Resource constrained systems often are programmed using an event-based model. Many applications do not lend themselves well to an event-based approach, but preemptive multithreading pre-allocates resources that cannot...
详细信息
Ad hoc Wireless sensor Networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations [3]. As we begin to deploy sensor networks in real world applic...
详细信息
ISBN:
(纸本)9781424404988
Ad hoc Wireless sensor Networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations [3]. As we begin to deploy sensor networks in real world applications [8], concerns are being raised about the fidelity and integrity of the sensor network data. In this paper, we motivate and propose an online algorithm that leverages Competitive Learning Neural Network for characterization of a dynamic, unknown environment. Based on the proposed characterization sensor networks can autonomously construct multimodal views of their environments and derive the conditions for verifying data integrity over time.
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys[5], [6], [10], authenticate all co...
详细信息
ISBN:
(纸本)9781424404247
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys[5], [6], [10], authenticate all communications with cryptographic functions[8], and also apply secure information aggregation schemes[13] or hop-by-hop filtering methods[14], [16]. However, these security measures can take considerable overhead in terms of storage, communication and computation, which are scarce resources in sensor nodes. Previously proposed security measures can only resist against a limited number of compromised nodes, which we define as the resistance level. In this paper, we propose a separate solution to any security measure. This technique either significantly reduces the overhead, or increases the resistance level without increasing overhead. The solution is based on a new "Mixed Multi-Channel" (MMC) architecture. In this design, each node can only use one fixed channel. The whole network is thus divided into multiple "planes" by the different planes. Exploiting the characteristics of multi-channel communication, a series of methods are proposed, such as MMC-1, MMC-k and MMC-r. We then present designs to integrate the methods with current security measures, and analyze their resistance level and energy conservation.
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide u...
详细信息
In this paper, we devise and evaluate an Energy-aware Improved Directed Diffusion (EIDD) algorithm for area event monitoring in wireless sensor network. Through Diffusion of different type interest, a gathering node i...
详细信息
ISBN:
(纸本)9783540683797
In this paper, we devise and evaluate an Energy-aware Improved Directed Diffusion (EIDD) algorithm for area event monitoring in wireless sensor network. Through Diffusion of different type interest, a gathering node is chose to build an aggregate tree to gather and aggregate data in the event area. Meanwhile, we improve the way using to build the gradient field in original Directed Diffusion. The new way can find more logical route by taking residual energy as a key element. The simulation results show that EIDD gains better energy efficiency, data collection efficiency and lesser transmission delay compared with original Directed Diffusion.
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a robust multi-hop localization scheme, na...
详细信息
Improving network lifetime is a fundamental challenge of wireless sensor networks. One possible solution consists in making use of mobile sinks. Whereas theoretical analysis shows that this approach does indeed benefi...
详细信息
This paper introduces an opportunistic packet scheduling method and medium access control (MAC) scheme for controlling the throughput in wireless local area networks (WLANs). The proposed method takes advantage of the...
详细信息
ISBN:
(纸本)3540380914
This paper introduces an opportunistic packet scheduling method and medium access control (MAC) scheme for controlling the throughput in wireless local area networks (WLANs). The proposed method takes advantage of the multi-user diversity in time-varying wireless channel while the asymmetric traffic load problem between the uplink and the downlink is alleviated. The proposed method can be implemented without the modification of the deployed ieee 802.11 nodes. The performance of the proposed method is compared with ieee 802.11 distributed Coordination Function (DCF) by computer simulations.
Wireless sensor Network (WSN) is expected to have a significant impact on the efficiency of military and civil applications such as target field imaging, intrusion detection, weather monitoring. sensors with low cost,...
详细信息
ISBN:
(纸本)3540380914
Wireless sensor Network (WSN) is expected to have a significant impact on the efficiency of military and civil applications such as target field imaging, intrusion detection, weather monitoring. sensors with low cost, low power and multifunction are expected to last until their energy drains, so energy-conserving forms of communication and computation are essential to the sensor node lifetime. Given the unreliable nature of the wireless channel and the high failure rate of the individual sensors, a fault tolerant routing protocol with energy-efficiency is expected to overcome these problems. In this paper, we propose an energy efficient multipath routing algorithm (EMRA) for wireless sensor networks. EMRA can efficiently find a disjoint multipath and provide a protection for routing failure. From the observed results, EMRA performs well in terms of average dissipated energy and delay to set up backup path.
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like the Internet offer tremendous connecti...
详细信息
暂无评论