Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. therefore, the safety of WSN is very important. Since any single key system canno...
详细信息
this paper proposes a novel energy efficient data clustering scheme to improve energy efficiency for cluster-based wireless sensor networks (WSNs). In order to reduce the energy dissipation of transmitting sensing dat...
详细信息
3G-WLAN is a companion system of third-generation (3G) cellular systems and WLAN systems. By integration of these two systems, users can not only be offered a bit rate expectation placed on 3G systems, but also suffic...
详细信息
Wireless sensor Networks (WSN) play very important role in information and communication Technology (ICT) and have attracted a lot of attention lately. the importance of these networks are increasing exponentially due...
详细信息
the proceedings contain 73 papers. the topics discussed include: a real-time architecture for automated wireless sensor and actuator networks;fast resampling and denoising of spread spectrum signal for real-time wirel...
ISBN:
(纸本)9780769537504
the proceedings contain 73 papers. the topics discussed include: a real-time architecture for automated wireless sensor and actuator networks;fast resampling and denoising of spread spectrum signal for real-time wireless location;performance analysis of a semi-fixed mapping scheme for VOIP services in wireless OFDMA systems;routing in wireless networks of varying connectivity;self-stabilizing clustering algorithm for ad hoc networks;a performance evaluation of a grid-enabled object-oriented parallel outdoor ray launching for wireless network coverage prediction;on the cooperation and power allocation schemes for multiple-antenna multiple-relay networks;effect of user density and traffic volume on uplink capacity of multihop cellular network;enhance the quality of experience by accelerating user requests in a multi-wireless-carrier environment;and hierarchical wireless network architecture for distributed applications.
the proceedings contain 80 papers. the topics discussed include: fingerprinting-based localization in WiMAX networks depending on SCORE measurements;analytical modeling of a time-threshold based multi-guard bandwidth ...
ISBN:
(纸本)9780769536118
the proceedings contain 80 papers. the topics discussed include: fingerprinting-based localization in WiMAX networks depending on SCORE measurements;analytical modeling of a time-threshold based multi-guard bandwidth allocation scheme for cellular networks;an approach on short message service text transfer for Turkish GSM operators;symbol phase synchronizers tested with different input sequences;adaptive MCS selection in OFDM systems based on channel frequency coherence;improved method for evaluation of network throughput and protection in future optically switched metropolitan networks;dynamic NAK timer algorithm to improve delivery latency of CCSDS file delivery protocol in deferred NAK mode;blocking analysis for priority classes in hybrid WDM-OCDMA passive optical networks;modeling of cellular network subscriber mobility;and a novel distributed medium access control and synchronization for ad-hoc sensor networks.
sensor network integrates sensor technology, MEMS (Micro-Electro-Mechanical system) technology, embedded computing, wireless communication technology and distributed information management technology. It is of great v...
详细信息
ISBN:
(纸本)9780819473677
sensor network integrates sensor technology, MEMS (Micro-Electro-Mechanical system) technology, embedded computing, wireless communication technology and distributed information management technology. It is of great value to use it where human is quite difficult to reach. Power consumption and size are the most important consideration when nodes are designed for distributed WSN (wireless sensor networks). Consequently, it is of great importance to decrease the size of a node, reduce its power consumption and extend its life in network. WSN nodes have been designed using JN5121-Z01-M01 module produced by jennic company and ieee 802.15.4/ZigBee technology. Its new features include support for CPU sleep modes and a long-term ultra low power sleep mode for the entire node. In low power configuration the node resembles existing small low power nodes. An embedded temperature sensor node has been developed to verify and explore our architecture. the experiment results indicate that the WSN has the characteristic of high reliability, good stability and ultra low power consumption.
We focus on designing networks of wireless sensors to perform distributed sampling and interpolation. sensors periodically sample a physical quantity of interest and report their measurements to a data center. A spati...
详细信息
the basis of procedure in query based sensor networks is such that the component nodes of network wait for receiving query from sink and once they took the query, they provide sink with required data. An issue in this...
详细信息
Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task;as such systems may be operated very frequently, at a quick pace, and at times in emergency situations...
详细信息
ISBN:
(纸本)9781424435173
Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task;as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard, and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks [1]. Our work targets the problem of designing wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate this protocol's time and energy consumption, and its impact on the battery lifetime.
暂无评论