scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2012"


Journal ArticleDOI
TL;DR: An overview of the Internet of Things for people with disabilities is provided and different application scenarios are considered in order to illustrate the interaction of the components of theInternet of Things.

542 citations


Journal ArticleDOI
TL;DR: The coverage problem is classified from different angles, the evaluation metrics of coverage control algorithms are described, the relationship between coverage and connectivity is analyzed, typical simulation tools are compared, and research challenges and existing problems in this area are discussed.

523 citations


Journal ArticleDOI
TL;DR: Various types of attacks and countermeasures related to trust schemes in WSNs are categorized, the development of trust mechanisms are provided, a short summarization of classical trust methodologies are given and an open field and future direction with trust mechanisms in W SNs is provided.

342 citations


Journal ArticleDOI
TL;DR: A comprehensive survey and comparison of routing protocols in WSNs from classical routing protocols to swarm intelligence based protocols and a comparison of a representative number of classical and swarm based protocols are presented.

274 citations


Journal ArticleDOI
TL;DR: An efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses and is extremely suitable for use in distributed multi- server architecture.

265 citations


Journal ArticleDOI
TL;DR: The IoUT is introduced and its main differences with respect to the Internet of Things (IoT) are outlined and the proposed IoUT architecture is described.

252 citations


Journal ArticleDOI
TL;DR: A data compression scheme is one that can be used to reduce transmitted data over wireless channels, which leads to a reduction in the required inter-node communication, which is the main power consumer in wireless sensor networks.

243 citations


Journal ArticleDOI
TL;DR: The original proposal, TRIP, aimed to quickly and accurately distinguish malicious or selfish nodes spreading false or bogus messages throughout the network, and a set of design requirements for trust and reputation models specifically applicable to VANETs are suggested.

236 citations


Journal ArticleDOI
TL;DR: This paper proposes a new password-based user authentication scheme in hierarchical wireless sensor networks that achieves better security and efficiency as compared to those for other existing password- based approaches.

213 citations


Journal ArticleDOI
TL;DR: A frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user.

206 citations


Journal ArticleDOI
TL;DR: This work provides an overview of existing multicast routing mechanisms based on routing categories that helps in multimedia communication over MANETs and point to directions for future research and development.

Journal ArticleDOI
TL;DR: All the security requirements and all the goals an ideal password authentication scheme should satisfy and achieve are defined and presented through six currently available dynamic ID based remote user authentication schemes.

Journal ArticleDOI
TL;DR: An overview of classical RL and three extensions, including events, rules and agent interaction and coordination, to wireless networks and how several wireless network schemes have been approached using RL to provide network performance enhancement are discussed.

Journal ArticleDOI
TL;DR: This paper proposes a secure and privacy preserving keyword searching (SPKS) scheme, which allows the CSP to participate in the decipherment, and to return only files containing certain keywords specified by the users, so as to reduce both the computational and communication overhead in decryption for users.

Journal ArticleDOI
TL;DR: A trust management protocol for mission-driven group communication systems in mobile ad hoc networks is developed and analyzed using hierarchical modeling techniques based on stochastic Petri nets to identify the optimal length of a trust chain among peers in a trust web that generates the most accurate trust levels without revealing risk.

Journal ArticleDOI
TL;DR: This paper identifies the main specifications of real-time data management and presents the available real- time data management solutions for WSNs, in order to discuss them and identify some open issues and provide guidelines for further contributions.

Journal ArticleDOI
TL;DR: This paper is the first comprehensive review of existing bandwidth aggregation techniques in heterogeneous wireless networks and provides important lessons and information from current bandwidth aggregation solutions, which can be used to guide the development of more efficient bandwidth aggregation approaches.

Journal ArticleDOI
TL;DR: EBC is based on the concept of betweenness centrality, which has been first introduced in the context of social network analysis, and measures the ''importance'' of each node in the network, and outperforms the competitor ones in all observed cases.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed schemes effectively improve the storage and access efficiencies of small files, compared with native HDFS and a Hadoop file archiving facility.

Journal ArticleDOI
TL;DR: The proposed Building Management Framework (BMF) provides powerful abstractions that capture the morphology of buildings to allow for the rapid development and flexible management of pervasive building monitoring applications.

Journal ArticleDOI
TL;DR: A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks and is susceptible to many application-dependent and application-independent attacks.

Journal ArticleDOI
TL;DR: A vulnerability analysis of SAODV is conducted to identify unresolved threats to the algorithm, such as medium access control layer misbehaviour, resources depletion, blackholes, wormholes, jellyfish and rushing attacks and to compare schemes that have been proposed to combat the identified threats.

Journal ArticleDOI
TL;DR: In this paper, the authors present IPv6 features to support mobile systems and survey the mobility management services along with their techniques, strategies and protocol categories, and elaborate upon the classification and comparison among various mobility management protocols.

Journal ArticleDOI
TL;DR: This paper surveys some of the work in service-oriented middleware (SOM) and discusses the main objectives and characteristics of the surveyed approaches, and highlights the challenges to be addressed when designing and developing SOM solutions that satisfy the requirements of different application domains.

Journal ArticleDOI
TL;DR: The possibilities for the introduction of collective knowledge in disaster relief and present architecture and examples of how this could be accomplished are discussed.

Journal ArticleDOI
TL;DR: This paper provides a taxonomy of various ant colony algorithms with advantages and disadvantages of each others with respect to various metrics.

Journal ArticleDOI
TL;DR: DCR, a novel distributed partitioning detection and connectivity restoration algorithm to tolerate the failure of actors, is presented and an extended version of DCR is presented, named RAM, to handle one possible case of a multi-actor failure.

Journal ArticleDOI
TL;DR: A survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper.

Journal ArticleDOI
TL;DR: This paper proposes an innovative service selection algorithm for SOA systems that can recommend a number of suitable services based on the user's QoS requirements and is much more flexible in supporting the multiple objectives and user personalization.

Journal ArticleDOI
TL;DR: Experimental results show that EHEED can extend remarkably the network lifetime and can be very effective for long-lived sensor network.