Journal articles on the topic 'Resource-constrained wireless sensor'

To see the other types of publications on this topic, follow the link: Resource-constrained wireless sensor.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Resource-constrained wireless sensor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wójcikowski, Marek. "Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network." Metrology and Measurement Systems 22, no. 2 (June 1, 2015): 221–28. http://dx.doi.org/10.1515/mms-2015-0019.

Full text
Abstract:
Abstract In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating a model of the sensor network node, the same software is used in real sensor network nodes and in the simulation framework. Operation of the framework is illustrated with examples of simulations of selected transactions in the sensor network.
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Xiao Guang, Dong Zhu Feng, Jian Deng, and Yuan Jie Bai. "Resource-Constrained Wireless Sensor Network Information Decision Fusion in Ocean Environment." Applied Mechanics and Materials 433-435 (October 2013): 229–32. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.229.

Full text
Abstract:
In order to solve the decision information fusion issues of resource-constrained wireless sensor network, several decision information fusion rules under exponential distribution fading channel are investigated in this paper. At first, optimal likelihood ratio rule is given. The detection performance of this fusion rule is best, however, this rule acquires channel information which is too costly for resource constrained sensor networks. To solve this problem, suboptimal likelihood ratio fusion rule is proposed which requires only the knowledge of channel statistics. In addition, the reduced forms of the suboptimal are also derived, in the case of extreme channel signal-to-noise ratio (SNR). Theoretical analysis and simulations show that suboptimal fusion rule needs much less computation and information, yet exhibits only slight performance degradation. Suboptimal fusion rules are practicable for resource constrained wireless sensor networks decision information fusion system working in ocean environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Alves, Renan C. A., Doriedson A. G. Oliveira, Geovandro C. C. F. Pereira, Bruno C. Albertini, and Cíntia B. Margi. "WS3N: Wireless Secure SDN-Based Communication for Sensor Networks." Security and Communication Networks 2018 (August 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/8734389.

Full text
Abstract:
The Software Defined Networking (SDN) paradigm can provide flexible routing and potentially support the different communication patterns that exist in Wireless Sensor Networks (WSN). However applying this paradigm to resource-constrained networks is not straightforward, especially if security services are a requirement. Existing SDN-based approaches for WSN evolved over time, addressing resource-constrained requirements. However, they do not integrate security services into their design and implementation. This work’s main contribution is a secure-by-design SDN-based framework for Wireless Sensors Networks. Secure node admission and end-to-end key distribution to support secure communication are considered key services, which the framework must provide. We describe its specification, design, implementation, and experiments considering device and protocol constraints. The results indicate that our approach has achieved such goals with acceptable overheads up to medium sized networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Shankaramma and Nagaraj G. S. "Survey on WSN Network Lifetime Through Leach Clustering Schemes." International Journal of Engineering and Advanced Technology 11, no. 3 (February 28, 2022): 58–61. http://dx.doi.org/10.35940/ijeat.c3366.0211322.

Full text
Abstract:
Sensor nodes deployed in wireless sensor networks (WSN) are resource constrained, battery operated and have a restricted energy resource. The significant number of wireless sensor network applications aim to extend the longevity of the network by using various strategies. Clustering algorithms were proven to be among the best efficient ways for increasing wireless sensor network reliability. In a wireless sensor network, clustering-based solutions control the network operations to manage the restricted energy in the optimal effective way to extend the network lifetime. Reviews in related subject could assist in gathering thorough and timely information about wireless sensor networks lifetime study through different clustering protocols. This research review study paper presents an extensive study of existing low energy adaptive clustering hierarchy (LEACH) homogeneous clustering procedures and analysis.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yuehai, Weidong Wang, Shiying Cao, Shiju Li, Li Xie, and Baocang Ding. "Self-Similarity Superresolution for Resource-Constrained Image Sensor Node in Wireless Sensor Networks." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/719408.

Full text
Abstract:
Wireless sensor networks, in combination with image sensors, open up a grand sensing application field. It is a challenging problem to recover a high resolution(HR)image from its low resolution(LR)counterpart, especially for low-cost resource-constrained image sensors with limited resolution. Sparse representation-based techniques have been developed recently and increasingly to solve this ill-posed inverse problem. Most of these solutions are based on an external dictionary learned from huge image gallery, consequently needing tremendous iteration and long time to match. In this paper, we explore the self-similarity inside the image itself, and propose a new combined self-similarity superresolution(SR)solution, with low computation cost and high recover performance. In the self-similarity image super resolution model(SSIR), a small size sparse dictionary is learned from the image itself by the methods such asKSVD. The most similar patch is searched and specially combined during the sparse regulation iteration. Detailed information, such as edge sharpness, is preserved more faithfully and clearly. Experiment results confirm the effectiveness and efficiency of this double self-learning method in the image super resolution.
APA, Harvard, Vancouver, ISO, and other styles
6

Zoumboulakis, Michael, and George Roussos. "Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks." Mobile Networks and Applications 16, no. 2 (October 9, 2010): 194–213. http://dx.doi.org/10.1007/s11036-010-0268-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Kuan, and Xiaoquan Xu. "A Resource Scheduling Strategy for WSN with Communication Constrained." MATEC Web of Conferences 175 (2018): 03032. http://dx.doi.org/10.1051/matecconf/20181750100103032.

Full text
Abstract:
Due to the loss of wireless communication link, the remote estimator in the wireless sensor network can only receive part of the observation information or can not be completely received, which reduces the accuracy of the state estimation. Focusing on the above problems, a strategy based on network resource scheduling is proposed to improve the impact of link loss on state estimation. The strategy considers the quantization process of sensor observations and the limited transmission bandwidth. The objective of optimization is to minimize the estimated error covariance and the expected energy consumption of the data packet. The data rate and the time slot are allocated to each communication link. The simulation results show that the optimal state estimation of the physical process can be obtained under a small transmission bandwidth and simple BPSK modulation, and the energy consumption of the transmitted data packet can be effectively reduced.
APA, Harvard, Vancouver, ISO, and other styles
8

Zivanov, Zarko, Predrag Rakic, and Miroslav Hajdukovic. "Wireless sensor network application programming and simulation system." Computer Science and Information Systems 5, no. 1 (2008): 109–26. http://dx.doi.org/10.2298/csis0801110z.

Full text
Abstract:
We present, a wireless sensor network application programming and simulation system, suitable for wireless sensor network application development for both resource constrained and unconstrained hardware. Developed programs can be tested inside simulator, or (with source unchanged) executed directly on hardware. Main contribution of our project is uniform object oriented programming model with predefined basic concurrency abstractions.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Chuanyi, and Xiaoyong Li. "Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks." Sensors 20, no. 6 (March 12, 2020): 1592. http://dx.doi.org/10.3390/s20061592.

Full text
Abstract:
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified.
APA, Harvard, Vancouver, ISO, and other styles
10

Ramya, E., and R. Gobinath. "Performance metrics in wireless sensor networks :a survey and outlook." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 25. http://dx.doi.org/10.14419/ijet.v7i2.26.12527.

Full text
Abstract:
Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations.
APA, Harvard, Vancouver, ISO, and other styles
11

Manvi, Sunilkumar S. "Resource Monitoring for Wireless Sensor Networks using ANFIS." Journal of Applied Computer Science Methods 8, no. 1 (June 1, 2016): 41–67. http://dx.doi.org/10.1515/jacsm-2016-0004.

Full text
Abstract:
Abstract Wireless sensor networks (WSNs) are usually a resource constrained networks which have limited energy, bandwidth, processing power, memory etc. These networks are now part of Internet by the name Internet of Things (IoT). To get many services from WSNs, we may need to run many applications in the sensor nodes which consumes resources. Ideally, the resources availability of all sensor nodes should be known to the sink before it requests for any further service(s) from the sensor node(s). Hence, continuous monitoring of the resources of the sensor nodes by the sink is essential. The proposed work is a framework for monitoring certain important resources of sensor network using Adaptive-Neuro Fuzzy Inference System (ANFIS) and Constrained Application Protocol (CoAP). The ANFIS is trained with these resources consumption patterns. The input to ANFIS is the resources consumption levels and the output is the resources consumed levels that needs to be sent to the sink which may be individual or combinations of resources. The trained ANFIS generates the output periodically which determines resources consumption levels that needs to be sent to the sink. Also, ANFIS continuously learns using hybrid learning algorithm (which is basically a combination of back propagation and least squares method) and updates its parameters for better results. The CoAP protocol with its observe option is used to transport the resource monitoring data from the sensor nodes to the cluster head, then from the cluster head to the sink. The sensor nodes runs coap server, the cluster head runs both coap client and server and the sink runs coap client. The performance of the proposed work is compared with LoWPAN network management protocol (LNMP) and EmNets Network Management Protocol (EMP) in terms of bandwidth and energy overheads. It is observed that proposed work performs better when compared to the existing works.
APA, Harvard, Vancouver, ISO, and other styles
12

LI, Yan-Jun. "Decision Fusion Under Fading Channel in Resource-Constrained Wireless Sensor Networks." Journal of Software 18, no. 5 (2007): 1130. http://dx.doi.org/10.1360/jos181130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

NAZIR, SAJID. "Image subset communication for resource-constrained applications in wireless sensor networks." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 28, no. 5 (September 25, 2020): 2686–701. http://dx.doi.org/10.3906/elk-2002-169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Voyles, Richard M., Jaewook Bae, Amy C. Larson, and Mustafa A. Ayad. "Wireless video sensor networks for sparse, resource-constrained, multi-robot teams." Intelligent Service Robotics 2, no. 4 (September 4, 2009): 235–46. http://dx.doi.org/10.1007/s11370-009-0053-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Alshammari, Majid, and Khaled Elleithy. "Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks." Sensors 18, no. 10 (October 21, 2018): 3569. http://dx.doi.org/10.3390/s18103569.

Full text
Abstract:
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard does not specify how to manage, store, or distribute the encryption keys. Many solutions have been proposed to address this problem, but the majority are impractical in resource-constrained devices such as wireless sensor nodes or cause degradation of other metrics. Therefore, we propose an efficient and secure key distribution protocol that is simple, practical, and feasible to implement on resource-constrained wireless sensor nodes. We conduct simulations and hardware implementations to analyze our work and compare it to existing solutions based on different metrics such as energy consumption, storage overhead, key connectivity, replay attack, man-in-the-middle attack, and resiliency to node capture attack. Our findings show that the proposed protocol is secure and more efficient than other solutions.
APA, Harvard, Vancouver, ISO, and other styles
16

Herrería-Alonso, Sergio, Andrés Suárez-González, Miguel Rodríguez-Pérez, Raúl F. Rodríguez-Rubio, and Cándido López-García. "Efficient Wind Speed Forecasting for Resource-Constrained Sensor Devices." Sensors 21, no. 3 (February 2, 2021): 983. http://dx.doi.org/10.3390/s21030983.

Full text
Abstract:
Wind energy harvesting technology is one of the most popular power sources for wireless sensor networks. However, given its irregular nature, wind energy availability experiences significant variations and, therefore, wind-powered devices need reliable forecasting models to effectively adjust their energy consumption to the dynamics of energy harvesting. On the other hand, resource-constrained devices with limited hardware capacities (such as sensor nodes) must resort to forecasting schemes of low complexity for their predictions in order to avoid squandering their scarce power and computing capabilities. In this paper, we present a new efficient ARIMA-based forecasting model for predicting wind speed at short-term horizons. The performance results obtained using real data sets show that the proposed ARIMA model can be an excellent choice for wind-powered sensor nodes due to its potential for achieving accurate enough predictions with very low computational burden and memory overhead. In addition, it is very simple to setup, since it can dynamically adapt to varying wind conditions and locations without requiring any particular reconfiguration or previous data training phase for each different scenario.
APA, Harvard, Vancouver, ISO, and other styles
17

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
18

Yu, Cheng Bo, Yu Xuan Liu, Yi Meng Zhang, and Hong Bing Li. "Intelligent Surveillance and Image Transmission Based on Wireless Video Sensor Network." Advanced Materials Research 457-458 (January 2012): 690–95. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.690.

Full text
Abstract:
Design and implement an energy-efficient smart camera mote architecture to be used as surveillance device for assisted living. Add the Passive Infrared Sensor (PIR) to WVSN, PIR detect the human or animal’s moving, then it triggers the camera to wake up. The image captured will be grayscale processing by the central processing unit. Camera sensor nodes transmit a grayscale image over wireless channel to master control station. It offers reduced complexity, response time, and power consumption over conventional solutions. By experimental results from the test illustrate that performance of the designed wireless image sensor is better than the exiting ones in the market in terms of received signal strength intensity (RSSI) and packet rate ratio (PRR) with respect to the distance. This scheme is less complicated than other wireless video sensor surveillance techniques, allowing resource-constrained video sensors to operate more reliably and longer.
APA, Harvard, Vancouver, ISO, and other styles
19

Poonam, Rani, and Sharma Avinash. "Cluster Based Data Aggregation Scheme in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2678–83. http://dx.doi.org/10.1166/jctn.2020.8966.

Full text
Abstract:
Wireless Sensor Network (WSN) consists of a network with huge quantity of sensors that are deployed to accomplish a particular task. These low cost sensors are proficient of aggregating and communicating the sensed information over the field. Evaluation of IoT and proliferation of sensors with other application results building a variety of gazettes. However, these nodes being powered by a battery are energy constrained. While operating, most of the vitality is spent during packet transmission. So an ardent care should be taken care of while developing the protocol. The protocols through which nodes communicate with each other is known as routing. Designing of appropriate routing protocol results in better lifetime of the protocol. This paper proposes a routing protocol based on cluster formation among same type of sensor nodes (SN) for gathering of data at intermediate nodes in the cluster and these intermediate nodes further transmits data to resource opulence sink.
APA, Harvard, Vancouver, ISO, and other styles
20

Qin, Danyang, Shuang Jia, Songxiang Yang, Erfu Wang, and Qun Ding. "A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/1547963.

Full text
Abstract:
Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS) is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.
APA, Harvard, Vancouver, ISO, and other styles
21

Wei, Min, Chunmeng Rong, Erxiong Liang, and Yuan Zhuang. "An intrusion detection mechanism for IPv6-based wireless sensor networks." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210779. http://dx.doi.org/10.1177/15501329221077922.

Full text
Abstract:
With the advancement of IPv6 technology, many nodes in wireless sensor networks realize seamless connections with the Internet via IPv6 addresses. Security issues are a significant obstacle to the widespread adoption of IPv6 technology. Resource-constrained IPv6 nodes face dual attacks: local and Internet-based. Moreover, constructing an active cyber defense system for IPv6-based wireless sensor networks is difficult. In this article, we propose a K-nearest neighbor-based intrusion detection mechanism and design a secure network framework. This mechanism trains an intrusion detection algorithm using a feature data set to create a normal profile. The intrusion detection algorithm uses the normal profile to perform real-time detection of network traffic data to achieve rapid detections connecting many devices in a wireless sensor network. In addition, we develop a test platform to verify this mechanism. Experimental results show that this mechanism is appropriate for IPv6-based wireless sensor networks and achieves a low false-positive rate and good intrusion detection accuracy at an acceptable resource cost.
APA, Harvard, Vancouver, ISO, and other styles
22

Ding, Zhiguo, Haikuan Wang, Minrui Fei, and Dajun Du. "A Novel Distributed Online Anomaly Detection Method in Resource-Constrained Wireless Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/146189.

Full text
Abstract:
In this paper, a novel distributed online anomaly detection method in resource-constrained WSNs was proposed. Firstly, the spatiotemporal correlation existing in the sensed data was exploited and a series of single anomaly detectors were built in each distributed deployment sensor node based on ensemble learning theory. Secondly, these trained detectors were broadcasted to the member sensor nodes in the cluster, combining with its trained detector, and the initial ensemble detector was built. Thirdly, considering resources-constrained WSNs, ensemble pruning based on biogeographical based optimization (BBO) was employed in the cluster head node to obtain an optimized subset of ensemble members. Further, the pruned ensemble detector coded by the state matrix was broadcasted to each member sensor nodes for the distributed online global anomaly detection. Finally, the experiments operated on a real WSN dataset demonstrated the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
23

Abudu, Prince M. "CommNets: Communicating Neural Network Architectures for Resource Constrained Systems." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9909–10. http://dx.doi.org/10.1609/aaai.v33i01.33019909.

Full text
Abstract:
Applications that require heterogeneous sensor deployments continue to face practical challenges owing to resource constraints within their operating environments (i.e. energy efficiency, computational power and reliability). This has motivated the need for effective ways of selecting a sensing strategy that maximizes detection accuracy for events of interest using available resources and data-driven approaches. Inspired by those limitations, we ask a fundamental question: whether state-of-the-art Recurrent Neural Networks can observe different series of data and communicate their hidden states to collectively solve an objective in a distributed fashion. We realize our answer by conducting a series of systematic analyses of a Communicating Recurrent Neural Network architecture on varying time-steps, objective functions and number of nodes. The experimental setup we employ models tasks synonymous with those in Wireless Sensor Networks. Our contributions show that Recurrent Neural Networks can communicate through their hidden states and we achieve promising results.
APA, Harvard, Vancouver, ISO, and other styles
24

Mao, Yuxin, and Ping Zhu. "A Source-Initiated On-Demand Routing Algorithm Based on the Thorup-Zwick Theory for Mobile Wireless Sensor Networks." Scientific World Journal 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/283852.

Full text
Abstract:
The unreliability and dynamics of mobile wireless sensor networks make it hard to perform end-to-end communications. This paper presents a novel source-initiated on-demand routing mechanism for efficient data transmission in mobile wireless sensor networks. It explores the Thorup-Zwick theory to achieve source-initiated on-demand routing with time efficiency. It is able to find out shortest routing path between source and target in a network and transfer data in linear time. The algorithm is easy to be implemented and performed in resource-constrained mobile wireless sensor networks. We also evaluate the approach by analyzing its cost in detail. It can be seen that the approach is efficient to support data transmission in mobile wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
25

Kaur, Jaspreet, and Amit Kumar Bindal. "Adaptive Topology Control for Hierarchical Routing Over Resource Constrained Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 16, no. 9 (September 1, 2019): 3917–24. http://dx.doi.org/10.1166/jctn.2019.8271.

Full text
Abstract:
Topology defines the standards used by sensors to communicate with each other. Frequent updates in topology may cause excessive control overhead. Overall resource requirements for network operations can be reduced by optimizing the topology control schemes. In this paper, traditional methods for topology management are investigated and a new approach is introduced to manage the frequent topological updates.
APA, Harvard, Vancouver, ISO, and other styles
26

Mispan, Mohd Syafiq, Aiman Zakwan Jidin, Muhammad Raihaan Kamaruddin, and Haslinah Mohd Nasir. "Proof of concept for lightweight PUF-based authentication protocol using NodeMCU ESP8266." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 3 (December 1, 2021): 1392. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1392-1398.

Full text
Abstract:
Wireless sensor node is the foundation for building the next generation of ubiquitous networks or the so-called internet of things (IoT). Each node is equipped with sensing, computing devices, and a radio transceiver. Each node is connected to other nodes via a wireless sensor network (WSN). Examples of WSN applications include health care monitoring, and industrial monitoring. These applications process sensitive data, which if disclosed, may lead to unwanted implications. Therefore, it is crucial to provide fundamental security services such as identification and authentication in WSN. Nevertheless, providing this security on WSN imposes a significant challenge as each node in WSN has a limited area and energy consumption. Therefore, in this study, we provide a proof of concept of a lightweight authentication protocol by using physical unclonable function (PUF) technology for resource-constrained wireless sensor nodes. The authentication protocol has been implemented on NodeMCU ESP8266 devices. A server-client protocol configuration has been used to verify the functionality of the authentication protocol. Our findings indicate that the protocol used approximately 7% of flash memory and 48% of static random-access memory (SRAM) in the sensor node during the authentication process. Hence, the proposed scheme is suitable to be used for resource-constrained IoT devices such as WSN.
APA, Harvard, Vancouver, ISO, and other styles
27

S. Kori, Gururaj, and Mahabaleshwar S. Kakkasageri. "Game Theory based Resource Identification Scheme for Wireless Sensor Networks." International Journal of Intelligent Systems and Applications 14, no. 2 (April 8, 2022): 54–73. http://dx.doi.org/10.5815/ijisa.2022.02.05.

Full text
Abstract:
In modern world of sensing and distributive systems, traditional Wireless Sensor Networks (WSN) has to deal with new challenges, such as multiple application requirements, dynamic and heterogeneous networks. Senor nodes in WSN are resource constrained in terms of energy, communication range, bandwidth, processing delay and memory. Numerous solutions are proposed to optimize the performance and to increase the lifetime of WSN by introducing new resource management principles. Effective and intelligent resource management in WSN involves in resource identification, resource scheduling, and resource utilization. This paper proposes a Bayesian Game Model (BGM) approach to efficiently identify the best node with the maximum resource in WSN for data transmission, considering energy, bandwidth, and computational delay. The scheme operates as follows: (1) Sensor nodes information such as residual energy, available bandwidth, and node ID, etc., is gathered (2) Energy and bandwidth of each node are used to generate the payoff matrix (3) Implementation of node identification scheme is based on payoff matrix, utilities assigned, strategies and reputation of each node (4) Find Bayesian Nash Equilibrium condition using Starring algorithm (5) Solving the Bayesian Nash Equilibrium using Law of Total Probability and identifying the best node with maximum resources (6) Adding/Subtracting reward (reputation factor) to winner/looser node. Simulation results show that the performance of the proposed Bayesian game model approach for resource identification in WSN is better as compared with the Efficient Neighbour Discovery Scheme for Mobile WSN (ENDWSN). The results indicate that the proposed scheme has up to 12% more resource identification accuracy rate, 10% increase in the average number of efficient resources discovered and 8% less computational delay as compared to ENDWSN.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Chaoran, and Yun Liu. "SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/105364.

Full text
Abstract:
Wireless sensor network is a self-organizing multihop network, which is composed of a large number of wireless sensor nodes and usually deployed in unattended environment to collect target information. At present, WSN is facing a growing range of security threats owing to its wireless and resource-constrained characteristics. Compromised sensor nodes can easily corrupt data accuracy and integrity by falsifying sensed information, selectively forwarding or misdirecting received data packets during the process of data aggregation. To solve these security problems, we propose a smart reputation-based data aggregation protocol for WSNs (SRDA) that can provide adequate protection of data accuracy and integrity for wireless sensor network. The simulation results indicate that SRDA can effectively identify the compromised nodes and isolate them from the network by the deployment of the smart reputation system.
APA, Harvard, Vancouver, ISO, and other styles
29

Riaz, Rabia, Tae-Sun Chung, Sanam Shahla Rizvi, and Nazish Yaqub. "BAS: The Biphase Authentication Scheme for Wireless Sensor Networks." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/7041381.

Full text
Abstract:
The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Gulen, Utku, Abdelrahman Alkhodary, and Selcuk Baktir. "Implementing RSA for Wireless Sensor Nodes." Sensors 19, no. 13 (June 27, 2019): 2864. http://dx.doi.org/10.3390/s19132864.

Full text
Abstract:
As wireless sensor networks (WSNs) become more widespread, potential attacks against them also increase and applying cryptography becomes inevitable to make secure WSN nodes. WSN nodes typically contain only a constrained microcontroller, such as MSP430, Atmega, etc., and running public key cryptography on these constrained devices is considered a challenge. Since WSN nodes are spread around in the field, the distribution of the shared private key, which is used in a symmetric key cryptographic algorithm for securing communications, is a problem. Thus, it is necessary to use public key cryptography to effectively solve the key distribution problem. The RSA cryptosystem, which requires at least a 1024-bit key, is the most widely used public key cryptographic algorithm. However, its large key size is considered a drawback for resource constrained microcontrollers. On the other hand, RSA allows for extremely fast digital signature generation which may make it desirable in applications where messages transmitted by sensor nodes need to be authenticated. Furthermore, for compatibility with an existing communication infrastructure, it may be desirable to adopt RSA in a WSN setting. With this work, we show that, in spite of its long key size, RSA is applicable for wireless sensor networks when optimized arithmetic, low-level coding and some acceleration algorithms are used. We pick three versions of the MSP430 microcontroller, which is used widely on wireless sensor network nodes, and implement 1024-bit RSA on them. Our implementation achieves 1024-bit RSA encryption and decryption operations on MSP430 in only 0 . 047 s and 1 . 14 s, respectively. In order to achieve these timings, we utilize several acceleration techniques, such as the subtractive Karatsuba-Ofman, Montgomery multiplication, operand scanning, Chinese remainder theorem and sliding window method. To the best of our knowledge, our timings for 1024-bit RSA encryption and decryption operations are the fastest reported timings in the literature for the MSP430 microcontroller.
APA, Harvard, Vancouver, ISO, and other styles
31

Dutta, Prabal, and Adam Dunkels. "Operating systems and network protocols for wireless sensor networks." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 370, no. 1958 (January 13, 2012): 68–84. http://dx.doi.org/10.1098/rsta.2011.0330.

Full text
Abstract:
Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes—including energy, computing, communications and storage—which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.
APA, Harvard, Vancouver, ISO, and other styles
32

Hang, Lei, Wenquan Jin, HyeonSik Yoon, Yong Hong, and Do Kim. "Design and Implementation of a Sensor-Cloud Platform for Physical Sensor Management on CoT Environments." Electronics 7, no. 8 (August 7, 2018): 140. http://dx.doi.org/10.3390/electronics7080140.

Full text
Abstract:
The development of the Internet of Things (IoT) has increased the ubiquity of the Internet by integrating all objects for interaction via embedded systems, leading to a highly distributed network of devices communicating with human beings as well as other devices. In recent years, cloud computing has attracted a lot of attention from specialists and experts around the world. With the increasing number of distributed sensor nodes in wireless sensor networks, new models for interacting with wireless sensors using the cloud are intended to overcome restricted resources and efficiency. In this paper, we propose a novel sensor-cloud based platform which is able to virtualize physical sensors as virtual sensors in the CoT (Cloud of Things) environment. Virtual sensors, which are the essentials of this sensor-cloud architecture, simplify the process of generating a multiuser environment over resource-constrained physical wireless sensors and can help in implementing applications across different domains. Virtual sensors are dynamically provided in a group which advantages capability of the management the designed platform. An auto-detection approach on the basis of virtual sensors is additionally proposed to identify the accessible physical sensors nodes even if the status of these sensors are offline. In order to assess the usability of the designed platform, a smart-space-based IoT case study was implemented, and a series of experiments were carried out to evaluate the proposed system performance. Furthermore, a comparison analysis was made and the results indicate that the proposed platform outperforms the existing platforms in numerous respects.
APA, Harvard, Vancouver, ISO, and other styles
33

LI, DEYING, ZHENG LI, WENKAI MA, and WENPING CHEN. "CONSTRAINED RELAY NODE DEPLOYMENT FOR UNDERWATER ACOUSTIC WIRELESS SENSOR NETWORKS." Discrete Mathematics, Algorithms and Applications 04, no. 01 (March 2012): 1250010. http://dx.doi.org/10.1142/s1793830912500103.

Full text
Abstract:
An underwater acoustic wireless sensor network (UA-WSN) consists of many resource-constrained underwater sensor nodes (USNs), which are deployed to perform collaborative monitoring tasks over a given region. One way to preserve network connectivity while guaranteeing other network QoS is to deploy some relay nodes (RNs) in the networks. Although RNs' function is more powerful than USNs, but they can lead to more interference and their cost is more expensive. This paper addresses constrained low-interference relay node deployment problem for 3-D UA-WSNs in which the RNs are placed at a subset of candidate locations to ensure connectivity between the USNs such that the number of RNs deployed and the value of total incremental interference are minimized. We first prove that it is NP-hard, then propose a general approximation algorithm framework. Based on the framework, we get two polynomial time O(1)-approximation algorithms.
APA, Harvard, Vancouver, ISO, and other styles
34

Oliveira, Luis M. L., Joel J. P. C. Rodrigues, André G. F. Elias, and Bruno B. Zarpelão. "Ubiquitous Monitoring Solution for Wireless Sensor Networks with Push Notifications and End-to-End Connectivity." Mobile Information Systems 10, no. 1 (2014): 19–35. http://dx.doi.org/10.1155/2014/270568.

Full text
Abstract:
Wireless Sensor Networks (WSNs) belongs to a new trend in technology in which tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data such as temperature and humidity. Recently, due to the huge growth in the use of mobile devices with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks. Interconnecting WSNs with smartphones and the Internet is a big challenge and new architectures are required due to the heterogeneity of these devices. Taking into account that people are using smartphones with Internet connection, there is a good opportunity to propose a new architecture for wireless sensors monitoring using push notifications and smartphones. Then, this paper proposes a ubiquitous approach for WSN monitoring based on a REST Web Service, a relational database, and an Android mobile application. Real-time data sensed by WSNs are sent directly to a smartphone or stored in a database and requested by the mobile application using a well-defined RESTful interface. A push notification system was created in order to alert mobile users when a sensor parameter overcomes a given threshold. The proposed architecture and mobile application were evaluated and validated using a laboratory WSN testbed and are ready for use.
APA, Harvard, Vancouver, ISO, and other styles
35

Arjmandi, Hamidreza, and Farshad Lahouti. "Resource Optimized Distributed Source Coding for Complexity Constrained Data Gathering Wireless Sensor Networks." IEEE Sensors Journal 11, no. 9 (September 2011): 2094–101. http://dx.doi.org/10.1109/jsen.2011.2109947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Wooseong, and Wonyong Yoon. "Multi-constrained Max–Min Fair Resource Allocation in Multi-channel Wireless Sensor Networks." Wireless Personal Communications 97, no. 4 (August 9, 2017): 5747–65. http://dx.doi.org/10.1007/s11277-017-4807-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Sehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.

Full text
Abstract:
A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
38

Ali, Shahwar, A. Humaria, M. Sher Ramzan, Imran Khan, Syed M. Saqlain, Anwar Ghani, J. Zakia, and Bander A. Alzahrani. "An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092577. http://dx.doi.org/10.1177/1550147720925772.

Full text
Abstract:
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
APA, Harvard, Vancouver, ISO, and other styles
39

Tiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.

Full text
Abstract:
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.
APA, Harvard, Vancouver, ISO, and other styles
40

Hughes, Daniel, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier Del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen, and Jo Ueyama. "Building Wireless Sensor Network Applications with LooCI." International Journal of Mobile Computing and Multimedia Communications 2, no. 4 (October 2010): 38–64. http://dx.doi.org/10.4018/jmcmc.2010100103.

Full text
Abstract:
Considerable research has been performed in applying run-time reconfigurable component models to the domain of wireless sensor networks. The ability to dynamically deploy and reconfigure software components has clear advantages in sensor networks, which are typically large in scale and expected to operate for long periods in the face of node mobility, dynamic environmental conditions, and changing application requirements. LooCI is a component and binding model that is optimized for use in resource-constrained environments such as Wireless Sensor Networks. LooCI components use a novel event-based binding model that allows developers to model rich component interactions, while providing support for run-time reconfiguration, reflection, and policy-based management. This paper reports on the design of LooCI and describes a prototype implementation for the Sun SPOT. This platform is then evaluated in context of a real-world river monitoring and warning scenario in the city of São Carlos, Brazil.
APA, Harvard, Vancouver, ISO, and other styles
41

You, Seongwon, Jason K. Eshraghian, Herbert C. Iu, and Kyoungrok Cho. "Low-Power Wireless Sensor Network Using Fine-Grain Control of Sensor Module Power Mode." Sensors 21, no. 9 (May 4, 2021): 3198. http://dx.doi.org/10.3390/s21093198.

Full text
Abstract:
Wireless sensor nodes are heavily resource-constrained due to their edge form factor, which has motivated increasing battery life through low-power techniques. This paper proposes a power management method that leads to less energy consumption in an idle state than conventional power management systems used in wireless sensor nodes. We analyze and benchmark the power consumption between Sleep, Idle, and Run modes. To reduce sensor node power consumption, we develop fine-grained power modes (FGPM) with five states which modulate energy consumption according to the sensor node’s communication status. We evaluate the proposed method on a test bench Mica2. As a result, the power consumed is 74.2% lower than that of conventional approaches. The proposed method targets the reduction of power consumption in IoT sensor modules with long sleep mode or short packet data in which most networks operate.
APA, Harvard, Vancouver, ISO, and other styles
42

Ghai, Shilpy, Vijay Kumar, and Rohit Vaid. "Dynamic Queue Synchronization for Congestion Control Over Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2562–74. http://dx.doi.org/10.1166/jctn.2020.8931.

Full text
Abstract:
Congestion control over resource constrained sensor network is a critical challenge and it is also quite hard to fulfill the QoS constraints for end users. In this paper, a dynamic queue synchronization (DQS) scheme is introduced that can alter the data rate dynamically as per the current buffer length. Its performance is compared with existing schemes i.e., Dynamic Round Robin (DRR) and Random Early Discard (RED) using different routing protocols i.e., LEACH/PEGASIS/TEEN under various constraints (Throughput/End-to-End Delay/Routing Load/Energy).
APA, Harvard, Vancouver, ISO, and other styles
43

Obbo, Aggrey, Pius Ariho, and Evarist Nabaasa. "Towards People Crowd Detection Using Wireless Sensor Networks." European Journal of Technology 6, no. 2 (June 17, 2022): 32–48. http://dx.doi.org/10.47672/ejt.1071.

Full text
Abstract:
Objective: The objective of this study was to examine and propose the use of wireless sensor networks for people crowd detection in resource constrained environments such as developing economies. Methodology: A systematic review was carried out on current technological trends and application of Wireless Sensor Networks (WSNs) in crowd detection. For this study, focus was on WSN implementation in developing economies, where infrastructure is underdeveloped and people crowds are dynamic and spontaneous. Based on a requirement analysis and knowledge of the inherent challenges of WSNs, a WSN implementation for people crowd detection was proposed. Findings: Most studies in crowd detection using WSNs, have been in the area of non-people crowds. However issues critical to deployment of WSNs for people crowd detection in developing countries include: the uncontrollable nature of people crowds, under developed physical infrastructure and the inherent challenges of power, computational capacity and broadcast communication characterizing WSNs. Achieving people crowd detection using WSNs therefore, calls for special attention. Recommendation: To ensure effective people crowd detection, requires taking into consideration connectivity, scalability, performance, security, accuracy and resource utilization of WSNs.
APA, Harvard, Vancouver, ISO, and other styles
44

Lachowski, Rosana, Marcelo Pellenz, Edgard Jamhour, Manoel Penna, Glauber Brante, Guilherme Moritz, and Richard Souza. "ICENET: An Information Centric Protocol for Big Data Wireless Sensor Networks." Sensors 19, no. 4 (February 22, 2019): 930. http://dx.doi.org/10.3390/s19040930.

Full text
Abstract:
Wireless Sensors Networks (WSNs) are an essential element of the Internet of Things (IoT), and are the main producers of big data. Collecting a huge amount of data produced by a resource-constrained network is a very difficult task, presenting several challenges. Big data gathering involves not only periodic data sensing, but also the forwarding of queries and commands to the network. Conventional network protocols present unfeasible strategies for large-scale networks and may not be directly applicable to IoT environments. Information-Centric Networking is a revolutionary paradigm that can overcome such big data gathering challenges. In this work, we propose a soft-state information-centric protocol, ICENET (Information Centric protocol for sEnsor NETworks), for big data gathering in large-scale WSNs. ICENET can efficiently propagate user queries in a wireless network by using a soft-state recovery mechanism for lossy links. The scalability of our solution is evaluated in different network scenarios. Results show that the proposed protocol presents approximately 84% less overhead and a higher data delivery rate than the CoAP (Constrained Application Protocol), which is a popular protocol for IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
45

Kaur, Puneet, and Navpreet Kaur. "A Survey on Wireless Sensor Network: Comparative Review." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 29, 2017): 119. http://dx.doi.org/10.23956/ijarcsse.v7i7.110.

Full text
Abstract:
Due to advanced features of wireless sensor devices, the usage of these devices are rises tremendously all over the world. Many researchers work on wireless devices for new enhancement in ad hoc network. WSN (Wireless Sensor Network) included small, low-cost and resource constrained nodes. In order to provide the unique communication protocols many researches have been done in the existing algorithms by introducing new methods and algorithms. In this study, some approaches to eliminate the Sinkhole Attack are introduced that happened in WSN. Apart from this, various routing protocols that can be used to improve the performance of network during transmission of data are discussed in this paper. The performance prediction of routing protocol is very tough task due to varying network scenarios. The performance of WSN is measured using various parameters like throughput, end to end delay are also discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
46

S., Jayasri B., and G. Raghavendra Rao. "Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in Wireless Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4637. http://dx.doi.org/10.11591/ijece.v8i6.pp4637-4645.

Full text
Abstract:
Irrespective of inclusion of Wireless Sensor Network (WSN) in majority of the research proposition for smart city planning, it is still shrouded with some significant issues. A closer look into problems in WSN shows that energy parameter is the origination point of majority of the other problems in resource-constrained sensors as well as it significant minimizes the reliability in standard sensory operation in adverse environment. Therefore, this manuscript presents a novel analytical model that is meant for establishing a well balance between energy efficiency over multi-path data forwarding and reliable operation with improved network performance. The complete process is emphasized during data fusion stage to ensure data quality too. A simulation study has been carried out using benchmarked test-bed of MEMSIC nodes to find that proposed system offers good energy conservation process during data fusion operation as well as it also ensure good reliable operation in comparison to existing system.
APA, Harvard, Vancouver, ISO, and other styles
47

Aarab, Zineb, Asmae El Ghazi, Rajaa Saidi, and Moulay Driss Rahmani. "Towards a context-aware Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 3 (August 22, 2018): 1869. http://dx.doi.org/10.14419/ijet.v7i3.15667.

Full text
Abstract:
Recently, the development of wireless sensor networks (WSNs) is spreading rapidly. WSNs are highly distributed self-organized systems which comprise a large number of resource constrained sensor nodes. Developers of WSNs face many challenges from communication, memory, limited energy… Also, mobility has become a major concern for WSN researchers. Indeed, Mobile WSNs (MWSN) consist of mobile sensor nodes that can move on their own and also interact with the physical environment. Developing applications for MWSN is a complicated process because of the wide variety of WSN applications and low-level implementation details. Integrating context-awareness can improve MWSN applications results. In this paper, some research issues and challenges involved in the design of WSNs are presented. Model-Driven Engineering offers an effective solution to WSN application developers by hiding the details of lower layers and raising the level of abstraction. In this sense, we propose a context-aware WSN architecture and WSN metamodel to ease the work for developers in this field.
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, S. P., and S. C. Sharma. "A Novel Energy Efficient Clustering Algorithm for Wireless Sensor Networks." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1775–80. http://dx.doi.org/10.48084/etasr.1277.

Full text
Abstract:
Wireless sensor networks (WSNs) are composed of huge amount of tiny resource constrained devices known as sensors. The demand for an energy efficient structure is becoming gradually more essential in WSNs. Energy efficient clustering is a distinguished optimization problem which has been studied extensively to expand the life span of WSNs. In this manuscript, a new energy efficient clustering scheme for WSNs with the use of Particle Swarm Optimization (PSO) is proposed. The clustering algorithm is implemented with the goal of concurrently minimizing the intra-cluster distance along with optimizing the usage of network energy. The presented algorithm is tested widely and results are analyzed and compared with previous ones to show the supremacy in term of alive nodes, energy consumption, packet delivery ratio, and system throughput. Simulation results show that the proposed algorithm outperforms other existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
49

Gao, Ruiling, Minghuan Zhao, Zhihui Qiu, Yingzhou Yu, and C. Hwa Chang. "An Improved Motion-Sensing Based Monitoring System for Smart Health Care." International Journal of Software Innovation 3, no. 4 (October 2015): 48–61. http://dx.doi.org/10.4018/ijsi.2015100104.

Full text
Abstract:
Smart health care system has been widely studied by researchers in recent years. Various system design schemes have been proposed for the purpose of enhancing the performance of traditional hospital-centered health care system. Equipped with wireless devices, the innovative system is capable to offer intelligent monitoring and control. In this paper, the authors present an improved web-based motion detection system for health care. The algorithm running on it can detect different motion patterns for individuals and perform well across different hardware platforms, such as Android phones and sensors. The authors use Contiki and its supported low-power wireless standards for 6LoWPAN-based Wireless Sensor Network (WSN) to address security issues and realize real-time bidirectional communication. The Web of Things (WoT) integrates data from resource-constrained sensors into web applications and allows the realization of this smart system. Further, a technical evaluation is given to evaluate this system.
APA, Harvard, Vancouver, ISO, and other styles
50

Buzura, Sorin, Bogdan Iancu, Vasile Dadarlat, Adrian Peculea, and Emil Cebuc. "Optimizations for Energy Efficiency in Software-Defined Wireless Sensor Networks." Sensors 20, no. 17 (August 24, 2020): 4779. http://dx.doi.org/10.3390/s20174779.

Full text
Abstract:
Software-defined wireless sensor networking (SDWSN) is an emerging networking architecture which is envisioned to become the main enabler for the internet of things (IoT). In this architecture, the sensors plane is managed by a control plane. With this separation, the network management is facilitated, and performance is improved in dynamic environments. One of the main issues a sensor environment is facing is the limited lifetime of network devices influenced by high levels of energy consumption. The current work proposes a system design which aims to improve the energy efficiency in an SDWSN by combining the concepts of content awareness and adaptive data broadcast. The purpose is to increase the sensors’ lifespan by reducing the number of generated data packets in the resource-constrained sensors plane of the network. The system has a distributed management approach, with content awareness being implemented at the individual programmable sensor level and the adaptive data broadcast being performed in the control plane. Several simulations were run on historical weather and the results show a significant decrease in network traffic. Compared to similar work in this area which focuses on improving energy efficiency with complex algorithms for routing, clustering, or caching, the current proposal employs simple computing procedures on each network device with a high impact on the overall network performance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography