نتایج جستجو برای: sink location

تعداد نتایج: 239433  

2013
JYH-HORNG WEN CHENG-CHIH YANG CHENG-MIN LIN YUNG-FA HUANG

Wireless sensor network (WSN) scalability and energy-efficiency issues remain an interesting research problem. This paper presents a multiple-sink deployment scheme for large-scale WSNs. An 8-rings Corona style sensor network is regarded as a Corona Sensor Cell (CSC) based on coarse-grain location awareness for energy-efficiency consideration. The overall task includes nodes training and data d...

Journal: :Comput. Sci. Inf. Syst. 2016
Sangho Lee Jong Kim Yoonho Kim

Protecting the location privacy of source and sink nodes in a sensor network is an important problem. Source-location privacy is to prevent event source tracking by adversaries and sink-location privacy is to protect sink nodes from adversaries who try to disrupt the sensor network. In this paper, we propose a constant-rate broadcast scheme for ensuring their location privacy. This scheme (1) e...

2016
Ruben Rios Javier López Jorge Cuéllar

The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...

Journal: :Theor. Comput. Sci. 2014
Yuya Higashikawa Mordecai J. Golin Naoki Katoh

This paper considers the k-sink location problem in dynamic path networks. In our model, a dynamic path network consists of an undirected path with positive edge lengths, uniform edge capacity, and positive vertex supplies. Here, each vertex supply corresponds to a set of evacuees. Then, the problem requires to find the optimal location of k sinks in a given path so that each evacuee is sent to...

2014
Ahmed E. El-Din Rabie A. Ramadan A. A. Elmagid Salah A. Aly

Due to the sink node crucial position, its location privacy is becoming one of the major issues in wireless sensor networks (WSNs) which requires ultimate protection. Particularly, the WSNs successfulness is endanger as the wireless transmission nodes are susceptive to illicit tracing and detection. While privacy of the message can be ensured through encryption content, this paper formalizes a ...

2015
Abhishek R. Malviya Balaso N. Jagdale

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may to attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy ...

Journal: :Computer Science and Information Systems 2016

2006
William Conner Tarek F. Abdelzaher Klara Nahrstedt

When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryption is used to protect the actual contents of the messages. The communication patterns, which often reveal higher volumes of traffic near the sink, could allow an attacker to identify the vicinity of the sink node. With...

Journal: :EURO Journal on Computational Optimization 2015

2016
KULWARDHAN SINGH P. SHARMA

Energy awareness is an essential design issue in wireless sensor network. Therefore, attention must be given to the routing protocols since they might differ depending on the application and network architecture. It is desired to design the energy efficient routing protocols to conserve the poser supply of sensor node and prolongs its lifetime. Recently sink mobility has been exploited in numer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید