Software agent technology has attracted much attention for developing various distributedsystems, composed of autonomous agents interacting with one another using particular mechanisms and protocols. Such systems pro...
详细信息
ISBN:
(纸本)354038619X
Software agent technology has attracted much attention for developing various distributedsystems, composed of autonomous agents interacting with one another using particular mechanisms and protocols. Such systems provide high-level reconfigurability, flexibility and robustness in dynamic environments, and have applications in many areas. However, the great advantages of distributed agent systems are often overshadowed by the challenges of providing flexible and consistent security management for agent interactions in the dynamic and heterogeneous computing environments. Trust, which is the belief of an agent that the other agent will act or intend to act beneficially, is a basis for secure distributed agent systems. In this paper, various major research issues of managing trust among various entities are identified, and the approaches in dealing with them are discussed. A framework for managing trust among various entities in distributed agent systems is presented.
In this paper we investigate the problem of Direction of Arrival (DoA) estimation in distributed and self-organizing Wireless sensor Networks (WSNs), which use Ultra Wide-Band (UWB) technology at the physical layer. T...
详细信息
ISBN:
(纸本)9781424403974
In this paper we investigate the problem of Direction of Arrival (DoA) estimation in distributed and self-organizing Wireless sensor Networks (WSNs), which use Ultra Wide-Band (UWB) technology at the physical layer. The proposed DoA estimation technique is based on the Spectral Correlation MUltiple SIgnal Classification (SC-MUSIC) algorithm, which is well suited for wide-band signals and relies on the cyclostationarity properties of UWB signaling. Each sensor node is assumed to be equipped with a single omnidirectional antenna and DoA information is extracted by post-processing the signals received by a cluster of nodes and sent to a sink node. The performance of this algorithm is analyzed by assuming an Additive White Gaussian Noise (AWGN) channel and by including in the analysis errors due to location discovery and timing synchronization procedures. The results show a significant robustness of the algorithm with respect to this kind of errors.
Radio Frequency Identification (RFID) sensor networks are increasingly being applied to the hospital environment. Capture of fine grained operational data in this environment can promote meaningful process reengineeri...
详细信息
ISBN:
(纸本)9781424401956
Radio Frequency Identification (RFID) sensor networks are increasingly being applied to the hospital environment. Capture of fine grained operational data in this environment can promote meaningful process reengineering with the objective of improving efficiencies in operational aspects. The RFID sensor nodes generate large amounts of fine grained real time data, related to resources and processes within the hospital environnient. Understanding and managing these data in the context of the enterprise applications pose challenges for the middleware which has to connect sensor networks with enterprise applications. In this paper we propose an architectural solution based on the notion of an event. The primary characteristics of an event are discussed and a three layered event representation model is developed to map raw sensory information to semantic events. A generalized event ontology language is proposed.
Tracking mobile targets is an important application of wireless sensor networks. However, mobility of the target brings new challenges to designing energy-efficient and scalable data collection schemes. A novel Dynami...
详细信息
Although many users want to access their personal data from anywhere in ubiquitous computing environments, distributed storage systems with data replication have not yet been accepted widely. We point out that one cur...
详细信息
ISBN:
(纸本)3540380914
Although many users want to access their personal data from anywhere in ubiquitous computing environments, distributed storage systems with data replication have not yet been accepted widely. We point out that one current problem of existing systems is the difficulty of determining which data is important and should be replicated in mobile devices. We propose a new personal storage system that uses rdF for metadata descriptions and for selections of replication candidates. We present a basic design and a prototype implementation of the system and confirm it's feasibility for large amount of accumulated data.
Coverage has been an active research area in mobile sensor networks. For a randomly placed large-scale sensor network, sensor nodes would most probably be distributed asymmetrically, and it requires the coverage algor...
详细信息
ISBN:
(纸本)3540380914
Coverage has been an active research area in mobile sensor networks. For a randomly placed large-scale sensor network, sensor nodes would most probably be distributed asymmetrically, and it requires the coverage algorithm to do with the diffusion and contraction of the network. Most of the existed algorithms are on the assumption that sensor nodes are initially densely distributed or the states of the network coverage are known to all the nodes, which does not meet all application scenarios. This paper proposes a new adaptive coverage algorithm based on the combination of boundary contraction and random repulsion. It works well on the scenarios of the asymmetrical initial distribution, the isotropic sensor nodes, and that only the coverage states in communication range being known by nodes. Simulation results show that the algorithm realizes both the diffusion and contraction of the sensor network, and that the deployed nodes tend to be uniformly distributed.
Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue. Node misbehavior due to malicious attacks can impair the overall functioning of the system. Existing approaches mainly...
详细信息
ISBN:
(纸本)9780780397910
Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue. Node misbehavior due to malicious attacks can impair the overall functioning of the system. Existing approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches only address part of the problem of security in sensor networks. However, cryptography is not sufficient to prevent the attacks in which some of the nodes are overtaken and compromised by a malicious user. Recently, the use of reputation systems has shown positive results as a self-policing mechanism in ad-hoc networks. This scheme can aid in decreasing vulnerabilities which are not solved by cryptography. We look at how a distributed reputation scheme can benefit the object tracking application in sensor networks. Tracking multiple objects is one of the most important applications of the sensor network- In our setup, nodes detect misbehavior locally from observations, and assign a reputation to each of their neighbors. These reputations are used to weight node readings appropriately when performing object tracking. Over time, data from malicious nodes will not he included in the track formation process. We evaluate the reputation system experimentally and demonstrate how it improves object tracking in the presence of malicious nodes.
In the field of Artificial Intelligence, most of the distributedsystems are described by services which can be composed to provide more complex ones. Currently, the potential to achieve dynamic composition of service...
详细信息
ISBN:
(纸本)9781424401956
In the field of Artificial Intelligence, most of the distributedsystems are described by services which can be composed to provide more complex ones. Currently, the potential to achieve dynamic composition of services has driven recent research efforts. To this end it is crucial to find solutions in order to automate this task. In the present paper, we propose a methodology which deals with these insufficiencies on two levels. The first level is the design. Based on teleological reasoning, each service is related to a goal which is represented by a conceptual model called an Ontology. Services are described by a functional model which relies on a core reasoning process between interacting functional Components of the complex system. The process is based on Information Flow (IF) approach, where the main idea is the fusion of goal ontologies. The second level is the implementation through Multi Agent systems (MAS). We propose an algorithm describing the mechanism of the dynamic fusion of services, in which the intelligent agents support the functional components of the complex system.
Previous experience with a data center prototype called Unity established that utility functions provide a natural framework for self-optimization in distributed autonomic computingsystems [1]. In an effort to bring ...
详细信息
The wireless sensor network (WSNs) was extensively deployed and researched for many applications in recently. By taking the advantage of smaller dimension, lower cost and simple structure of the sensor node, the more ...
详细信息
ISBN:
(纸本)3540380914
The wireless sensor network (WSNs) was extensively deployed and researched for many applications in recently. By taking the advantage of smaller dimension, lower cost and simple structure of the sensor node, the more restrictions come together with sensors. Therefore, the limited power of sensor nodes is the most direct and difficult problem we meet. The limitation on the energy of sensor node makes the bottlenecks for designing the suitable routing protocols. In order to solve the problem of limited energy, the loading of nodes have to be distributed as possible as it can. If the energy consumption can be shared averagely by most nodes, then the lifetime of sensor networks will be enlarged. Thus we propose the routing protocol called Reactive Energy Decision Routing Protocol (REDRP) for sensor networking by considering several representative routing protocols in different structures. This protocol will create the routes in reactive routing method to transmit the data node gathered and the REDRP use the residual energy of nodes as the routing decision for energy-aware. As the results of simulation shows that the more fairness usage of sensor nodes, the total energy consumption of entire network will be distributed fairly by our protocol and the lifetime will also be increased.
暂无评论