Efthymiou, Charilaos Nikoletseas, Sotiris Rolim, Jose
Published in
Wireless Networks
We study the problem of energy-balanced data propagation in wireless sensor networks. The energy balance property guarantees that the average per sensor energy dissipation is the same for all sensors in the network, during the entire execution of the data propagation protocol. This property is important since it prolongs the network’:s lifetime by ...
Pietro, Roberto Di Mancini, Luigi V. Mei, Alessandro
Published in
Wireless Networks
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message exchange capabilities. Due to the scarcity of hardware resources, the lack of network infrastructures, and the threats to security, implementing secure pair-wise communications among any pair of sensors is a challenging problem in distributed WSNs. ...
Camtepe, S. A. Yener, B. Yung, Moti
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assi...
Rossi, Michele Zorzi, Michele Rao, Ramesh R.
Published in
Wireless Networks
The main goal of this paper is to provide routing–table-free online algorithms for wireless sensor networks (WSNs) to select cost (e.g., node residual energies) and delay efficient paths. As basic information to drive the routing process, both node costs and hop count distances are considered. Particular emphasis is given to greedy routing schemes,...
Sheu, Jang-Ping Tu, Shin-Chih Yu, Chia-Hao
Published in
Wireless Personal Communications
In wireless sensor networks, query execution over a specific geographical region is an essential function for collecting sensed data. However, sensor nodes deployed in sensor networks have limited battery power. Hence, the minimum number of connected sensor nodes that covers the queried region in a sensor network must be determined. This paper prop...
Cadilhac, Michaël Hérault, Thomas Lassaigne, Richard Peyronnet, Sylvain Tixeuil, Sébastien
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by constructing a Time Division Media Access (TDMA) schedule. APMC (Approximate Probabilistic Model Checker) is a tool that uses approximation-based verification techniques in o...
Le Merrer, Erwan Gramoli, Vincent Kermarrec, Anne-Marie Viana, Aline Bertier, Marin
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy consumption of a single sensor node but also the extension of the entire network lifetime. We propose a simple and adaptive energy-conserving topology management scheme, ...
Wang, Xiaofei Berger, Toby
Published in
Wireless Networks
Wireless sensor networks (WSN) are formed by network-enabled sensors spatially randomly distributed over an area. Because the number of nodes in the WSNs is usually large, channel reuse must be applied, keeping co-channel nodes sufficiently separated geographically to achieve satisfactory SIR level. The most efficient channel reuse configuration fo...
Shue Chen, Chung Shing Wong, Wing
This paper introduces a family of periodic binary sequences with interesting cross-correlation properties for potential applications in distributed wireless accessing. Following Massey's model of collision channel without feedback, a simple and robust multiple access protocol that does not require complicated processing such as back-off algorithms ...
Kumar, Santosh Lai, Ten H. Arora, Anish
Published in
Wireless Networks
When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k ...