To see the other types of publications on this topic, follow the link: Wireless application protocol.

Journal articles on the topic 'Wireless application protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless application protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wright, L. "Wireless application protocol (WAP)." Interactive Marketing 2, no. 2 (October 1, 2000): 148–57. http://dx.doi.org/10.1057/palgrave.im.4340083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ralph, D., and H. Aghvami. "Wireless application protocol overview." Wireless Communications and Mobile Computing 1, no. 2 (2001): 125–40. http://dx.doi.org/10.1002/wcm.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Llana, Andres. "Wireless Application Protocol (WAP) and Mobile Wireless Access." Information Systems Security 11, no. 3 (July 2002): 14–21. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37895.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikolaidis, I. "The wireless application protocol [Book Review]." IEEE Network 14, no. 6 (November 2000): 4–5. http://dx.doi.org/10.1109/mnet.2000.885659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Linke, Andreas. "Industrial Control Applications using the Wireless Application Protocol (WAP)." IFAC Proceedings Volumes 34, no. 9 (July 2001): 53–58. http://dx.doi.org/10.1016/s1474-6670(17)41681-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

., Kamini, and Ravinder Singh. "Performance Test of WAP Gateway Over Web Server Using OPNET." CGC International Journal of Contemporary Technology and Research 2, no. 2 (June 26, 2020): 120–25. http://dx.doi.org/10.46860/cgcijctr.2020.06.26.120.

Full text
Abstract:
The Security for the portable devices such as mobile phones,iPad and laptops becoming extremely important day by day.The intermediates such as gateway are the main source for communication through wireless media. In today's era, maintaining the transport level security amongst cellular devices like mobile phones and PDA(Personal Digital Assistant) become the most burning issue.During communications of smart phones with the web server through broadband method pass communication through the gateway known as Wireless Applications Protocol. The main purpose of WAP gateway is to transfer all the protocol used in WAP to the protocols used on the internet server. The WAP proxy server uses marshalling and unmarshalling methodology for the content to reduce the size of the data that has been sent through the wireless link. Further, the communication between the mobile phones and wireless application protocol is secured by using the security protocol called WTLS. The communication between the WAP gateway and web server is secured through the TLS/SSL security protocols. This paper simulates an assessment of wireless and wired networks using OPNET simulation tools. This paper simulated 2 different scenarios comparing wireless mobile client communication using WTLS gateway MD5_RSA encryption and Firewall gateway TLS encryption using MD5_RSA.The investigation results shows how the end to end security takes place between wireless clients to web servers using hybrid security protocol.
APA, Harvard, Vancouver, ISO, and other styles
7

Pandeeswaran, Chelliah, Natrajan Papa, and Sundar G. Jayesh. "EE-Hybrid MAC Protocol for Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 407–11. http://dx.doi.org/10.4028/www.scientific.net/amm.573.407.

Full text
Abstract:
MAC protocol design in Wireless sensor networks becomes vibrant research field for the past several years. In this paper an EE-Hybrid MAC protocol (Energy efficient hybrid Medium Access Control) has been proposed, which is energy efficient and low latency MAC protocol, which uses interrupt method to assign priority for certain wireless sensor nodes assumed to be present in critical loops of industrial process control domain. EE-Hybrid MAC overcomes some of the limitations in the existing approaches. Industrial wireless sensor network require a suitable MAC protocol which offers energy efficiency and capable of handling emergency situations in industrial automation domain. Time critical and mission critical applications demands not only energy efficiency but strict timeliness and reliability. Harsh environmental condition and dynamic network topologies may cause industrial sensor to malfunction, so the developed protocol must adapt to changing topology and harsh environment. Most of the existing MAC protocols have number of limitations for industrial application domain In industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay. The proposed EE-Hybrid MAC protocol is simulated in NS2 environment, from the result it is observed that proposed protocol provides better performance compared to the conventional MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Zhi Yan, Guang You Yang, Jing Jing Zhou, and Xiong Gan. "Energy-Efficient Routing Protocol of Wireless Sensor Network for Industrial Application." Key Engineering Materials 579-580 (September 2013): 732–39. http://dx.doi.org/10.4028/www.scientific.net/kem.579-580.732.

Full text
Abstract:
An energy-efficient wireless sensor routing protocol (Energy-efficient clustering hierarchy routing protocol, EECH) for industrial field is proposed based on LEACH protocol according to the energy inefficiency of existing routing protocols and the characteristics of industrial field applications. The EECH protocol takes full advantages of the node clustering and time slot distribution in LEACH and implements the functions such as clustering, multi hop time slot distribution, node sleeping and data gathering. The cluster heads can be evenly distributed in the area with the geography location information of the wireless nodes, so that the optimal data gathering path can be established. Meanwhile, the EECH protocol can reduce the conflict in data receiving/transmitting and the energy consumption of the nodes, and extend the network lifetime through the multi hop time slot distribution and node sleep mechanism. The simulation results have shown that the death time of the first node in EECH protocol is extended double time than that of LEACH protocol. When most of the nodes dies, the amount of received data of the base station node is more than twice as much as the LEACH protocol, which has verified the energy efficiency characteristic of the EECH protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Liao, Ying, Wei Xu Hao, and Wei Qun Li. "Algorithms for Routing Protocol in Wireless Sensor Networks." Advanced Materials Research 219-220 (March 2011): 965–71. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.965.

Full text
Abstract:
Wireless sensor networks (WSNs) detect and monitor the outside physical state by the sensor nodes organizing automatically. Routing protocol is one of most important parts research contents of WSNs. This paper analyses and compares routing protocols of wireless sensor networks with other networks, and summarizes characteristics and the appropriate application by studying recent routing protocols for sensor networks. Finally, the important features and the future trends of routing protocols possess are putted forward.
APA, Harvard, Vancouver, ISO, and other styles
10

Cuevas-Martinez, Juan Carlos, Manuel Angel Gadeo-Martos, Jose Angel Fernandez-Prieto, Joaquin Canada-Bago, and Antonio Jesus Yuste-Delgado. "Wireless Intelligent Sensors Management Application Protocol-WISMAP." Sensors 10, no. 10 (September 28, 2010): 8827–49. http://dx.doi.org/10.3390/s101008827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fenech, Tino. "Exploratory study into wireless application protocol shopping." International Journal of Retail & Distribution Management 30, no. 10 (October 2002): 482–97. http://dx.doi.org/10.1108/09590550210445353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

P., Samundiswary, and Surender R. "Performance Analysis of IEEE 802.15.4 Based Wireless Sensor Networks using LAR protocol for CBR and ZIGBEE Traffic Applications." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 9 (September 15, 2013): 1963–68. http://dx.doi.org/10.24297/ijct.v10i9.1374.

Full text
Abstract:
IEEE 802.15.4 standard based wireless sensor networks (WSNs) emerges as the next generation wireless standard for low-rate wireless personal area networks. IEEE 802.15.4 standard offers low power, low data rate and short range networking for wireless battery powered devices. It has also started to demand much attention towards research. The performance of the network can be analysed by using different types of routing protocols. In this paper, the performance analysis of IEEE 802.15.4 based Wireless Sensor Networks is done by using  Location Aided Routing (LAR) protocols for the traffic applications such as Constant Bit Rate (CBR) and Zigbee traffic application. The LAR protocol enables the routing of data between the source and destination by using directional flooding technique. The performance metrics such as throughput, delay, jitter and packets dropped of LAR for  CBR and Zigbee traffic application is evaluated and analysed. The simulation is modelled by using QualNet.
APA, Harvard, Vancouver, ISO, and other styles
13

Mosorov, Volodymyr, Sebastian Biedron, and Taras Panskyi. "THE APPLICATION OF REDUNDANCY IN LEACH PROTOCOL." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 2 (May 30, 2018): 50–53. http://dx.doi.org/10.5604/01.3001.0012.0706.

Full text
Abstract:
Nowadays wireless sensor networks have gained much popularity due to their flexibility. This progress has enabled the use of sensor nodes on an unprecedented scale and opened new opportunities for the so-called ubiquitous computerization. The total freedom of nodes distribution within the wireless sensor network (WSN), where the wireless characteristic is one of the greatest advantages of WSN, implies its greatest weaknesses. To overcome this challenge specialized routing protocols, such as many different version of LEACH, were ushered in so as to make effective use of the energy of the nodes themselves. This article aims to show the functioning of a new author’s solution, called IIS-LEACH, which uses redundancy as a basic element in increasing the reliability of WSN networks.
APA, Harvard, Vancouver, ISO, and other styles
14

Tan, Ding Zhong, Nian Sheng Jing, and Fu Qiang Liu. "Research on Wireless Sensor Networks with Application." Advanced Materials Research 433-440 (January 2012): 4621–24. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4621.

Full text
Abstract:
Wireless sensor networks (WSNs) used for remote temperature monitoring is researched in this paper; the WSN is in multi-layered structure. The WSN node, the routing protocol which can choose the routing path adaptively, the data communication protocol and the data encryption technology for wireless transmission, WSN management and monitoring software are Researched and Realized. The WSN was deployed, tested, and running steadily, it proved that the protocol and node design are reasonable.
APA, Harvard, Vancouver, ISO, and other styles
15

Jia, Xiao Wei, and Li Li Zhang. "Application of Bluetooth in Wireless Communication of CNC Manufacturing." Applied Mechanics and Materials 422 (September 2013): 232–36. http://dx.doi.org/10.4028/www.scientific.net/amm.422.232.

Full text
Abstract:
Through analyzing and comparing existing wireless communication protocols, this paper selects Bluetooth protocol suitable for CNC manufacturing and constructs communication system base on Bluetooth protocol.this system can solve some shortcomings of the wired network process, and make CNC machining faster, more flexible, more efficient.
APA, Harvard, Vancouver, ISO, and other styles
16

Shi, Xin Jun, Xi En Ye, and Chang Ye Li. "WiFi Wireless Video Transmission Technology's Application in Intelligent Home." Advanced Materials Research 846-847 (November 2013): 1487–90. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1487.

Full text
Abstract:
This Paper takes WiFi wireless video transmission as the technical basis, realized a remote WiFi video system through embedded Linux system, and successfully applyed it in the intelligent home control.The WiFi module is based on IEEE802.11n wireless protocol, which improves the highest transmission rate to 300 Mbps. Wireless camera capture video data and use H.264 to encode it, which greatly reduces the consume of the wireless bandwidth.The PDA terminal is implemented to comunicate with embedded Linux system via TCP/IP protocol, while the data is encrypted by TLS/SSL protocol.
APA, Harvard, Vancouver, ISO, and other styles
17

Cuzanauskas, Tomas, and Aurimas Anskaitis. "TCP Performance in Multi-Polling Game Theory-Based IEEE 802.11 Networks." Electrical, Control and Communication Engineering 11, no. 1 (December 1, 2016): 33–40. http://dx.doi.org/10.1515/ecce-2016-0010.

Full text
Abstract:
Abstract Easy usage and integration with various applications made IEEE 802.11 one of the most used technologies these days, both at home and business premises. Over the years, there have been many additional improvements to the 802.11 standards. Nevertheless, the algorithms and Media Access Control (MAC) layer methods are almost the same as in previous Wi-Fi versions. In this paper, a set of methods to improve the total system capacity is proposed – such as efficient transmit power management based on Game Theory with a custom wireless medium protocol. The transmit power management and wireless medium protocol is verified by both simulation and real application scenarios. The results conclude that the capacity of the proposed wireless medium protocol is overall 20 percent higher than the standard 802.11 wireless medium access protocols. Additional TCP Acknowledgment filtering, which was tested together with the proposed wireless medium access protocol, can provide up to 10-percent-higher TCP throughput in high-density scenarios, especially for asymmetrical traffic cases. The conducted research suggests that efficient power management could result in lighter transmit power allocation rules that are currently set by the local regulators for current Wi-Fi devices. Thus, better propagation characteristics and wireless medium management would lead to an overall higher wireless system capacity.
APA, Harvard, Vancouver, ISO, and other styles
18

Heo, Ju Seung, Ki Sang Ok, and Kee Cheon Kim. "Public Key Techniques for Prevention of Resource Exhaustion Attack in Wireless Sensor Networks." Advanced Materials Research 740 (August 2013): 159–63. http://dx.doi.org/10.4028/www.scientific.net/amr.740.159.

Full text
Abstract:
This paper proposes a prevention mechanism for resource exhaustion attack in Wireless Sensor Networks (WSN). WSNs are widely used in science, medical, and military applications. However, WSN has problems of small memory, weak processors, and the limited battery power. On the other hands, public key techniques provide powerful security, but they need high energy, memory, computation cost than the symmetric cryptography. Therefore, we propose a more efficient protocol than the existing protocols in WSN, which analyze RSA algorithm and simulate ECC algorithm in CC2420 which is a true single-chip 2.4Ghz IEEE 802.15.4 compliant RF transceiver designed for low-power and low voltage wireless application. We also compared our proposed protocol and other public key-based protocols.
APA, Harvard, Vancouver, ISO, and other styles
19

Cynthia, Prudhvi Krishna Saguturu, C., Komali Bandi, Srikanth Magulluri, and T. Anusha. "A survey on MANET protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i2.31.13384.

Full text
Abstract:
In Wireless sensor networks and ad hoc networks nodes have a freedom to move from one place to another, they are self-configuring this type of the structure fulfil the requirements of several application. A survey on the different MANET protocols will be done in this paper. Mainly this paper will focus on the Quality of Service on the different parameters like Throughput and Delay between different protocols like AODV (Ad Hoc on Demand Distance Vector), DSDV (Destination-Sequenced Distance-Vector Routing), DSR (Dynamic Source Routing), and TORA (Temporary Ordered Routing Algorithm). DSDV is called as proactive protocol because they know everything about the nodes in the network before the communication start. DSR, AODV, TORA protocols are called reactive protocol because nodes in this network do not know anything about network. They are also called ON-DEMAND routing protocols. After this analysis you will come to know which MANET protocol is best for different application.
APA, Harvard, Vancouver, ISO, and other styles
20

Sang, Lei, and Duo Long. "Application of Ant Colony Algorithm to the Hierarchical Routing in Wireless Sensor Networks." Advanced Materials Research 989-994 (July 2014): 1833–36. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1833.

Full text
Abstract:
Wireless sensor networks (WSN) have become a hot research topic in the field of computer science. Since WSNs are characterized by limited node energy, dynamic topological structure and data fusion, the design of WSN routing protocols is faced with new problems and challenges. In recent years, many new routing algorithms for wireless sensor networks have appeared, but they all have some shortcomings. This paper studies and analyzes these routing protocols, and in view of their shortcomings, proposes a WSN hierarchical routing protocol based on ant colony algorithm. And a simulation test is conducted on this improved routing protocol, and the simulation result proves that this algorithm basically achieves the design objectives of WSN routing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
21

Hua, Wen Wu, Zhong Hu Yuan, and Xiu Zhen Yu. "A Design of Z-Stack Application Based on the IEEE Address." Applied Mechanics and Materials 401-403 (September 2013): 1272–77. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1272.

Full text
Abstract:
This paper has designed a ZigBee application which is based on the IEEE address. This applications operating environment is TIs protocol stack called Z-Stack. The application can realize the following functions: wireless network self-organizing, the automatic acquisition and information upload. The upper machine communication protocol uses the IEEE address as device ID. This insures the application can find the datas physical source. With the help of network address, the applications speed and any other performance indicators will not drop. Using this application, the user can immediately find the accurate position directly after the security problem appeared. It has improved the efficiency of the wireless network management obviously.
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Tsu-Yang, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, and Sachin Kumar. "A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (April 14, 2021): 1–15. http://dx.doi.org/10.1155/2021/5537018.

Full text
Abstract:
The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
23

Sooki, Peter, and Akos Korosi. "Simulation-Based Performance Analysis Of Wireless Routing Protocols For Smart Metering Applications." European Scientific Journal, ESJ 12, no. 9 (March 30, 2016): 1. http://dx.doi.org/10.19044/esj.2016.v12n9p1.

Full text
Abstract:
There is a growing interest for smart metering applications in wireless environment recently. Wireless smart meter devices are easy to use solutions for recording energy consumption and report back the amount to the utility on a daily basis. This kind of usage of smart meter devices can be considered as a special subset of wireless sensor networks (WSN). The communication protocol used in smart meter networks has to be fast, reliable and secure. The challenge in developing such a protocol is the difficulty to debug software on multiple wireless nodes at the same time. This difficulty highlights the importance of the simulation-based approach. The most laborious part of the wireless communication is the routing protocol in the network layer when it comes to implementation. In this paper different wireless communication routing protocols are compared by simulation including naive Flooding, Gradient-Based Routing (GBR) and Directed Diffusion (DD). The simulation results show that GBR and DD have a superior performance over flooding as expected, and that GBR and DD has similar efficiency in a smart metering application. Since GBR is easier to implement it is the recommended solution for routing in a smart metering network.
APA, Harvard, Vancouver, ISO, and other styles
24

Samant, Tapaswini, and Amlan Datta. "Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2331. http://dx.doi.org/10.11591/ijece.v6i5.10645.

Full text
Abstract:
<p>In the era of wireless communication, wireless sensor is one of the best technologies we are witnessing. In case of environmental monitoring, tactical systems and different tracking applications, wireless sensors are being used. Here, the corresponding nodes operate on incomplete power and thus the energy comes into play to operate these entire networks. Managing the energy and its utilization is vital for TCP/IP protocol suite which is MAC layer’s application. Thus keeping in mind the above challenges, the techniques used are increasing the sleep duration, over hearing and ideal listening, collision of packet and eliminating hidden terminal problem. This paper is oriented towards the comparison of energy consumption by SMAC and TMAC protocol. The characteristics of TMAC and SMAC protocols were explored keeping real transmission conditions intact, like variable transmission bit rate, dynamic topology and mobile sensors in network. TMAC and SMAC protocols are contention based protocols and are designed to keep the energy consumption low using duty cycle.</p>
APA, Harvard, Vancouver, ISO, and other styles
25

Samant, Tapaswini, and Amlan Datta. "Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2331. http://dx.doi.org/10.11591/ijece.v6i5.pp2331-2337.

Full text
Abstract:
<p>In the era of wireless communication, wireless sensor is one of the best technologies we are witnessing. In case of environmental monitoring, tactical systems and different tracking applications, wireless sensors are being used. Here, the corresponding nodes operate on incomplete power and thus the energy comes into play to operate these entire networks. Managing the energy and its utilization is vital for TCP/IP protocol suite which is MAC layer’s application. Thus keeping in mind the above challenges, the techniques used are increasing the sleep duration, over hearing and ideal listening, collision of packet and eliminating hidden terminal problem. This paper is oriented towards the comparison of energy consumption by SMAC and TMAC protocol. The characteristics of TMAC and SMAC protocols were explored keeping real transmission conditions intact, like variable transmission bit rate, dynamic topology and mobile sensors in network. TMAC and SMAC protocols are contention based protocols and are designed to keep the energy consumption low using duty cycle.</p>
APA, Harvard, Vancouver, ISO, and other styles
26

Wei-Wei, Lin, Zeng Hong-Wei, and Jung Yoon Kim. "A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case." Wireless Communications and Mobile Computing 2021 (July 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6378139.

Full text
Abstract:
Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless communication environment becomes more and more complex, and the fault coverage of wireless protocol conformance testing is also facing more and more challenges. To solve this problem, this paper uses Finite State Machine (FSM) as a formal description tool for wireless protocols and presents a combining test method based on two test methods with complementary characteristics in the test technologies based on structural coverage and state identification. Then, the paper evaluates the effectiveness of the method based on 14 empirical cases. The experimental results show that the fault coverage of each empirical case can be effectively improved to 100% when the average test cost is only increased by 17.99%.
APA, Harvard, Vancouver, ISO, and other styles
27

Su, Xiao Qin, Xu Hua Pan, and Zhao Ming Lei. "A Novel MAC Protocol with Different QoS for WMSNs Materials." Advanced Materials Research 321 (August 2011): 146–50. http://dx.doi.org/10.4028/www.scientific.net/amr.321.146.

Full text
Abstract:
The adoption of wireless multimedia sensor networks (WMSNs) by applications that require complex operations, ranging from health care to industrial monitoring, has brought forward a new challenge of fulfilling the quality of service (QoS) requirements of these applications. Since the requirements depend on the applications, it would be difficult to design a single MAC that satisfies the wide range of applications. This calls for a suitable MAC protocol capable of achieving application-specific QoS. In this paper, we have proposed a novel MAC protocol with different QoS for WMSNs, which not only adapts to application oriented QoS, but also attempts to conserve energy without violating QoS-constraints. Simulation results demonstrate that the proposed protocol is capable of providing a bound latency including real-time and better throughput, at the cost of reasonable energy consumption, in comparison to other existing MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Zhi Ming, and Xiang Guang Chen. "The Development and Application of Ultra-Low-Power Wireless Sensor Network Nodes." Advanced Materials Research 846-847 (November 2013): 411–14. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.411.

Full text
Abstract:
In order to extend the life span of battery-powered wireless sensor network nodes, this article proceed from the power module, data processing module, wireless module and MAC protocols to design an ultra-low-power wireless sensor network nodes. The nodes improve the power module efficiency maximally, at the same time it utilizes the ultra-low-power data processing module and the asynchronous MAC protocol adopting a sleep wake-up mechanism. Thus it reduces the integrated energy consumption of wireless module significantly. The life span of the nodes has been increased more than three times. In a word, the design in proposed in this paper greatly cuts down the energy consumption of wireless sensor network, which has practical significance of expanding the application space and improving the application effects of wireless sensor network.
APA, Harvard, Vancouver, ISO, and other styles
29

Kumar Upadhayay, Shravan, and Mansi Gupta. "LEC-TMAC: Improving Energy Consumption & Latency in TMAC Protocol for Wireless Body Area Network." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (September 1, 2015): 430. http://dx.doi.org/10.11591/tijee.v15i3.1559.

Full text
Abstract:
<p class="Standard">The most common protocols for Wireless Body Area Network (WBAN) like TMAC, ZigBeeMAC, Baseline MAC protocol .In this paper, evaluating the effects of LEC-TMAC Protocol wireless body area network basis of Latency and energy consumption. This analysis is important in point of view that the varying requirement of WBAN according to varying conditions. In LEC-TMAC, the application packet rate of nodes a considerable effect is observed on latency and energy consumption for MAC protocols that is presented in the paper. As a conclusion, we invoke a number of new research challenges with regard to prospects of Wireless body area network and other issues.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Ullah, Niamat, M. Sanaullah Chowdhury, Mosaddique Al Ameen, and Kyung Sup Kwak. "Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 504946. http://dx.doi.org/10.1155/2012/504946.

Full text
Abstract:
Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.
APA, Harvard, Vancouver, ISO, and other styles
31

Kouki, Rihab, Hichem Salhi, and Faouzi Bouani. "Embedded predictive control strategy based on Internet of Things technology: Application to a thermal process under imperfect wireless network." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 234, no. 7 (December 6, 2019): 775–91. http://dx.doi.org/10.1177/0959651819890954.

Full text
Abstract:
This article is concerned with the design of wireless-networked control framework based on Internet of Things technology and predictive control strategy to remote control a thermal benchmark system. In order to improve the control performance of systems, an autonomous real-time solution is proposed for handling network problems. The adopted control strategy is divided into two cooperative parts under a master–slave architecture, in which two STM32 microcontrollers are investigated. The slave board is connected closely to the process and the master one is a distant controller. The microcontrollers communicate wirelessly through the Transmission Control Protocol/Internet Protocol. In the master board, a model predictive output-estimator-based controller is designed to control wirelessly the benchmark system, even though the incoming outputs from the slave board are lost. However, a buffered structure is implemented on the slave board to compensate the input losses of the arrived control sequences. The performance of the proposed wireless-networked predictive control compensation strategy for packet loss and perturbation handling in the wireless-networked control system in this work is verified through different experimentation conditions. Also, a comparative study with a wireless-networked proportional integral controller is performed to demonstrate the effectiveness of wireless-networked predictive control strategy for practical Internet of Things applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Jiang, Yu, Yan Chun Liang, Li Li He, Ying Hui Cao, and Cheng Quan Hu. "WSN Networking Protocol Based on Dynamic Changing Channel." Applied Mechanics and Materials 44-47 (December 2010): 844–48. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.844.

Full text
Abstract:
Based on the analysis of the wireless sensor networks in the application of the public utilities, a new approach which can change channel dynamically in buildings using wireless sensor networks was designed and implemented. In this paper, the WSN platform supported for AES encryption. And on the basis of the TDMA protocol, using linear regression and BBS generator, a new WSN protocol which has the ability to change communication channel dynamically was designed. Compared with traditional network protocols, the proposed method can decrease the degree of network congestion, energy consumption, program complexity and easy to achieve.
APA, Harvard, Vancouver, ISO, and other styles
33

Hong, Zhang, Jun Jie Wang, and Ai Sheng Ma. "Application Research of Wireless Communication Technology in Remote Meter Reading System." Applied Mechanics and Materials 513-517 (February 2014): 1494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1494.

Full text
Abstract:
In view of the problems in the current domestic and international remote wireless meter reading system, propose the remote wireless meter reading terminal system based on ZigBee technology combined with GPRS technology, carry out the hardware circuit design of each module, establish ZigBee wireless meter reading network based on 802.15.4 layer networking protocol, design a more practical remote wireless meter reading protocol and data transmission format. Test results show that it has realized the formation of ZigBee network, collection and remote transmission of meter data, terminal equipment parameters modification and other functions to achieve the terminal design requirements.
APA, Harvard, Vancouver, ISO, and other styles
34

Bhar, Jamila, and Imen Bouazzi. "Elastic hybrid MAC protocol for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4174. http://dx.doi.org/10.11591/ijece.v11i5.pp4174-4182.

Full text
Abstract:
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
APA, Harvard, Vancouver, ISO, and other styles
35

Tao, Tao, Zhong Hua Tong, Xiao Zheng, Xuan Gou Wu, and Lin Na Wei. "Depth Analysis of ZigBee Protocol on Wireless Sensor-Actuator Network." Applied Mechanics and Materials 666 (October 2014): 305–11. http://dx.doi.org/10.4028/www.scientific.net/amm.666.305.

Full text
Abstract:
With the development of information technology, research and application of wireless sensor-actuator network is more and more widely. In this paper, the composition of wireless sensor-actuator network is described, the ZigBee protocol which is a wireless networking protocol is analyzed from multiple aspects in the network. Network architecture, protocol stack hierarchy, building network process, data transfer process, task approach based on ZigBee protocol are studied.
APA, Harvard, Vancouver, ISO, and other styles
36

Heinzelman, W. B., A. P. Chandrakasan, and H. Balakrishnan. "An application-specific protocol architecture for wireless microsensor networks." IEEE Transactions on Wireless Communications 1, no. 4 (October 2002): 660–70. http://dx.doi.org/10.1109/twc.2002.804190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gao, Jun-feng, Hong-guo Zhang, and Guang-yi Tang. "A Delay-aware Application Protocol for Wireless Sensor Networks." International Journal of Grid and Distributed Computing 8, no. 6 (December 31, 2012): 49–56. http://dx.doi.org/10.14257/ijgdc.2015.8.6.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Ya, and Zhen Xu. "Research on Wireless Sensor Network Routing Protocol Based on Internet of Things." Applied Mechanics and Materials 513-517 (February 2014): 1127–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1127.

Full text
Abstract:
The development and application of the Internet of things and the basic structure of wireless sensor network are briefly introduced,routing protocol in wireless sensor network is studied in detail. Since the wireless sensor network is a kind of energy-limited and resource-limited network, the routing protocol must guarantee the smaller routing expenses and the reducing energy consumption. Based on the analysis and research of existing wireless sensor network routing protocol, this paper emphasizes on the detailed analysis of the hierarchy routing protocol LEACH algorithm.The paper also introduces two improved algorithms according to the limit of LEACH protocol.
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, Weizhe, You Zhang, and Tai-Hoon Kim. "Detecting bad information in mobile wireless networks based on the wireless application protocol." Computing 96, no. 9 (May 8, 2013): 855–74. http://dx.doi.org/10.1007/s00607-013-0325-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Huang, Qing Fu, Jian Wu Yang, and Zhi Cheng Chen. "The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01." Advanced Materials Research 271-273 (July 2011): 991–94. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.991.

Full text
Abstract:
With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Shu Qian, Wei Zhang, Zhang Wei Zhu, Cheng Quan Hu, and Li Li He. "Design of Application Platform for Wireless Sensor Networks." Advanced Engineering Forum 6-7 (September 2012): 859–64. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.859.

Full text
Abstract:
One of the bottlenecks that slow down the development the wireless sensor networks application is that people have to design different programs according to the different applications. A wireless sensor network application platform is presented which can be used to rapidly deploy an application by setting simple configuration parameters. The platform consists of two modules: Base station Module and Server Module. Base Station Module receives data from the coordinator by RS232 port,and sends them to the server through socket protocol. It also receives commands and parameters from server and delivers them to the coordinator. The platform also provides human-computer interactive function for users in the Browser/Server structure.
APA, Harvard, Vancouver, ISO, and other styles
42

Rajeswari, S. Raja, and V. Seenivasagam. "Comparative Study on Various Authentication Protocols in Wireless Sensor Networks." Scientific World Journal 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/6854303.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
APA, Harvard, Vancouver, ISO, and other styles
43

Moussa, Sherif, Ghada Abdel Halim, and Salah Ramadan. "Study on the Hierarchical Routing Protocols for Wireless Sensor Networks." Applied Mechanics and Materials 850 (August 2016): 43–51. http://dx.doi.org/10.4028/www.scientific.net/amm.850.43.

Full text
Abstract:
Routing the sensed data is considered a main challenge in Wireless Sensor Networks (WSN) because the routing characteristics may vary depending on the network application and/or the network architecture. Since most sensor network applications work in clusters, hierarchical routing protocols have been developed to fit this network topology. This paper introduces the performance differentials for most common hierarchical routing protocols such as Low Energy Adaptive Clustering Hierarchy (LEACH) and Threshold sensitive Energy Efficient sensor Network protocol (TEEN). The design parameters of sensor networks are analyzed to present a classification and comparison of LEACH, TEEN routing protocols. The two protocols are analyzed using different mobility models using NS2 simulation tool. This comparison reveals the important features that need to be taken into consideration while designing and evaluating new routing protocols for sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
44

Cheng, Li, Zhen Huan Cheng, Huan Xin Cheng, and Peng Li. "Application of the Wireless Data Transmission System." Applied Mechanics and Materials 328 (June 2013): 177–81. http://dx.doi.org/10.4028/www.scientific.net/amm.328.177.

Full text
Abstract:
Because of Urumqi Petrochemical Plant needing a large amount of industrial water, in view of their water supply problem, this paper proposed to use wireless data transmission technology to install a wireless gateway on the far flow transmitter, through the equipment RS485 interface, the cumulative flowing data accessed radio station to get the data by using the MODBUS protocol. Eventually it improves the efficiency of the water supply and centralizes management.
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Yang, Qiong Wu, Ting Zhao, Yong Tie, Fengshan Bai, and Minglu Jin. "An Improved Energy-Efficient Routing Protocol for Wireless Sensor Networks." Sensors 19, no. 20 (October 21, 2019): 4579. http://dx.doi.org/10.3390/s19204579.

Full text
Abstract:
Cluster-based hierarchical routing protocols play an essential role in decreasing the energy consumption of wireless sensor networks (WSNs). A low-energy adaptive clustering hierarchy (LEACH) has been proposed as an application-specific protocol architecture for WSNs. However, without considering the distribution of the cluster heads (CHs) in the rotation basis, the LEACH protocol will increase the energy consumption of the network. To improve the energy efficiency of the WSN, we propose a novel modified routing protocol in this paper. The newly proposed improved energy-efficient LEACH (IEE-LEACH) protocol considers the residual node energy and the average energy of the networks. To achieve satisfactory performance in terms of reducing the sensor energy consumption, the proposed IEE-LEACH accounts for the numbers of the optimal CHs and prohibits the nodes that are closer to the base station (BS) to join in the cluster formation. Furthermore, the proposed IEE-LEACH uses a new threshold for electing CHs among the sensor nodes, and employs single hop, multi-hop, and hybrid communications to further improve the energy efficiency of the networks. The simulation results demonstrate that, compared with some existing routing protocols, the proposed protocol substantially reduces the energy consumption of WSNs.
APA, Harvard, Vancouver, ISO, and other styles
46

Poonam, Rani, and Sharma Avinash. "Cluster Based Data Aggregation Scheme in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2678–83. http://dx.doi.org/10.1166/jctn.2020.8966.

Full text
Abstract:
Wireless Sensor Network (WSN) consists of a network with huge quantity of sensors that are deployed to accomplish a particular task. These low cost sensors are proficient of aggregating and communicating the sensed information over the field. Evaluation of IoT and proliferation of sensors with other application results building a variety of gazettes. However, these nodes being powered by a battery are energy constrained. While operating, most of the vitality is spent during packet transmission. So an ardent care should be taken care of while developing the protocol. The protocols through which nodes communicate with each other is known as routing. Designing of appropriate routing protocol results in better lifetime of the protocol. This paper proposes a routing protocol based on cluster formation among same type of sensor nodes (SN) for gathering of data at intermediate nodes in the cluster and these intermediate nodes further transmits data to resource opulence sink.
APA, Harvard, Vancouver, ISO, and other styles
47

Geng, Dao Qu, and Zhen Fang. "SCP: A Simple Communication Protocol for WBASN." Applied Mechanics and Materials 321-324 (June 2013): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.624.

Full text
Abstract:
In recent years, researchers have increasingly paid more attention to the Wireless Body Area Sensor Network (WBASN) for its potential applications in medical care and health care field. In these applications, the reliable data transmission is the key point. This paper presents a simple protocol for WBASN, and the reliability of data transport is concerned. The protocol design is described in detailed, and then the protocol evaluation is given. The evaluation result shows that the protocol is suitable for the application of WBASN.
APA, Harvard, Vancouver, ISO, and other styles
48

Shen, Bin, Xin Lei Liu, Xian Li Qin, and Ming Chao Fu. "Research of Wireless Routing Protocol Used in Underground Wireless Gas Monitoring Network Based on Star-Bus Topology and Non Protocol Stack." Applied Mechanics and Materials 190-191 (July 2012): 1170–74. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.1170.

Full text
Abstract:
In order to realize the application of the underground wireless monitoring network, in view of the characteristics of the underground wireless monitoring, a kind of multi jump wireless routing protocol based address priority and star-bus topology is designed in this paper. After the analysis of the mine wireless transmission process model and data broadcast problem, considering the technologies of direction control, second localization, the anti-interference, network survival period and so, a method of adding the protocol address and the uplink and downlink flag is proproesd to solve these probles above. Simulation results show that, this protocol can be successfully completed the wireless datatransmission in the underground laneway environment.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Tao Tao, Feng Yang, and Ming Chu Liu. "Data Transmission of Ground Penetrating Radar over Wireless Network." Applied Mechanics and Materials 701-702 (December 2014): 961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.961.

Full text
Abstract:
A wireless data transmission system used to realize data transmission of ground penetrating radar (GPR) is designed. It including data receiver and sender overcomes the disadvantages of traditional GPR cable transmission system. STM32F407 chip and ATK-RM04 are core components of data sender. PC with a wireless network card is data receiver. System is designed with reference to C/S network model. Data receiver and sender are respectively developed with VC++ socket and RAW API of Lwip TCP/IP protocol stack. CP protocol is chosen as network transport protocol. Practical applications show that system can stably transmit data within 0m-20m and maximum loss rate is 0.005%. It is reliable and convenient for GPR’s application.
APA, Harvard, Vancouver, ISO, and other styles
50

Thangamuthu, A. P. "Security in Wireless Sensor Networks: Issues and Challenges." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 120–28. http://dx.doi.org/10.34293/sijash.v8i4.3671.

Full text
Abstract:
Wireless sensor networks (WSNs) have made it easier for people to live in various fields: medical engineering, agriculture. With computing power and wireless networking, sensing technology makes it lucrative for its potential abundance of use. Since the many uses of such systems have been used, lightweight, inexpensive, disposable and self-contained computers, known as sensor nodes or “motes,” are created. WSNs are commonly used in applications for monitoring, tracking and control. These include centralized management, system heterogeneity, protocol routing, the versatility of node, the privacy of information and restricted computing capacity. WSN covers a wide geographical area; routing protocols, scalability and security should therefore be addressed. In the traditional networking technique, there are major benefits due to the low cost and cooperative design of wireless networks (WNs). The networks with wireless sensors have more advantages over wired networks. Although wireless networks have various advantages, they are vulnerable to security problems. Due to the broader application, safety has become an important issue for wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography