The traditional metadata can not provide enough support for the adaptive distributedsystems. In this paper, we propose a metadata extension that uses the scenarios as semantic aspect, describing the expected interact...
详细信息
ISBN:
(纸本)0769523161
The traditional metadata can not provide enough support for the adaptive distributedsystems. In this paper, we propose a metadata extension that uses the scenarios as semantic aspect, describing the expected interaction sequence based on XML Schema. With such constraints, resource waste and further damages can be avoided by preventing the illegal interactions at runtime. This extension is more valid and user-friendly than the majority of the existing proposals, avoiding the potential inconsistency. A prototype has been developed to illustrate the applicability of the extended metadata. The experiments demonstrate that the prototype introduces an average overhead ratio of 6.4% in the inter-process interactions and only 0.27% in the remote interactions. The approach presented in this paper is suitable for the adaptive distributedsystems and affords more guarantee of reliability.
sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric k...
详细信息
ISBN:
(纸本)3540281029
sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive in sensor networks due to its efficiency, but establishing a shared key for communicating parties is very challenging. The low computational capability and small storage budget within sensors render many popular public-key based key distribution and management mechanisms impractical. In this paper, we propose and analyze a truly in-situ key management scheme for large scale sensor networks, called: Public Key Management (PKM). In this scheme, we deploy service and worker sensors. The service sensors contain a key space, while worker sensors are deployed blind, with no pre-deployment knowledge. Worker sensors obtain security information from service sensors through a secure channel after deployment. After obtaining security information, worker sensors compute shared keys with their neighbors. For security reasons, service sensors erase stored key space information after deployment. During this procedure, PKM shifts a large amount of computational overhead from worker sensors to service sensors, thus conserving worker sensors' resources. PKM's performance, in terms of storage, computational overhead and resiliency, is very good.
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These services (i.e. Overlay Applications) ...
详细信息
ISBN:
(纸本)0769523161
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These services (i.e. Overlay Applications) would be composed of multiple cooperative distributed software elements that dynamically build an ad hoc communication mesh (i.e. an Overlay Association). In a previous contribution, we proposed a collaborative distributed method to provide enhanced QoS between end-points within an overlay association. This method aims at discovering and utilizing composite alternate end-lo-endpaths that experience better QoS than the default path given by the IP routing mechanisms. In this paper we present our investigations on a modification to this method. This modification aims at improving its scalability by structuring participating nodes into a coordinate space and by using an alternative scheme to construct the lists of candidate relay nodes for the alternate path discovery method.
The proceedings contain 127 papers. The topics discussed include: opportunities for microtechnology in ion channel research;insulating dielectrophoresis for the continuous separation and concentration of Bacillus subt...
详细信息
ISBN:
(纸本)0780387112
The proceedings contain 127 papers. The topics discussed include: opportunities for microtechnology in ion channel research;insulating dielectrophoresis for the continuous separation and concentration of Bacillus subtilis;multi-DNA extraction chip based on an aluminum oxide membrane integrated into a PDMS microfluidic structure;continuous plasma separation form whole blood using microchannel geometry;improving DNA microarray hybridization with a pulsed source-sink mixing device;microfabricated fluorescence-activated cell sorter with hydrodynamic flow manipulation;dual capillary electrophoresis devices with electrochemical detection on a single platform;lab-on-a-chip systems with three dimensional microelectrodes;open environment micro device for integration of patch clamp instrumentation with targeted microfluidic chemical delivery;influence of oxygen microenvironment on microfluidic glucose sensor performance;and a PDMS microfluidic spotter for fabrication of lipid microarrays.
Synchronicity is a useful abstraction in many sensor network applications. Communication scheduling, coordinated duty cycling, and time synchronization can make use of a synchronicity primitive that achieves a tight a...
详细信息
Ultra Wideband (UWB) technology is fast emerging as a potential contender for next generation wireless sensor networks because of the inherent low power requirements and built in security. Time hopping and direct sequ...
详细信息
ISBN:
(纸本)0780392701
Ultra Wideband (UWB) technology is fast emerging as a potential contender for next generation wireless sensor networks because of the inherent low power requirements and built in security. Time hopping and direct sequence based spread spectrum techniques are employed for UWB multiple access systems, which makes the correlation properties of these techniques a critical issue in a multi-user (multiple nodes) scenario. In this paper we present a comparative performance analysis of different spreading codes namely, PN, Gold and Kasami using PPM and PAM modulation schemes over AWGN and ieee 802.15.3a channel models. We use a PRake receiver for multipath channel. We observe that DS spreading technique is more suitable than TH for multi-user systems. Simulation results show that Kasami codes perform better than Gold and PN codes for all considered cases. However, Kasami codes can accommodate less number of nodes for a given code length due to their reduced set size. Thus, for small sensor networks Kasami codes should be deployed, where as for larger sensor networks Gold and PN codes are more suitable.
The current wireless sensor network designs are largely based on a layered approach. The suboptimality and inflexibility of this paradigm result in poor performance, due to constraints of power, communication, and com...
详细信息
ISBN:
(纸本)3540297693
The current wireless sensor network designs are largely based on a layered approach. The suboptimality and inflexibility of this paradigm result in poor performance, due to constraints of power, communication, and computational capabilities. Key management plays an important role in wireless sensor networks, because it not only takes charge of securing link-layer communications between nodes, but also has great effects on other protocol layers, e.g. routing and IDS (Intrusion Detection System). However, no existing key management protocols have attached enough importance to cross-layering designs. In this paper, we propose a cross-layering key management scheme, which can provide other protocol layers with a nice trust-level metric. The trust-level metric is generated during the pairwise key establishment phase, and it varies as system conditions change. This metric describes the security level between two neighboring nodes and helps other protocol layers to make decisions. We also present simulations and analysis to show the superior characteristics of our scheme against both passive attacks and active attacks.
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. The essence of PLU lies in the integra...
详细信息
ISBN:
(纸本)3540281029
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. The essence of PLU lies in the integration of location prediction and one-hop broadcasting of location update packets. The full PLU algorithm and its associated data structure are described in the paper. The simulation results have shown an improved performance of PLU thanks to its newly introduced type of updates where location prediction is applied to reduce the number of packets or bytes transmitted for location update purpose whereas keeping a high accuracy level of location information.
Recent technological advances and the continuing quest for greater efficiency have led to an explosion of link and network protocols for wireless sensor networks. These protocols embody very different assumptions abou...
详细信息
暂无评论