For wireless sensor networks, pairwise key establishment is a fundamental security service. However, establishing pairwise keys in wireless sensor networks is not a trivial thing, particularly due to the resource cons...
详细信息
ISBN:
(纸本)9781424413119
For wireless sensor networks, pairwise key establishment is a fundamental security service. However, establishing pairwise keys in wireless sensor networks is not a trivial thing, particularly due to the resource constraints on sensor nodes, and the nodes capture attack. In this paper, we propose a new efficient pairwise key management scheme based on the work of Liu et al. [7]. In our scheme, after deployment, a few sensor nodes are self-elected to become service nodes, which are responsible for key generation and distribution. The majority of the nodes are worker nodes, which are responsible for sensing and reporting data, and the keys shared by the nodes are distributed by service nodes. Compared with the scheme(LKE) provided by Liu et. al., our scheme does not need to learn the accurate locations of nodes. In addition, our scheme needs no computational overhead and requires less memory;the resilience against nodes capture attack Is perfect. Simulation analysis Is also provided.
In this paper DMVOCC-MDA-2PLV protocol is proposed for processing mobile distributed real-time transaction in mobile broadcast environments. The new protocol can eliminate conflicts between mobile read-only and mobile...
详细信息
ISBN:
(纸本)9781424413119
In this paper DMVOCC-MDA-2PLV protocol is proposed for processing mobile distributed real-time transaction in mobile broadcast environments. The new protocol can eliminate conflicts between mobile read-only and mobile update transactions, and resolve data conflicts flexibly using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking. Respond time of mobile read-only transactions is greatly improved. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols.
Macroprogramming-the technique of specifying the behavior of the system, as opposed to the constituent nodes-provides application developers with high level abstractions that alleviate the programming burden in develo...
详细信息
ISBN:
(纸本)9783540730897
Macroprogramming-the technique of specifying the behavior of the system, as opposed to the constituent nodes-provides application developers with high level abstractions that alleviate the programming burden in developing wireless sensor network (WSN) applications. However, as the semantic gap between macroprogramming abstractions and node-level code is considerably wider than in traditional programming, converting the high level specification to running code is a daunting process, and a major hurdle to the acceptance of macroprogramming. In this paper, we propose a general compilation framework for a data-driven macroprogramming language that allows for plugging in different modules implementing various stages of compilation. We also demonstrate an actual instantiation of our framework by showing an end-to-end solution for compiling macro-programs. Our compiler provides the final code to be deployed on real nodes as well as an estimate of the costs the running system will incur, e.g., in terms of messages exchanged. We compared the auto-generated code against a hand-coded version for the same application behavior to verify the outcome of our compiler.
WE! introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due PF to, e.g., harsh environments, energy constraints, or security considerations. Instead...
详细信息
ISBN:
(纸本)9783540730897
WE! introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due PF to, e.g., harsh environments, energy constraints, or security considerations. Instead, we assume that the sensors buffer the measurements over the lifetime and report them directly to a sink without necessarily requiring communications. Upon retrieval of the reports, all sensor data measurements will be available to a central entity for post processing. Our algorithm is based on the further assumption that some of the data fields that are being observed by the sensors can be modeled as a local (i.e. having decaying spatial correlations) stochastic process;if not, then choose an auxiliary field, e.g., carefully engineered random signals intentionally generated by arranged devices, "cloud shadows" cast on the ground, or animal heat. The sensor nodes record the measurements, or a function of the measurements, e.g., "1" when the measured signal is above a threshold, and "0" otherwise. These time-stamped sequences are ultimately transferred to the sink. The localization problem is then approached by analyzing the correlations between these sequences at pairs of nodes. As for applications, we discuss the localization scheme for large-scaled sensor networks deployed on the seabed and study a two-tiered architecture that organizes deaf sensors with local masters.
distributedsensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of scarce resources in sensors. However, compr...
详细信息
ISBN:
(纸本)1424413176
distributedsensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of scarce resources in sensors. However, compromised and misbehaving nodes are a serious threat, as an attacker can employ them to eavesdrop on communication, inject forged data, or manipulate protocol operation. In this context, distributed revocation protocols play a decisive role since they allow removing compromised nodes in an efficient way. The design of distributed revocation protocols is challenging due to technical restrictions of sensor nodes, the distributed operation of sensor networks, and the presence of compromised nodes that can collude to subvert protocol operation. We propose the Cooperative Security Protocol (CSP) to enhance network security and enable efficient distributed revocation. The CSP is based on the distribution of revocation information - so called partial revocation votes - to the neighbors of a node as prerequisite to join the network. If an intruder refuses to disclose its revocation votes, the network does not allow it to join. Thus, the node is prevented from attacking the network. If the intruder cooperates by disclosing its revocation information, it can endanger the network neither, since its neighbors, which cooperate to monitor its correct operation, can use the revocation information to ban it from the network.
The operating systems of Wireless sensor networks should he suitable for strict-constrained system resources and support two operation modes: event-driven & multi-threading. Traditional embedded operating systems ...
详细信息
ISBN:
(纸本)9781424413119
The operating systems of Wireless sensor networks should he suitable for strict-constrained system resources and support two operation modes: event-driven & multi-threading. Traditional embedded operating systems are generally not fit for WSN applications. This paper presents a smart, resource-aware, low-power-consuming and distributed real-time micro-kernel: LIMOS. LIMOS adopts an event & thread two-level system architecture and a two-level scheduling policy: 'non pre-emption priority based' high level scheduling for events;and 'preemptive priority-based' low level scheduling for threads. The scheduling scheme is predictable and deterministic with respect to real-time applications. A unique system interface and a system primitive-pair, i.e. tuple and IN & OUT, are proposed for all kinds of system synchronization and communication. LIMOS integrates the advantages of tinyOS and SDREAM. It allows running in different modes. The combination of two kernels extends greatly the application range of LIMOS from simple single-task to multitask applications. In present, LIMOS has been evaluated on several hardware platforms and ported for different applications.
The architecture of uniform information space of Republic of Uzbekistan by a hierarchical principle on the basis distributed mobile IT systems is stated. For the information space of regional management which is forme...
详细信息
Wireless sensor networks have been widely used for surveillance in harsh environments. In many such applications, the environmental data are continuously sensed, and data collection is performed synchronously. When a ...
详细信息
ISBN:
(纸本)9781424413119
Wireless sensor networks have been widely used for surveillance in harsh environments. In many such applications, the environmental data are continuously sensed, and data collection is performed synchronously. When a data collector cannot communicate with the sensors directly for some reason, continuous data collection becomes a challenging problem. In this paper, we present an effective way of solving such problems by combining partial network coding with distributed network storage. Specifically, we assume that there are k sources generating the data continuously and n>k storage nodes with limited memory which communicate with the sources. We want a data collector, who can appear anywhere around the storage nodes, to query any k or more storage nodes and be able to retrieve the data generated by the sources timely and continuously. Furthermore, through simulation, the relationship between the number of storage nodes connected by one source and the probability of successful reception of the data collector is found.
The proceedings contain 86 papers. The topics discussed include: a modular architecture for providing carrier-grade SIP telephony services;outdoor capacity study utilizing multiple element antennas at the millimeter w...
详细信息
ISBN:
(纸本)0769528899
The proceedings contain 86 papers. The topics discussed include: a modular architecture for providing carrier-grade SIP telephony services;outdoor capacity study utilizing multiple element antennas at the millimeter wave band;UWB channel measurements for measures for hand-portable and wearable devices;a novel linear-programming based approach for near-optimal rate allocation in the UMTS enhanced uplink;performance evaluation of the PRRA MAC protocol for GEO satellite networks;distributed power control in cellular mobile radio systems with time-varying link gains;subchannelization performance for the downlink of a multi-cell OFDMA system;the analysis of the optimal periodic ranging slot number in ieee 802.16 OFDMA systems;software solutions for converting a MIMO-OFDM channel into multiple SISO-OFDM channels;toward a hardware real time SIMO channel emulator;and variable sub-carrier in OFDM to reduce the ICI due to carrier frequency offset and IQ imbalance.
The increasing number of internetworking communication networks and technologies require more and more flexible computing solutions, connecting resources in a transparent, open and reliable way. Parallelism and redund...
详细信息
暂无评论