Journal articles on the topic 'Wireless communication systems. Wireless application protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless communication systems. Wireless application protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wu, Tsu-Yang, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, and Sachin Kumar. "A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (April 14, 2021): 1–15. http://dx.doi.org/10.1155/2021/5537018.

Full text
Abstract:
The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
2

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Full text
Abstract:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
APA, Harvard, Vancouver, ISO, and other styles
3

Wei-Wei, Lin, Zeng Hong-Wei, and Jung Yoon Kim. "A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case." Wireless Communications and Mobile Computing 2021 (July 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6378139.

Full text
Abstract:
Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless communication environment becomes more and more complex, and the fault coverage of wireless protocol conformance testing is also facing more and more challenges. To solve this problem, this paper uses Finite State Machine (FSM) as a formal description tool for wireless protocols and presents a combining test method based on two test methods with complementary characteristics in the test technologies based on structural coverage and state identification. Then, the paper evaluates the effectiveness of the method based on 14 empirical cases. The experimental results show that the fault coverage of each empirical case can be effectively improved to 100% when the average test cost is only increased by 17.99%.
APA, Harvard, Vancouver, ISO, and other styles
4

Sarang, Sohail, Goran M. Stojanović, Stevan Stankovski, Željen Trpovski, and Micheal Drieberg. "Energy-Efficient Asynchronous QoS MAC Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2020 (September 24, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860371.

Full text
Abstract:
In recent years, wireless sensor networks (WSNs) have gained significant attention in both industry and academia. In WSNs, each sensor node is normally equipped with a small-size battery with finite capacity. Hence, energy-efficient communication is considered a key factor for the extension of network lifetime. Formerly, a large number of medium access control (MAC) protocols have been proposed to improve energy efficiency to prolong the network lifetime. There are applications that generate different types of data packets and require quality of service (QoS) without any disruption in network operation. Therefore, these applications need an energy-efficient QoS MAC protocol that can support QoS by considering energy efficiency as the primary goal to avoid any failure in the network. This article proposes an energy-efficient asynchronous QoS (AQSen) MAC protocol, called AQSen-MAC. The AQSen-MAC considers different types of data packets and uses two novel techniques: self-adaptation and scheduling to enhance energy efficiency, packet delivery ratio, and network throughput. Furthermore, in the protocol, the receiver adjusts its duty cycle according to the remaining energy to prolong the network operation. Finally, the performance of the AQSen-MAC protocol has been evaluated through detailed simulation using Castalia and compared with MPQ-MAC, PMME-MAC, and QAEE-MAC protocols. The simulation results indicate that the AQSen-MAC protocol significantly reduces the energy consumption at the receiver of up to 13.4%, consumption per bit of up to 3% and improves the packet delivery ratio and network throughput of up to 12% in the network.
APA, Harvard, Vancouver, ISO, and other styles
5

Murgod, Tejaswini R., and S. Meenakshi Sundaram. "A comparative study of different network simulation tools and experimentation platforms for underwater communication." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 879–85. http://dx.doi.org/10.11591/eei.v10i2.1466.

Full text
Abstract:
Study of computer networks and their performance parameters like delay, bandwidth utilization, throughput, latency, jittering, and packet loss. have gained significant importance in the recent times. Simulation studies have been preferred for these parameters in computer networks, which in a real time is a difficult task. A network consists of many networking devices as gateways, routers, bridges, wireless access points and hub connected to it. To implement any new protocol or algorithm in a network is costlier and time consuming. Recently lot of research is going on underwater wireless sensor networks (UWSNs). Conducting real time experiments for underwater applications are overpriced, so as an alternative solution for this, we can conduct simulation studies to reduce the cost and quicken the research activities.In this paper we explore the different experimentation platforms and simulation tools available that help the network architects to develop new protocols or do changes to the existing protocol in a productive manner. We classify the tools based on various parameters and provide guidelines for researchers to choose a suitable platform based on their requirements.
APA, Harvard, Vancouver, ISO, and other styles
6

Jimenez, Jose M., José Luis García-Navas, Jaime Lloret, and Oscar Romero. "Architecture and Protocol to Optimize Videoconference in Wireless Networks." Wireless Communications and Mobile Computing 2020 (October 5, 2020): 1–22. http://dx.doi.org/10.1155/2020/4903420.

Full text
Abstract:
In the past years, videoconferencing (VC) has become an essential means of communications. VC allows people to communicate face to face regardless of their location, and it can be used for different purposes such as business meetings, medical assistance, commercial meetings, and military operations. There are a lot of factors in real-time video transmission that can affect to the quality of service (QoS) and the quality of experience (QoE). The application that is used (Adobe Connect, Cisco Webex, and Skype), the internet connection, or the network used for the communication can affect to the QoE. Users want communication to be as good as possible in terms of QoE. In this paper, we propose an architecture for videoconferencing that provides better quality of experience than other existing applications such as Adobe Connect, Cisco Webex, and Skype. We will test how these three applications work in terms of bandwidth, packets per second, and delay using WiFi and 3G/4G connections. Finally, these applications are compared to our prototype in the same scenarios as they were tested, and also in an SDN, in order to improve the advantages of the prototype.
APA, Harvard, Vancouver, ISO, and other styles
7

Ehrlich, Marco, Arne Neumann, Alexander Biendarra, and Jürgen Jasperneite. "Quality-of-Service monitoring of hybrid industrial communication networks." at - Automatisierungstechnik 67, no. 1 (2019): 69–78. http://dx.doi.org/10.1515/auto-2018-0057.

Full text
Abstract:
Abstract Today many hybrid (wired & wireless) industrial communication networks with a huge variety of heterogeneous technologies and protocols are present in the manufacturing and automation domain. The increasing requirements regarding e. g., latency, reliability, or determinism create the need for a holistic network management concept in order to assure a network-wide Quality-of-Service (QoS) resource provisioning and the assurance of the admissioned resources. Consequently, a monitoring of the whole network is required to feed the network management system with the needed information about the underlying network processes. Various technical approaches using different methods of extracting the information from network traffic are available for the purpose of QoS parameter observance and measurement at the moment. Therefore, this paper provides a state of the art research about network management and QoS provisioning respectively QoS assurance concepts. In addition, the passive network monitoring approach using the flow export technique based on the Internet Protocol Flow Information Export (IPFIX) is investigated for a utilisation in the nowadays industry domain based on a conceptual case study with a wireless protocol. As a conclusion, an evaluation is performed in order to clarify the limits and the overall usability of IPFIX for the monitoring of industrial networks in order to support future network management systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Hilmani, Adil, Abderrahim Maizate, and Larbi Hassouni. "Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT)." Wireless Communications and Mobile Computing 2020 (July 13, 2020): 1–21. http://dx.doi.org/10.1155/2020/9179530.

Full text
Abstract:
With the increasing number of vehicles, the management of parking spaces in cities is becoming increasingly important in improving the quality of life and combating air pollution. Indeed, finding a parking space at peak times and in congested areas of the population becomes a huge challenge for drivers. To remedy this problem, most modern cities have smart parking. The equipment of these smart parking is mainly based on the implementation of wireless sensor networks (WSN) to monitor, track, and collect real-time information on the occupancy status of each parking space. This information is then made available to drivers who are looking for an available parking space. However, sensor nodes have limitations in terms of energy and communication that affect the performance and quality of the wireless sensor network. Therefore, the design of a self-organization protocol for WSN that minimizes power consumption and maximizes the longevity of the WSN network must be taken into account when implementing and developing a sustainable and viable intelligent parking system. In this paper, we propose a protocol for self-organization of wireless sensor networks (WSN) for the management of parking spaces in outdoor and urban car parks. This protocol is based on building clusters using ZigBee transmission technology for multihop communication. Each sensor node will be installed in the ground of each parking space to monitor its availability by sending the empty or busy state of that space to the gateway using cluster head nodes (CHs). This approach has a robust and efficient self-organizing algorithm that minimizes energy dissipation and increases the lifetime of sensor nodes and the WSN network. The simulation results show that parking management systems in outdoor and urban car parks using the self-organization protocol presented are efficient and sustainable in terms of energy consumption, reliability of data transmission, and the longevity of the WSN network compared to other existing parking systems that use different self-organizing protocols for wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
9

T, SAMPRADEEPRAJ, and RAJA S P. "On Improving Reliability in Multicast Routing Protocol for Wireless Sensor Network." Information Technology And Control 49, no. 2 (2020): 260–74. http://dx.doi.org/10.5755/j01.itc.49.2.24111.

Full text
Abstract:
Multicast routing becomes the most challenging problem in Wireless Sensor Networks (WSN). Multicasting is an effective way to facilitate group communication in which the multicast data need to be sent from a source node to multiple receivers. In this paper, a simple and efficient algorithm Minimum Connected Dominating Set (MCDS) is used to form a virtual backbone as forwarding group of the network. The MCDS aims at minimizing the number of nodes, where few nodes should be dominated, which are responsible for forwarding the multicast packets by applying Random Linear Network Coding (RLNC). RLNC has great potential to improve the performance of multicast routing protocol. The objective of this paper is to improve the performance of On-Demand Multicasting Routing Protocol (ODMRP) with respect to reliability using RLNC over MCDS for WSN, so that bandwidth utilization can be increased in the network. The proposed approach is named as RLNMCDS-ODMRP, which deliver multicast data in high reliable. Experimental results and performance analysis show that the proposed protocol outperforms the classical multicast routing protocols that use MCDS or RLNC.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar Dwivedi, Anshu, Awadhesh Kumar Sharma, and Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT." ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, no. 2 (2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.

Full text
Abstract:
Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Yan Ju, and Xin Hua Li. "Study on Application of Wireless Sensor Networking in Environmental Monitoring." Applied Mechanics and Materials 157-158 (February 2012): 1297–300. http://dx.doi.org/10.4028/www.scientific.net/amm.157-158.1297.

Full text
Abstract:
A novel wireless sensor networks is designed with integrating sensors, embedded operating systems and wireless networking technology. The temperature, humidity, light strength and pressure around the sensor could be measured accurately. The collected data by sensor networks are analysed and treated in PC computer via USB interface. LEACH communication protocol was introduced to ZigBee networks in this paper. The node programs were exploited based on IAR System platform to accomplish data collection.
APA, Harvard, Vancouver, ISO, and other styles
12

Nabavi, Seyed Reza, Nafiseh Osati Eraghi, and Javad Akbari Torkestani. "WSN Routing Protocol Using a Multiobjective Greedy Approach." Wireless Communications and Mobile Computing 2021 (April 13, 2021): 1–12. http://dx.doi.org/10.1155/2021/6664669.

Full text
Abstract:
Due to the widespread use of communication networks and the ease of transmitting and gathering information through these networks, wireless sensor networks (WSN) have become increasingly popular. Usability in any environment without the need for environmental monitoring and engineering of these networks has led to their increasing usage in various fields. Routing information from the sensor node to sink, so that node energy is consumed uniformly and network life is not reduced, is one of the most important challenges in wireless sensor networks. Most wireless networks have no infrastructure, and embedded sensor nodes have limited power. Thus, the early termination of the wireless node’s energy based on the transmission of messages over the network can disrupt the entire network process. In this paper, the object is designed to find the optimal path in WSN based on the multiobjective greedy approach to the near optimal path. The proposed model is presented in this method to transfer sensed data of the sensor network to the base station for the desired applications. In this method, the sensor nodes are identified as adjacent nodes based on their distance. The energy of all nodes initially is approximately equal, which decreases with the transfer of information between the nodes. In this way, when a node senses a message, it checks several factors for transmitting information to its adjacent nodes and selects the node with the largest amount of factors as the next hop. The simulation results show that the energy consumption in the network grids is almost symmetrically presented, and the network lifetime is reduced with a gentle slope that provides optimum energy consumption in the networks. Also, the packet transmission delay in the network reaches 450 milliseconds for the transmission of information between 15 nodes and 650 connections. Besides, network throughput increases by approximately 97%. It also shows better performance compared to other previous methods in terms of evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
13

Yuan, Deying, Guoqiang Zheng, Huahong Ma, Jiaqing Shang, and Jishun Li. "An Adaptive MAC Protocol Based on IEEE802.15.6 for Wireless Body Area Networks." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/3681631.

Full text
Abstract:
The application carrier of wireless body area network (WBAN) is human; due to changes in people’s sports status or physical health and other reasons, the business traffic fluctuates greatly, which requires the network to have good adaptability. In addition, the energy consumption problem is also a key factor restricting the applications of the WBAN. At present, the proposed MAC protocol is not highly adaptive and has low energy efficiency. To solve this problem, this paper proposes an adaptive MAC protocol based on IEEE802.15.6 for WBAN (A-MAC). The protocol sets the data to three priorities according to the type of service; the superframe structure of IEEE802.15.6 is improved and reorganized into four phases: the beacon phase, the contention access phase, the noncontention access phase, and the inactive phase. The length of the contention access phase and the noncontention access phase is adjusted according to the proportion of nodes that generate each priority data. The contention access phase is further divided into three subphases, and the length of the subphase is dynamically adjusted according to the data priority. In the contention access phase, all nodes compete for access channel according to the channel access policy. The random data that competes successfully transmits data directly, and the periodic data that competes successfully transmits data in the allocated time slots of the noncontention access phase. Finally through the simulation of the proposed A-MAC protocol and IEEE 802.15.6 MAC protocol and CA-MAC protocol in network performance which were compared, the results show that in terms of throughput, power consumption, and the network time delay, the network performance using A-mac protocol is better than the network performance using IEEE802.15.6 MAC and CA-MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Mei-Wen, Tsung-Hsun Wu, Wei-Yen Lin, Kun-Chan Lan, Chien-Ming Chou, and Chung-Hsien Hsu. "On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection Systems." ISRN Communications and Networking 2011 (October 11, 2011): 1–11. http://dx.doi.org/10.5402/2011/723814.

Full text
Abstract:
In an 802.11p (the so-called DSRC) network, the WSMP protocol is used for the communication between OBU and RSU. Unlike a wired network, an 802.11p wireless network is prone to fading, shadowing, and interferences, which might result in high error rates. However, there is no reliability mechanism embedded in the WSMP protocol, which can become an important issue for mission-critical ITS applications such as ETC (Electronic Toll Collection). In this work, we develop a protocol on top of WSMP to build a reliable session for the message exchanges between RSU and OBU. Our protocol uses a timer-based mechanism for the message retransmission in the case of message losses. In this paper, we first describe the design of our session protocol and evaluate its performance for ETC communication in simulations. We then discuss the implementation of our protocol on the ITRI WAVE box and evaluate its effectiveness on real roads.
APA, Harvard, Vancouver, ISO, and other styles
15

Stecklina, Oliver, Peter Langendörfer, and Christian Goltz. "A Lifetime Forecast Scheme for a Distributed Low Duty Cycle Multi-Hop Routing in Wireless Sensor Networks." International Journal of Business Data Communications and Networking 9, no. 4 (2013): 1–22. http://dx.doi.org/10.4018/ijbdcn.2013100101.

Full text
Abstract:
Wireless sensor nodes become more and more attractive for a broad variety of application scenarios. Wireless Sensor Networks (WSNs) can be easily deployed and they require by design low maintenance effort. But running installations are still rare, because real world requirements and environmental conditions are even today a big challenge. Especially in multi-hop networks a minimum lifetime of several years cannot be achieved globally. In this paper, the authors present a Distributed Low Duty Cycle (DLDC) based Multi-Hop Routing (MHR) protocol for Wireless Sensor Networks guaranteeing a minimum network lifetime. The authors introduce a forecast scheme to calculate the expected life of a node with a minimal effort. The authors are convinced that by using a forecast scheme the network topology and the used protocols can be easily optimized before deploying the network. The authors evaluated their forecast scheme by measuring real sensor node parameters and simulating an example network in the Castalia simulation framework. The authors demonstrated that by using the proposed scheme an energy consumption forecast with a deviation of less than three per cent can be achieved.
APA, Harvard, Vancouver, ISO, and other styles
16

Zadobrischi, Eduard, and Mihai Dimian. "Vehicular Communications Utility in Road Safety Applications: A Step toward Self-Aware Intelligent Traffic Systems." Symmetry 13, no. 3 (2021): 438. http://dx.doi.org/10.3390/sym13030438.

Full text
Abstract:
The potential of wireless technologies is significant in the area of the safety and efficiency of road transport and communications systems. The challenges and requirements imposed by end users and competent institutions demonstrate the need for viable solutions. A common protocol by which there could be vehicle-to-vehicle and vehicle-to-road communications is ideal for avoiding collisions and road accidents, all in a vehicular ad hoc network (VANET). Ways of transmitting warning messages simultaneously by vehicle-to-vehicle and vehicle-to-infrastructure communications by various multi-hop routings are set out. Approaches to how to improve communication reliability by achieving low latency are addressed through the multi-channel (MC) technique based on two non-overlaps for vehicle-to-vehicle (V2V) and vehicle-to-road (V2R) or road-to-vehicle (R2V) communications. The contributions of this paper offer an opportunity to use common communication adaptable protocols, depending on the context of the situation, coding techniques, scenarios, analysis of transfer rates, and reception of messages according to the type of protocol used. Communications between the road infrastructure and users through a relative communication protocol are highlighted and simulated in this manuscript. The results obtained by the proposed and simulated scenarios demonstrate that it is complementary and that the common node of V2V/V2R (R2V) communication protocols substantially improves the process of transmitting messages in low-latency conditions and is ideal for the development of road safety systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Hussen, Hassen Redwan, Sung-Chan Choi, Jong-Hong Park, and Jaeho Kim. "Predictive geographic multicast routing protocol in flying ad hoc networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771984387. http://dx.doi.org/10.1177/1550147719843879.

Full text
Abstract:
In the past decades, the unmanned aerial systems have been utilized only for military operations. However, recently, the potential uses and applicability of unmanned aerial vehicles (commonly known as drones) in civilian application domains are becoming a fast-growing phenomenon. A flying ad hoc network is a wireless ad hoc network specifically designed for the communication of unmanned aerial vehicles. Multicast routing is one of the vital aspects in wireless ad hoc networks. Using multicast transmission approaches, flying ad hoc network applications may need to send the same message to a specific group of flying nodes. The multicast communication approaches can benefit flying ad hoc network applications in conserving the scarce resources of flying nodes. Research works have been proposed to tackle the challenges in multicast routing with multi-hop communication in ad hoc network environments. Nevertheless, the conventional multicast routing mechanisms incur excessive control message overhead when a large number of nodes experience frequent topological changes. A scalable geographic multicast routing mechanism, which specially require localized operation and reduced control packet overhead, is necessary. Multicast routing in flying ad hoc networks is extremely challenging because of the dynamic topology changes and network disconnection resulted from frequent mobility of nodes. In this article, we present and implement a scalable and predictive geographic multicast routing mechanism in flying ad hoc networks. In uniform and random deployment scenarios, the MATLAB-based evaluation result has revealed that when the communication range increases, the probability of finding one-hop predicted forwarders to reach multicast destinations also increases. The implementation of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is done using Optimizing Network Engineering Tools Modeler 16.0. We have added the scalable and predictive geographic multicast routing mechanism in flying ad hoc network as a new routing scheme in the Mobile Ad hoc Network routing protocol groups of the Optimizing Network Engineering Tools Modeler. Then, the performance of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is compared with two of the existing Mobile Ad hoc Network routing protocols (Geographic Routing Protocol and Dynamic Source Routing). Eventually, we present two instance scenarios regarding the integration of scalable and predictive geographic multicast routing mechanism in flying ad hoc network scheme in the Internet of Things platform.
APA, Harvard, Vancouver, ISO, and other styles
18

Vakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, and Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks." International Journal of Business Data Communications and Networking 9, no. 4 (2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.

Full text
Abstract:
In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Meribout, M. "A New Distributed and Scalable Network Protocol Targeting Intelligent Transportation Systems." International Journal of Vehicular Technology 2011 (June 22, 2011): 1–7. http://dx.doi.org/10.1155/2011/120194.

Full text
Abstract:
Vehicular networks are the major ingredients of the envisioned Intelligent Transportation Systems (ITS) concept. An important component of ITS which is currently attracting wider research focus is road traffic monitoring. The actual approaches for traffic road monitoring are characterized by longer response times and are also subject to higher processing requirements and possess high deployment costs. In this paper, we propose a completely distributed and scalable mechanism for wireless sensor network-based road traffic monitoring. The approach relies on the distributed and bidirectional exchange of traffic information between the vehicles traversing the routes and a miniature cluster head and takes into consideration both the security and reliability of data communication. In addition, the communication between nodes is collision-free since the underlined data link layer protocol relies on a heuristic time multiplexed-based protocol. The performance analysis shows that the proposed mechanism usually outperforms other algorithms for different traffic densities.
APA, Harvard, Vancouver, ISO, and other styles
20

Bernard, Muwonge Ssajjabbi, Tingrui Pei, and Kimbugwe Nasser. "QoS Strategies for Wireless Multimedia Sensor Networks in the Context of IoT at the MAC Layer, Application Layer, and Cross-Layer Algorithms." Journal of Computer Networks and Communications 2019 (December 29, 2019): 1–33. http://dx.doi.org/10.1155/2019/9651915.

Full text
Abstract:
Wireless multimedia sensor networks (WMSNs) have got capacity to collect both scalar sensor data and multidimensional sensor data. It is the basis for the Internet of things (IoT). Quality of service (QoS) pointers like energy efficiency, reliability, bit error rate, and latency can be helpful in data collection estimation over a network. In this paper, we review a number of QoS strategies for WMSNs and wireless sensor networks (WSNs) in the IoT context from the perspective of the MAC and application layers as well as the cross-layer paradigm. Considering the MAC layer, since it is responsible for regulating the admittance to the shared medium and transmission reliability and efficiency through error correction in wireless transmissions, and for performance of framing, addressing, and flow control, the MAC protocol design greatly affects energy efficiency. We thus review a number of protocols here including contention-free and contention-based protocols as well as the hybrid of these. This paper also surveys a number of state-of-the-art machine-to-machine, publish/subscribe, and request/response protocols at the application layer. Cross-layer QoS strategies are very vital when it comes to system optimization. Many cross-layer strategies have been reviewed. For these QoS strategies, the challenges and opportunities are reviewed at each of the layers considered. Lastly, the future research directions for QoS strategies are discussed for research and application before concluding this paper.
APA, Harvard, Vancouver, ISO, and other styles
21

Han, Yu, Jian Su, Guangjun Wen, Yiran He, and Jian Li. "CPEH: A Clustering Protocol for the Energy Harvesting Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (April 11, 2021): 1–14. http://dx.doi.org/10.1155/2021/5533374.

Full text
Abstract:
In the last decade, energy harvesting wireless sensor network (EHWSN) has been well developed. By harvesting energy from the surrounding environment, sensors in EHWSN remove the energy constraint and have an unlimited lifetime in theory. The long-lasting character makes EHWSN suitable for Industry 4.0 applications that usually need sensors to monitor the machine state and detect errors continuously. Most wireless sensor network protocols have become inefficient in EHWSN due to neglecting the energy harvesting property. In this paper, we propose CPEH, which is a clustering protocol specially designed for the EHWSN. CPEH considers the diversity of the energy harvesting ability among sensors in both cluster formation and intercluster communication. It takes the node’s information such as local energy state, local density, and remote degree into account and uses fuzzy logic to conduct the cluster head selection and cluster size allocation. Meanwhile, the Ant Colony Optimization (ACO) as a reinforcement learning strategy is utilized by CPEH to discover a highly efficient intercluster routing between cluster heads and the base station. Furthermore, to avoid cluster dormancy, CPEH introduces the Cluster Head Relay (CHR) strategy to allow the proper cluster member to undertake the cluster head that is energy depletion. We make a detailed simulation of CPEH with some famous clustering protocols under different network scenarios. The result shows that CPEH can effectively improve the network throughput and delivery ratio than others as well as successfully solve the cluster dormancy problem.
APA, Harvard, Vancouver, ISO, and other styles
22

Olariu, S., Q. Xu, M. Eltoweissy, A. Wadaa, and A. Y. Zomaya. "Protecting the Communication Structure in Sensor Networks." International Journal of Distributed Sensor Networks 1, no. 2 (2005): 187–203. http://dx.doi.org/10.1080/15501320590966440.

Full text
Abstract:
In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, denial of service attacks (DoS) that compromise or disrupt communications or target nodes serving key roles in the network, e.g. sink nodes, can easily undermine the functionality as well as the performance delivered by the network. Particularly vulnerable are the components of the communications or operation infrastructure. Although, by construction, most sensor network systems do not possess a built-in infrastructure, a virtual infrastructure, that may include a coordinate system, a cluster structure, and designated communication paths, may be established post-deployment in support of network management and operation. Since knowledge of this virtual infrastructure can be instrumental for successfully compromising network security, maintaining the anonymity of the virtual infrastructure is a primary security concern. Somewhat surprisingly, in spite of its importance, the anonymity problem has not been addressed in wireless sensor networks. The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the virtual infrastructure in a class of sensor network systems. Our solution defines schemes for randomizing communications such that the cluster structure, and coordinate system used remain undetectable and invisible to an observer of network traffic during both the setup and operation phases of the network.
APA, Harvard, Vancouver, ISO, and other styles
23

Kim, Wonsoo, Kumaran Vijayasankar, Mickael Chouteau, and Jianwei Zhou. "An Experimental Study of Sub-1 GHz Frequency-Hopping-Based 6LoWPAN Mesh Networking for Smart-Grid Applications." Journal of Computer Networks and Communications 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/5787653.

Full text
Abstract:
This paper presents an experimental study of a multihop Internet Protocol Version 6 over Low-Power Wireless Personal Area Networks (6LoWPAN)-based mesh system that uses un-slotted channel hopping (USCH) medium access control (MAC). Designers of wireless smart-grid networks are using (or looking to use) the Sub-1 GHz spectrum, given its longer radio range compared to the traditional 2.4 GHz spectrum used in Wi-Fi® or Bluetooth® low energy. The frequency-hopping (FH) technique is attractive in this area, as it provides improved robustness and longer range owing to the higher transmission power that regulatory requirements allow. Although Sub-1 GHz allows for a longer range, smart-grid networks deployed over a large geographic area still require multiple hops to provide the required coverage. Many proprietary and standards-based solutions have been proposed to implement such a networking protocol. Notable specifications in this area include the Field Area Networks (FAN) specification from the Wi-SUN (smart utility networks) Alliance and the JupiterMesh specification from the Zigbee Alliance. Little is known about the performance of FH systems over a multihop network, however. This paper presents an implementation of an FH-based multihop networking protocol based on the Texas Instruments (TI) SimpleLink™ TI 15.4-stack, with an experimental study of such a system over multiple hops compared to a non-frequency-hopping (non-FH) system. Results show that the proposed FH-based 6LoWPAN mesh system significantly improves network coverage, network capacity, and communication robustness to interference while demonstrating coexistence capabilities.
APA, Harvard, Vancouver, ISO, and other styles
24

Cui, Cui. "Using Wireless Sensor Network to Correct Posture in Sports Training Based on Hidden Markov Matching Algorithm." Journal of Sensors 2021 (September 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/2159181.

Full text
Abstract:
This paper combines the research of wireless sensor networks and sports training and proposes a wireless sensor network-based intelligent sports training system. According to the requirements of the system, this design uses the wireless sensor network system as the platform for development and the ZigBee module for wireless communication. The advantage of this system is to transmit the obtained information to the ZigBee coordinator module, and after the processing of information and the resultant decision, a nonwearable unmonitored motion training model based on visual sensing is proposed. The motion terminal collects video data streams of user motion actions and extracts features to establish HMM motion recognition algorithm to achieve recognition of motion actions, automatic counting, and intelligent scoring functions. The template matching algorithm based on dynamic time regularization and weighted Euclidean distance realizes a universal real-time motion recognition algorithm with high standard and low latency and can guide the user’s motion action based on similarity calculation. The intelligent sports training system is designed and developed to maintain a high-quality human-computer interaction experience with a real-time feedback client and uploads sports data to a cloud server via the HTTP protocol, which supports real-time sports proximity query and training plan development on the website. After practical application tests, the intelligent sports training system based on the wireless sensor network proposed in this paper is stable and reliable and adds fun and competitiveness to boring sports. The research of this paper has some reference value for the application of wireless sensor networks and the research of the motion recognition algorithm.
APA, Harvard, Vancouver, ISO, and other styles
25

Purkar, Santosh V., and R. S. Deshpande. "Energy Efficient Clustering Protocol to Enhance Performance of Heterogeneous Wireless Sensor Network: EECPEP-HWSN." Journal of Computer Networks and Communications 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2078627.

Full text
Abstract:
Heterogeneous wireless sensor network (HWSN) fulfills the requirements of researchers in the design of real life application to resolve the issues of unattended problem. But, the main constraint faced by researchers is the energy source available with sensor nodes. To prolong the life of sensor nodes and thus HWSN, it is necessary to design energy efficient operational schemes. One of the most suitable approaches to enhance energy efficiency is the clustering scheme, which enhances the performance parameters of WSN. A novel solution proposed in this article is to design an energy efficient clustering protocol for HWSN, to enhance performance parameters by EECPEP-HWSN. The proposed protocol is designed with three level nodes namely normal, advanced, and super, respectively. In the clustering process, for selection of cluster head we consider different parameters available with sensor nodes at run time that is, initial energy, hop count, and residual energy. This protocol enhances the energy efficiency of HWSN and hence improves energy remaining in the network, stability, lifetime, and hence throughput. It has been found that the proposed protocol outperforms than existing well-known LEACH, DEEC, and SEP with about 188, 150, and 141 percent respectively.
APA, Harvard, Vancouver, ISO, and other styles
26

Chauvenet, Cedric, Bernard Tourancheau, Denis Genon-Catalot, Pierre-Emmanuel Goudet, and Mathieu Pouillot. "Interoperable IPv6 Sensor Networking over PLC and RF Media." International Journal of Business Data Communications and Networking 6, no. 4 (2010): 1–20. http://dx.doi.org/10.4018/jbdcn.2010100101.

Full text
Abstract:
The evolution of technology has made the connection of all types of devices to IP networks possible. In this paper, the authors investigate the possible usage of IPv6 in sensor networks connected through the Power Line Communication (PLC) non-wireless medium and demonstrate possible interoperability. This work is based on the adaptation of the IEEE 802.15.4 standard protocol constrained by the low-power, lossy and low data-rate context of PLC transceiver that uses pulse modulation. The aim is to provide interoperability features with other media using a robust and reliable communication stack. The target application of such results ranges from smart metering and environment monitoring to home control and urban area energy efficiency applications. This paper proposes the first adaptation of the IEEE 802.15.4 standard commons for the PLC medium. Following this standard interface, the authors demonstrate data communication on PLC with low power energy requirement using the pulse PLC physical layer. This paper also presents an initial implementation of the Routing Protocol for Low power and lossy networks (RPL) setup proposed by the IETF working group. In this context, the authors demonstrate interoperability in a testbed between PLC and Wireless Sensor Networks (WSN).
APA, Harvard, Vancouver, ISO, and other styles
27

Zheng, Yani, Gaurav Dhiman, Ashutosh Sharma, Amit Sharma, and Mohd Asif Shah. "An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor." Security and Communication Networks 2021 (August 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/4229013.

Full text
Abstract:
The usage of wireless sensors has become widespread for the collection of data for various Internet of Things (IoT) products. Specific wireless sensors use optical fiber technology as transmission media and lightwave signals as carriers, showing the advantages of antielectromagnetic interference, high sensitivity, and strong reliability. Hence, their application in IoT systems becomes a research hotspot. In this article, multiple optical fiber sensors are constructed as an IoT detection system, and a Transmission Control Protocol (TCP)/Internet Protocol (IP) communication stack is used for the sensor module. Furthermore, design of gateway module, data server, and monitoring module is established in order to run the data server in the Windows system and communicate across the network segments. Furthermore, the optical fiber sensor is connected to the development board with WiFi, meanwhile considering the optical fiber wireless network’s congestion problem. The fuzzy logic concept is introduced from the perspective of cache occupancy, and a fiber sensor’s network congestion control algorithm is proposed. In the experiment, the IoT detection system with multiple optical fiber sensors is used for water level detection, and the sensor’s real-time data detected by the User Interface (UI) are consistent with the feedback results. The proposed method is also compared with the SenTCP algorithm and the CODA algorithm, and it was observed that the proposed network congestion control algorithm based on the fuzzy logic can improve network throughput and reduce the network data packet loss.
APA, Harvard, Vancouver, ISO, and other styles
28

Abed, Ali, AbdulAdhem Ali, and Nauman Aslam. "Building an HMI and Demo Application of WSN-based Industrial Control Systems." Iraqi Journal for Electrical and Electronic Engineering 7, no. 2 (2011): 107–11. http://dx.doi.org/10.37917/ijeee.7.2.4.

Full text
Abstract:
In this paper we present the details of methodology pursued in implementation of an HMI and Demo Temperature Monitoring application for wireless sensor-based distributed control systems. The application of WSN for a temperature monitoring and control is composed of a number of sensor nodes (motes) with a networking capability that can be deployed for monitoring and control purposes. The temperature is measured in the real time by the sensor boards that sample and send the data to the monitoring computer through a base station or gateway. This paper proposes how such monitoring system can be setup emphasizing on the aspects of low cost, energy-efficient, easy ad-hoc installation and easy handling and maintenance. This paper focuses on the overall potential of wireless sensor nodes and networking in industrial applications. A specific case study is given for the measurement of temperature (with thermistor or thermocouple), humidity, light and the health of the WSN. The focus was not on these four types of measurements and analysis but rather on the design of a communication protocol and building of an HMI software for monitoring. So, a set of system design requirements are developed that covered the use of the wireless platforms, the design of sensor network, the capabilities for remote data access and management, the connection between the WSN and an HMI software designed with MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
29

Jemili, Imen, Dhouha Ghrab, Abdelfettah Belghith, and Mohamed Mosbah. "Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 3 (2017): 48–67. http://dx.doi.org/10.4018/ijswis.2017070103.

Full text
Abstract:
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The challenging task is to authorize a sensor node to adopt a duty-cycle mode without inflicting any negative impact on the performance of the network. A context-aware paradigm allows sensors to adapt their functional behavior according to the context in order to enhance network performances. In this context, the authors propose an enhanced version the Efficient Context-Aware Multi-hop Broadcasting (E-ECAB) protocol, which combines the advantages of context awareness by considering a multi criteria and duty-cycle technique in order to optimize resources usage and satisfy the application requirements. Simulation results show that E-ECAB achieves a significant improvement in term of throughput and end-to-end delay without sacrificing energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
30

Mo, Jiaqing, and Hang Chen. "A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks." Security and Communication Networks 2019 (December 16, 2019): 1–17. http://dx.doi.org/10.1155/2019/2136506.

Full text
Abstract:
Wireless sensor networks (WSNs) have great potential for numerous domains of application because of their ability to sense and understand unattended environments. However, a WSN is subject to various attacks due to the openness of the public wireless channel. Therefore, a secure authentication mechanism is vital to enable secure communication within WSNs, and many studies on authentication techniques have been presented to build robust WSNs. Recently, Lu et al. analyzed the security defects of the previous ones and proposed an anonymous three-factor authenticated key agreement protocol for WSNs. However, we found that their protocol is vulnerable to some security weaknesses, such as the offline password guessing attack, known session-specific temporary information attack, and no session key backward secrecy. We propose a lightweight security-improved three-factor authentication scheme for WSNs to overcome the previously stated weaknesses. In addition, the improved scheme is proven to be secure under the random oracle model, and a formal verification is conducted by ProVerif to reveal that the proposal achieves the required security features. Moreover, the theoretical analysis indicates that the proposal can resist known attacks. A comparison with related works demonstrates that the proposed scheme is superior due to its reasonable performance and additional security features.
APA, Harvard, Vancouver, ISO, and other styles
31

Debnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.

Full text
Abstract:
In Mobile Ad-hoc Network (MANET), portable devices like smartphones, or laptop PC can join together to make provisional networks without any infrastructure The objective of multicast or unicast protocols is to ensure an efficient route formation and flow control mechanism which is a very challenging issue for many group computing services in MANETs. MANETs can support several real-time applications like emergency rescue, and disaster relief operations which require minimum Quality of Service (QoS) to handle high traffic. Providing QoS for multimedia and group-oriented computing in MANETs becomes a real challenge due to the wireless medium and the mobility of operating nodes. Therefore, an investigation of routing protocols for one-to-many or many-to-many computing is important that supports acceptable QoS in MANETs. Numerous QoS metrics have been considered for the assessment like packet delivery ratio, latency, packet loss rate, control overhead, and throughput. By considering different network topologies and scenarios with different performance parameters, the primary goal of this study is to explore the challenges and factors for QoS services in MANET’s multicast communication. The outcomes of investigation can be used to design the future MANET protocol for multimedia applications. The performance results indicate that the increasing number of sending/receiving nodes may increase the overhead or latency of the network but capable of providing higher network throughput, carried out in NS-2. The results also indicate although MANETs can induce errors and packets are lost as part of the normal operating context, multicast AODV practice superior to the unicast protocol to various QoS in a wide range of scenarios with less overhead.
APA, Harvard, Vancouver, ISO, and other styles
32

Aznaoui, Hanane, Said Raghay, Youssef Ouakrim, and Layla Aziz. "A Heuristic Algorithm of Cooperative Agents Communication for Enhanced GAF Routing Protocol in WSNs." Wireless Communications and Mobile Computing 2019 (June 9, 2019): 1–14. http://dx.doi.org/10.1155/2019/4947610.

Full text
Abstract:
Rapid progress in technologies has led to the development of small sensor nodes. A wireless sensor network (WSN) is an interconnected collection of a large number of these small sensor nodes that is used to monitor and record the physical environment. WSNs have applications in diverse scenarios. They play an important role in tracking and monitoring in different domains, such as environmental research, military, and health care. In most of these applications, the WSN is composed of a large number of nodes deployed in an area of interest, and not all nodes are directly connected to the base station (BS). In some cases, batteries of nodes cannot be recharged or changed. For that, the most solution required to overcome these problems is to optimize energy consumed during communication. Data transmission in networks is maintained by routing protocols, which are responsible for discovering the required paths. This paper presents an improvement of the Geographic Adaptive Fidelity (GAF) routing protocol created on a smart actives node selection. The routing process works on cooperative agents communication where another node is activated in the same grid if the data collected are considered as important data, and a heuristic method is used to find an optimal path in terms of energy to transmit data collected until reaching the BS. Simulation results prove that the cooperative agents GAF (CAGAF) routing protocol proposed is more efficient compared to the basic version in terms of considering important data, energy consumed, and dead nodes.
APA, Harvard, Vancouver, ISO, and other styles
33

Gawas, Mahadev A., Lucy J. Gudino, and K. R. Anupama. "Congestion-Adaptive and Delay-Sensitive Multirate Routing Protocol in MANETs: A Cross-Layer Approach." Journal of Computer Networks and Communications 2019 (May 29, 2019): 1–13. http://dx.doi.org/10.1155/2019/6826984.

Full text
Abstract:
With a growing demand of multimedia communication over MANETs, to support quality of service (QoS), the MAC standards such as 802.11a/b/g operate with multiple data rates to efficiently utilize the limited resources. Since the wireless channel is shared among the neighbors in MANETs, determining delay-sensitive and congestion-aware routes using the IEEE 802.11 MAC is still a challenging problem. This paper proposes a novel cross-layer approach called congestion-adaptive and delay-sensitive multirate (CADM) routing protocol in MANETs. The CADM protocol exploits the cross-layer interaction between the network layer, MAC, and physical layer. The CADM accesses the correlation between data rate, congestion metric, and MAC delay in delay-sensitive applications to provide enhanced network efficiency in MANETs. The protocol discovers multiple node-disjoint routes and facilitates optimal data rates between the links based on the estimated delay to admit a flow with the certain delay requirement in multirate MANETs. The proposed CADM protocol discovers the route through less congested nodes and also actively handles the congestion if it occurs. The performance of the CADM protocol is comprehensively assessed through the simulation, which highlights the advantages of our cross-layer mechanism.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Meifang, and Zhange Liang. "An Extraction Method of Volleyball Spiking Trajectory and Teaching Based on Wireless Sensor Network." Security and Communication Networks 2021 (June 3, 2021): 1–11. http://dx.doi.org/10.1155/2021/9966994.

Full text
Abstract:
It is helpful to analyze volleyball spiking technology and improve spiking quality to extract volleyball spiking trajectory. This article studies the extraction method and teaching method of volleyball spiking trajectory based on a wireless sensor network. The acceleration sensor and gyroscope sensor are used to collect the spiking action state information of volleyball players. The collected information is transmitted to the PC terminal through the wireless sensor network, including physical layer, data link layer, network layer, transmission layer, and application layer, using the LEACH clustering routing protocol algorithm. In the PC terminal, the feedback filtering method is used to preprocess the received information and calculate the integral of each sensor node’s acceleration, connecting the spatial coordinates of each time to obtain the upper limb trajectory in three-dimensional space and realize the trajectory extraction of volleyball spike action. The experimental results show that the position error is less than 0.01 m and the speed error is less than 0.15 m/s. The application of this method in volleyball teaching can effectively improve the quality of volleyball teaching.
APA, Harvard, Vancouver, ISO, and other styles
35

Ok, Jin-Sung, Soon-Do Kwon, Cheol-Eun Heo, and Young-Kyoon Suh. "A Survey of Industrial Internet of Things Platforms for Establishing Centralized Data-Acquisition Middleware: Categorization, Experiment, and Challenges." Scientific Programming 2021 (April 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/6641562.

Full text
Abstract:
The development of industrial Internet of Things (IIoT), big data, and artificial intelligence technologies is leading to a major change in the production system. The change is being propagated into the wave of transforming the existing system with a vertical structure into the corresponding horizontal platform or middleware. Accordingly, the way of acquiring IIoT data from an individual system is being altered to the way of being increasingly centralized through an integrated middleware of a scalable server or through a large platform. That said, middleware-based IIoT data acquisition must consider multiple factors, such as infrastructure (e.g., operation environment and network), protocol heterogeneity, interoperability (e.g., links with legacy systems), real-time, and security. This manuscript explains these five aspects in detail and provides a taxonomy of eighteen state-of-the-art IIoT data-acquisition middleware systems based on these aspects. To validate one of these aspects (network), we present our evaluation results at a real production site where IIoT data-acquisition loss rates are compared between wireless (long-term evolution) and wired networks. As a result, the wired communication can be more suitable for centralized IIoT data-acquisition middleware than wireless networks. Finally, we discuss several challenges in establishing the best IIoT data-acquisition middleware in a centralized way.
APA, Harvard, Vancouver, ISO, and other styles
36

Gaitan, Nicoleta Cristina. "A Long-Distance Communication Architecture for Medical Devices Based on LoRaWAN Protocol." Electronics 10, no. 8 (2021): 940. http://dx.doi.org/10.3390/electronics10080940.

Full text
Abstract:
Recent market studies show that the market for remote monitoring devices of different medical parameters will grow exponentially. Globally, more than 4 million individuals will be monitored remotely from the perspective of different health parameters by 2023. Of particular importance is the way of remote transmission of the information acquired from the medical sensors. At this time, there are several methods such as Bluetooth, WI-FI, or other wireless communication interfaces. Recently, the communication based on LoRa (Long Range) technology has had an explosive development that allows the transmission of information over long distances with low energy consumption. The implementation of the IoT (Internet of Things) applications using LoRa devices based on open Long Range Wide-Area Network (LoRaWAN) protocol for long distances with low energy consumption can also be used in the medical field. Therefore, in this paper, we proposed and developed a long-distance communication architecture for medical devices based on the LoRaWAN protocol that allows data communications over a distance of more than 10 km.
APA, Harvard, Vancouver, ISO, and other styles
37

Liqin, Hu, Wang Sanyou, Ma Fujun, and Zhang Shubo. "Equal Area Partition-Based Energy Efficient Routing Algorithm for Circular WSN." Wireless Communications and Mobile Computing 2021 (August 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/7280558.

Full text
Abstract:
Wireless sensor network (WSN) is communicating method with each other without the assistance of communication cable. The circular environment is an important application scenario in WSN. As a core technology, routing algorithm is the brain of WSN monitoring system. In this paper, we propose a new routing algorithm named Equal Area Partition Based Energy Efficient Multipath Algorithm (EAPEEM), which tries to exploit sector equal area model in node deployment, data transfer, and route maintenance. Existing algorithms, as compared to our existing models, do not fully match with routing and nodes. One attractive feature of our protocol is its balanced network transmission capacity and improved node energy utilization, which can reduce the possibility of system damage. Simulations show that EAPEEM can retain at least 28.6% of batteries and expand stability by more than 43%.
APA, Harvard, Vancouver, ISO, and other styles
38

Khan, Muhammad Asghar, Tanweer Ahmad Cheema, Insaf Ullah, et al. "A Dual-Mode Medium Access Control Mechanism for UAV-Enabled Intelligent Transportation System." Mobile Information Systems 2021 (February 15, 2021): 1–13. http://dx.doi.org/10.1155/2021/5578490.

Full text
Abstract:
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new landscape requires a stable, flexible, and business-friendly base of connectivity, networking, and computing technology, in which Unmanned Aerial Vehicles (UAVs) can play an important role. A UAV-enabled Intelligent Transportation System (ITS) can provide a cost-effective communication solution to improve the safety and efficiency of the transportation system, particularly if the data traffic is nonhomogeneous and nonstationary. Typically, wireless is the communication medium between vehicles and UAVs in an ITS setting, which is based on the IEEE802.11p MAC protocol adopted by car manufactures. However, the IEEE 802.11p MAC protocol is modified solely for omnidirectional antennas, which restricts network coverage, delay, and throughput. In comparison, the directional antenna has greater network coverage, spatial reuse, and bandwidth. In addition, a multiaccess edge computing (MEC) facility at the backhaul link will provide ultralow latency and high bandwidth services to meet the increasingly growing demand for latency-sensitive vehicle applications such as vehicular video data analytics, autonomous driving, and intelligent navigation. Therefore, this article aims to propose a novel dual-mode MAC protocol that can work in two antenna modes, i.e., directional and omnidirectional. For modeling and simulation purposes, we use the Optimized Network Engineering Tool (OPNET) and aim to seek an evaluation with respect to throughput, media access delay, and retransmission attempts. The results obtained demonstrate the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
39

Jadoon, Rab Nawaz, Adnan Anwar Awan, Muhammad Amir Khan, WuYang Zhou, and Aqdas Naveed Malik. "PACR: Position-Aware Protocol for Connectivity Restoration in Mobile Sensor Networks." Wireless Communications and Mobile Computing 2020 (December 31, 2020): 1–15. http://dx.doi.org/10.1155/2020/8859256.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have gained global attention in recent times due to their vast applications in various fields. These networks can face the disruption of data transmission due to sensor node failures when placed in harsh, inaccessible, and adverse environments such as battlefields or monitoring in enemy territory. The specific tasks performed by the collaboration among the sensor nodes in WSNs by internode connectivity may be terminated. Besides this, due to the failure of sensor nodes, the area covered by the network may be limited, which can cause damage to the objectives for such a network, as there might be an unaware danger in the lost area. Connectivity is a big problem in mobile WSNs due to the mobility of nodes. Researchers have developed a lot of algorithms that are capable enough for connectivity problems, but they do not emphasize the loss of coverage. We try to fill these gaps by proposing the new hybrid algorithm PACR (Position-Aware protocol for Connectivity Restoration). The concept behind PACR is the same as a person who writes his will before death on a deathbed. In the same way, when the sensor energy is below the threshold, it is converted into a recovery coordinator and generates a recovery plan. This accelerates the recovery by decreasing the time needed for failure identification. For the recovery process, the neighbor’s nodes do not travel to the exact position of the failed node. Instead, they just move to the distance where they can build communication links with other nodes. This greatly prolongs the network lifetime. The simulation results show that PACR outperforms other techniques present in the literature.
APA, Harvard, Vancouver, ISO, and other styles
40

Hussain, Aamir, Tariq Ali, Faisal Althobiani, et al. "Security Framework for IoT Based Real-Time Health Applications." Electronics 10, no. 6 (2021): 719. http://dx.doi.org/10.3390/electronics10060719.

Full text
Abstract:
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
APA, Harvard, Vancouver, ISO, and other styles
41

Vera-Pérez, José, Javier Silvestre-Blanes, Víctor Sempere-Payá, and David Cuesta-Frau. "Multihop Latency Model for Industrial Wireless Sensor Networks Based on Interfering Nodes." Applied Sciences 11, no. 19 (2021): 8790. http://dx.doi.org/10.3390/app11198790.

Full text
Abstract:
Emerging Industry 4.0 applications require ever-increasing amounts of data and new sources of information to more accurately characterize the different processes of a production line. Industrial Internet of Things (IIoT) technologies, and in particular Wireless Sensor Networks (WSNs), allow a large amount of data to be digitized at a low energy cost, thanks to their easy scalability and the creation of meshed networks to cover larger areas. In industry, data acquisition systems must meet certain reliability and robustness requirements, since other systems such as predictive maintenance or the digital twin, which represents a virtual mapping of the system with which to interact without the need to alter the actual installation, may depend on it. Thanks to the IEEE 802.15.4e standard and the use of Time-Slotted Channel Hopping (TSCH) as the medium access mechanism and IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) as the routing protocol, it is possible to deploy WSNs with high reliability, autonomy, and minimal need for re-configuration. One of the drawbacks of this communication architecture is the low efficiency of its deployment process, during which it may take a long time to synchronize and connect all the devices in a network. This paper proposes an analytical model to characterize the process for the creation of downstream routes in RPL, whose transmission of multi-hop messages can present complications in scenarios with a multitude of interfering nodes and resource allocation based on minimal IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH). This type of multi-hop message exchange has a different behaviour than the multicast control messages exchanged during the synchronization phase and the formation of upstream routes, since the number of interfering nodes changes in each retransmission.
APA, Harvard, Vancouver, ISO, and other styles
42

Jasim, Musaab Mohammed, Hayder Khaleel AL-Qaysi, and Yousif Allbadi. "Reliability-based routing metric for UAVs networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1771. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1771-1783.

Full text
Abstract:
<span>As a result of technological advances in robotic systems, electronic sensors, and communication techniques, the production of unmanned aerial vehicle (UAV) systems has become possible. Their easy installation and flexibility led these UAV systems to be used widely in both military and civilian applications. Note that the capability of one UAV is however limited. Nowadays, a multi-UAV system is of special interest due to the ability of its associate UAV members either to coordinate simultaneous coverage of large areas or to cooperate to achieve common goals/targets. This kind of cooperation/coordination requires a reliable communication network with a proper network model to ensure the exchange of both control and data packets among UAVs. Such network models should provide all-time connectivity to avoid dangerous failures or unintended consequences. Thus, the multi-UAV system relies on communication to operate. Flying ad hoc network (FANET) is moreover considered as a sophisticated type of wireless ad hoc network among UAVs which solved the communication problems into other network models. Along with the FANET’s unique features, challenges and open issues are also discussed especially in the routing protocols approach. We will try to present the expected transmission account metric with a new algorithm for reliability. In addition to this new algorithm mechanism, the metric takes into account the relative speed between UAVs, and thus the increase of the fluctuations in links between UAVs has been detected. Accordingly, the results show that the function of the AODV routing protocol with this metric becomes effective in high mobility environments.</span>
APA, Harvard, Vancouver, ISO, and other styles
43

Teng, Haojun, Xiao Liu, Anfeng Liu, Hailan Shen, Changqin Huang, and Tian Wang. "Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks." Wireless Communications and Mobile Computing 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/2068375.

Full text
Abstract:
In wireless sensor networks (WSNs), many applications require a high reliability for the sensing data forwarding to sink. Due to the lossy nature of wireless channels, achieving reliable communication through multihop forwarding can be very challenging. Broadcast technology is an effective way to improve the communication reliability so that the data can be received by multiple receiver nodes. As long as the data of any one of the receiver nodes is transmitted to the sink, the data can be transmitted successfully. In this paper, a cross-layer optimization protocol named Adaptive transmission Power control based Reliable data Forwarding (APRF) scheme by using broadcast technology is proposed to improve the reliability of network and reduce communication delay. The main contributions of this paper are as follows: (1) for general data aggregation sensor networks, through the theoretical analysis, the energy consumption characteristics of the network are obtained. (2) According to the case that the energy consumption of near-sink area is high and that in far-sink area is low, a cross-layer optimization method is adopted, which can effectively improve the data communication by increasing the transmission power of the remaining energy nodes. (3) Since the reliability of communication is improved by increasing the transmission power of the node, the number of retransmissions of the data packet is reduced, so that the delay of the packet reaching the sink node is reduced. The theoretical and experimental results show that, applying APRF scheme under initial transmission power of 0 dBm, although the lifetime dropped by 13.77%, delay could be reduced by 40.37%, network reliability could be reduced by 10.08%, and volume of data arriving at sink increased by 10.08% compared with retransmission-only mechanism.
APA, Harvard, Vancouver, ISO, and other styles
44

Amara Korba, Abdelaziz, Mehdi Nafaa, and Salim Ghanemi. "An efficient intrusion detection and prevention framework for ad hoc networks." Information & Computer Security 24, no. 4 (2016): 298–325. http://dx.doi.org/10.1108/ics-08-2015-0034.

Full text
Abstract:
Purpose Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network. Design/methodology/approach This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network. Findings A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms. Originality/value It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.
APA, Harvard, Vancouver, ISO, and other styles
45

Shijer, Sameera Sadey, and Ahmad H. Sabry. "Analysis of performance parameters for wireless network using switching multiple access control method." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (2021): 6–14. http://dx.doi.org/10.15587/1729-4061.2021.238457.

Full text
Abstract:
The developments of wireless networks have directed to search for opportunities of a broad diversity of improved and new networking contributions. Wireless Asynchronous Transfer Mode (ATM) is a non-synchronous or random mode of transferring information. The advantages of circuit switching include dedicated connections and guaranteed traffic parameters and the benefits of packet switching are the efficiency at the physical layer and a more cost-effective design. ATM is the only protocol that offers the best of both communication methods. Although the Variable Bit-Rate (VBR) transmission presents a promising prospective of stable data quality, it is usually accompanied by network traffic overload and cell packet loss, which extensively weakens that potential. This work overcomes these concerns by developing a switching-based multiple access control model to improve the data transmission performance of wireless ATM. Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. It is demonstrated that the introduced method effectively transmits information without creating any network complexity and delay
APA, Harvard, Vancouver, ISO, and other styles
46

Jimenez, Jose M., Lorena Parra, Laura García, Jaime Lloret, Pedro V. Mauri, and Pascal Lorenz. "New Protocol and Architecture for a Wastewater Treatment System Intended for Irrigation." Applied Sciences 11, no. 8 (2021): 3648. http://dx.doi.org/10.3390/app11083648.

Full text
Abstract:
Water quality may be affected by aspects such as pollution from industries, agricultural fertilizers and pesticides, and waste produced by humans. This contamination can affect the produce of the fields irrigated by untreated water. Therefore, it is necessary to add a treatment process in irrigation systems. In this paper, an architecture, communication protocol, and a data analysis algorithm for a wastewater treatment system intended for irrigation are presented. Our system includes a smart group-based wireless sensor network that is able to detect high salinity levels and pollution stains, such as oil spills. When contamination is detected, the water is led into auxiliary canals that perform the biosorption process to treat the water and dump it back into the main canal. Simulations were performed to assess the amount of data stored on the secure digital (SD) card, the consumed bandwidth, and the energy consumption of our proposal. The results show the system has a low bandwidth consumption with a maximum of 2.58 kbps for the setting of two daily data transmissions of the node in the last auxiliary canal. Furthermore, it can sustain the energy consumption in adverse conditions, where the node with the highest energy consumption reaches the lowest energy value of 12,320 mW/h.
APA, Harvard, Vancouver, ISO, and other styles
47

Jeong, Wootae, and Shimon Y. Nof. "Timeout-Based Information Forwarding Protocol for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 3, no. 4 (2007): 331–46. http://dx.doi.org/10.1080/15501320601062148.

Full text
Abstract:
Recent wireless microsensor network protocols provide more flexible leverage to the applications with dynamically changing topology, but they should be designed to overcome energy constraints, the bandwidth limit, and system latency. Thus, microsensor network protocols should be effective both in energy and in latency. In addition, they should be evaluated through designated tools at each level of networking characteristics. This paper proposes a new Timeout-based Information Forwarding (TIF) protocol for wireless sensor networks. It uses a relatively simple logic to forward the data packet with multi-hop fashion to reduce the overall network energy consumption. The TIF protocol has been implemented into a network evaluation tool, called TIE/MEMS, and provides a design strategy for distributed wireless sensor network systems needed for various emerging applications. The simulated results show that the TIF protocol has low energy consumption and provides design guidelines between energy consumption and latency according to the number of hops by adjusting weight values in the timeout function.
APA, Harvard, Vancouver, ISO, and other styles
48

Dass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." International Journal of Business Data Communications and Networking 12, no. 2 (2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.

Full text
Abstract:
Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a serious type of attack where the attacker can target a particular user/client. To ensure security, the authors propose an improved scheme which anonymously provides secure authentication satisfying synchronization, untraceability of user and resists common attacks in a wireless network. As most of the real time security protocols use bio-metric based authentication schemes, they also propose a smartcard based secure authentication scheme for wireless networks. Their proposed schemes are proved safe under the formal security analysis of BAN logic. Both of their protocols are simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA). The simulation of their protocols under On-the-Fly-Model-Checker (OFMC) and Constant Logic based Attack Searcher (CL-AtSe) models of AVISPA results in a SAFE state. The authors have compared their proposed schemes against some of the recently proposed wireless authentication schemes in terms of attack resistivity and operational cost. Experimental results elicit a significant improvement over the existing schemes with low cost. Proposed untraceable, synchronized schemes can be applied for authentication purposes in public wireless networks, client server authentication system etc. with effective cost.
APA, Harvard, Vancouver, ISO, and other styles
49

Al-Saeed, Yasmeen, Eman Eldaydamony, Ahmed Atwan, Mohammed Elmogy, and Osama Ouda. "Efficient Key Agreement Algorithm for Wireless Body Area Networks Using Reusable ECG-Based Features." Electronics 10, no. 4 (2021): 404. http://dx.doi.org/10.3390/electronics10040404.

Full text
Abstract:
Wireless Body Area Networks (WBANs) are increasingly employed in different medical applications, such as remote health monitoring, early detection of medical conditions, and computer-assisted rehabilitation. A WBAN connects a number of sensor nodes implanted in and/or fixed on the human body for monitoring his/her physiological characteristics. Although medical healthcare systems could significantly benefit from the advancement of WBAN technology, collecting and transmitting private physiological data in such an open environment raises serious security and privacy concerns. In this paper, we propose a novel key-agreement protocol to secure communications among sensor nodes of WBANs. The proposed protocol is based on measuring and verifying common physiological features at both sender and recipient sensors prior to communicating. Unlike existing protocols, the proposed protocol enables communicating sensors to use their previous session pre-knowledge for secure communication within a specific period of time. This will reduce the time required for establishing the shared key as well as avoid retransmitting extracted features in the medium and hence thwarting eavesdropping attacks while maintaining randomness of the key. Experimental results illustrate the superiority of the proposed key agreement protocol in terms of both feature extraction and key agreement phases with an accuracy of 99.50% and an error rate of 0.005%. The efficacy of the proposed protocol with respect to energy and memory utilization is demonstrated compared with existing key agreement protocols.
APA, Harvard, Vancouver, ISO, and other styles
50

Bordim, Jacir Luiz, Koji Nakano, and Hong Shen. "Sorting on Single-Channel Wireless Sensor Networks." International Journal of Foundations of Computer Science 14, no. 03 (2003): 391–403. http://dx.doi.org/10.1142/s0129054103001807.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a distributed system consisting of a large number of wireless sensing devices and a base station. Due to their compactness and low-cost, sensor networks can be distributed at a fraction of the cost of conventional wired sensors and actuator systems. The physical world generates an unlimited amount of data that can be observed and monitored. Hence, designing protocols to coordinate WSNs with hundreds, or even thousands, of sensors will face many challenges. In this work we focus on the design of protocols that enable the sensor nodes to coordinate among themselves to achieve a larger task. From this standpoint, we present a sorting protocol for wireless sensor networks. We show that in a WSN consisting of n sensor nodes, where each sensor stores an element and has a fixed transmission range r. sorting can be performed in [Formula: see text] time slots when [Formula: see text]. We also reason that future applications of wireless sensor networks are very likely to employ short-range radio communications (i.e., r less than 100 meters). If this is the case, the time complexity of our sorting protocol is optimal.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography