Hayajneh et al., 2014 - Google Patents
Analysis and evaluation of random placement strategies in wireless sensor networksHayajneh et al., 2014
View PDF- Document ID
- 4373182561795184260
- Author
- Hayajneh T
- Khasawneh S
- Publication year
- Publication venue
- Journal of Circuits, Systems, and Computers
External Links
Snippet
Wireless sensor networks (WSNs) are an attractive choice for many applications where sensors are densely and efficiently deployed in an area of interest. For example, in surveillance applications, where deterministic placement is not applicable, the sensors have …
- 238000004458 analytical method 0 title description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/023—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Priyadarshi et al. | Wireless sensor networks deployment: a result oriented analysis | |
Vanitha et al. | Optimized pollard route deviation and route selection using Bayesian machine learning techniques in wireless sensor networks | |
Singh et al. | A brief research study of wireless sensor network | |
Kirton et al. | Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks | |
Labella et al. | A bio-inspired architecture for division of labour in SANETs | |
Rakavi et al. | Grid based mobile sensor node deployment for improving area coverage in Wireless Sensor Networks | |
Singh | A proficient node deployment mechanism using adjustable sensing range in wireless sensor networks | |
Desnitsky et al. | Ensuring availability of wireless mesh networks for crisis management | |
Hayajneh et al. | Analysis and evaluation of random placement strategies in wireless sensor networks | |
Yun et al. | A method for deciding node densities in non-uniform deployment of wireless sensors | |
Yu et al. | Leveraging energy, latency, and robustness for routing path selection in Internet of Battlefield Things | |
Tamene et al. | Intelligent clustering protocol design and optimisation in wireless sensor networks | |
Kaur et al. | Detection and prevention of blackhole attacks in wireless sensor networks | |
Mnasri et al. | 3D deployment problem in wireless sensor networks resolved by genetic and ant colony algorithms | |
Yarbrough et al. | Assessing security risk for wireless sensor networks under cyber attack | |
Sharma et al. | Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network | |
Meena et al. | Coverage maximization using multi-objective optimization approach for wireless sensor network in real time environment | |
Das et al. | Coordination based motion control in mobile wireless sensor network | |
Mohamed et al. | Energy‐efficient circle zones stable election protocol with helper nodes for heterogeneous WSNs | |
Shaon | A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks | |
Mahapatra et al. | A survey on wireless sensor network (applications and architecture) | |
Nosaka et al. | Comparison Evaluation of Single and Multi Mobile Events Wireless Sensor Networks Using AODV Protocol | |
Mohapatra et al. | Coverage problem in wireless sensor networks | |
Chanak et al. | Obstacle discovery and localization scheme for wireless sensor network | |
Shaw et al. | Mobile sink to track multiple targets in wireless visual sensor networks |