期刊文献+
共找到211篇文章
< 1 2 11 >
每页显示 20 50 100
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
1
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
Dynamic Cluster Key Management Scheme on Wireless Sensor Networks 被引量:2
2
作者 Pei Qingqi Li Hongning +2 位作者 Pang Liaojun Hao Yin Hong Tang 《China Communications》 SCIE CSCD 2010年第1期73-79,共7页
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno... Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireless sensor network for communications, this paper introduces a hierarchical key management scheme based on the different abilities of different sensor nodes in the clustered wireless sensor network. In this scheme, the nodes are distributed into several clusters, and a cluster head must be elected for each cluster. Private communication between cluster heads is realized through the encryption system based on the identity of each head while private communication between cluster nodes in a same cluster head is achieved through the random key preliminary distribution system. Considering the characteristics of WSN, we adopt dynamic means called dynamic cluster key management scheme to deal with master key, so master key will be updated according to the changed dynamic network topology. For cluster head node plays a pivotal role in this scheme, a trust manage-ment system should be introduced into the election of the cluster head which will exclude the malicious node from outside the cluster, thus improve the whole network security. 展开更多
关键词 wireless sensor networks IDENTITY-BASED ENCRYPTION SYSTEM RANDOM key PRELIMINARY distribution SYSTEM TRUST management SYSTEM
下载PDF
A Survey on Underwater Acoustic Sensor Networks: Perspectives on Protocol Design for Signaling, MAC and Routing 被引量:5
3
作者 Mohammad Sharif-Yazd Mohammad Reza Khosravi Mohammad Kazem Moghimi 《Journal of Computer and Communications》 2017年第5期12-23,共12页
Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underw... Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underwater sensor networks are different from other sensor networks due to the acoustic channel used in their physical layer, thus we should discuss about the specific features of these underwater networks such as acoustic channel modeling and protocol design for different layers of open system interconnection (OSI) model. Each node of these networks as a sensor needs to exchange data with other nodes;however, complexity of the acoustic channel makes some challenges in practice, especially when we are designing the network protocols. Therefore based on the mentioned cases, we are going to review general issues of the design of an UASN in this paper. In this regard, we firstly describe the network architecture for a typical 3D UASN, then we review the characteristics of the acoustic channel and the corresponding challenges of it and finally, we discuss about the different layers e.g. MAC protocols, routing protocols, and signal processing for the application layer of UASNs. 展开更多
关键词 ACOUSTIC communications UNDERWATER ACOUSTIC sensor networks (UASNs) UNDERWATER Medium Access Control (Underwater MAC) UNDERWATER ROUTING distributed Signal Processing
下载PDF
Review of Key Management Mechanisms in Wireless Sensor Networks 被引量:1
4
作者 SUN Dong-Mei HE Bing 《自动化学报》 EI CSCD 北大核心 2006年第6期900-906,共7页
Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inn... Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inner characteristics of sensor networks: deployed in hostile environments, limited resource and ad hoc nature. This paper investigates the constraints and special requirements of key management in sensor network environment, and some basic evaluation metrics are introduced. The key pre-distribution scheme is thought as the most suitable solution for key management problem in wireless sensor networks. It can be classified into four classes: pure probabilistic key pre-distribution, polynomial-based, Blom's matrix-based, and deterministic key pre-distribution schemes. In each class of methods, the related research papers are discussed based on the basic evaluation metrics. Finally, the possible research directions in key management are discussed. 展开更多
关键词 Key management key pre-distribution wireless sensor networks
下载PDF
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks
5
作者 Alak Roy Nityananda Sarma 《Digital Communications and Networks》 SCIE CSCD 2021年第3期385-398,共14页
To design an energy-efficient Medium Access Control(MAC)protocol for the Underwater Wireless Sensor Networks(UWSNs)is an urgent research issue since depleted batteries cannot be recharged or replaced in the underwater... To design an energy-efficient Medium Access Control(MAC)protocol for the Underwater Wireless Sensor Networks(UWSNs)is an urgent research issue since depleted batteries cannot be recharged or replaced in the underwater environment.Moreover,the underwater acoustic channels are affected by hindrances such as long propagation delay and limited bandwidth,which appear in the design of the MAC protocol for the UWSNs.The available MAC protocols for the terrestrial wireless sensor networks exhibit low performance in energy efficiency,throughput and reliability in the UWSNs,and cannot be used in the UWSNs directly because of their unique characteristics.This paper proposes a synchronous duty-cycled reservation-based MAC protocol named Ordered Contention MAC(OCMAC)protocol.The basic mechanism of this protocol is to schedule data transmission by transmitters through the scheduling of Ready To Send(RTS)frames.The protocol eliminates the possible collision during data transmission and improves communication efficiency.The paper analyzes the performance in energy efficiency,throughput and reliability of the protocol by modeling the queuing behavior of OCMAC with a Markov Chain process.Furthermore,the analytical model is validated through a simulation study.The analysis results demonstrated that while providing good throughput and reliability,OCMAC can achieve energy saving. 展开更多
关键词 Underwater wireless sensor networks MAC protocol Energy efficiency THROUGHPUT RELIABILITY Acoustic communication OCMAC
下载PDF
Implementation Study of a Centralized Routing Protocol for Data Acquisition in Wireless Sensor Networks
6
作者 Trung Hieu Pham Xue Jun Li +1 位作者 Wai Yee Leong Peter Han Joo Chong 《Wireless Sensor Network》 2011年第5期167-173,共7页
Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency ar... Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs. 展开更多
关键词 WIRELESS sensor network Three-Way communication CENTRALIZED sensor protocols for Information NEGOTIATION
下载PDF
System Performance of Wireless Sensor Network Using LoRa–Zigbee Hybrid Communication 被引量:4
7
作者 Van-Truong Truong Anand Nayyar Showkat Ahmad Lone 《Computers, Materials & Continua》 SCIE EI 2021年第8期1615-1635,共21页
Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed ... Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed in the monitoring area to collect suitable data and transmit it to the gateway.Ensuring communications in heterogeneous WSNs,is a critical issue that needs to be studied.In this research paper,we study the system performance of a heterogeneous WSN using LoRa–Zigbee hybrid communication.Specifically,two Zigbee sensor clusters and two LoRa sensor clusters are used and combined with two Zigbee-to-LoRa converters to communicate in a network managed by a LoRa gateway.The overall system integrates many different sensors in terms of types,communication protocols,and accuracy,which can be used in many applications in realistic environments such as on land,under water,or in the air.In addition to this,a synchronous management software on ThingSpeak Web server and Blynk app is designed.In the proposed system,the token ring protocol in Zigbee network and polling mechanism in LoRa network is used.The system can operate with a packet loss rate of less than 0.5%when the communication range of the Zigbee network is 630 m,and the communication range of the LoRa network is 3.7 km.On the basis of the digital results collected on the management software,this study proves tremendous improvements in the system performance. 展开更多
关键词 Wireless sensor network ZIGBEE LoRa communication protocol CONVERTER packet loss
下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
8
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things IPv6 over low power wireless personal area networks Routing protocol for Low-Power and Lossy networks Internet protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
AEECA for Reliable Communication to Enhance the Network Life Time for WSN
9
作者 Ganesh Jayaraman V R Sarma Dhulipala 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1705-1719,共15页
Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the en... Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms. 展开更多
关键词 Wireless sensor network reliable communication energy management energy clustering sensorS base station gateway node
下载PDF
Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study
10
作者 Suraiya Tarannum 《Wireless Sensor Network》 2010年第6期483-491,共9页
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computa... A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks. 展开更多
关键词 Wireless sensor network sensor NODE communication protocols Architecture ENERGY CONSUMPTION of sensor NODE ENERGY CONSERVATION communication protocols
下载PDF
Cross Layer Design for Cooperative Transmission in Wireless Sensor Networks
11
作者 Kanojia Sindhuben Babulal Rajiv Ranjan Tewari 《Wireless Sensor Network》 2011年第6期209-214,共6页
Several protocols and schemes have been proposed to reduce energy consumption in Wireless Sensor Net-works (WSNs). In this paper we employ farcoopt, a cross layer design approach with the concept of coop-eration among... Several protocols and schemes have been proposed to reduce energy consumption in Wireless Sensor Net-works (WSNs). In this paper we employ farcoopt, a cross layer design approach with the concept of coop-eration among the nodes with best farthest neighbor scheme to increase the Quality of Service (QoS), reduce energy consumption, increases performance and end-to-end throughput. We present cooperative transmission to connect previously disconnect parts of a network thus overcoming the separation problem of multi-hop network. We show that this approach improves connectivity over 50% compared to multi-hop approaches and reduces the number of nodes necessary to provide full coverage of an area up to 35%. Simulation results show that on increase of data rates i.e. packet the network life time increases in farcoopt as compared to tra-ditional multi hop approach. The result of this analysis is presented in this work. 展开更多
关键词 COOPERATIVE network CROSS Layer Design WIRELESS sensor networks Energy SAVING communication protocol ROUTING
下载PDF
Distributed In-Time Multiple Coverage Holes Healing Protocol
12
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
下载PDF
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
13
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
下载PDF
A Dedicated MAC Protocol Package for Real-Time Ocean Current Field Estimation Using Distributed Underwater Acoustic Sensor Networks
14
作者 Hao Chen Huifang Chen +1 位作者 Lei Xie Kuang Wang 《Journal of Communications and Information Networks》 CSCD 2019年第3期71-79,共9页
Distributed underwater acoustic sensor networks(UASNs)are envisioned in real-time ocean current velocity estimation.However,UASNs at present are still dominated by post-processing partially due to the complexity of on... Distributed underwater acoustic sensor networks(UASNs)are envisioned in real-time ocean current velocity estimation.However,UASNs at present are still dominated by post-processing partially due to the complexity of on-line detection for travel times and lack of dedicated medium access control(MAC)protocols.In this study,we propose a dedicated MAC protocol package for real-time ocean current velocity estimation using distributed UASNs.First,we introduce the process and requirements of ocean current velocity estimation.Then,we present a series of spatial reuse time division multiple access(TDMA)protocols for each phase of real-time ocean current field estimation using distributed UASNs,followed by numerical analysis.We divide UASNs into two categories according to their computing ability:feature-complete and feature-incomplete systems.The feature-complete systems that have abundant computing ability carry out the presented MAC protocol package in three phases,whereas the feature-incomplete ones do not have enough computing ability and the presented MAC protocol package is reduced to two phases plus an additional downloading phase.Numerical analysis shows that feature-complete systems using mini-slot TDMA have the best real-time performance,in comparison with feature-incomplete systems and other feature-complete counterparts.Feature-incomplete systems are more energy-saving than feature-complete ones,owing to the absence of in-network data exchange. 展开更多
关键词 distributed underwater acoustic sensor networks ocean current dedicated medium access control protocol package spatial reuse time division multiple access REAL-TIME
原文传递
智能配电通信无线传感器网络工程研究
15
作者 胡青璞 《现代传输》 2024年第3期76-79,共4页
为了提升智能配电通信无线传感器运行效果,通过对无线传感器网络Qo S需求的简单分析,进而设计了智能电网无线传感器网络跨层协议栈,然后以此为基础,设计了一款基于Qo S-CLR算法的无线传感器网络路由通信协议。通过模拟分析可以发现,基于... 为了提升智能配电通信无线传感器运行效果,通过对无线传感器网络Qo S需求的简单分析,进而设计了智能电网无线传感器网络跨层协议栈,然后以此为基础,设计了一款基于Qo S-CLR算法的无线传感器网络路由通信协议。通过模拟分析可以发现,基于Qo S算法的无线传感器网络协议性能远高于LHEED算法,因而可将基于Qo S算法的无线传感器网络协议大规模推广到智能配电通信领域。 展开更多
关键词 智能配电 无线传感器网络 通信协议
下载PDF
基于人工智能的配电网智能化维修管理系统设计与实现
16
作者 陈巍 《通信电源技术》 2024年第11期7-10,共4页
文章提出一种基于人工智能的配电网智能化维修管理系统,旨在解决传统维修管理方法存在的局限性和不足。该系统利用传感器网络、边缘计算、数据分析以及智能决策等技术手段,实现对配电网运行状态实时监测、故障诊断以及维修决策的智能化... 文章提出一种基于人工智能的配电网智能化维修管理系统,旨在解决传统维修管理方法存在的局限性和不足。该系统利用传感器网络、边缘计算、数据分析以及智能决策等技术手段,实现对配电网运行状态实时监测、故障诊断以及维修决策的智能化管理。最后,通过实验验证和案例分析评估系统的性能和效果,以期为配电网维修管理领域的进一步研究和应用提供理论与实践支持。 展开更多
关键词 人工智能 配电网 智能化维修管理系统 传感器网络
下载PDF
Application of wireless sensor networks to aircraft control and health management systems 被引量:15
17
作者 Rama K. YEDAVALLI Rohit K. BELAPURKAR 《控制理论与应用(英文版)》 EI 2011年第1期28-33,共6页
Use of fly-by-wire technology for aircraft flight controls have resulted in an improved performance and reliability along with achieving reduction in control system weight. Implementation of full authority digital eng... Use of fly-by-wire technology for aircraft flight controls have resulted in an improved performance and reliability along with achieving reduction in control system weight. Implementation of full authority digital engine control has also resulted in more intelligent, reliable, light-weight aircraft engine control systems. Greater reduction in weight can be achieved by replacing the wire harness with a wireless communication network. The first step towards fly-by-wireless control systems is likely to be the introduction of wireless sensor networks (WSNs). WSNs are already finding a variety of applications for both safety-critical and nonsafety critical distributed systems. Some of the many potential benefits of using WSN for aircraft systems include weight reduction, ease of maintenance and an increased monitoring capability. This paper discusses the application of WSN for several aircraft systems such as distributed aircraft engine control, aircraft flight control, aircraft engine and structural health monitoring systems. A brief description of each system is presented along with a discussion on the technological challenges. Future research directions for application of WSN in aircraft systems are also discussed. 展开更多
关键词 Wireless sensor networks distributed turbine engine control Fly-by-wireless Aircraft engine health monitoring Aircraft structural monitoring communication constraints
原文传递
Quantum Key Distribution Network Based on Differential Phase Shift 被引量:5
18
作者 王婉莹 王川 +1 位作者 文凯 龙桂鲁 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第6期1463-1466,共4页
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the dif... Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack. 展开更多
关键词 SECURE DIRECT communication DISTRIBUTION protocol OPTICAL networks BELLTHEOREM CRYPTOGRAPHY ENTANGLEMENT STATES
下载PDF
Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment 被引量:1
19
作者 Anshul Sharma Divneet Singh Kapoor +3 位作者 Anand Nayyar Basit Qureshi Kiran Jot Singh Khushal Thakur 《Computers, Materials & Continua》 SCIE EI 2022年第6期6239-6256,共18页
The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa ... The simultaneous advances in the Internet of Things(IoT),Artificial intelligence(AI)and Robotics is going to revolutionize our world in the near future.In recent years,LoRa(Long Range)wireless powered by LoRaWAN(LoRa Wide Area Network)protocol has attracted the attention of researchers for numerous applications in the IoT domain.LoRa is a low power,unlicensed Industrial,Scientific,and Medical(ISM)bandequipped wireless technology that utilizes a wide area network protocol,i.e.,LoRaWAN,to incorporate itself into the network infrastructure.In this paper,we have evaluated the LoRaWAN communication protocol for the implementation of the IoT(Internet of Things)nodes’communication in a forest scenario.The outdoor performance of LoRa wireless in LoRaWAN,i.e.,the physical layer,has been evaluated in the forest area of Kashirampur Uttarakhand,India.Hence,the present paper aims towards analyzing the performance level of the LoRaWAN technology by observing the changes in Signal to Noise Ratio(SNR),Packet Reception Ratio(PRR)and Received Signal Strength Indicator(RSSI),with respect to the distance between IoT nodes.The article focuses on estimating network lifetime for a specific set of LoRa configuration parameters,hardware selection and power constraints.From the experimental results,it has been observed that transmissions can propagate to a distance of 300 m in the forest environment,while consuming approx.63%less energy for spreading factor 7 at 2 dBm,without incurring significant packet loss with PRR greater than 80%. 展开更多
关键词 LoRa LoRaWAN IOT communication protocol wireless sensor networks packet reception ratio
下载PDF
A cross-layer fault tolerance management module for wireless sensor networks 被引量:1
20
作者 Ozlem KARACA Radosveta SOKULLU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2012年第9期660-673,共14页
It is a well-established fact that wireless sensor networks (WSNs) are very power constraint networks, but besides this, they are inherently more fault-prone than any other type of wireless network and their protocol ... It is a well-established fact that wireless sensor networks (WSNs) are very power constraint networks, but besides this, they are inherently more fault-prone than any other type of wireless network and their protocol design is very application specific. Major reasons for the faults are the unpredictable wireless communication channel, battery depletion, as well as fragility and mobility of the nodes. Furthermore, as traditional protocol design methods have proved inadequate, the cross-layer design (CLD) approach, which allows for interactions between different layers, providing more flexible and energy-efficient functionality, has emerged as a viable solution for WSNs. In this study we define a fault tolerance management module suitable to the requirements, limitations, and specifics of WSNs, encompassing methods for fault detection, fault prevention, fault management, and recovery. The suggested solution is in line with the CLD approach, which is an important factor in increasing the network performance. Through simulations the functionality of the network is evaluated, based on packet loss, delay, and energy consumption, and is compared with a similar solution not including fault management. The results achieved support the idea that the introduction of a unified approach to fault management improves the network performance as a whole. 展开更多
关键词 Wireless sensor networks (WSNs) Cross-layer frameworks protocol design Fault management
原文传递
上一页 1 2 11 下一页 到第
使用帮助 返回顶部