scholarly journals Decision Fusion Under Fading Channel in Resource-Constrained Wireless Sensor Networks

2007 ◽  
Vol 18 (5) ◽  
pp. 1130 ◽  
Author(s):  
Yan-Jun LI
2013 ◽  
Vol 330 ◽  
pp. 957-960
Author(s):  
Qiao Ling Du ◽  
Zhi Rui Wang ◽  
Yu Pei ◽  
Yi Ding Wang

This paper investigates the performance analysis of OQPSK in HF band for wireless sensor networks. An analytical model for getting symbol error rate (SER) is given in presence of Bi-Kappa noise in HF band. And the SER of OQPSK is given in AWGN and Rayleigh fading channel. Simulation results HF noise as Bi-Kappa noise should be investigated in HF band for WSN.


Author(s):  
Teemu Laukkarinen ◽  
Lasse Määttä ◽  
Jukka Suhonen ◽  
Timo D. Hämäläinen ◽  
Marko Hännikäinen

Resource constrained Wireless Sensor Networks (WSNs) require an automated firmware updating protocol for adding new features or error fixes. Reprogramming nodes manually is often impractical or even impossible. Current update protocols require a large external memory or external WSN transport protocol. This paper presents the design, implementation, and experiments of a Program Image Dissemination Protocol (PIDP) for autonomous WSNs. It is reliable, lightweight and it supports multi-hopping. PIDP does not require external memory, is independent of the WSN implementation, transfers firmware, and reprograms the whole program image. It was implemented on a node platform with an 8-bit microcontroller and a 2.4 GHz radio. Implementation requires 22 bytes of data memory and less than 7 kilobytes of program memory. PIDP updates 178 nodes within 5 hours. One update consumes under 1‰ of the energy of two AA batteries.


2014 ◽  
Vol 977 ◽  
pp. 484-490
Author(s):  
Run Zeng

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.


Sign in / Sign up

Export Citation Format

Share Document