-
881
A New Metric for Modeling the Uneven Sleeping Problem in Coordinated Sensor Node Scheduling
Published 2013-11-01“…Monitoring performance and energy constraint are two conflicting aspects in wireless sensor networks. In order to save battery power in very dense sensor networks, some redundant sensors can be put into the sleep state while other sensor nodes remain active for the sensing and communication tasks. …”
Get full text
Article -
882
Adaptive duty cycle control–based opportunistic routing scheme to reduce delay in cyber physical systems
Published 2019-04-01“…Wireless sensor networks are the foundation of cyber physical systems. …”
Get full text
Article -
883
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01“…Generally, wireless sensor networks have been designed to support predefined application services. …”
Get full text
Article -
884
Review of Blockchain integrated WSN
Published 2023-03-01“…Nowadays, we know that wireless sensor networks are being widely applied in many fields of human life such as civil and military applications. …”
Get full text
Article -
885
Finite-Time Nonfragile Dissipative Filter Design for Wireless Networked Systems with Sensor Failures
Published 2018-01-01“…In this study, the problem of finite-time nonfragile dissipative-based filter design for wireless sensor networks that is described by discrete-time systems with time-varying delay is investigated. …”
Get full text
Article -
886
Distributed Voronoi-Based Self-Redeployment for Coverage Enhancement in a Mobile Directional Sensor Network
Published 2013-11-01“…Therefore, conditions of directional sensor networks are dissimilar to those of generic wireless sensor networks for researches, especially on the sensing coverage. …”
Get full text
Article -
887
Markov Model-Based Energy Efficiency Spectrum Sensing in Cognitive Radio Sensor Networks
Published 2016-01-01“…Cognitive Radio Sensor Network (CRSN), incorporating cognitive radio capability in wireless sensor networks, is a new paradigm of the next-generation sensor network. …”
Get full text
Article -
888
Charging path optimization in mobile wireless rechargeable sensor networks
Published 2023-12-01“…The wireless power transfer technique is promising in solving the energy bottleneck of sensor nodes in wireless sensor networks, which can thus prolong the network lifetime or even maintain sustainable network operations.Most existing works focused on optimizing the static chargers’ deployment or mobile chargers’ charging path for static sensor nodes with fixed sensor node positions, ignoring the scenario with mobile sensor nodes.Thus, design and optimize the charging path of a mobile charger was studied for dynamic wireless sensor networks with mobile sensor nodes, to maximize the charging utility within a finite time horizon, that is, the charger can encounter as more sensor nodes as possible in a limited time and charge them.Notice that the mobile charger may stop to simultaneously charge multiple nodes within its charging range during its charging tour.The proposed charging path optimization problem was proven to be an APX-hard problem.Then, based on the constructed directed acyclic graph using discretization method, a layer-wise pruning algorithm based on the backtracking method was proposed.The proposed algorithm took the solution generated by the greedy algorithm as the benchmark and searched the optimal charging path under a fixed time division by layer-wise pruning.Simulation results show that the proposed algorithm can effectively improve the charging utility .…”
Get full text
Article -
889
Weighted mixed regression localization method based on three-dimensional Voronoi diagram division
Published 2022-06-01“…With the development of the wireless communication technology and sensing technology, various technologies based on wireless sensor networks are applied.These technologies are widely used in the fields of intelligent agriculture, intelligent transportation, fire rescue and so on.Node localization technology is one of the basic technologies of wireless sensor networks.Location information is a part of the sensing data, which determines the specific measures to be taken in the next step.Due to the complexity of the three-dimensional (3D) space localization environment, the application of the plane positioning method in 3D space will have some limitations.Aiming at above problems, the weighted hybrid regression location algorithm WMR-SKR based on a 3D Voronoi diagram was studied.The localization algorithm was divided into two stages: offline training and online testing.The 3D space was divided into Voronoi diagrams according to the anchor nodes in the network.In the offline training stage, the sequence composed of the coordinates of the anchor nodes and Voronoi cell vertices was used as the training set for training.In the online test stage, the coordinates of unknown nodes in the network were predicted through the trained localization model.Simulation results show that the WMR-SKR algorithm can effectively reduce the node localization error and improve the node localization speed in 3D space.…”
Get full text
Article -
890
Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks
Published 2018-04-01“…In order to solve the problem of spectrum scarcity in wireless sensor networks, cognitive radio technology can be introduced into wireless sensor networks, giving rising to cognitive radio sensor networks. …”
Get full text
Article -
891
Improving Energy Adaptivity of Constructive Interference-Based Flooding for WSN-AF
Published 2015-06-01“…This is a very critical problem, especially in energy-limited large-scale wireless sensor networks for agriculture and forestry (WSN-AF) system. …”
Get full text
Article -
892
Sensor Grid Middleware Metamodeling and Analysis
Published 2014-04-01“…Sensor grid is a platform that combines wireless sensor networks and grid computing with the aim of exploiting the complementary advantages of the two systems. …”
Get full text
Article -
893
Novel and lightweight digital signature scheme
Published 2010-01-01“…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
Get full text
Article -
894
Continuous Skyline Queries Based on MapReduce
Published 2014-05-01“…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. …”
Get full text
Article -
895
Architecture to connect sensor networks with Internet and services provided
Published 2008-01-01“…Connecting wireless sensor networks (WSN) with Internet and providing effective services to the Internet us-ers are the heated research issues. …”
Get full text
Article -
896
Accurate range-based distributed localization of wireless sensor nodes using grey wolf optimizer
Published 2023-06-01“… Various ranging techniques are frequently employed in wireless sensor networks (WSNs) to determine the distance between a node and its neighboring anchor nodes. …”
Get full text
Article -
897
Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Published 2013-11-01“…Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. …”
Get full text
Article -
898
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
899
TALK: Topology Aware LKH Key Management
Published 2014-11-01“…Cryptographic key management for wireless sensor networks (WSNs) and mobile ad-hoc networks (MANETs) is a particularly challenging task, as they mostly consist of high counts of resource constrained nodes, especially when group communication and dynamic network membership capabilities are required. …”
Get full text
Article -
900
Study on multi-channel reservation based MAC protocol for sensor networks
Published 2011-01-01“…Aiming at triple hidden terminal problems in wireless sensor networks,an adaptive duty cycle based multi-channel MAC protocol was proposed,called MCR.MCR efficiently handled triple hidden terminal problems with multiple channel reservation.By minimizing the lower bound of average times of channel switching in MCR,the optimal duty cycle in theoretical analysis was obtained.To investigate values of multiple channel reservation and dynamic duty cycling in MCR,extensive simulation and real testbed experiments were conducted.The results show that compared with other protocols,when the number of channels is larger or loads are heavy,M-cube improves throughput and energy effi-ciency significantly.…”
Get full text
Article