Bilateral localisation algorithm for wireless sensor networks with communication holes
Localisation is one of the vital services for many protocols and applications in wireless sensor networks. Although in most of the range base localisation algorithms an unknown node requires at least three anchor nodes to localise itself, some ...
Exploiting the influence of infostation system on delay-tolerant networks
Heterogeneous delay-tolerant network DTN is a trend in the future. This paper investigates the heterogeneity of DTNs by assuming that among the regular DTN nodes some infostations are equipped with large-capacity buffer and connected by high-speed links ...
Co-simulating complex energy harvesting WSN applications: an in-tunnel wind powered monitoring example
A complex wind-energy harvesting wireless sensor network WSN application for subway tunnels is pre-prototyped using the HarvWSNet co-simulation framework. Detailed models of every component, including energy harvester, tunnel propagation channel, train ...
Provably secure CL-KEM-based password-authenticated key exchange protocol
Traditional password-based authentication protocols are vulnerable to various password-related attacks, while public key cryptography PKC is expensive to manage certificates. Moreover, the traditional identity-based cryptography suffers to key escrow. ...
An energy-balanced loop-free routing protocol for distributed wireless sensor networks
To prolong the network lifespan, the energy-balanced routing algorithm builds its routes based on a weighted sum of node's depth, residual energy and energy density. It is a pity that this algorithm introduces routing loops and redundant hops, which ...
Enhancing mobile sensor selection in large participatory sensing systems
The large number of sensor-rich mobile devices that are commonly available in urban environments bring new venues for the study of the environment and human interactions. Better approaches for the exploitation of the spatial-temporal properties of ...