-
1521
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. However, before exchanging data, the nodes need to know each other and key exchange. …”
Get full text
Article -
1522
Routing and Clustering of Sensor Nodes in the Honeycomb Architecture
Published 2019-01-01“…Energy is the most valuable resource in wireless sensor networks; this resource is limited and much in demand during routing and communication between sensor nodes. …”
Get full text
Article -
1523
Optimization Calculation Method and Mathematical Modeling of Big Data Chaotic Model Based on Improved Genetic Algorithm
Published 2022-01-01“…The optimal coverage problem in sensor networks can carry out fine optimization search on local areas. …”
Get full text
Article -
1524
El renacimiento del monitoreo ambiental dentro de nuevos paradigmas científicos y operacionales
Published 2017-06-01“…En este sentido, uno de los sistemas emergentes más interesantes aplicado al monitoreo ambiental es lo que se llaman redes inalámbricas de monitoreo ambiental, conocidas por sus siglas en inglés como wireless sensor networks (WSN). Acá se presentan y se explican algunas de sus aplicaciones, ventajas y desafíos. …”
Get full text
Article -
1525
Underwater source localization using time difference of arrival and frequency difference of arrival measurements based on an improved invasive weed optimization algorithm
Published 2022-05-01“…Abstract In this study, we propose an underwater localization method based on an improved invasive weed optimization algorithm to accurately locate moving sources in underwater sensor networks. First, the Lévy flight model is introduced into the invasive weed optimization algorithm to enhance its global search ability and avoid falling into local optima. …”
Get full text
Article -
1526
New Enhanced Authentication Protocol for Internet of Things
Published 2021-03-01“…For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user’s data is a central question. …”
Get full text
Article -
1527
Fuzzy-Based Trust Prediction Model for Routing in WSNs
Published 2014-01-01“…The cooperative nature of multihop wireless sensor networks (WSNs) makes it vulnerable to varied types of attacks. …”
Get full text
Article -
1528
Selection and Ranking of Fog Computing-Based IoT for Monitoring of Health Using the Analytic Network Approach
Published 2021-01-01“…The clouds suggested systems improved to overcome several challenges in ubiquitous frameworks of medical services such as energy efficiency, portability, adaptableness, and quality issues by accommodating right to take care of definite weights of the distant medical services group and sensor networks. The proposed research work has considered the analytic network process (ANP) for selection and ranking of FC-based IoT for health monitoring systems. …”
Get full text
Article -
1529
Enhancing the Efficiency of Routing Strategies in WSNs Using Live Streaming Algorithms
Published 2024-12-01“… The application of machine learning in wireless sensor networks (WSN) has attracted much attention. Since references in WSNs are pre-defined, determining how to optimize the utilization of resources and achieve efficient load balancing has become a critical problem in WSNs. …”
Get full text
Article -
1530
Network traffic control using traffic shaping techniques
Published 2024-01-01“…The importance of Traffic Shaping techniques arise with their potential to manage the traffic quality in modern network forms, such as Internet of Things (IoT) sensor networks. This paper explains the basic concept of traffic shaping, available algorithms on which traffic shaping techniques are based and provides a comparison with Traffic Policing techniques.…”
Get full text
Article -
1531
Investigation of Randomly Populated Cylindrical, Spherical, and Cubical Arrays for Application in Space, Aerial, and Underwater Collaborative Beamforming
Published 2024-01-01“…In addition, these topologies provide mathematical simplicity toward understanding the fundamental research problem of both surface and underwater swarm-based UUV sensor networks, and their constraints to implementing a physical system in a volumetric setting. …”
Get full text
Article -
1532
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. …”
Get full text
Article -
1533
Impedance Analysis and Optimization of Self-Powered Interface Circuit for Wireless Sensor Nodes Application
Published 2018-01-01“…Energy harvesting for self-powered wireless sensor networks (WSNs) is increasingly needed. In this paper, a self-powered WSN node scenario is proposed and realized by coupling the electric charge extraction interface circuit, power management module, and wireless communication module. …”
Get full text
Article -
1534
Real-Time Communications in Large-Scale Wireless Networks
Published 2008-01-01“…The applications can include wireless mesh infrastructure for broadband Internet access supporting multimedia services, visual sensor networks for surveillance, and disaster-relief networks. …”
Get full text
Article -
1535
On the Exploration of Adaptive Mechanisms Providing Reliability in Clustered WSNs for Power Plant Monitoring
Published 2016-01-01“…Wireless Sensor Networks (WSNs) are used in almost every sensing and detection environment instead of wired devices in the current world, all the more in power plant monitoring applications. …”
Get full text
Article -
1536
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
Get full text
Article -
1537
Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis
Published 2022-01-01“…Because of numerous dormant application fields, wireless sensor networks (WSNs) have emerged as an important and novel area in radio and mobile computing research. …”
Get full text
Article -
1538
Max-Min Fair Link Quality in WSN Based on SINR
Published 2014-01-01“…This paper addresses first the problem of max-min fair (MMF) link transmissions in wireless sensor networks (WSNs) and in a second stage studies the joint link scheduling and transmission power assignment problem. …”
Get full text
Article -
1539
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. …”
Get full text
Article -
1540
PRESEE: An MDL/MML Algorithm to Time-Series Stream Segmenting
Published 2013-01-01“…The novelty of this algorithm is further demonstrated by the application of PRESEE in segmenting real-time stream datasets from ChinaFLUX sensor networks data stream.…”
Get full text
Article