Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas of context-awareness research. In thi...
详细信息
ISBN:
(纸本)0769523005
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas of context-awareness research. In this paper we address the incorporation of privacy support into context models. In particular we present extensions to our context modelling approach that address the challenges of assigning ownership to context information and enabling users to express privacy preferences for their own information.
Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications, In this paper, to...
详细信息
ISBN:
(纸本)3540281029
Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications, In this paper, to efficiently and effectively achieve this goal, we propose a distributed key management scheme whereby each SG (Service Group) maintains an SG server. This server is utilized to manage the key tree and provide the related session keys for all the users in this SG. Compared with the already existing method employing an integrated key graph to the hierarchical access control problem, there is no complex merging key tree algorithm needed in the proposed scheme, and thus the communication overhead can be greatly reduced. Also the trust and communication burden on one centralized server, KDC (Key Distribution Center), is scattered, and thus better scalability when the number of users increases can be achieved.
We propose a hybrid model to alleviate the notorious problem of premature battery depletion in sensor networks: in a first stage, simple sensors are deployed over an area of interest using any traditional method, in a...
详细信息
ISBN:
(纸本)0769523005
We propose a hybrid model to alleviate the notorious problem of premature battery depletion in sensor networks: in a first stage, simple sensors are deployed over an area of interest using any traditional method, in a second phase, more powerful relays are put in positions that allow them to off-load as much of the forwarding burden imposed on the simple sensors as possible. We introduce this model in detail, give a few theoretical results with respect to the optimal placement of the powerful sensors, propose various heuristic approaches for their placement, and present comparative simulation results for these heuristics.
This work proves the technical feasibility of creating pervasive computing infrastructures using multi-agent systems which interact with heterogeneous non-agent systems. Our main contribution is the development of a p...
详细信息
Service composition is the operation of forming a complex service from existing services by discovering, integrating and executing those services. Such an operation is very useful and common in grid computing, especia...
详细信息
Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P...
详细信息
ISBN:
(纸本)3540281029
Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P systems. We evaluate RWAP by comprehensive trace driven simulations. Results show that RWAP significantly reduces traffic cost and encryption overhead compared with existing approaches.
This paper presents the architecture and the methodology of a distributed Control System (DCS) which is based on intelligent field devices and an Integrative Development Environment (IDE) in connection with software s...
详细信息
ISBN:
(纸本)0780390946
This paper presents the architecture and the methodology of a distributed Control System (DCS) which is based on intelligent field devices and an Integrative Development Environment (IDE) in connection with software servers as a basic source of software within this innovative automation environment. This approach covers the whole life cycle of the DCS, ranging from the hardware independent design of the control application, to the operation of the system during run-time including both the engineering and the maintenance process. The methodology is strongly based on the application of Plug-and-Play mechanisms in the filed device level and the usage of IEC 61499 Function Blocks to design the control application. The open source tool Eclipse is the basis for the IDE and provides a powerful and scalable framework for the integration of software modules.
sensor networks typically operate in hostile outdoor environments. In such environments, sensor networks are highly susceptible to physical attacks that can result in physical node destructions. In this paper, we stud...
详细信息
ISBN:
(纸本)3540281029
sensor networks typically operate in hostile outdoor environments. In such environments, sensor networks are highly susceptible to physical attacks that can result in physical node destructions. In this paper, we study the impacts of physical attacks on sensor network configuration. Lifetime is an important metric during configuration for many sensor applications. While lifetime is constrained by limited energies and has been addressed before, prior results cannot be directly applied in the presence of physical attacks. In this paper, we define a practical lifetime problem in sensor networks under a representative physical attack model that we define. We develop an anlytical approach to derive the minimum number and deployment plan of sensors to meet lifetime requirement under physical attacks. We make several observations in this paper. One of our important observations is the high sensitivity of lifetime to physical attacks highlighting the significance of our study.
Location discovery is a challenging problem in sensor networks. However, many sensor network applications require the availability of the physical sensor positions. In this paper, we present TPSS, a time-based positio...
详细信息
ISBN:
(纸本)3540281029
Location discovery is a challenging problem in sensor networks. However, many sensor network applications require the availability of the physical sensor positions. In this paper, we present TPSS, a time-based positioning scheme for sensor networks when a number of short-range beacons' are randomly and uniformly deployed. By measuring the Time Difference of Arrivals (TDoAs) of signals from nearby beacons, nodes can use TPSS to effectively estimate their locations based on the range differences through trilateration. TPSS requires no long-range beacons to cover the entire network, an essential difference compared to TPS [2] and iTPS [15]. Features of TPSS include high scalability, low communication and computation overheads, no requirement for time synchronization, etc. Simulation results indicate that TPSS is an effective and efficient self-positioning scheme for sensor networks with short range beacons.
sensor network is a key technology for the 21st century. Our research aims to formulate and implement a new conceptual model for the next generation of networked sensor devices, which encompasses not only intelligence...
详细信息
暂无评论