The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent enhancement of sensor devices, such as the Micro-Electro Mechanical Devices (MEMs) used for information collection and dissemination, has led to the emergence of the Internet of Things (IoT). This new paradigm overlaps with many research area such as the Wireless Sensor Networks (WSNs) where sensor nodes are deployed over an area to perform local computations based on information gathered...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form...
In this paper we propose event goodput, i.e., the fraction of events which may be successfully managed by a system, as a relevant metric to describe the performance of battery powered real-time sensor networks. Unlike other performance metrics as response, completion, maximum lateness times, all representing fundamental, but different, figures of merit for the description of the behavior of real-time...
Camera-enabled sensors deployed for visual monitoring will cover a region of the target field, providing information for many innovative applications based on wireless sensing. Actually, some areas of the monitored field may have more relevance than others, according to the characteristics of the applications, which may indicate that such areas need better coverage to avoid blind spots and achieve...
Recent breakthroughs in wireless energy transfer-based rechargeable batteries enable a promising application of Wireless Charging Vehicles (WCVs) in Wireless Rechargeable Sensor Networks (WRSNs). This paper studies cooperative WCV schedules in WRSNs to optimize sensor recharging. The objective is to minimize the number of WCVs under the constraint that all sensors must be periodically recharged before...
The problem of coverage in three-dimensional (3D) wireless sensor networks is challenging and hard. In this paper, we focus on the problem of k-coverage of a 3D field of interest (FoI), where every point is covered by at least k sensors. First, we propose three sensor placement strategies to guarantee k-coverage of a 3D FoI. Second, we compute the corresponding sensor density. Third, we investigate...
A low-complexity algorithm is presented that clusters sensor nodes based on similarity in the sensed signals. This feature makes it an enabler for distributed detection of events that are impossible to identify using information available to a single node. The algorithm does not require system training prior to deployment nor does it assume statistical knowledge of the signal. Experimental results...
Stability of civil structures is one of the main issues to be considered for the aging of bridges, buildings, tunnels, mines, dams, aircraft or other aging structures. They must be checked correctly, thus, security of civil structures, especially tunnels and bridges, pose a great matter for civil engineering. Therefore, Structural health monitoring ‘SHM’ takes more and more an important area in modern...
Low Power and Lossy Networks (LLN) are characterized by stringent energy constraints and frequent communication errors. Recent research in the area of LLNs has focused in solving many issues like security, energy efficiency, and routing. RPL is a new routing protocol proposed for LLNs by IETF ROLL group. RPL provides opportunities for improving overall performance of LLN by providing mechanisms for...
Node compromising is still the most hard attack in Wireless Sensor Networks (WSNs). It affects key distribution which is a building block in securing communications in any network. The weak point of several roposed key distribution schemes in WSNs is their lack of resilience to node compromising attacks. When a node is compromised, all its key material is revealed leading to insecure communication...
Supporting mobility in wireless sensor networks is one of the major requirements for future Internet of Things (IoT) applications. This work focuses on optimizing the objective function of Routing Protocol for Low-power and Lossy Networks (RPL) in mobile applications. RPL routing is the most common standard routing protocol designed for IoT applications. We optimized RPL objective function by combining...
One of the main challenges in delivering end-toend service chains across multiple Software Defined Networking (SDN) and Network Function Virtualization (NFV) domains is to achieve unified management and orchestration functions. A very critical aspect is the definition of an open, vendoragnostic, and interoperable northbound interface (NBI) that should be as abstracted as possible from domain-specific...
Jamming attacks have been a great challenge for the researchers since they can severely damage the Quality of Service (QoS) of Multi-Hop Wireless Networks (MHWNs). Therefore, how to detect and distinguish multiple jamming attacks and thus to restore network service has been a hot topic in recent years. Note that different jamming attacks will cause different network status changes in MHWN. Based on...
Radio environment maps can be a powerful tool for achieving efficient context-aware resource allocation in 5G heterogeneous networks. In this paper, we consider an heterogeneous network formed by a traditional cellular network and a wireless sensor network. The role of the wireless sensor network is to estimate the radio environment map of the cell using a geostatistical interpolation technique named...
Nowadays, many protocols have been designed to support smart grid system due to the massively of transferred data, reliability and the constrained of environment. RPL protocols have been designed to support with these constrains of networks: energy, memory, power and interconnection. To improve the performance, ETX and energy balance metrics must be use in RPL networks. In this paper, we propose Weight...
Wireless Body Area networks (WBANs) are a subset of wireless sensor networks that interconnect miniaturized nodes with sensor or actuator capabilities in, on, or around a human body. WBANs offer number of routing protocols i.e., CICADA etc., but inefficient usage of network resources may lead to premature network failure. To increase energy efficiency, reliability and network load balancing, this...
Volcano monitoring systems by using Wireless Sensor Networks (WSN) must ensure an adequate network performance, which — in fact — depends on the number of network nodes. This paper is focused on determining the number of nodes, which collectively are able to yield an adequate network performance. We implemented function optimization methods and QoS metric analysis to find the effective number of sensors...
Key Pre-distribution in wireless sensor network refers to distributing secret keys in sensor nodes prior to deployment. Among a range of key pre-distribution schemes combinatorial design based come within reach of most suitable method due to its good expansion in the secure communication graph. Combinatorial based scheme distributes keys to the sensor nodes according to the Balance Incomplete Block...
Scale-free can be seemed as one of the most impacting discoveries in complex networks theory and has already been successfully proved to be highly effective in constructing error-tolerant topology structures of wireless sensor networks (WSNs). As in scale-free WSNs, a few key nodes possess most connections, requiring them to take excessive message-relay tasks. Due to this reason, the energy of these...
The first step in the deployment of wireless sensor networks for real-life applications is sensor placement. This step is of primary importance as it not only determines the network's cost, but also affects energy consumption, network lifetime, and the quality of service provided by the network. In this paper, we tackle the sensor placement problem that is NP-hard. The goal is to optimize the number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.