Coverage is a central issue in the design of wireless sensor networks. There are many measures for coverage, based on what aspect of surveillance quality we wish to address. Designing a network that achieves desired s...
详细信息
As the popularity of resource-constrained devices such as hand-held computers increases, a new network service offloading complex processing tasks towards computational resources located in the access- or core network...
详细信息
ISBN:
(纸本)9781424404247
As the popularity of resource-constrained devices such as hand-held computers increases, a new network service offloading complex processing tasks towards computational resources located in the access- or core network, sounds very promising. In a consumer-oriented environment, characterized by a large diversity in connected devices, a transparent network-based request processing strategy offers a clear flexibility advantage, as the installation and configuration of extra software components on all client devices can be avoided. In this work, this is achieved by linking computational resources to an anycast group, which allows intermediate router nodes to decide upon the target server. It is shown in the paper that the anycast routing problem can be reduced to unicast routing. Consequently, unicast multiple constraints routing algorithms can be applied to compute an optimal path based on several server selection criteria, including server load, path delay, path cost, etc. For this purpose, we envision the SAMCRA algorithm. A new evaluation ordering strategy for previously computed sub-paths is introduced, which guarantees optimality for the complete SAMCRA path between source and destination. Simulation results show that an effective distribution of the job scheduling requests over the available resources can be achieved by applying the described algorithm.
The issue of maintaining privacy in data mining has attracted considerable attention over the last few years. The difficulty lies in the fact that the two metrics for evaluating privacy preserving data mining methods:...
详细信息
ISBN:
(纸本)3540459162
The issue of maintaining privacy in data mining has attracted considerable attention over the last few years. The difficulty lies in the fact that the two metrics for evaluating privacy preserving data mining methods: privacy and accuracy are typically contradictory in nature. This paper addresses privacy preserving mining of association rules on distributed dataset. We present an algorithm, based on a probabilistic approach of distorting transactions in the dataset, which can provide high privacy of individual information and at the same time acquire a high level of accuracy in the mining result. Finally, we present experiment results that validate the algorithm.
Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions of optimal, i.e. under different cost metrics). ...
详细信息
ISBN:
(纸本)3540352279
Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions of optimal, i.e. under different cost metrics). However, all these schemes differ from one common failing - they construct an optimal tree for a given fixed subset of the sensors. In most practical scenarios, the sensor group is continuously and dynamically varying - consider for example the set of sensors scattered in a forest that are sensing temperatures above some specified threshold, during a wildfire. Given the limited computational and energy resources of sensor nodes it is impossible to either prestore the optimal tree for every conceivable group or to dynamically generate them on the fly. In this paper we propose the novel approach of constructing a single group-independent spanning tree (GIST) T for the network and then letting any sensor group S use the subtree induced by S on T, TS as its group aggregation tree. The important question is, how does the quality of the subtree TS compare to the optimal tree, OPTs, across different groups S. We consider two well-accepted measures - aggregation cost (sum over all links) and delay (diameter). We show that in polynomial time we can construct a GIST that simultaneously achieves O(log n)-approximate aggregation cost and O(1)-approximate delay, for all groups S. To the best of our knowledge GIST is the first construction with a nontrivial and provable performance guarantee that works for all groups. We provide a practical and distributed protocol for realizing GIST that requires only local knowledge. We show an Ω(n) lower bound for commonly accepted solutions such as MST and SPT (i.e. there exists a group for which the induced subtree performs poorly) and demonstrate by simulation that GIST is good not just in the worst case - it outperforms SPT and MST by between 30 and 60 per cent in realistic random scenarios. GIST is an ov
Because sensor networks consist of devices with weak physical security, they are likely to be compromised by an attacker. So, it is very important to establish a pairwise key securely between the communicating nodes. ...
详细信息
ISBN:
(纸本)3540380914
Because sensor networks consist of devices with weak physical security, they are likely to be compromised by an attacker. So, it is very important to establish a pairwise key securely between the communicating nodes. However, utilizing one hop local keys are known to be very vulnerable to threats caused by compromised nodes. This paper proposes a scheme where each node establishes three hop local keys at network boot-up time and employs them for a later pairwise key establishment. When any two nodes agree a pairwise key, all nodes on the route between two nodes contribute to the agreement of the pairwise key. Here, the initial three hop local keys are employed for encrypting a secret key delivered from a node to other nodes. Therefore, the proposed scheme bothers attackers to compromise much more nodes than the scheme using one hop local keys only. The simulation results showed that the proposed scheme provides better performance and higher security than the one hop local key based scheme.
The sensor nodes in a network are connected to the outer world via a base station. Base stations (BS) have some back up power and it is not suppose to fail due to shortage of battery power. The nodes which are away fr...
详细信息
ISBN:
(纸本)9781424404988
The sensor nodes in a network are connected to the outer world via a base station. Base stations (BS) have some back up power and it is not suppose to fail due to shortage of battery power. The nodes which are away from the base station communicate to it via the nodes which are in proximity of BS. So, the nodes which are nearer to BS have additional communication responsibilities of forwarding data of distant nodes. Thus the nodes which are in proximity of BS will run out of battery power very soon and create bottleneck for communication. In this paper we have proposed that if the density of sensor nodes increases as we move towards base station this effect can be minimized. We found the required exact density of the sensor nodes at a particular distance from BS to avoid bottleneck phenomenon around it. We have considered the real life scenario where the nodes generate data only when there is an event of interest with a given probability of occurrence. The main contribution of this paper with our proposed strategy is lifetime offered per unit cost of deployment is almost double.
In large scale P2P networks, it is less likely that repeat interactions will occur between same peers for the asymmetric interests between them. So it is difficult to establish the direct trust relationship between pe...
详细信息
ISBN:
(纸本)354038619X
In large scale P2P networks, it is less likely that repeat interactions will occur between same peers for the asymmetric interests between them. So it is difficult to establish the direct trust relationship between peers and the network is vulnerable to malicious peers. A group based reputation system GroupRep for P2P networks is proposed in this paper to solve this problem. In GroupRep, the trust relationship is classified into three tiers: the trust relationship between groups, between groups and peers, and between peers. A peer evaluates the credibility of a given peer by its local trust information or the reference from the group it belonging to. A filtering cluster algorithm is proposed to filter unfair ratings provided by malicious peers. As a result, good peers are distinguished from malicious ones. Choosing the download source based on the trust value of responders can make good peers happy with the high ratio of the success query and the high satisfaction level under malicious collusive attacks with front peers.
Wireless sensor network technology has found diverse applications in numerous fields. As the networking technology is refined in many ways, the need for system modulation with effective performance becomes essential. ...
详细信息
ISBN:
(纸本)9781424404988
Wireless sensor network technology has found diverse applications in numerous fields. As the networking technology is refined in many ways, the need for system modulation with effective performance becomes essential. A multitude of architectures, which includes system abstraction and layering, has been proposed to solve the need at the operating system level. However, previous efforts do not qualify for networking architecture required by sensor networking, since they are aimed at hardware abstraction or protocol-based layering. In this paper, we classify developers into kernel, network and application developers and propose a network architecture that enables those developers to program independently. Network stack is separated into three different layers;MLL, NSL, DNL. This three-layered architecture provides an effective programming environment to sensor network developers by minimizing modification of other layers and maximizing reusability of the networking module. To validate the proposed mechanism, we implemented and assessed the performance with a few network algorithms and applications, based on the RETOS, which supports a dynamic loadable kernel module.
In this paper, we propose a new data gathering mechanism for large scale multihop sensor networks. A mobile data observer, called SenCar, which could be a mobile robot or a vehicle equipped with a powerful transceiver...
详细信息
暂无评论