PEAL: Power Efficient and Adaptive Latency Hierarchical Routing Protocol for Cluster-Based WSN
- Faouzi Hidoussi,
- Homero Toral-Cruz,
- Djallel Eddine Boubiche,
- Rafael Martínez-Peláez,
- Pablo Velarde-Alvarado,
- Romeli Barbosa,
- Freddy Chan
In wireless sensor networks, one of the most important constraints is the low power consumption requirement. For that reason, several hierarchical or cluster-based routing methods have been proposed to provide an efficient way to save energy during ...
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks
The converge-cast in wireless sensor networks (WSNs) is widely applied in many fields such as medical applications and the environmental monitoring. WSNs expect not only providing routing with high throughput but also achieving efficient energy saving. ...
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness
In this paper, we propose a new medium access control (MAC) protocol for wireless sensor networks called MMSMAC (multi-mode sensor MAC protocol), which operates according to the application requirements and traffic load, in three main modes: synchronous,...
Weighted Hyperbolic DV-Hop Positioning Node Localization Algorithm in WSNs
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks (WSAN) identifying geographically where an event occurred, which facilitates timely response to this action. This article presents a performance evaluation of ...
A Low Duty Cycle MAC Protocol for Directional Wireless Sensor Networks
Directional communication in wireless sensor networks minimizes interference and thereby increases reliability and throughput of the network. Hence, directional wireless sensor networks (DWSNs) are fastly attracting the interests of researchers and ...
MRL-SCSO: Multi-agent Reinforcement Learning-Based Self-Configuration and Self-Optimization Protocol for Unattended Wireless Sensor Networks
Resource-constrained nodes in unattended wireless sensor network (UWSN) operate in a hostile environment with less human intervention. Achieving the optimal quality of service (QoS) in terms of packet delivery ratio, delay, energy, and throughput is ...
Self-Organizing Mobility Control in Wireless Sensor and Actor Networks Based on Virtual Electrostatic Interactions
This paper introduces a new mobility control method for surveillance applications of wireless sensor and actor networks. The proposed method is based on virtual electrostatic forces which act on actors to coordinate their movements. The definition of ...
A Contract-Based Model for Multiuser Cooperative Relay in Wireless Communication Networks
Cooperative communication utilizes multi-user spatial diversity to improve spectrum efficiency and channel capacity. However, due to the limited wireless network resource, the selfish relay nodes may be unwilling to offer their relay assistance without ...
Underwater Ad Hoc Wireless Communication for Video Delivery
Due to the high attenuation of the water at high frequencies, underwater communications in freshwater are not being investigated so much. Many current underwater communication systems are based on acoustic or optical techniques. The use of ...
Hybrid MANET---DTN and a New Algorithm for Relay Nodes Selection
In this paper, a new way to a selection of the secure relay nodes in hybrid MANET---DTN networks based on the cooperation between routing, trust and game theory mechanisms is introduced. The hybrid MANET---DTN enables delivering the data or messages in ...
A Trust-Distortion Resistant Trust Management Scheme on Mobile Ad Hoc Networks
Trust management is a promising approach to conduct nodes' transactions and establish management interactions in mobile ad hoc networks, in which collaboration between nodes is critical to achieve system goals. Lack of centralized management, severe ...
An Augmented Routing Algorithm for Trusted Detection of Link Failures in MANETs
Now a days, the communication between different nodes in a Mobile Ad hoc Network (MANET) is not guarded. Various encryption mechanisms are used to protect the communication between nodes. Link failures and packet dropping due to unfaithful nodes are ...
Node Re-Routing and Congestion Reduction Scheme for Wireless Vehicular Networks
Recently, the interest of research is going to be focused on the emerging vehicular ad-hoc networks paradigm. In these networks, vehicles communicate with each other and have the possibility of exploiting a distributed approach, typical of ad-hoc ...
Visual Hysteresis Based Dynamic Interference Shaping for Real-Time Video Services in Dense Deployed Cellular Networks
Due to the dense deployed base stations and the growing traffic of best effort (BE) services, frequent bursty interference becomes one of major challenges to assure quality of experience (QoE) for real-time video services. Considering those situations, ...
Analysis of Neighbourhood Relations for Femtocell Networks
Nowadays mobile operators are trying to find an economic solution to improve coverage, mainly indoor, and to meet exponentially growing data traffic demands. A cost-effective means to manage these challenges represent small cells, such as metrocells or ...
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
The Internet of Things (IoT) is an expansion of Internet-based sensing, processing and networking. As a key technique of the IoT, the Radio Frequency Identification (RFID) had a prosperous development in the past decade. Security schemes were also ...
A Fairness-Enhanced Micropayment Scheme
The micropayment scheme is widely used in the electronic payment, where the transaction value is tiny, meanwhile, the number of transactions is very huge. Recently, Liu and Yan proposed a lightweight micropayment scheme to achieve the efficiency, the ...
A Countermeasure to SQL Injection Attack for Cloud Environment
Although cloud computing becomes a new computing model, a variety of security threats have been described. Among these threats, SQL injection attack (SQLIA) has received increasing attention recently. In the past, many researchers had proposed several ...
Secure Data Access and Sharing Scheme for Cloud Storage
Cloud storage is a new storage mode emerged along with the development of cloud computing paradigm. By migrating the data to cloud storage, the consumers can be liberated from building and maintaining the private storage infrastructure, and they can ...
Exploring the Impact of QR Codes in Authentication Protection: A Study Based on PMT and TPB
The fast growing usage of mobile devices to access services over telecommunication networks urges researchers to look for an efficient way to secure users' online credentials. Rooted in online users' fear appeals, this study measures the impact of an ...
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows from captured darknet data, distinguish scan ...
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
Internet of Things has drastically expanded the global network for information exchange, because thousands of communication devices are becoming part of the global network. Besides the numerous benefits of global network expansion, secure communication ...
Prediction of Speech Quality Based on Resilient Backpropagation Artificial Neural Network
- Lukas Orcik,
- Miroslav Voznak,
- Jan Rozhon,
- Filip Rezac,
- Jiri Slachta,
- Homero Toral-Cruz,
- Jerry Chun-Wei Lin
The paper presents a system for monitoring and assessment the speech quality in the IP telephony infrastructures using modular probes. The probes are placed at key nodes in the network where aggregating packet loss data. The system dynamically measures ...
Priority-Aware Packet Pre-marking for DiffServ Architecture Based on H.264/SVC Video Stream Structure
The H264/SVC codec allows for generation of hierarchical video streams. In the stream of this type video data belonging to different layers have different priority depending on their importance to the quality of the video and the decoding process. This ...
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks
Localization is emerging as a vital functionality of various wireless applications. Existing localization methods generally partition irregular regions with huge obstacles into regular ones, and rely on at least three anchor nodes to localize unkonwn ...
The Entanglement Level and the Detection of Quantum Data Transfer Correctness in Short Qutrit Spin Chains
The quantum entanglement is an important feature of many protocols in the field of quantum computing. In this paper we evaluate a level of entanglement in short qutrit chains. This evaluation is carried out with use of the computable cross norm and ...
The Optimal Sizing of HSS Database in IMS
Our paper deals with the architecture and standards of IP the multimedia subsystem from next generation networks point of view. It describes the structure of the home subscriber server database and then derives equations for sizing of its load in the ...
Waterfall Traffic Classification: A Quick Approach to Optimizing Cascade Classifiers
Heterogeneous wireless communication networks, like 4G LTE, transport diverse kinds of IP traffic: voice, video, Internet data, and more. In order to effectively manage such networks, administrators need adequate tools, of which traffic classification ...