The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low Power Wide Area Networks (LPWAN) are used in a number of applications, including disaster monitoring and recovery networks. LPWAN sensors capture data bits and transmit them via dedicated gateways, which are connected to public carrier networks (e.g., cellular networks). One of the challenges encountered in disaster management scenarios revolves around the carry/forward sensed data and geographical...
Congestion presents a significant challenge in ad hoc networks due to their unstructured and distributed nature. In most congestion detection schemes for such networks, the affected node itself detects whether it is congested or not. The detection approach proposed in this paper performs detection with information estimators from neighbouring uncongested nodes that may be able to relieve the congestion...
Recently, a tremendous interest has been concentrated on the design and development of wireless sensor networks (WSNs) — distributed systems comprised of numerous wireless, sensor devices deployed densely in a sensing area. Battery powered sensors need efficient management due to limited energy resources, and energy conservation is a vital design issue that needs to be boosted in order to increase...
Device-to-device communications aim to enhance service coverage, particularly at cell edges or in black spots within a neighborhood through relaying and forwarding. In this context, each device is free to move independently, and will therefore change its links to other devices frequently due to connectivity issues. During these movements, a device may be requested to forward traffic unrelated to its...
Crowd sensing exploits users' smart devices and human mobility to collect information on a large scale. To realize a crowd sensing campaign, sensing tasks with spatio-temporal requirements are distributed to the devices that can provide the requested information. Typically, the distribution of sensing tasks relies on a centralized communication infrastructure such as cloud servers. However, such an...
In the recent year's low power computing systems have gained popularity. Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the new optimization of structure of network transmission protocol, the routing optimization in transmission...
Cognitive radio (CR) is a promising method suitable for solving inefficiency spectrum policy by opportunistically identifying the vacant portions of the spectrum that are used by primary users (PUs). In cognitive radio ad hoc networks (CRAHNs), secondary users (SUs) can opportunistically utilize the spectrum that is available from PUs. In this paper, we propose a neighbor-aware distance estimated...
In cognitive radio systems, fast and efficient spectrum selection is a vital task to minimize the overhead of spectrum scanning, and hence to improve the response time of the system. So, the choice of channel sensing sequence plays an important role for better performance of the system. This paper proposes a co-operative Q-learning based spectrum sensing technique for the secondary users of an ad...
The problem of coverage in three-dimensional (3D) wireless sensor networks is challenging and hard. In this paper, we focus on the problem of k-coverage of a 3D field of interest (FoI), where every point is covered by at least k sensors. First, we propose three sensor placement strategies to guarantee k-coverage of a 3D FoI. Second, we compute the corresponding sensor density. Third, we investigate...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
In this paper, we address the blind rendezvous problem of cognitive radios (CRs) quickly finding each other to establish communication in a multi-channel dynamic spectrum access (DSA) environment. We propose a multi-agent Q-learning based rendezvous strategy that allows CR-based secondary users (SUs) to actively explore a dynamic DSA environment and learn through resulting rewards which channels are...
Swarms of drones are increasingly being requested to carry out missions that cannot be completed by single drones. Particularly in the field of civil security, strong needs emerge in terms of surveillance and observation of hostile, distant or extended areas. Currently, existing solutions do not meet this demand, as they are generally based on too heavy infrastructures or over-processing, without...
The processing time of real-time sensing, data analytics and other applications is an important performance metric. When the application is being executed on a distributed system, the load balancing scheme among processing nodes significantly affects the total processing time of the application. We consider a load balancing scheme for distributed computing at the edge of the network. In the edge model...
Vehicles are increasingly equipped with sensors for safety applications. Sharing information among vehicles can further improve the safety of the overall transportation environment. Enabling each vehicle to get the “right information at the right time” can be valuable to avoid dangerous situations. Information-Centric Networks (ICN) that use the notion of “named-objects” enable information dissemination...
In the Era of the Internet of Things (IoT) the validity of sensing coverage is of utmost importance as it affects the reliability of sensing services. The presence of anchor misplacement poses a challenge on the validity of sensing coverage. This kind of challenge has generally been overlooked in sensing coverage research. In this paper, we investigate the sensing validity under several scenarios...
In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud. The proposed incentive mechanism employs a tendering framework to model the interaction between vehicle cloud server and vehicles. With the proposed incentive mechanism, the cloud server can select participated vehicles to collaborate for its announced tasks, and the selected vehicles can earn payments...
Barrier coverage is a natural application of sensor networks in which sensors are deployed to detect intruders or protect crucial resources. In this paper, we consider a hybrid sensor network with a two-phase deployment, in which less-expensive static sensors are first randomly deployed in an area, and then more-expensive mobile sensors are deployed to fill coverage gaps. We use a probabilistic model...
Urban mobility has become one of the most challenging issue in urban centers. As a consequence, traffic congestion has become a daily problem. Several Advanced Traffic Management Systems (ATMS) have been proposed to improve overall traffic efficiency. However, these systems inefficiently exchange traffic information, which can lead to network overload. In order to overcome the mobility problem and...
To enforce surrounding surveillance efficiently and reduce the heavy cost to deploy various infrastructures, mobile sinks are perceived to have potentials for utilization by wireless multimedia sensor networks (WMSNs). However, since high-mobility usually causes communication disconnections and the high re-transmission rate will consume more network resources, quality of experience (QoE) monitoring...
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.