6 research outputs found

    Ubiquitous Sensor Networks and Its Application

    Get PDF
    Ubiquitous sensor networks and its application are emerging rapidly as an exciting new paradigm to provide reliable and comfortable life services. The ever-growing ubiquitous sensor networks and its application will provide an intelligent and ubiquitous communication and network technology for tomorrow. That is, the UCMA have emerged rapidly as an exciting new paradigm that includes ubiquitous, grid, and peer-to-peer computing to provide computing and communication services at anytime and anywhere. In order to realize the advantages of such services, it is important that intelligent systems be suitable for UCMA

    Intelligent Sensor Networks

    Get PDF
    In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts

    Traffic Rerouting Strategy against Jamming Attacks in WSNs for Microgrid

    No full text
    In a microgrid as an energy infrastructure, the vulnerability against jamming attacks is fatal. Thus, the ability to deal with jamming attacks and maintain an acceptable level of service degradation in presence of the attacks is needed. To solve the problem, we propose a traffic rerouting scheme in wireless communication infrastructure for islanded microgrid. We determine disjoint multiple paths as candidates of a detour path and then select the detour path among the candidates in order to reduce the effect of jamming attack and distribute traffic flows on different detour paths. Through performance comparison, we show that our scheme outperforms a conventional scheme in terms of packet delivery ratio and end-to-end delay
    corecore