The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes LBA, a lifetime balanced data aggregation scheme for asynchronous and duty cycle sensor networks under an application-specific requirement of end-to-end data delivery delay bound. In contrast to existing aggregation schemes that focus on reducing the energy consumption and extending the operational lifetime of each individual node, LBA has a unique design goal to balance the nodal...
Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed...
Monitoring the health of a sensor network is important for maintaining the health and normal operation of the network. For large-scale cost- effective monitoring, using inexpensive motes as sniffers is an attractive choice. In this paper, we quantify the capability and fidelity of mote-class sniffers for sensor network monitoring. In particular, we experimentally quantify the sustainable workload...
In this paper, a cross-layer collision-tolerant (CT) media access control (MAC) scheme is proposed to achieve reliable low power communications for one-hop asynchronous wireless sensor networks (WSNs). Unlike conventional MAC schemes that discard and retransmit signals colliding at a receiver, the CT-MAC extracts the salient information from the colliding signals by leveraging on the signal processing...
Network Tomography (or network monitoring) uses end-to-end measurements to characterize the network, such as estimating the network topology and localizing random or adversarial glitches. Under the setting that all nodes in the network perform random linear network coding, this work provides a comprehensive study of passive network tomography in the presence of network failures, in particular adversarial/random...
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and...
In this research, we propose a robust Sybil attack detection framework for MANETs based on cooperative monitoring of network activities. We do not require designated and honest monitors to perform the Sybil attack detection. Each mobile node in the network observes packets passing through it and periodically exchanges its observations in order to determine the presence of an attack. Malicious nodes...
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the same frequency with the same or different radio access technology (RAT). The WMNs experience two types of interferences according to the source of interference. Coexisted networks with WMN induce the interference called...
In vehicular ad hoc networks (VANETs), it is vital to ensure that tampered data packets, especially safety-related ones, are detected and stopped from further propagation. To this end, we propose a novel scheme, autonomous watchdog formation enabled by 2-hop neighborhood awareness (AWF-NA), to ensure nodes automatically functioning as watchdogs to monitor the behaviors of the relaying nodes. Unlike...
Network tomography has been widely used recently as an method to infer the network internal link-level characteristics by end-to-end measurement. In this paper, we consider the problem of estimating link loss rates using network tomography. The existing methods make the inference based on the whole tree of network, which is very complex for large scale network. To overcome this limitation, we propose...
Traffic congestion on major roadways costs our nation billions of dollars in lost earnings, wasted fuel consumption, injury and loss of human life. Providing motorists with real time roadway conditions is essential to mitigating traffic congestion. We propose a novel real-time messaging system that can be used to communicate imminent traffic conditions to motorists. Having such information can allow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.