{"title":"Virtualization of Wireless Sensor Networks","authors":"A. Bashir","doi":"10.4172/2090-4886.1000E105","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E105","url":null,"abstract":"Internet-of-Things (IoT) is considered one of the next technological revolutions. It enables communication among objects of various kinds. Wireless Sensor Networks (WSNs), being the basic elements of IoT, can help users (humans or machines) to interact and react to realworld events. WSN nodes are capable of sensing, communications, and computations; and are getting more powerful. Though various advantages, but one obvious drawback WSNs have is that they are domain-specific and task-oriented, which means they are designed to serve one particular application without the possibility of being reused for another application. This leads us to redundant deployment of WSN infrastructure in a particular are for multiple similar applications. For example, in a military environment the temperature monitoring WSN infrastructure would probably be different from the infrastructure to monitor the enemy movement. Such redundancy increase infrastructure cost. With the philosophy of IoT, in the future, WSN deployment should support multiple applications simultaneously.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000E105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSSI-based Indoor Localization Using RSSI-with-Angle-based Localization Estimation Algorithm","authors":"Ambassa Joel Yves, Peng Hao","doi":"10.4172/2090-4886.1000122","DOIUrl":"https://doi.org/10.4172/2090-4886.1000122","url":null,"abstract":"For the scenarios of indoors localization and tracking, the solutions generally need complex infrastructure because they would require either a grid of antennas, each having a well-known position (proximity based approach), or a sophisticated algorithm that uses scene fingerprint to estimate the location or the zone of an object by matching the online measurement with the closest offline measurement. Those techniques may not be available in unknown zones, which will make it difficult to locate a lost node. In this paper, with no additional hardware costs, we propose a new RSSIbased approach in order to find a lost node using a known node. By rotating the known node at the same spot we can collect different RSSI for different polar angles. Two pairs of angles with the strongest RSSI will indicate the main lobes of the radiation pattern, namely, zone of the unknown node. Experimental results illustrate a very close estimation of the unknown node zone, reducing up to 84% of the zone uncertainty.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"149 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000122","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Resource Allocation in OFDM Communication System forDifferent Modulation Technique using FRBS and PSO","authors":"Farhana Mustafa, P. Lohiya","doi":"10.4172/2090-4886.1000121","DOIUrl":"https://doi.org/10.4172/2090-4886.1000121","url":null,"abstract":"OFDM is technique that is chosen for high data rate communication and is important for 4th generation communication system. Resources such as power, bandwidth are limited, thus intelligent allocation of these resources to users are crucial for delivering the best possible quality of services. Fuzzy Rule Based System (FRBS) and Particle Swarm Optimization (PSO) algorithm are used for optimization of code rate, modulation and power. FRBS is used for adapting code rate and modulation size while PSO is used for power allocation.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2015 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial for the Topics of Micro Sensors for Communications and Wireless Sensor Networks","authors":"Daniel Choi","doi":"10.4172/2090-4886.1000E104","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E104","url":null,"abstract":"The Journal of Sensor Networks and Data Communications is a peer-reviewed, open access journal, which means that all published articles are made freely available online without a subscription, and authors retain the copyright of their work. The journal is supported by an experienced international editorial board team invites you to an opportunity of publishing your research experience to the professional societies.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Security and Privacy in Wireless Sensor Network","authors":"Sameer Kumar Meher, P. Manjusha, ey","doi":"10.4172/2090-4886.1000120","DOIUrl":"https://doi.org/10.4172/2090-4886.1000120","url":null,"abstract":"Over the past few years, the concern of security is increasing day by day. Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Ring Signature is a type of digital signature that enable a user to sign a message so that ring of possible signers is identified without revealing exactly which member of that ring actually generated the signature. Ring signatures are completely ad-hoc in nature there is no requirement of any central authority or coordination among different users. In this paper, we review summarize the study of ring signature schemes and scrutinize their relationships with other existing cryptographic schemes and discuss the uses and the mechanism used by ring signature.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System","authors":"D. Rajagopal, K. Thilakavalli","doi":"10.4172/2090-4886.1000119","DOIUrl":"https://doi.org/10.4172/2090-4886.1000119","url":null,"abstract":"New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-22"},"PeriodicalIF":0.0,"publicationDate":"2015-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of a Novel Power Control Algorithm in Heart RateMonitoring of a Mobile Adult: Energy Efficiency Comparison with FixedPower Transmission","authors":"D. Basu, G. S. Gupta, G. Moretti, X. Gui","doi":"10.4172/2090-4886.1000135","DOIUrl":"https://doi.org/10.4172/2090-4886.1000135","url":null,"abstract":"In this paper, experiments are conducted to evaluate the efficacy of a novel adaptive power control algorithm in terms of energy efficiency in heart rate monitoring scenario of a mobile adult in a typical home environment. As part of health care, persons with heart related problems are required to be monitored by logging for example, their heart rate on a regular basis to check for any anomaly. At the same time, it is expected that the person in question should be able to move freely within the given facility. The wireless sensors that are attached to the person send periodic data to the central base station. Since the person is mobile, the distance between the transmitting sensor and the base station changes with time. Since the signal path-loss is primarily dependent on distance and the number and type of obstructions between the transmitter and the receiver, it may be wise to use transmission power control to modulate the transmit power. Using power control, the sensor can adjust the level that is sufficient to send the data through the wireless channel without wasting energy. Conservation of energy is critical in wireless sensor network scenarios because they are powered by batteries which have limited lifetime. A critical application like the heart rate monitoring sensor is expected to operate for a reasonable amount of time before the battery dies. The novel adaptive power control algorithm uses intelligent modulation methods to ramp up or ramp down the transmission power level as and when required. By this method, the operational lifetime of the wireless sensor can be extended. As part of the experimental methodology for this paper, two subjects of different age groups have been used. Experimental results show that there is at least a 12% increase in the energy savings using the proposed algorithm.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2016 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Light-Weight Energy Consumption Model and Evaluation for WirelessSensor Networks","authors":"A. Richardson, J. Rendall, Yong-Hsun Lai","doi":"10.4172/2090-4886.1000137","DOIUrl":"https://doi.org/10.4172/2090-4886.1000137","url":null,"abstract":"Wireless sensor networks are comprised of low power devices with fixed energy stores. They often require long term operation for successful deployment so it is important to efficiently manage and track their energy usage. To effectively accomplish this across distributed networks requires methods which have low energy cost with minimal error. In this paper we present a straightforward model for energy consumption in wireless sensor networks which is light-weight and accurate. The model has been applied to a wireless sensor network developed by the Queen's University MEMs lab and is evaluated with a custom testbed. Through testing, the model is exposed to realistic disturbances of communication loss, battery effects and variable voltage supplies. It was shown that with 99% packet reception rates in the network, the model accurately estimates end node energy consumption with less than 5% error. These results were demonstrated across varying data rates, battery supply capacities, and runtimes up to full network lifetime.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2016 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000137","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path Loss Prediction of Wireless Mobile Communication for Urban Areas of Imo State, South-East Region of Nigeria at 910 MHz","authors":"N. NnamaniKelvin, Alumona Tl","doi":"10.4172/2090-4886.1000117","DOIUrl":"https://doi.org/10.4172/2090-4886.1000117","url":null,"abstract":"This paper provides an extension of path loss prediction in urban city of Imo State of Nigeria with a measured set of propagation at 910 MHz band. This paper work discusses and implements Okumura, Hata, cost-231, walfisch-Ikegami model, Sagami-Kuboi Model even though Hata and cost-231 Hata Models are extensively used in path loss analysis for GSM and CDMA systems comparison with the set results developed. It is of utmost importance that this paper work guides network designers in mobile cellular propagation and inculcates an accurate method of designing, deploying and managing of their network for proper attenuation.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2015 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70963919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Aware Cross Layer Framework for Multimedia Transmission overWireless Sensor Networks","authors":"Mohammed Ezz El Dien, A. Youssif, A. Ghalwash","doi":"10.4172/2090-4886.1000136","DOIUrl":"https://doi.org/10.4172/2090-4886.1000136","url":null,"abstract":"Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors which are limited in terms of computational, memory, bandwidth, and battery capability. Multimedia transmission over WSN requires certain Qos guarantees such as huge amount of bandwidth, strict delay and lower loss ratio, which makes transmitting multimedia content over it, is a challenging problem. Recently adopting cross-layer design in WMSNs proved to be a promising approach, which improves quality of service of WSN under various operational conditions. In this work, an energy aware framework for transmitting multimedia content over WSN (ECWMSN) is presented, where packet and path scheduling were introduced, so that It adaptably selects optimum video encoding parameters at application layer according to current wireless channel state, and schedules packets according to its type to drop less important packets in case of network congestion. Finally, path scheduling is introduced so that different packets types/priority is routed through suitable path with suitable Qos taking into consideration the network lifetime. Simulation results show that ECWMSN optimizes video quality and prolongs network lifetime.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"5 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}