent years, Phasor Measurement Unit (PMU) based Wide Area Measurement System (WAMS) has been receiving ever increasing attention from the academia as well as from the industry. Power utilities have been designing and implementing WAMS to provide more intelligent monitoring, control, and protection of the power grid. In order to achieve real-time operations in the modern power systems, construction...
Wireless sensor networks (WSNs), now-a-days, are deployed in environmental data collection as well as in critical event monitoring. Successful data collection requires reliability while reliable event detection necessitates timeliness. Simultaneous data gathering and event monitoring is not well studied in literature. In this paper, we propose a system model that works on homogeneous data gathering...
In this work we describe a methodology to estimate one-way packet loss from IPFIX or NetFlow flow records collected at two monitoring points. The proposed method does not require tight synchronization between the two monitoring points, nor it relies upon external routing information. It can run online or offline, and can work on legacy IPFIX/NetFlow traces which were not collected for the specific...
This paper studies source location anonymity in a large monitoring wireless sensor network with a single data collector, and under a global attack. The qualifier ”global” indicates the capability of the eavesdropper (attacker) to capture all network transmissions, and to discern their time and location. We propose a scheme for generating fake network traffic to disguise the real event notification...
This paper presents a novel energy-efficient pulse switching protocol for ultra light-weight wireless network applications. The key idea is to abstract a single pulse, as opposed to multi-bit packets, as the information exchange mechanism. Pulse switching is shown to be sufficient for event and target tracking applications with binary sensing. Target tracking with conventional packet transport can...
Wireless sensor networks (WSN) can be an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when a network is deployed to monitor sensitive objects. In order to enhance source location privacy in sensor...
In order to reduce the number of BGP updates that routers need to process, it is common to rate-limit such updates using a timer that specifies the minimum time between two consecutive updates for a given destination prefix. Rate-limiting plays an important role in determining the number of routing updates that are generated after a routing event, and the time it takes before the network converges...
In this paper, we propose an autonomous self-organization mechanism for the monitoring of the cold chain. All along the transportation through this logistic chain, the sensors are moved with the goods in very different networks. We argue that depending on the situation some protocols are more suited than others and it is necessary the sensors to adapt and to switch dynamically depending on where they...
RFD and MRAI are the only two built-in mechanisms in BGP router against unstable routes, they can however negatively impact the convergence. In this paper, we propose a churn aggregation approach CAGG to stabilize BGP routing without harming convergence. CAGG is based on the observation that AS PATH change is the dominant cause for BGP updates and only a small number of AS PATHs are explored by each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.