Science topic

Wireless Sensor Network - Science topic

Network to exchange information about all sorts of wireless sensor networks
Questions related to Wireless Sensor Network
  • asked a question related to Wireless Sensor Network
Question
4 answers
How can simulate sybil attack in wsn in ns2 or other simulators?
  • asked a question related to Wireless Sensor Network
Question
8 answers
How to design mathematical model for AODV routing protocol? I have developed a new routing protocol, I would like to design or write the mathematical model for this routing protocol? is there any book I can read it. Thank you in Advance.
Relevant answer
Answer
Designing a mathematical model for the Ad hoc On-Demand Distance Vector (AODV) routing protocol involves formalizing the behavior, performance metrics, and operational characteristics of the protocol. Below are steps on how to approach the design of such a model:
Step 1: Define the Network Environment
  1. Network Topology: Specify the type of ad hoc network, including the number of nodes (N), mobility models (random waypoint, RWP, etc.), and node distribution (random, grid).
  2. Node Characteristics: Define node attributes, such as transmission range (R), energy constraints, and communication capabilities.
Step 2: Understand AODV Operation
AODV can be understood through its key operational phases:
  • Route Discovery: Nodes broadcast Route Request (RREQ) messages when they need a route.
  • Route Maintenance: Established routes are maintained as long as they are needed; if a link breaks, Route Error (RERR) messages are sent.
  • Route Reply: A Route Reply (RREP) is sent back to the source upon receiving an RREQ from a destination node.
Step 3: Establish Key Performance Metrics
Define the metrics you are interested in analyzing, including:
  1. Route Discovery Time (T_rd): Time taken to establish a route.
  2. End-to-End Delay (T_e2e): Time taken for a packet to travel from source to destination.
  3. Throughput (Th): Amount of data delivered over time.
  4. Packet Delivery Ratio (PDR): Ratio of delivered packets to the total packets sent.
  5. Network Overhead (O): Control packets generated (RREQ, RREP, RERR).
  6. Energy Consumption (E): Used energy per route discovery and maintenance.
Step 4: Mathematical Formulation
  1. Model Route Discovery:Let TRREQTRREQ​ be the time taken to receive RREQ and TRREPTRREP​ the time taken to send RREP. The route discovery time can be modeled as:
Trd=TRREQ+TRREPTrd​=TRREQ​+TRREP
  1. Calculate End-to-End Delay:If LL is the packet length, RR the transmission rate, and DD the number of hops, the delay can be modeled as:
Te2e=∑i=1D(LR+Tpropagation+Tqueue)Te2e​=i=1∑D​(RL​+Tpropagation​+Tqueue​)
Where TpropagationTpropagation​ is the propagation delay, and TqueueTqueue​ is the queuing delay at each node.
  1. Throughput:Define throughput as:
Th=PDR⋅LTtotalTh=TtotalPDRL
Where TtotalTtotal​ is the total time for communication.
  1. Packet Delivery Ratio:
PDR=NdeliveredNsentPDR=NsentNdelivered​​
Where NdeliveredNdelivered​ is the number of packets successfully delivered and NsentNsent​ is the total packets sent.
  1. Network Overhead:This can be calculated as the ratio of control packets to data packets:
O=NcontrolNdataO=NdataNcontrol​​
  1. Energy Consumption:If EtxEtx​ is the energy used to transmit and ErxErx​ for receiving:
E=NRREQ⋅Etx+NRREP⋅Erx+NRERR⋅EtxE=NRREQ​⋅Etx​+NRREP​⋅Erx​+NRERR​⋅Etx
Step 5: Simulate and Validate
  1. Simulation: Use a network simulator (like ns-3 or OMNeT++) to validate the mathematical model against real-world scenarios.
  2. Data Collection: Collect data for different simulations to compare with theoretical predictions.
  3. Parameter Sensitivity Analysis: Analyze how sensitive your model is to changes in parameters (e.g., node density, mobility patterns).
Step 6: Refine the Model
Based on validation results, refine your model to improve accuracy, considering factors like dynamic changes in network topology, varying traffic patterns, or more realistic mobility models.
  • asked a question related to Wireless Sensor Network
Question
5 answers
Is omnet++ suitable to implement key management in WSN? What should I do? Can anyone give me some advice?
Relevant answer
Answer
OMNeT++ is suitable for implementing key management in Wireless Sensor Networks (WSNs). OMNeT++ is a discrete event simulation environment that provides a robust framework for simulating networking protocols and applications. Here are some reasons why OMNeT++ is a good choice for this purpose:
Reasons to Use OMNeT++ for Key Management in WSN
  1. Modular Architecture: OMNeT++ supports a modular design, allowing you to create and manage various components like nodes, networks, and protocols separately. This modularity makes it easier to implement and test specific features like key management.
  2. Existing Frameworks: OMNeT++ has several existing frameworks (such as INET and MiXiM) that include models for wireless communication, sensor networks, and security protocols. You can leverage these frameworks to build your key management protocols.
  3. Extensive Simulation Capabilities: OMNeT++ allows you to simulate various network scenarios with different parameters, giving you the ability to analyze the performance and effectiveness of your key management scheme under different conditions (e.g., network size, mobility, node failures).
  4. Support for Complex Scenarios: You can simulate complex scenarios which are crucial for key management, like node capture, impersonation attacks, and the dynamics of node addition/removal. This helps in assessing the resilience of your key management techniques.
  5. Visualization Tools: OMNeT++ provides simulation visualization tools that help you analyze your simulation results graphically, making it easier to identify performance issues and better understand the interaction between nodes.
  6. Customizability: You can develop custom protocols and adapt the existing libraries to fit your specific needs regarding key management techniques, such as symmetric/asymmetric cryptography, key distribution, and revocation.
Key Management Considerations in WSN
When implementing key management in WSN using OMNeT++, consider the following:
  • Key Generation and Distribution: Determine how keys will be generated and distributed among sensor nodes (for example, centralized vs. decentralized approaches).
  • Key Storage and Revocation: Implement strategies for storing keys securely and revoking compromised keys.
  • Scalability: Ensure that your key management scheme can scale with the number of nodes and network variability.
  • Energy Efficiency: Consider the energy constraints of WSNs; the key management scheme should be lightweight and not drain the nodes' batteries.
  • Security Constraints: Make sure that your protocol addresses vulnerabilities common in WSNs, such as eavesdropping and replay attacks.
  • asked a question related to Wireless Sensor Network
Question
6 answers
I am working on WSNs; opportunistic routing precisely.
Relevant answer
Answer
Simulating a wireless sensor network (WSN) using the Network Simulator 3 (ns-3) involves a series of steps to set up your simulation environment, define your network topology, and run your desired scenarios. Here’s a step-by-step guide to help you get started:
Step 1: Install ns-3
  1. Download ns-3: Get the latest version from the ns-3 website.
  2. Install: Follow the installation instructions provided in the documentation for your operating system. Ensure that you have all the required dependencies installed.
Step 2: Setup the Wireless Sensor Network Environment
  1. Choose a WSN model: ns-3 has several models that can be used to simulate WSNs, such as:Zigbee LoRaWAN IEEE 802.15.4
  2. Install required models: Ensure that any additional models are included in your ns-3 installation depending on your simulation needs.
Step 3: Write Your Simulation Script
  1. Create a new script: In the scratch directory of your ns-3 installation, create a new .cc file (e.g., wsn_simulation.cc).
  2. Include necessary headers: cpp#include "ns3/core-module.h" #include "ns3/network-module.h" #include "ns3/wifi-module.h" // or other relevant modules
  3. Configure the simulation:Define node types: Create sensor nodes and the sink node. Set up the communication technology (e.g., Wi-Fi, Zigbee). Establish the topology (grid, random distribution, etc.). Example basic setup: cppusing namespace ns3; int main(int argc, char *argv[]) { CommandLine cmd; cmd.Parse(argc, argv); // Create nodes NodeContainer sensorNodes; sensorNodes.Create(10); // create 10 sensor nodes NodeContainer sinkNode; sinkNode.Create(1); // one sink node // Setup Wi-Fi or other protocol WifiHelper wifi; wifi.SetStandard(WIFI_PHY_STANDARD_80211b); // More Wi-Fi configuration... // Install network stack wifi.Install(sensorNodes); wifi.Install(sinkNode); // Set up communication (addresses, channels, etc.) // Add applications (data generation from sensors to sink) Simulator::Run(); Simulator::Destroy(); return 0; }
Step 4: Run the Simulation
  1. Build the project: Execute the following command in the ns-3 directory: bash./waf build
  2. Run your simulation: Execute your script using the following command: bash./waf --run wsn_simulation
Step 5: Analyze Results
  1. Log and visualize results: Use ns-3’s built-in tracing system to log performance metrics (e.g., packet delivery ratio, latency).
  2. Export data for analysis: You can generate output files (e.g., CSV) for external analysis in tools like Python or MATLAB.
Step 6: Modify and Experiment
  • Change topology, node configurations, or application model parameters to explore different scenarios.
  • Modify the simulation script as needed to fine-tune your results.
Additional Resources
  • Documentation: Review the ns-3 manual for deeper insights into specific modules and features.
  • Examples: Check the examples directory for sample scripts.
Setting up a WSN simulation in ns-3 can be quite flexible and powerful, allowing you to model various scenarios and analyze different protocols and performance metrics effectively.
  • asked a question related to Wireless Sensor Network
Question
2 answers
Hello everyone,
I am currently investigating the application of Poisson distribution in detecting attacks in wireless sensor networks. Does anyone have any knowledge of studies in this field? I am looking for articles or resources that specifically address this topic. Any help or guidance in this area would be greatly appreciated.
Thank you,
Mehdi Najafi
Master's Student in Computer Networks, Islamic Azad University of Hamedan
Relevant answer
Answer
The Poisson distribution is quite useful in detecting attacks in wireless sensor networks (WSNs) due to its ability to model the occurrence of rare events over a fixed period or space. Here are a few ways it can be applied:
Event Detection: In WSNs, the Poisson distribution can model the arrival of packets or events. If the rate of packet arrival deviates significantly from the expected Poisson distribution, it may indicate an attack, such as a Denial of Service (DoS) attack.
Node Deployment: The spatial distribution of sensor nodes can be modeled using a Poisson point process. This helps in evaluating the coverage and connectivity of the network, which is crucial for detecting and mitigating attacks.
Intrusion Detection: By analyzing the frequency and pattern of network traffic, the Poisson distribution can help identify anomalies that suggest malicious activities. For example, a sudden spike in traffic could indicate a jamming attack.
Trust Models: Poisson distribution-based trust models can be used to assess the reliability of nodes in the network. Nodes that deviate from the expected behavior can be flagged as potentially compromised.
  • asked a question related to Wireless Sensor Network
Question
3 answers
Hello everyone,
I am currently conducting research on Tiny ML in WSN. Specifically, I am seeking information and articles related to in the field of Wireless Sensor Networks and Tiny ML.
Could anyone suggest relevant resources or articles? Any help or guidance would be greatly appreciated.
Thank you,
Mehdi Najafi
Master's Computer Networks Student at Islamic Azad University of Hamedan
Relevant answer
Answer
Artificial Intelligence (AI) and Machine Learning (ML) have experienced rapid growth in both industry and academia. However, the current ML and AI models demand significant computing and processing power to achieve desired accuracy and results, often restricting their use to high-capability devices. With advancements in embedded system technology and the substantial development in the Internet of Things (IoT) industry, there is a growing desire to integrate ML techniques into resource-constrained embedded systems for ubiquitous intelligence. This aspiration has led to the emergence of TinyML, a specialized approach that enables the deployment of ML models on resource-constrained, power-efficient, and low-cost devices. Despite its potential, the implementation of ML on such devices presents challenges, including optimization, processing capacity, reliability, and maintenance. This article delves into the TinyML model, exploring its background, the tools that support it, and its applications in advanced technologies. By understanding these aspects, we can better appreciate how TinyML is transforming the landscape of AI and ML in embedded and IoT systems.
Regards,
Shafagat
  • asked a question related to Wireless Sensor Network
Question
1 answer
Good research topic from telecom
Relevant answer
Answer
  1. Energy efficient routing protocols for WSNs
  2. WSN based health monitoring
  3. WSN attacks and countermeasures
  4. Cross-Layer Optimization for QoS in Wireless Sensor Networks
  5. Latency Reduction in WSNs for Real-Time Data
  • asked a question related to Wireless Sensor Network
Question
2 answers
My concerns are accurate prediction of energy consumption and allocation of residual energy in a wireless sensor network.
Relevant answer
Answer
Have you tried using a simulator?
  • asked a question related to Wireless Sensor Network
Question
2 answers
My name is Apurva Saoji. I am a Ph.D scholar  in Computer engineering in India. I am looking for international expert in reviewing my PhD thesis, "Competitive Optimization Techniques to Minimize Energy Consumption in Wireless Sensor Network," Kindly do the needful.
Relevant answer
Answer
Your advisor should contact some of the authors whose work you have cited in your thesis. Today, with tools like LinkedIn and Research Gate, contacting experts may not be difficult.
  • asked a question related to Wireless Sensor Network
Question
6 answers
Please someone help me to install Aqua-sim-ng to work on UWSN simulation..
Which version of Ubuntu is more preferable to install Aqua-sim-ng. Also share some useful resources that helps to get familiar with Aqua-sim-ng tool.
Relevant answer
Answer
I have a few questions about NetSim's Underwater Acoustic Sensor Networks library:
  1. How can I interface my machine learning algorithm with NetSim?
  2. Specifically, how can I pass the "acoustic measurements" that NetSim logs for each packet to my ML algorithm in Python?
  3. Once Python processes these measurements, it needs to send back certain actions to NetSim.
  4. How can I ensure this NetSim-Python-NetSim-Python loop continues in real-time?
  • asked a question related to Wireless Sensor Network
Question
2 answers
PEH can use in micro and macro system. Is Micro system feasible for PEH for application like medical implant, Wireless Sensor Network or else?
Relevant answer
Answer
Yes, there are several commercially available piezoelectric energy harvesters (PEHs) ranging from micro to macro scale. Here are some examples:
Micro-scale PEHs:
  • PowerFilm by EnerChip:Thin-film PEHs that are flexible and can be integrated into various surfaces to harvest energy from vibrations. Commonly used to power wearables, sensors, and other small electronics.
  • P21 by Perpetua:Micro-scale PEH designed to be embedded into devices and harvest energy from internal vibrations. Well-suited for powering medical implants, wireless sensor nodes, and other low-power applications.
  • EMIJ by EnOcean:Micro-scale PEHs used in wireless switches and sensors to generate the power needed for communication. Popular choice for building automation and Internet of Things (IoT) applications.
Macro-scale PEHs:
  • Innowave PowerPlates:Macro-scale PEHs designed to be installed on surfaces that experience vibrations, such as bridges, floors, and wind turbine towers. Can generate significant amounts of power, which can be used to power lights, sensors, and other devices.
  • Tyndall SCAPE harvester:Macro-scale PEH designed for use in railways. Installed on the tracks and harvests energy from the vibrations of passing trains. The harvested energy can be used to power signals, sensors, and other railway infrastructure.
  • APC by APCEnergy:Macro-scale PEHs designed for use in industrial applications, such as on conveyor belts and production lines. They can harvest energy from the vibrations of machinery and equipment, which can be used to power sensors, actuators, and other devices.
This is not an exhaustive list, and new PEH products are constantly being developed. The best PEH for your application will depend on your specific needs, such as the size, power output, and cost.
infoSources
  1. www.researchgate.net/post/Piezoelectric_energy_harvesterPEH_can_convert_vibration_to_energy_Is_there_any_product_list_Micro-Macro_of_PEH_currently_avaiable_in_market
  • asked a question related to Wireless Sensor Network
Question
2 answers
Hello,
I am examining the performance of underwater wireless sensor networks using the vbf protocol and I want to compare the results with other protocols like vbva or dbf or others.
so i ask how to ?
thanks for your help
  • asked a question related to Wireless Sensor Network
Question
3 answers
Can someone please tell me what is the scope of doing research on Routing in Underwater water sensor networks? Also please give me some suggestions to start my research with Aquasim ng.
Relevant answer
Answer
You can look at this implementation of depth based routing (DBR) for underwater acoustic networks - https://www.tetcos.com/pdf/v13.3/NetSim-UWAN_DBR-protocol-implementation.pdf
  • asked a question related to Wireless Sensor Network
Question
4 answers
Hello all, I am looking to simulate a heterogeneous Wireless Sensor Network (WSN) with energy harvesting devices for my research. The network should consist of at least two classes of wireless sensors: a set of low-energy normal sensors and another set of overlay sensors, which could be high-energy or preferably energy harvesting sensors. The data collected by these sensors should be transmitted to an external fusion node. My goal is to vary properties such as clustering and study network performance and lifetime. Currently, I am using the NetSim simulator, but I welcome directions on using any other simulator as well.
Relevant answer
Answer
To simulate a Heterogeneous Wireless Sensor Network (WSN) with Energy Harvesting Devices, you can follow these steps:
Begin by creating a Sensor Network while enabling the Energy Model feature.
Customize the battery model capacity for specific sensors according to your requirements. Additionally, ensure that energy harvesting is enabled for some sensors.
To implement clustering, you have the option to either write Python code or utilize MATLAB for this purpose. You can then integrate the clustering algorithm with NetSim. Alternatively, you can modify the C-source code within NetSim to incorporate your desired clustering algorithm.
For guidance and reference, you may check NetSim file exchange example titled "Heterogeneous LEACH in WSN" as a practical illustration of interfacing with MATLAB and implementing clustering within the WSN simulation. https://github.com/NetSim-TETCOS/Heterogeneous-LEACH-v13.1/archive/refs/heads/main.zip
  • asked a question related to Wireless Sensor Network
Question
3 answers
- I am trying to understand the factors that affects the well being of the grains and how they can be mitigated by using IoT.
- Also potential challenges one would encounter if they choose IoT method to secure their grains.
Relevant answer
Answer
Hi
Robert Schaefer
thank you so much, currently the Silos and the sheds are used as grain facilities. Routine fumigation is conducted after three months for stocks in storage and all doors and windows (if any) are opened for storage sheds to allow fresh air to circulate through the stocks.
  • asked a question related to Wireless Sensor Network
Question
3 answers
I will be implementing the code on MICA motes.
Relevant answer
Answer
can anyone write an implementation code for SMAC or DMAC or TMAC or XMAC protocol in java or in rebeca language model
thx
  • asked a question related to Wireless Sensor Network
Question
2 answers
I am learning how to use omnet++4.1to simulate zigbee and 802.15.4 protocol, can someone give me some complete code about it on omnet++4.1
Relevant answer
Hello! Please any update for this?
Thank you
  • asked a question related to Wireless Sensor Network
Question
6 answers
When simulating a wireless sensor network in NetSim, what are the parameters to vary to increase/decrease the communication range of the sensors? How is the default range calculated? How can I modify the GUI grid size (environment) in proportion to the communication range?
Relevant answer
Answer
Hello,
You can look through the comprehensive documentation provided by NetSim support. It explains the different nuances involved in obtaining the radio communication range or transmission range.
Here is the link:
Thanks,
Anthony
  • asked a question related to Wireless Sensor Network
Question
2 answers
I am searching a postdoc position in IoT or WSN and some stuff like that.
Relevant answer
Answer
The best is if search the positions in LinkedIn or else, by contacting the professors directly.
  • asked a question related to Wireless Sensor Network
Question
3 answers
I want to create a WSN network where the sensor devices have different properties, especially different energy levels at the simulation start. LEACH protocol is applied to elect cluster heads in this network and analyze the network performance against traditional routing protocols.
  • asked a question related to Wireless Sensor Network
Question
4 answers
How to solve the problem if the sensor is not capable of transmitting data to base station in WSN. Is there any paper talking about this issue?
Relevant answer
Answer
Hi Heba,
I'm not sure if I understand the question but I found the following paper, maybe could be useful as starting point:
Bottleneck around Base Station in Wireless Sensor Network and its Solution (https://doi.org/10.1109/MOBIQW.2006.361777)
  • asked a question related to Wireless Sensor Network
Question
3 answers
If anyone know a literature available that justify, how much minimum transmission amplification energy is required for a node to transmit data at certain distance. So, accordingly, networks amplification energy can be set.
Relevant answer
Answer
The answer to your question is dependent on many things, not the distance only. In addition to the distance, it also heavily dependent on the RF frequency band, the propagation condition, the Tx/Rx techniques, and so on. For instance, regarding the propagation condition, is it used in-door or out-door ? Is there a line of sight (LOS) propagation path, or no LOS path at all ? Is the Tx/Rx in fixed location or in moving ? Talking about the RF frequency band, for instance, if it is working in the millimeter wave band (e.g. 60-GHz band), there is a significant extra power loss in the air. Regarding to the used techniques, what kind of modulation scheme is used ? Is there any error correction coding technique used ? These things greatly affect the answer to your question. Good luck.
  • asked a question related to Wireless Sensor Network
Question
2 answers
Does it have some work of general amount of faulty data in WSN (Wireless Sensor Network) or any kind of sensors?
I would like to generate some sensor's faulty data for machine learning training, but I don't know at which amount I should stop (25%,50%,...) ?
Relevant answer
unfortunately there's no clear response, specially for unsupervised algorithms, to this question its depends on situation but when it comes to practice, 1% seems to be the adequate rate.
  • asked a question related to Wireless Sensor Network
Question
4 answers
I am currently trying to apply a hybrid metaheuristic method into clustering of WSN through MATLAB, but it is very confusing, and I come across many errors. Is there any example code that I can use it as a reference for my research?
Main Idea: Selecting cluster head using a hybrid metaheuristic method.
Relevant answer
Answer
There are several options in NetSim - dynamic clustering, LEACH, Pegasis, SOM, etc. See https://tetcos.com/file-exchange.html
  • asked a question related to Wireless Sensor Network
Question
8 answers
It seems that the term Wireless Sensor Networks (WSN) has been there in the literature for the last 20 years or so, and when many researchers thought it will disappear when the term Internet of Things (IoT) was coined, they seemed wrong about it and now more and more papers are talking about the two terms in the same papers, so where does the WSN domain ends and where does the IoT begins in the entire big picture?
Relevant answer
Answer
WSN is an enabling technology for the IoT. WSN is a network compromising of sensor nodes deployed to measure the environment. IoT on the hand may consist of both sensors and actuators. WSN is not necessarily connected to the Internet while IoT is always connected to the Internet. I will suggest reading a book by Adam Dunkels "Interconnecting Smart Objects with IP".
  • asked a question related to Wireless Sensor Network
Question
7 answers
I want to detect faults in WSN working using ns2 TCL code.
I have mannasim framework installed on my PC, is there anyone who has already worked on this concept and can help me out so that I should be able to calculate faults in WSN in an energy efficient manner.
Relevant answer
Answer
Any idea about how to write code for Fault detection in WSN using Deep learning??
  • asked a question related to Wireless Sensor Network
Question
1 answer
I have obtained a source code on the WSN LEACH protocol, the link is shared below, I want to calculate the overall efficiency of the LEACH protocol. Is it possible to create a formula utilising no. of nodes alive, dead, packet send to database, and total energy.
matlab-leach-family/leach.m at master · mahedee/matlab-leach-family (github.com)
Relevant answer
Answer
You would need a network simulator like NetSim to get that kind of data. You can see https://tetcos.com/iot-wsn.html and https://tetcos.com/pdf/v13.1/LEACH_in_WSN_v13.1.pdf
  • asked a question related to Wireless Sensor Network
Question
12 answers
What are the least complex encryption algorithms that can be used in WSN, to encrypt the data sent from it.
Relevant answer
Everyone should know what the encryption algorithm can do, using the encryption algorithm to encrypt the data communication process is the most common security means. By using these means three purposes can be achieved:
1. Data confidentiality prevents user data from being stolen or leaked;
2, data integrity prevents the data transmitted by the user from being tampered with;
3, communication between contact, ensure the source of legal data;
  • asked a question related to Wireless Sensor Network
Question
2 answers
wireless sensor networks
Relevant answer
Answer
Dear Chindiyababy Uthayakumar,
Take a look at the following sources below:
QKD – How Quantum Cryptography Key Distribution Works:
_____
Quantum key distribution:
What are the cybersecurity risks to current cryptographic techniques?
Our cybersecurity infrastructure requires two different functions: authentication and confidentiality. Authentication allows distant users to trust their counterpart and validate the content of their exchanges.
It is mostly implemented by public-key signature schemes. Confidentiality is required for any exchange of private information. It is often performed in a two-step process. First the users have to exchange a common secret key.
This relies on another public-key protocol, the key exchange mechanism. The secret key is then used in a symmetric key encryption scheme. Both functions therefore depend on similar cryptographic techniques, known as asymmetric or public-key cryptography.
Cybersecurity is much more than the underlying cryptography. All current hacks and security failures do not come from a weak cryptography, but rather from faulty implementation, social engineering and the like. Today, we trust the cryptography, and fight to get the implementation right.
Unfortunately, this is about to change. The point of cryptographic vulnerability today is public-key cryptography, based on algorithms such as RSA or Elliptic Curve, which are used both to authenticate data and to securely exchange data encryption keys.
The very processing power of the quantum computer can solve these mathematical problems exponentially faster than classical computers and break public-key cryptography.
This means that the currently used public-key cryptosystems are not appropriate to secure data that require long-term confidentiality. An adversary could indeed record encrypted data and wait until a quantum computer is available to decrypt it, by attacking the public keys.
We need quantum-safe cryptography today.
_____
Quantum Key Distribution: A Networking Perspective:
_____
The case for Quantum Key Distribution A proven system for future-proof data protection.
_____
  • asked a question related to Wireless Sensor Network
Question
4 answers
I started my research in improving energy efficiency and lifetime of WSN using ML/DL.
Thank you in advance.
Relevant answer
Answer
This is an example in NetSim of using different unsupervised learning algorithms to increase the WSN network lifetime
Two more examples to increase the life time but not exactly ML based
  • asked a question related to Wireless Sensor Network
Question
5 answers
Clustering in WSN has been done to increase the energy conservation
Relevant answer
Answer
I think, it is K-Means Clustering.
  • asked a question related to Wireless Sensor Network
Question
1 answer
Matlab / nesC or Leach protocol simulation with cooja simulator.
Relevant answer
Answer
LEACH simulation using NetSim is available at https://tetcos.com/file-exchange.html. You will need to modify it for Cooja.
  • asked a question related to Wireless Sensor Network
Question
17 answers
Sir, how can I calculate a coverage area in a wireless sensor network based on nodes Residual energy ?
1. In sensor network i'm deploying sensors in random manner.
2. After deploying it, how can I cal. the coverage area for each sensor nodes based on it's residual energy?
3. Is there any formula to cal. the coverage if there is just those formulas given.
NOTE:- I want formula to cal. coverage area for the sensor node 
Relevant answer
Answer
If you find the answer, please give it to me
  • asked a question related to Wireless Sensor Network
Question
7 answers
I am in the phase of deciding the plat form for my research.
Relevant answer
Answer
GNS3 is for cisco routing protocol. You can only use cisco ios in GNS3.
  • asked a question related to Wireless Sensor Network
Question
6 answers
My project is about creating an energy efficient routing protocol for Wireless Sensor Networks. I wanted to ask, is Omnet++ better for this or NS2, NS3?
Relevant answer
Answer
A good option is NetSim Academic version.
  • asked a question related to Wireless Sensor Network
Question
4 answers
I want to log the residual energy of a node and use this information in my routing protocol (AODV). So that it can choose the path that consumes the least energy. How can I do this?
Relevant answer
Answer
The different currents available in the Sensor Battery model are: (i) Transmit-Current (ii) Receive-Current (iii) IdleMode-Current, and (iv) SleepMode-Current The energy consumed in each of these activities would is computed as:
  • Transmit-Energy-Consumed = Transmit-Current * Voltage * Time-for-which-node-transmits-packets
  • Receive-Energy-Consumed = Receive-Current * Voltage * Time -for-which-node-receives-packets
  • IdleMode-Energy-Consumed = IdleMode-Current * Voltage * Time-in-Idle-Mode
  • SleepMode-Energy-Consumed = SleepMode-Current * Voltage * Time-in-sleep-mode
Total-Energy-Consumed = Transmit-Energy-Consumed + Receiver-Energy-Consumed+IdleMode-Energy-Consumed + SleepMode-Energy-Consumed Here Time-for-which-node-transmits-packets is calculated with the formula Time-for-which-node-transmits-packets = PHY_OUT - CARRIER_SENSE_END of each packet. The PHY_OUT and CARRIER_SENSE_END timestamps can be got from then Event Trace.
  • asked a question related to Wireless Sensor Network
Question
9 answers
A new methodology is needed for the router deployment. Coverage and lifetime are also considered for this technique.
Relevant answer
Answer
this paper will provide you some guidence
  • asked a question related to Wireless Sensor Network
Question
2 answers
Hi community, are there some previous successful literature works that combine multiple path selection and ACO heuristic in wireless sensor networks?
Relevant answer
Answer
MATLAB has some ACO algorithms, and you can link MATLAB with NetSim easily.
Some examples (location aware routing, pegasis, clustering etc) in NetSim are available in https://tetcos.com/file-exchange.html.
I would suggest you try out an free evaluation before deciding since these are commercial tools.
  • asked a question related to Wireless Sensor Network
Question
1 answer
In the scholar community, we always try to oversee some research obstacles. For the industrials or private manufacturers, this is easy because R&D is funded. In the opensource R&D, how can we do to permit the progress of the research?
Relevant answer
Answer
In order to permit the progress of non-funded open source research, we must enhance and empower our network of research scholars, similar to our interest.
Twitter is the primary medium for identifying, debating, and disseminating open source research. It’s full of practitioners who are eager to engage in discussions with others about best methods and practices, and to share their own work and that of others. Having a Twitter account will allow you to follow researchers so that you can learn from their work, as well as ask questions and engage in discussions with like-minded researchers.
Having a healthy scholar network we may easily get the solutions of such obstacles.
Some of the useful Twitter lists of researchers include:
Gisela Pérez de Acha’s “OSINTers”
Rawan Shaif’s “OSINT”
Bianca Britton’s “Open Source”
Julia Bayer’s “OSINT research verify
Regards,
  • asked a question related to Wireless Sensor Network
Question
5 answers
Should be able to use existing or custom MAC protocols.
Relevant answer
Answer
Hello, NS-3 is Python-based tool, please you can check file attached
---
Simulation Tools for
Underwater Sensor
Networks (UASN)
Presented by : Marwa Salayma, Research Associate
Project team members: Yvan Petillot, Muaro Dragone, Rahul Mourya & Marwa Salayma
Heriot-Watt University, Edinburgh Center for Robotics
BTS 2019
  • asked a question related to Wireless Sensor Network
Question
7 answers
I'm looking for journals in which I can publish some works related to the routing protocols and new techniques in WSNs field.
Relevant answer
Answer
IEEE , Elsevier or Springer journals may be good for this kind of publication.
  • asked a question related to Wireless Sensor Network
Question
5 answers
We have currently a project about precision agriculture. We will establish a WSN environment, and we will use the data coming from sensors and we will apply some machine learning algorithms to these data to give some recommendations. But we haven't found any dataset that will help us in this goal. Are there any available datasets that related to crop growth with respect to temperature, humidty soil moisture etc?
Relevant answer
Furkan Göksel Have got the dataset?? If yes then kindly share same with me even I am in search of same for my project....
  • asked a question related to Wireless Sensor Network
Question
1 answer
Where else do Selective Forwarding Attacks exists aside from Routing for Low Power and Lossy Network (RPL), Mobile Ad Hoc Network (MANET) and Wireless Sensor Network (WSN)?
Relevant answer
Answer
I think selective forwarding attacks existed only for RPL, MANET, and Wireless Sensor Network
  • asked a question related to Wireless Sensor Network
Question
5 answers
I'm a PGRs student, I would like to implement a new clustering algorithm using NS3, I have basic information in programming skills and I read about the object oriented c++ and NS3, I tried to create my network and deploy the node and the sink, is anyone has a good idea on how I can do this is NS3 or how I can start this, i'm so confused and do not know what can one do. Thank you for helpingv.
Relevant answer
Answer
Did you find anything that can help me, too?
  • asked a question related to Wireless Sensor Network
Question
3 answers
I have developed an algorithm and need support for Simulation on NS2 or MATLAB
  • asked a question related to Wireless Sensor Network
Question
4 answers
Hi,
I am a researcher in Networks (computer science department) at Sohag university, Egypt
I am looking for a researcher from china in the same field to cooperate with to get a grant
Can you help me , please.
Thanks
Relevant answer
Answer
do you have any funding ?
  • asked a question related to Wireless Sensor Network
Question
2 answers
I want to implement an arduino-XBee-DHT11 WSN and implement LEACH protocol
Relevant answer
Answer
LEACH is a hierarchical protocol in which most nodes broadcast data to cluster leaders, who aggregate and compress the data before forwarding it to the base station (sink). The cluster head then establishes a timetable for each node in the cluster to send data.
Take a look at the following links, which may be of assistance:
  • asked a question related to Wireless Sensor Network
Question
4 answers
Can any scholar help me provide the Monte Carlo positioning matlab code for mobile sensor networks? E.g. MCL MCB
  • asked a question related to Wireless Sensor Network
Question
4 answers
This is part of my dissertation
Relevant answer
welcome!
If you want to manage the tasks of the wireless sensor networks you can use use the proper controller for the wireless sensor nodes. These controllers ranges from simple Arduino board to strawberry board. The microcontroller can be programmed to control the functions of the sensors mostly sampling and acquiring the signals of the sensors and conveying them to access point of the WSN.
There are also the problem of routing the data from the nodes to access point.
As the nodes are normally battery operated then one has to take care of the power management in the network.
For more information please follow the papers:
Best wishes
  • asked a question related to Wireless Sensor Network
Question
3 answers
Internet of things (IoT) has emerged as a technology that builds on other technologies such as machine-type communication, cognitive radios, and wireless sensor network. Owing to the requirement of energy constraints for IoT jamming might not be a good choice to counter a strong eavesdropper. Therefore, is the jamming technique beneficial for IoT?
Relevant answer
Answer
Dear Anil Kamboj,
Look the link, maybe useful.
Regards,
Shafagat
  • asked a question related to Wireless Sensor Network
Question
9 answers
IoT networks are somewhat blurry, as there is no global standard to define network architecture, to what extents the MANET, VANET and WSN belong to IoT? What are criteria that must be satisfied in these networks to call it IoT?
  • asked a question related to Wireless Sensor Network
Question
5 answers
Recommend a Network Simulator with easy help available like Matlab and Other softwares have.
Relevant answer
Answer
Dear Jitander, You can try softwares like OptiSystem, OptSim for underwater network simulation.
  • asked a question related to Wireless Sensor Network
Question
10 answers
I want to know about ML algorithms that are used to train the data set: e.g. in routing protocols in WSN.
Relevant answer
Answer
data mining techsnique
  • asked a question related to Wireless Sensor Network
Question
5 answers
I am in search of the current trend in the energy efficient routing protocols for WSN to be simulated using MATLAB/Simulink platform.
Relevant answer
Answer
Hierarchical routing protocols in WSN are defined to reduce energy consumption by aggregating data and to reduce the transmissions to the Base Station. LEACH (Low Energy Adaptive Clustering Hierarchy) Protocol is considered as the most popular routing protocol that use cluster based routing in order to minimize energy consumption. Matlab can be used as a simulation platform to emulate LEACH protocol and its variants.
See also:
  • asked a question related to Wireless Sensor Network
Question
5 answers
Hi,
I want some help
I want a matlab code for throughput in deec protocol and it's variants in wsn (wireless sensor network)
thanks,
Relevant answer
  • asked a question related to Wireless Sensor Network
Question
5 answers
Hi!
I have started working on a project "floating sensor networks (FSN) for continuous water quality monitoring". For which I need simulator to measure Like, pH, Turbidity, Salinity, Temperature, DO, EC, etc. Rather than going with real time deployment of FSN for measuring water quality sensors.
Objectives of the Project:
A. Water Quality Measurement
B. Reliable Data Transform
C. Congestion Control
D. Deployment Strategy
E. Energy Harvesting
All objectives should be carried out simulation based. Kindly suggest whether this work will done via simulation design (either partially or whole) 
Thanks in Advance.
Relevant answer
Answer
Dear Sarang, did you find any suitable simulation software? We also need it for a small project we are working on
  • asked a question related to Wireless Sensor Network
Question
2 answers
I need to know what is the approximately power cost for node in wireless multimedia sensor networks in NS3 simulator?
1- power cost for transmission
2- power cost for any image processing
3- power cost for image capturing
Thanks in advance
Relevant answer
Answer
Thank you Aparna Sathya Murthy so much.
  • asked a question related to Wireless Sensor Network
Question
7 answers
What is it that Routing protocol designed for WSN shall deliver(in addition to energy efficiency) so that it well suited for IoT integration?
Relevant answer
It depends on the IoT scenarios you want to deploy. "Per si", a WSN can already be part of an IoT scenario. The definition of IoT considers the possibility of devices communicating with Internet services. In other words, the cyber physical devices sending data to the Internet. Thus, once you have a WSN exchanging data with the Internet, you will not need to integrate it with an IoT scenario, because it is already part of an IoT application.
  • asked a question related to Wireless Sensor Network
Question
8 answers
Please suggest journals for publishing a review article related to routing protocols in Wireless Sensor Network
Relevant answer
Answer
  • asked a question related to Wireless Sensor Network
Question
5 answers
Energy consumption in WSN
Relevant answer
welcome!
The distributed wireless sensor network consumes less transmission energy than the central network. May be the wireless sensor network based on hybrid network configuration is the optimum one concerning the transmission energy and the processing energy in the nodes. Using cluster heads and forming smaller sized central networks save both transmission energy and processing energy.
Please you may get more information by following the paper:
Best wishes
  • asked a question related to Wireless Sensor Network
Question
8 answers
We are on the way to publish a new study in the wireless sensor networks security field , and after a deep research we read about SENSOR journal , does it have a high rank ?
Relevant answer
Answer
Yes it is a good journal for your article.
  • asked a question related to Wireless Sensor Network
Question
3 answers
I'm working on a new version of Yen's algorithm which selects optimal k numbers of shortest paths through the network. I want to add this algorithm in NS3 and used it as the major or completion routing protocol for a mesh WSN network. I'm opening to collaborate with researchers and publish future work together.
Relevant answer
Answer
Thank you for sharing this question
  • asked a question related to Wireless Sensor Network
Question
5 answers
PS: by "Predict the energy level of battery operated sensor node", I want to mean that I am willing to predict the amount of energy the sensor node will have at a given point of time. In other words, I am interested in building some regression model for time series forecasting of the amount of energy a sensor's battery will have over the next few hours/days.
The parameters which I could thought of are as follows.
1. L_volt and H_volt of battery
2. L_curr and H_curr in the circuit
3. Energy consumption rate
4. Ambient humidity, temperature and altitude
5. Battery discharge Cycle.
6. Magnitude of solar panel's, LUX, current and voltage .
Please let me know some other parameters, which I can add to the above list.
I thank you all in advance.
Relevant answer
Answer
Predict the energy level of battery operated sensor node
  • asked a question related to Wireless Sensor Network
Question
6 answers
Hi Community, I'm facing the issue of integration/compiling a new routing protocol in a WSN simulator. The final goal is to successfully add, configure this routing protocol in hardware devices like RPi. Is there someone who can provide a guideline to do that, or just some tips?
Thanks again.
Relevant answer
You need an operating system when you have more than one application on the computer. So, normally one uses for such small computers free real time operating systems free RTOS.
Best wishes
  • asked a question related to Wireless Sensor Network
Question
30 answers
Suitable Scopus Journal for wireless sensor network
Relevant answer
Answer
Fast Scopus Indexed publication in Machine Learning
  • asked a question related to Wireless Sensor Network
Question
3 answers
I want a matlab code for distributed energy-efficient clustering Protocol (DEEC) in wireless sensor network (WSN) with explanation please
thanks
Relevant answer
Answer
I do have that code with Python PL.
If your interested, please keep me posted.
Regards .
  • asked a question related to Wireless Sensor Network
Question
5 answers
In this equation how do I choose p (prob of cluster head)? I need to know what value I have to choose.
Relevant answer
Answer
This is for homogeneous environment, what will be for heterogeneous environment?
  • asked a question related to Wireless Sensor Network
Question
4 answers
hello all
I have started a research on range-free localization in wireless sensor networks using artificial neural networks. would you please introduce some great researchers in this field for citation?
Relevant answer
Answer
Very interesting Mr. Mohamed-Mourad Lafifi. Thank you for sharing the files.
  • asked a question related to Wireless Sensor Network
Question
3 answers
Hi everyone, does anyone know where can I find Matlab codes for Mobile Agent routing algorithm simulation in WSN? I found difficulties found anywhere.
Thank you
Relevant answer
Answer
Thank you for your response Ali Rezaee Khelifa Said
  • asked a question related to Wireless Sensor Network
Question
4 answers
I'm trying to solve the energy issue conservation in WSNs and I want to use the Markov technique to predict this conservation and demand the routing protocol to select an optimal path among a certain number of them.
If someone has an idea or tips to exploit this process, I'm open to discussing it.
Kindly!
  • asked a question related to Wireless Sensor Network
Question
2 answers
I am using matlab simulator and doing paper selfish node detection based on average retransmission number.
Some factors determine selfish node in wsn
-If energy is not sufficient to forward income packet
-if buffer size is full
-If distance is long
-Media(transmission)
Relevant answer
Answer
U can try this for 1000*1000 area with 400 no. of nodes and 40m between any 2 nodes.
>> clear
clf
n=400;
figure(1);
clf;
hold on;
L=1000;
R=400;
x = rand(1, 50000)*1000;
y = rand(1, 50000)*1000;
minAllowableDistance = 40;
numberOfPoints = n;
% Initialize first point.
xloc = x(1);
yloc = y(1);
% Try dropping down more points.
counter = 2;
for k = 2 : 50000
% Get a trial point.
thisX = x(k);
thisY = y(k);
% See how far point is away from existing keeper points.
distances = sqrt((thisX-xloc).^2 + (thisY - yloc).^2);
minDistance = min(distances);
if (minDistance >= minAllowableDistance)
xloc(counter) = thisX;
yloc(counter) = thisY;
counter = counter + 1;
end
if counter > numberOfPoints
break
end
end
scatter(xloc, yloc,'k', 'filled');
for i=1:n
text(xloc(i),yloc(i),num2str(i));
end
Coord=[xloc;yloc];
Coord=(Coord)';
Nseq=ones(1,n)*6;
cmatrix=randomGraphFromDegreeSequence(Nseq);
gplot(cmatrix,Coord,'-*')
>> gplot(cmatrix,Coord,'-*')
  • asked a question related to Wireless Sensor Network
Question
4 answers
I'm currently learning about rate-based congestion control for industrial wireless sensor network. Suppose there is a network consisting of several sensor nodes and one coordinator node connected in star topology (coordinator as a center of topology). Periodically, sensor nodes will transmit sensing data to the coordinator node.
The algorithm that I'm working on is designed to change the transmission rate of each sensor nodes every time a congestion occur (coordinator receive too many packets within a short time, hence making the receiving buffer overflows). As this algorithm is intended for industrial wireless sensor network, I want to try to combine them with WirelessHart and ISA100.11a protocol. As both protocols are designed over IEEE802.15.4 protocol with Time-Slotted Channel Hopping (TSCH) in its Link Layer, the transmit rate will be dependent on the timeslot size in slotframe. Hence my current conclusion is that: during network operation, if my algorithm wants to change a node's transmit rate, my algorithm must be able to change the TSCH timeslot size. Is it possible to implement my algorithm to TSCH devices currently on market? Is it recommended? Or does my conclusion not correct?
Relevant answer
Answer
Thank you Aparna Sathya Murthy for the reference given. The protocol itself is still in software simulation phase, with many things still being considered and have not been implemented in hardware simulation or real case.
Thank you Senslab Homa for the reference given.
Thank you Yuemin Ding for your response. I was not aware of this system manager function before. I will recheck again my case scenario and simulation to better portray the real implementation.
  • asked a question related to Wireless Sensor Network
Question
3 answers
The interested one.
Relevant answer
Answer
Dear Aparna Sathya Murthy, Thanks so much for your response!
  • asked a question related to Wireless Sensor Network
Question
9 answers
I am very interested in this paper.
Relevant answer
Answer
I will send you a complete source code for securing the Sink node using anomaly detection approach.
please send you email.
regards
  • asked a question related to Wireless Sensor Network
Question
4 answers
Zigbee and Xbee are RF modules used in mesh wireless sensor networks. The price of Xbee modules are almost twice as lesser than that of Zigbee modules. is there any unseen drawbacks over the lesser price matter
Relevant answer
Answer
Please go through this portal. It is a much rich with what are you looking for .
Regards
  • asked a question related to Wireless Sensor Network
Question
7 answers
I am also interested inthis area.
Relevant answer
Answer
  • asked a question related to Wireless Sensor Network
Question
4 answers
I am also interested to do this.
Relevant answer
Answer
Which domain of security are you deal with?
If Anomaly detection please let me know .
regards
  • asked a question related to Wireless Sensor Network
Question
1 answer
priority-based routing protocol for a wireless sensor networks in python.
Relevant answer
  • asked a question related to Wireless Sensor Network
Question
9 answers
Hello. My final year project for my bachelors degree is creating an energy efficient routing protocol for WSN. I decided to work on LEACH as I had hoped that I would find more documentations for this code. I added a few minor changes in a code I found for LEACH and I was hoping on improving it by creating an algorithm that enabled me to elect the cluster head by calculating the threshold value of the nodes in the network rather than by simple election of nodes as cluster heads because of round circulation.
What I'm saying is that it is extremely difficult to adapt my code according to threshold requirements. Could anyone help me out if I provided my code for LEACH?
Relevant answer
  • asked a question related to Wireless Sensor Network
Question
6 answers
Can anyone hepl me step by step in simulation using NS 3, Congestion control in WSN.
Please guide me. TIA
you can send me some related document at ersnehlata70@gmail.com
Relevant answer
Answer
Actually, this link has done it for your network
  • asked a question related to Wireless Sensor Network
Question
5 answers
Guide me , how to use and learn simulation on NS3 for Wireless Sensor Network.
The problem of my interest is Congestion Control.
Relevant answer
Answer
Actually, this link has done it for your network
  • asked a question related to Wireless Sensor Network
Question
7 answers
I am looking for a wireless network simulator to test a query classification algorithm.
I have already tested NS-2 (https://ns2simulator.com/ns2-download/), It's very complicated
Relevant answer
Answer
TOSSIM is simple and efficient simulator which is based on nesC (Network Embedded Systems
GLomoSIM
UWSIM
  • asked a question related to Wireless Sensor Network
Question
17 answers
Dear all,
Can you please tell me the ways to measure differential pressures across utility sides of the heat exchangers.
Unlike process side, the utility side pressure drops may not be measured. What can be done in such cases ? Are there indirect ways to measure it?
Thank you.
Relevant answer
Answer
There are many gages all over the place on most refinery units. Many send signals to the control room and many others must be read in the field. Each gage will have a small bias/error they are rarely identical. So if you want an accurate indication of the pressure drop from field gages you do a survey of the pressure at all points of interest with the same gage to eliminate the error between different gages
  • asked a question related to Wireless Sensor Network
Question
3 answers
The flash flood early warning system is based on a wireless sensor network. So my question is how do you approach the implementation of said so system?
Relevant answer
Answer
Flash flood detection through a multi-stage probabilistic warning system for heavy precipitation events
2011, Advances in Geosciences
📷Lorenzo Alfieri
A New Application of Domain Specific Modeling Towards Implementing an Early Warning Service
Published 2010
📷Syed Imran
  • asked a question related to Wireless Sensor Network
Question
10 answers
I want to simulate WSN for localization both for range-based (ultrsound) and range-free (RSSI). I want to measure the accuracy of each sensor and also the energy consumption. Which simulator is suitable for these work? Thank you for your reply.
Relevant answer
Answer
Omnet++ and OPnet are the best for WSN localization.
Regards
  • asked a question related to Wireless Sensor Network
Question
4 answers
I am currently working on a project that is based on optimizing cluster head (CH) selection for energy-efficient wireless sensor networks (WSNs) using evolutionary search techniques. For the purpose of comparison with classical baseline algorithms in this subject, I also want to compare my results with LEACH and LEACH-C. I have successfully implemented LEACH algorithm. However, I am not sure how to implement the LEACH-C algorithm.
This is the original paper that LEACH-C is proposed: Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on wireless communications, 1(4), 660-670.
In this paper, it was mentioned that the Simulated Annealing (SA) algorithm was used to determine clusters. It was also stated that SA selects among nodes having energy above the average energy. However, I cannot see any detail about how the neighborhood structures and the algorithm parameters were determined. Besides, I saw many other papers using LEACH-C in their experimental work, however, I could not find any guidelines for how they were implemented as well.
My question is that is there a standard to implement a LEACH-C algorithm? Thank you for any help you can provide.
Relevant answer
Answer
Goran Popovic thanks again. So, we cannot speak of a single standard LEACH-C algorithm. Rather, it is constructed by an algorithm designer. For the sake of fair comparisons, it would be better if the papers mentioned details of how they used LEACH-C.
  • asked a question related to Wireless Sensor Network
Question
9 answers
i design a neural network based WSN to achieve real time operation, i simulate the part of neural in matlab and the issue of WSN in a network simulator. how can i start with neural part?
and is there any effect in the design of neural network due to using it in a WSN?
thanks
jannat
  • asked a question related to Wireless Sensor Network
Question
3 answers
I submitting my paper in a newspaper. the journal requires that I declare 4 experts in my domain (wireless sensor networks). so I'm looking for 4 experts: name, first name, affiliation and institutional email addresses (e.g. university, research centre, governmental or business email addresses).
Thx.
Relevant answer
I might know the duty of the experts but it is better if we can get the answer from the editor of the journal as he is the one who is asking you as he needs 4 experts in WSN domain?
Best Regards,
Desalegn Abraha
  • asked a question related to Wireless Sensor Network
Question
2 answers
i need to build a WSN using nRF24L01 (Which is the only available transceiver in my country ) with LEACH protocol (i know the theory of the protocol ) but i don't know how to implement it .
Relevant answer
Answer
prof.Fawaz , this paper is a great help , although i'm new to this field and i'm not sure how to implement it
  • asked a question related to Wireless Sensor Network
Question
4 answers
Is there any existing simulation code for Trust Management System simulation in WSN or IoT? Can you please suggest some resources regarding this? I want to simulate the existing system and compare different frameworks.
Thanks
Relevant answer
Answer
Simulators are used to calculate trust values like matlab,ns2 and omnet++
  • asked a question related to Wireless Sensor Network
Question
8 answers
Addition of Codes in the OMNET++
packages..
Relevant answer
Answer
How to add application layer protocols to Omnet++
  • asked a question related to Wireless Sensor Network
Question
10 answers
I'm working on WSN. I want to do clustering and aggregation, and I want to optimize the results. Does OMNeT++ support this? 
Since I'm a beginner with this tool, can anyone provide any ideas on how to learn about this tool? Where can we add our code?
Relevant answer
Answer
how to install omnett++ ?
Follow these few steps:
Download the desired version.
Open the OMNeT++ folder.
Open the mingwenv file
Tab any key to continue /2
Type "./configure" and hit the enter key
Type "make" and hit the enter key
Type "omnetpp" and hit the enter key
  • asked a question related to Wireless Sensor Network
Question
5 answers
i want the help to simulate it on ns2
-i have alrady modified AODV file to set the promoscuous mode
- i want count the packets forwarded and received by nodes
-
Relevant answer
Answer
There are many resources to assist how to implement your protocol on NS2.
Please check below link
  • asked a question related to Wireless Sensor Network
Question
4 answers
I need a source code of any location-based routing protocol for mobile sensor networks such as Geographical adaptive fidelity(GAF), Diagonal GAF(DGAF),... for comparison, and evaluation with my approach.
Relevant answer
Answer
  • asked a question related to Wireless Sensor Network
Question
1 answer
In WSN, different simulator e.g., MATLAB, NS-2 are used with the same simulation parameters, results will be the same or not?
if we use the same simulation parameters for LEACH Protocol
1.use MATLAB for simulation
2. use NS-2 for simulation
In two cases, results will be the same or not e.g., network lifetime?
Relevant answer
Answer
If parameter values are taken the same in both the platforms, the results should remain almost the same. Some variation may be observed but the trend and the effects will be the same.