Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A new kind of pairwise k...
详细信息
ISBN:
(纸本)3540380914
Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A new kind of pairwise key pre-distribution model for sensor networks is proposed. And in addition, based on which, an efficient dynamic key path establishment algorithm is designed. Theoretic analysis and experimental figures show that the new algorithm has better performance than those previous related works.
While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a Compromised nOde Locating protocol for detecting ...
详细信息
With the improvement in computer electronics in terms of processing, memory and communication capabilities, it has become possible to scatter tiny embedded devices such as sensor nodes to monitor physical phenomena wi...
详细信息
In this paper we address three challenges that are present when building and analyzing wireless sensor networks (WSN) as part of ubiquitous computing environment: the need for an in-situ user interface, a data logger,...
详细信息
ISBN:
(纸本)9781424404247
In this paper we address three challenges that are present when building and analyzing wireless sensor networks (WSN) as part of ubiquitous computing environment: the need for an in-situ user interface, a data logger, and a power consumption meter. Solutions for the above have been presented using laptops, personal digital assistants (PDA), onboard flash memory chips of limited size (usually 1MB), and laboratory test equipment. All of them have a good utility for the right applications. However, considering a certain variety of WSNs, where size, battery life, and cost are crucial, none of the above solutions is satisfactory. In this paper we present a compact, lightweight, low power, and low cost multimodal sensor module SeeMote that meets the stated challenges, and is compatible with the popular MICAz mote. Our module has the following components: (1) a graphical user interface component that combines a color liquid crystal display (LCD) and 5-way buttons, (2) a power meter component that is reconfigurable for attaching various low-power devices, and (3) a data logger component that is interfaced to a removable secure digital (SD) or multimedia memory card (MMC). The module dimensions are 34x58x12mm. This paper describes the hardware and software design and experiences while developing and using the device. The device is evaluated by comparing its parameters and functionality to laptop and PDA solutions. We conclude that SeeMote is preferred for certain WSNs, such as very large scale, difficult to reach, and wearable WSNs. We also present several applications that use the LCD module, such as the portable frequency spectrum analyzer and remote sensory data display device.
The proceedings contain 40 papers. The special focus in this conference is on distributedcomputing and Internet Technology. The topics include: Ticket-based binding update protocol for mobile IPV6*;distributed node-b...
ISBN:
(纸本)9783540683797
The proceedings contain 40 papers. The special focus in this conference is on distributedcomputing and Internet Technology. The topics include: Ticket-based binding update protocol for mobile IPV6*;distributed node-based transmission power control for wireless ad hoc networks;indexing and retrieval of document images by spatial reasoning;energy-aware improved directed diffusion algorithm for area event monitoring in wireless sensor network;multimedia data hiding in spatial and transformed domain;Extension of r-tree for SPATIO-temporal Olap operations*;lossless data hiding for high embedding capacity;mining sequential support affinity patterns with weight constraints;mining images of material nanostructure data;Dynamic primary copy with piggy-backing mechanism for replicated UDDI registry;an empirical study on a web server queueing system and traffic generation by simulation;research into verifying semistructured data;materialized view tuning mechanism and usability enhancement;efficient remote user authentication and key establishment for multi-server environment;optimisation problems based on the maximal breach path measure for wireless sensor network coverage;Modified Raymond's algorithm for priority (MRA-P) based mutual exclusion in distributedsystems;requirements-driven modeling of the web service execution and adaptation lifecycle;an improved e-commerce protocol for fair exchange;multicontext-aware recommendation for ubiquitous commerce;Allocating QOS-constrained applications in AWEB service-oriented grid;an automatic approach to displaying web applications as Portlets;improving the deployability of existing windows-based client/server business information systems using Activex;a generalized linear programming based approach to optimal divisible load scheduling;application-level checkpointing techniques for parallel programs;multimedia traffic distribution using capacitated multicast tree;net-centric computing: The future of computers and networking.
A camera sensor network is a wireless network of cameras designed for ad-hoe deployment. The camera sensors in such a network need to be properly calibrated by determining their location, orientation, and range. This ...
详细信息
ISBN:
(纸本)9781424404247
A camera sensor network is a wireless network of cameras designed for ad-hoe deployment. The camera sensors in such a network need to be properly calibrated by determining their location, orientation, and range. This paper presents Snapshot, an automated calibration protocol that is explicitly designed and optimized for camera sensor networks. Snapshot uses the inherent imaging abilities of the cameras themselves for calibration and can determine the location and orientation of a camera sensor using only four reference points. Our techniques draw upon principles from computer vision, optics, and geometry and are designed to work with low-fidelity, low-power camera sensors that are typical in sensor networks. An experimental evaluation of our prototype implementation shows that Snapshot yields an error of 1-2.5 degrees when determining the camera orientation and 5-10cm when determining the camera location. We show that this is a tolerable error in practice since a Snapshot-calibrated sensor network can track moving objects to within 11cm of their actual locations. Finally, our measurements indicate that Snapshot can calibrate a camera sensor within 20 seconds, enabling it to calibrate a sensor network containing tens of cameras within minutes.
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC...
详细信息
ISBN:
(纸本)3540380914
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it's used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an algorithm that (1) is flexible with respect to the outlier definition, (2) works in-network with a communication load...
详细信息
The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (distributedcomputing Environment) systems imply that an application must be able to detect and adapt to changes in its state, its requirements,...
详细信息
In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenti...
详细信息
ISBN:
(纸本)0780394100
In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenticating a group of devices over an open insecure wireless channel. We choose a conference keying mechanism and extend it with symmetric authentication protocols and a key hierarchy on which group key could be distributed efficiently. We address two problems in this work. Firstly, the formation of secure groups in sensor network with a low communication complexity, secondly, provides an efficient solution to maintain such multicast group.
暂无评论