WSN's reliability plays an extraordinary role in certain applications. Among the reliability related solutions, the reliability of the network largely dependent on the routing reliability which mainly dependents o...
详细信息
ISBN:
(纸本)9781424421077
WSN's reliability plays an extraordinary role in certain applications. Among the reliability related solutions, the reliability of the network largely dependent on the routing reliability which mainly dependents on both aspects of the cluster-heads' reliability, and gateways' reliability. this paper proposes a novel redundancy-based directional reliable multi-hop clustering routing algorithm (DRMC) for Wireless sensor Network. DRMC integrates the diffused clustering withthe mechanism of multiple backup of the cluster-head and gateway node, this mechanism not only keeps the proper lifetime, the stability and expansibility of the network, but also improves the speed and reliability of the routing process. the efficiency of the algorithm is verified through the simulation results.
the proceedings contain 36 papers. the topics discussed include: efficient signature matching with multiple alphabet compression tables;correlation-based load balancing for network intrusion detection and prevention s...
ISBN:
(纸本)9781605582412
the proceedings contain 36 papers. the topics discussed include: efficient signature matching with multiple alphabet compression tables;correlation-based load balancing for network intrusion detection and prevention systems;distributed flow detection over multi path sessions;relaxed authenticity for data aggregation in wireless sensor networks;source location privacy against laptop-class attacks in sensor networks;securely computing an approximate median in wireless sensor networks;SYBIL proof anonymous reputation management;location privacy based on trusted computing and secure logging;evaluating the utility of anonymized network traces for intrusion detection;on the performance of a hybrid intrusion detection architecture for voice over IP systems;visual-similarity-based phishing detection;and voice pharming attack and the trust of VoIP.
Collaborative Signal Processing cluster-based for target tracking in wireless sensor network is proposed in this paper. Node clustering is a useful approach to reduce the communication overhead and develop data fuse i...
详细信息
ISBN:
(纸本)9781424421077
Collaborative Signal Processing cluster-based for target tracking in wireless sensor network is proposed in this paper. Node clustering is a useful approach to reduce the communication overhead and develop data fuse in wireless sensor networks. Each sensor node, which has incomplete information about its dynamic and uncertain world, must respond to sensed events within time constraints. the aim of Collaborative Signal processing in wireless sensor network is to insure that all necessary parts of the tasks being dealt with are Involved In the operations of at least one sensor node. When a target move to the sensing riled, a CH volunteers invite its neighboring sensors to form a cluster. All sensor nodes must act in a purposeful and consistent manner within the available computational and resource limitations Utilizing cluster technology can make good use of each sensor nodes' limited energy and perform tasks coordinately.
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. they are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sens...
详细信息
ISBN:
(纸本)9780769534930
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. they are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing the delivery of correct sensor data and from forging sensor data. the security and privacy problem related to wireless sensor network's application has become a serious issue in the real service environment. In this paper, we propose our management platform and security framework for wireless sensor networks. the proposed framework has advantages as regards secure association and intrusion detection. Furthermore, the proposed mechanism can be applied to ubiquitous application such as u-city, u-healthcare, u-defense as a secure wireless sensor network management platform.
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to just several days, or demands considera...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to just several days, or demands considerable maintenance efforts (e.g., in terms of battery substitution). A large portion of the energy of sensor applications is spent in node discovery as nodes need to periodically advertise their presence and be awake to discover other nodes for data exchange. the optimization of energy consumption, which is generally a hard task in fixed sensor networks, is even harder in mobile sensor networks, where the neighbouring nodes change over time. In this paper we propose an algorithm for energy efficient node discovery in sparsely connected mobile wireless sensor networks. the work takes advantage of the fact that nodes have temporal patterns of encounters and exploits these patterns to drive the duty cycling. Duty cycling is seen as a sampling process and is formulated as an optimization problem. We have used reinforcement learning techniques to detect and dynamically change the times at which a node should be awake as it is likely to encounter other nodes. We have evaluated our work using real human mobility traces, and the paper presents the performance of the protocol in this context.
Wireless sensor networks consist of a large number of sensor nodes with limited battery power, and how to use energy of sensor nodes more efficiently to extend the lifetime of networks is a primary goal in the design ...
详细信息
ISBN:
(纸本)9781424421077
Wireless sensor networks consist of a large number of sensor nodes with limited battery power, and how to use energy of sensor nodes more efficiently to extend the lifetime of networks is a primary goal in the design of wireless sensor networks. Data aggregation can reduce the traffic in network by utilizing the abilities of local computation and storage of sensor nodes. In this paper, we propose a novel data aggregation scheme based on wavelet-entropy (DAME in short) for wireless sensor networks. Firstly, we use multi-scale wavelet transforms to spread signals in multi-scale range, and then aggregate information using wavelet-entropy discriminance theorem in cluster members and cluster heads with LEACH clustering algorithm to reduce transmitting packets. Finally, we evaluate the performance of proposed data aggregation based on wavelet-entropy scheme by simulations.
distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is essential for DSPSs that often require hi...
详细信息
ISBN:
(纸本)9781424431748
distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is essential for DSPSs that often require highly-available system operations. In this paper, we explore a new predictive failure management approach that employs online failure prediction to achieve more efficient failure management than previous reactive or proactive failure management approaches. We employ light-weight stream-based classification methods to perform online failure forecast. Based on the prediction results, the system can take differentiated failure preventions on abnormal components only. Our failure prediction model is tunable, which can achieve a desired tradeoff between failure penalty reduction and prevention cost based on a user-defined reward function. To achieve low-overhead online learning, we propose adaptive data stream sampling schemes to adaptively adjust measurement sampling rates based on the states of monitored components, and maintain a limited size of historical training data using reservoir sampling. We have implemented an initial prototype of the predictive failure management framework within the IBM System S distributed stream processing system. Experiment results show that our system can achieve more efficient failure management than conventional reactive and proactive approaches, while imposing low overhead to the DSPS.
Topology control is an effective method to improve the energy efficiency of wireless sensor networks (WSNs). Traditional approaches are based on the assumption that a pair of nodes is either "connected" or &...
详细信息
ISBN:
(纸本)9781424431748
Topology control is an effective method to improve the energy efficiency of wireless sensor networks (WSNs). Traditional approaches are based on the assumption that a pair of nodes is either "connected" or "disconnected". these approaches are called connectivity-based topology control. In real environments however, there are many intermittently connected wireless links called lossy links. Taking a succeeded lossy link as an advantage, we are able to construct more energy-efficient topologies. Towards this end, we propose a novel opportunity-based topology control. We show that opportunity-based topology control is a problem of NP-hard. To address this problem in a practical way, we design a fully distributed algorithm called CONREAP based on reliability theory. We prove that CONREAP has a guaranteed performance. the worst running time is O(|E|) where E is the link set of the original topology, and the space requirement for individual nodes is O(d) where d is the node degree. To evaluate the performance of CONREAP we design and implement a prototype system consisting of 50 Berkeley Mica2 motes. We also conducted comprehensive simulations. Experimental results show that compared withthe connectivity-based topology control algorithms, CONREAP can improve the energy efficiency of a network up to 6 times.
Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes rep...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location information in order to fake their actual position. In this paper we propose the first deterministic distributed protocol for accurate identification of faking sensors in a WSN. Our scheme does not rely on a subset of trusted nodes that cooperate and are not allowed to misbehave. thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most [n/2] - 2 faking sensors. When the time of flight (ToF) technique is used, our protocol manages at most [n/2] - 3 misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is [n/2] - 1. thus, our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More specifically, our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.
Area monitoring is a common application of wireless sensor network (WSN). Mining area Monitoring System for Methane is very important because it guarantees the coal mine production safety. Automatic calibration techno...
详细信息
ISBN:
(纸本)9781424421077
Area monitoring is a common application of wireless sensor network (WSN). Mining area Monitoring System for Methane is very important because it guarantees the coal mine production safety. Automatic calibration technologies were useful for reduce the impacts of methane sensor's stability that led to shortcomings of traditional gas detector, such as frequent recalibration, high maintenance cost, and high false alarm rate : this paper described the hardware architecture of a mini intelligent methane sensor and the algorithmic research for maintenance-free techniques and technologies in WSN. the intelligent methane sensor is used as a sensing node to form a real-time methane monitoring network. the network connectivity can be used not only for methane data collection but also for the calibration and diagnosis of the sensors through data processing of the nearby sensing node, which provided the effective supporting for automatic calibration of the single intelligent methane detector. An intelligent methane sensor system equipped withthe network connectivity can perform the calibration autonomously in the field, and there is no need to prepare standard gases for each system as in the conventional calibration.
暂无评论