the proceedings contain 102 papers. the topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key base...
详细信息
ISBN:
(纸本)9780769531724
the proceedings contain 102 papers. the topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control;securing wireless data networks against eavesdropping using smart antennas;on security vulnerabilities of null data frames in ieee 802.11 based WLANs;identifying frequent items in P2P systems;on the impact of mobile hosts in peer-to-peer data networks;is random scheduling sufficient in P2P video streaming?;circumventing server bottlenecks;indirect large-scale P2P data collection;detecting click fraud in pay-per-click streams of online advertising networks;exploring anti-spam models in large scale VoIP systems;distributed divide-and-conquer techniques for effective DDoS attack defenses;and mobility-assisted spatiotemporal detection in wireless sensor networks.
the deployment of sensor networks in an aquatic environment has been severely limited because of the unpredictable nature of the underwater environment. Building a low-cost, energy and resource efficient Underwater Wi...
详细信息
ISBN:
(纸本)9780889867307
the deployment of sensor networks in an aquatic environment has been severely limited because of the unpredictable nature of the underwater environment. Building a low-cost, energy and resource efficient Underwater Wireless sensor Network (UWSN) will open new vistas in the areas of ocean, river and lake monitoring and exploration. In this paper we present a novel architecture for a hypothetical UWSN that could be deployed in the Bay-of-Bengal. this UWSN is an N-tier model withsensor nodes deployed at varying depths along the ocean column. the network can be re-configured based on the deployment scenario and the application. this paper also discusses various issues involved in developing a cross-layer protocol for the architecture proposed.
Existing solutions for top-k queries in wireless sensor networks mainly focused on energy efficiency and little attention has been paid to the response time to answer a top-k query as well as the relationship between ...
详细信息
ISBN:
(纸本)9780769534343
Existing solutions for top-k queries in wireless sensor networks mainly focused on energy efficiency and little attention has been paid to the response time to answer a top-k query as well as the relationship between the response time and the network lifetime. In this paper we address this issue explicitly by studying the top-k query problem in sensor networks withthe response time constraint. We aim at finding an energy-efficient routing tree and devising an evaluation algorithm for top-k queries on the tree such that the network lifetime is significantly prolonged, provided that the query response time constraint is met too. To do so, we propose a novel joint optimization framework of finding a routing tree and devising a filter-based evaluation algorithm on the tree. We also conduct extensive experiments by simulation to evaluate the performance of the proposed algorithms. the experimental results showed that the joint optimization framework prolongs the network lifetime significantly under a given response time constraint.
An important problem in wireless location systems especially in urban environment is the non-line-of-sight (NOLS) error. In this paper, we propose a novel NLOS error elimination algorithm based on distributed multi-an...
详细信息
In a wireless sensor network, an adversary may crack legal nodes or deploy malicious nodes to launch various attacks. these nodes are collectively called compromised nodes. In this paper, we define a Data Transmission...
详细信息
Enhanced distributed Control Function (EDCF) can guarantee inter-AC (Access Category) differentiation for wireless ad hoc networks. However, it ignores the intra-AC differentiation. this paper proposes a new function ...
详细信息
ISBN:
(纸本)9780769533223
Enhanced distributed Control Function (EDCF) can guarantee inter-AC (Access Category) differentiation for wireless ad hoc networks. However, it ignores the intra-AC differentiation. this paper proposes a new function to adjust the contention window in 802.11e to guarantee both inter-AC differentiation and intra-AC one. Our goal is to alleviate the delay, collisions and increase the throughput by decreasing collisions whet? the loads of the network are heavy. the mail? contribution of our algorithm, which takes flow priority and nodes density into consideration and can be adaptively adjusted according to recent network conditions, is to smooththe collision by tuning the contention window. We also present a theoretical throughput analysis on our new function. the experiment results indicate that our scheme outperforms ieee802.11e EDCF in terms of packet delay, throughput and collisions.
Geographic routing has been considered as an energy efficient and simple routing protocol for wireless sensor networks. It utilizes only geographical location information without global network structures to route dat...
详细信息
ISBN:
(纸本)9781424421077
Geographic routing has been considered as an energy efficient and simple routing protocol for wireless sensor networks. It utilizes only geographical location information without global network structures to route data packets. To take these advantages of geographic routing, a source node should be aware of the location of a sink node. Methods that the source node efficiently obtains the sink location information, however, have been scantily studied yet. In this paper, we propose a Restricted Linear Flooding Scheme to Obtain Sink Location in Wireless sensor Networks. the source node sends location query message and the sink node sends location announcement message to specified direction respectively, the node located on a crossing point of these two message forwarding paths informs the source node about the sink location information. then the source node sends data to the sink node by geographic routing. the proposed scheme also constructs a virtual restricted linear flooding zone Inside the network to guarantee the existence of the crossing point. Simulation results show that proposed scheme is more efficient In terms of energy consumption than existing protocols.
In the recent years, wireless sensor networks have attracted a lot of attention due to their broad application areas. In many application scenarios, hundreds or thousands of sensor nodes may be deployed in the physica...
详细信息
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. the performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its ...
详细信息
ISBN:
(纸本)9781424421077
Sensing coverage and energy consumption are two primary issues in wireless sensor networks. the performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In real-world applications, it Is unrealistic to guarantee all sensors have the same energy because they have different energy consumption. Moreover, sensors redeployment also results in the heterogeneous energy capacities. In this paper, an energy-efficient Area Coverage protocol for Heterogeneous Energy sensor networks (ACHE) is proposed. ACHE can achieve a good performance in terms of sensing area coverage, lifetime by minimizing energy consumption for control overhead, and balancing the energy load among all nodes. Adopting the hierarchical clustering Idea, ACHE elects the active nodes based on the average residual energy of neighboring nodes and its own residual energy parameters. Our simulation study and analysis demonstrate that ACHE not only provide the high quality of sensing coverage, but also has the good performance in the energy efficiency. In addition, ACHE can better adapt the applications withthe great heterogeneous energy capacities in the sensor networks.
Localisation algorithms are of key importance to Wireless sensor Networks, because they provide the information required to join the data sensed by each sensor. Protocol, application security and data integrity is par...
详细信息
ISBN:
(纸本)9780769533308
Localisation algorithms are of key importance to Wireless sensor Networks, because they provide the information required to join the data sensed by each sensor. Protocol, application security and data integrity is paramount for these networks that monitor critical infrastructures. However, current range-based distributed localisation algorithms are very sensible to faulty behaviour. A single faulty node may prevent every other node to know its position and everyone else position. In this work we show how to modify range-based distributed localisation algorithms in order to improve its resilience to faulty behaviour. We also conclude that the resilience cannot be improved further, with current algorithms, without changing the density of the network.
暂无评论