Review: Wireless sensor networks for rehabilitation applications: Challenges and opportunities
Rehabilitation supervision has emerged as a new application of wireless sensor networks (WSN), with unique communication, signal processing and hardware design requirements. It is a broad and complex interdisciplinary research area on which more than ...
Review: Intrusion detection system: A comprehensive review
With the increasing amount of network throughput and security threat, the study of intrusion detection systems (IDSs) has received a lot of attention throughout the computer science field. Current IDSs pose challenges on not only capricious intrusion ...
Review: An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are largely inefficient to be deployed in cloud ...
Review: A survey of intrusion detection techniques in Cloud
In this paper, we survey different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in Cloud are examined. ...
Review: A survey on interference management techniques in femtocell self-organizing networks
The femtocell concept is an emerging technology for deploying the next generation of the wireless networks, aiming at indoor coverage enhancement, increasing capacity, and offloading the overlay macrocell traffic. Nevertheless, one of the most critical ...
Review: Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain
Seamless communication is becoming one of the most important issues for the next generation of mobile and wireless networks. In this context, seamless is referred to users that are free to roam around different networks and at the same time stay ...
Review: A gradient based routing scheme for street lighting wireless sensor networks
Routing for wireless sensor networks based on gradient is a simple, reliable solution resulting in low information costs for the network package, as well as for the node itself. It is used for convergent traffic, where sensor nodes send messages to the ...
Review: Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks
An amendment to the 802.16e standard namely IEEE 802.16j specifying relay station (RS) and multi-hop relay base station (MR-BS) was approved in year 2006 supports Mobile Multi-hop Relay networks. (MMR). It provides coverage extension to isolated area ...
Review: Mobile guides: Taxonomy of architectures, context awareness, technologies and applications
Portable devices are increasingly employed in a wide range of mobile guidance applications. Typical examples are guides in urban areas, museum guides, and exhibition space aids. The demand is for the delivery of context-specific services, wherein the ...
Review: An initiative for a classified bibliography on TCP/IP congestion control
During last two decades researchers, scholars and students are continuously embracing and improving TCP congestion performance both in wired and wireless networks by focusing on four modules of congestion control algorithms i.e., slow start, congestion ...
Review: Wireless Sensor Network transport protocol: A critical review
The transport protocols for Wireless Sensor Network (WSN) play vital role in achieving the high performance together with longevity of the network. The researchers are continuously contributing in developing new transport layer protocols based on ...
A SIP servlets-based framework for service provisioning in stand-alone MANETs
Mobile Ad hoc Networks (MANETs) are transient networks formed dynamically by a collection of arbitrarily located wireless mobile nodes without relying on any existing network infrastructure or centralized administration. They are either stand alone or ...
Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks
We propose the minimum Wiener index spanning tree (MWST) as a routing topology that is suitable for sensor networks with multiple mobile base nodes. However, it was proved that finding a spanning tree with the minimum Wiener index from a weighted graph ...
MDiag: Mobility-assisted diagnosis for wireless sensor networks
Though widely employed in various applications, wireless sensor networks (WSNs) are liable to failures, especially after deployment. Since the on-site failures are difficult to reproduce, it is of critical importance to perform in-situ diagnosis. ...
Towards secure and communication-efficient broadcast encryption systems
Many emerging network applications are based upon a group communication model where security is a critical design issue. We address the broadcast encryption problem of distributing to a group of network entities a confidential cryptographic key, which ...
An efficient single-iteration single-bit request scheduling algorithm for input-queued switches
Aiming at minimizing communication overhead of iterative scheduling algorithms for input-queued packet switches, an efficient single-iteration single-bit request scheduling algorithm called Highest Rank First with Request Compression 1 (HRF/RC1) is ...
Handling large-scale node failures in mobile sensor/robot networks
In Wireless Sensor Networks (WSNs), maintaining connectivity with the sink node is a crucial issue to collect data from sensors without any interruption. While sensors are typically deployed in abundance to tolerate possible node failures, a large ...
Multi-manifold model of the Internet delay space
The network coordinate systems (NCSes) can assist the network applications to improve their performance by choosing preferred severs or constructing optimal overlay networks. However, the current NCSes cannot predict the end-to-end delay accurately, ...
Towards a predictive cache replacement strategy for multimedia content
In recent years, telecom operators have been moving away from traditional broadcast-driven television, towards IP-based interactive and on-demand multimedia services. Consequently, multicast is no longer sufficient to limit the amount of generated ...
Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network
The development of wireless sensor networks (WSNs) has greatly encouraged the use of sensors for multi-target tracking. The high efficiency detection and location monitoring are critical requirements for multi-target tracking in a WSN. In this paper, we ...
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata
In the rising paradigm of cloud computing, attainment of sustainable levels of cloud users' trust in using cloud services is directly dependent on effective mitigation of its associated impending risks and resultant security threats. Among the various ...
An applications perspective into the Future Internet
The building of the Future Internet is well on its way with many research projects and experimental development activities in different parts of the works. However the debate over different approaches is still ongoing. Much of the comparison is ...
Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT
The aim of this paper is the development, implementation and subsequent performance evaluation of an innovative tool called RSS_PROYECT, based on the RSS technology for content syndication. At the present, there are several Web content syndicators; ...
Sensing task assignment via sensor selection for maximum target coverage in WSNs
In this paper, we consider the problem of assigning the sensing task to cover maximum number of targets while minimizing the energy consumption of the sensing operation. To this end, we define the sensing task as an optimization problem of adjusting the ...
RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments
- Reinaldo B. Braga,
- Igor A. Chaves,
- Carina T. De Oliveira,
- Rossana M. C. Andrade,
- José Neuman De Souza,
- Hervé Martin,
- Bruno Schulze
In ad hoc grid environments, resources are not always available since nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of tasks to guarantee good performance. However, there are malicious ...
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs
NEtwork MObility (NEMO) is designed to efficiently deal with the mobility of a set of mobile nodes using Mobile Routers (MRs). NEMO is extremely suitable for Vehicle Ad hoc NETworks (VANETs) due to its highly mobile nature. However, NEMO also suffers ...
Benefits of using parallelized non-progressive network coding
Network coding helps improve communication rate and save bandwidth by performing a special coding at the sending or intermediate nodes. However, encoding/decoding at the nodes creates computation overhead on large input data that causes coding delays. ...
DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks
In this paper, a pair of novel rectification algorithms (greedy negative pressure push algorithm and dynamic local stitching algorithm) is proposed to cooperatively repair broken transmitting paths in Wireless Sensor Networks. Our approach is to ...
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized users are allowed to access reliable sensor nodes to obtain data and even are allowed to send ...