Current Issue : January - March Volume : 2021 Issue Number : 1 Articles : 5 Articles
In wireless sensor networks, sink mobility support is one of the essential functionalities in many applications. With continuous\nadvancement, future applications will require not only sink mobility support but also high-performance data delivery service.\nMultipath routing is one of the promising technologies for improving data delivery performance by collaboratively using\nalternative or redundant multiple routing paths. However, existing multipath routing protocols had not dealt with sink mobility.\nAs a result, they lead to bad performance in terms of energy efficiency due to the end-to-end path reconstruction. Consequently,\na novel multipath management scheme is required thereby supporting sink mobility without performance degradation. In this\npaper, we propose a multipath management scheme for supporting sink mobility. The proposed scheme dynamically constructs\nmultipath along the moving path of a sink. In addition, the proposed scheme provides the path shortening schemes according to\nthe sinkâ??s movement for reducing energy consumption. Our simulation results show that the proposed scheme is superior to\nexisting path management schemes in terms of reliability and energy efficiency....
As a component of mobile communication, the pay-TV system has attracted a lot of attention. By using mobile devices, users\ninteract with the head end system in service providers to acquire TV services. With the growth of mobile users, how to protect\nthe privacy of users while improving efficiency of the network has become an issue worthy of attention. Anonymous\nauthentication schemes for mobile pay-TV systems came into being. In this paper, we analyze the shortcomings of the existing\nauthentication protocol and then propose an improved one, which is secure against stored set attack and user traceability attack.\nThe proposed scheme is proved to be secure. Moreover, our new scheme performs better in efficiency and storage, compared\nwith several other schemes....
Wireless sensor networks are not prone to harsh environments and may fail due to various reasons. Failure of sensor nodes causes\npartitioning of network into various small segments and restricts the communication of nodes. Due to the significant importance\nof restoration mechanisms, many approaches have been proposed in the literature so far. However, these approaches do not focus\non uniform distribution of sensor nodes before the occurrence of failure. This paper fulfills the shortcoming in the literature by\nproposing a Uniform Distribution and Recovery Algorithm (UDRA) in two parts. The first part (prefailure algorithm) focuses on\npreparing the mobile sensor nodes to be ready for the failure beforehand by maintaining half of their communication distance\nbetween them. Also, it uses a novel method of directional matrix based on one-hop information. By using this method, each\nmobile node declares itself as cut-vertex (CV), intermediate node, or leaf node. The second part of the algorithm (postfailure\nalgorithm) gives complete recovery procedure in the network by its recovery nodes. The extensive simulations prove that the\nproposed algorithm supersedes the existing approaches....
The interaction between cores and memory blocks, in multiprocessor chips and smart systems, has always been a concern as it\naffects network latency, memory capacity, and power consumption. A new 2.5-dimensional architecture has been introduced in\nwhich the communication between the processing elements and the memory blocks is provided through a layer called the\ninterposer. If the core wants to connect to another, it uses the top layer, and if it wants to interact with the memory blocks, it\nuses the interposer layer. In a case that coherence traffic at the processing layer increases to the extent that congestion occurs, a\npart of this traffic may be transferred to the interposer network under a mechanism called load balancing. When coherence\ntraffic is moved to the interposer layer, as an alternative way, this may interfere with memory traffic. This paper introduces a\nmechanism in which the aforementioned interference may be avoided by defining two different virtual channels and using\nmultiple links which specifically determines which memory block is going to be accessed. Our method is based on the\ndestination address to recognize which channel and link should be selected while using the interposer layer. The simulation\nresults show that the proposed mechanism has improved by 32% and 14% latency compared to the traditional load-balancing\nand unbalanced mechanisms, respectively....
As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the\ninformation security in wireless sensor network (WSN) is critical. Due to constrained resources of sensor node, WSN is becoming a\nvulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks. The\nformer can be defended by using encryption and authentication schemes. However, this is invalid for the latter, which can obtain all\nkeys of the network. The studies have proved that the trust management technology is one of effective approaches for detecting and\ndefending against internal attacks. Hence, it is necessary to investigate and review the attack and defense with trust management. In\nthis paper, the state-of-the-art trust management schemes are deeply investigated for WSN. Moreover, their advantages and\ndisadvantages are symmetrically compared and analyzed in defending against internal attacks. The future directions of trust\nmanagement are further provided. Finally, the conclusions and prospects are given....
Loading....