Security is one of the major issue for the Ubiquitous sensor Networks' (USNs) applications. the evolution of Ubiquitous sensor networks provides a unique solution for many ubiquitous information services. Apparent...
详细信息
this paper presents an efficient mechanism to achieve significant energy savings in heterogeneous wireless sensor networks such as HPWREN. Environmental sensors are typically located in remote and hard-to-reach locati...
详细信息
ISBN:
(纸本)9781424435173
this paper presents an efficient mechanism to achieve significant energy savings in heterogeneous wireless sensor networks such as HPWREN. Environmental sensors are typically located in remote and hard-to-reach locations far from the main high-bandwidth data links. therefore the sensed data needs to be routed through multiple hops before reaching the backbone. the routing is done by battery-powered nodes using license free radios such as 802.11. In this context, minimizing energy consumption is critical to maintaining operational data links. We propose a distributed low-power scheduling algorithm that limits the number of active nodes and allows a large portion of nodes to sleep. the algorithm works in a completely distributed manner, requiring handshaking only when a node enters and exits the network. Routing of packets relies on a dynamically changing backbone of nodes. the nodes of the backbone provide connectivity and are responsible for delivering the packets to the proper destinations. the proposed solution sits on top of the unmodified MAC layer so that legacy network devices can be used, and expensive hardware/software modifications are avoided. thus our solution is cheap yet easily deployable. Our results show up to 60% energy savings per battery operated node while maintaining efficient data delivery.
the proceedings contain 11 papers. the topics discussed include: an approach for wireless sensor networks topology control in indoor scenarios;securing wireless mesh networks: a winning combination of routing and forw...
ISBN:
(纸本)9781605587752
the proceedings contain 11 papers. the topics discussed include: an approach for wireless sensor networks topology control in indoor scenarios;securing wireless mesh networks: a winning combination of routing and forwarding mechanisms;on using grid of collocated APs to improve performance of wireless VoD systems;a connection level model for ieee 802.11 cells;optimal wavelength converter allocation: a new approach based MOEA;goalbit: the first free and open source peer-to-peer streaming network;early traffic classification using support vector machines;MONTE: an implementation of an MPLS online traffic engineering tool;evaluating the impact of an acknowledgment strategy for APRP;enhancements to the opinion model for video-telephony applications;and a new user behavior model and QoE determination on short-message-service.
this paper investigates distributed range-free localization in wireless networks using a communication protocol called sum-dist which is commonly employed by localization algorithms. Withthis protocol, the reference ...
详细信息
ISBN:
(纸本)9781424435173
this paper investigates distributed range-free localization in wireless networks using a communication protocol called sum-dist which is commonly employed by localization algorithms. Withthis protocol, the reference nodes flood the network in order to estimate the shortest distance between the reference and blind nodes. Existing localization algorithms that use this communication protocol only evaluate the shortest distance. Our approach is somewhat different in that we optimize the localization performance for this communication protocol. We present a new algorithm called COM-LOC which exploits a certain part of the information inherent in the protocol that other algorithms consider as redundant or false information. We show that the use of this additional part of information increases the performance compared to other range-free algorithms by 68% to 206%. Other comparisons with several RSS-based localization algorithms show that COM-LOC outperforms these algorithms under a wide range of conditions, while keeping the communication costs equal.
distributed spectrum sensing provides an improvement for primary user detection but leads a, new security threat into CR system. the spectrum sensing data falsification malicious users can decrease the cooperative sen...
详细信息
ISBN:
(纸本)9783642040191
distributed spectrum sensing provides an improvement for primary user detection but leads a, new security threat into CR system. the spectrum sensing data falsification malicious users can decrease the cooperative sensing performance. In this paper, we propose a distributed scheme in which the presence and absence hypotheses distribution of primary signal is estimated based on past sensing received power data by robust statistics, and the data fusion are performed according to estimated parameters by Dempster-Shafer theory of evidence. Our scheme can achive a powerful capability of malicious user elimination due to the abnormality of the distribution of malicious users compared withthat of other legitimate users. In addition, the performance of our data, fusion scheme is enhanced by supplemented nodes' reliability weight.
distributed Virtual Environments such as Massive Multiplayer Online Games or Virtual Worlds have become very popular in the last few years and a more substantial surge in popularity and use is expected. Because of the...
详细信息
In timing analysis attackers study the transmission pattern of different nodes in a network withthe goal of extracting information about users, applications, or the structure of the network, even when the traffic is ...
详细信息
ISBN:
(纸本)9781424453337
In timing analysis attackers study the transmission pattern of different nodes in a network withthe goal of extracting information about users, applications, or the structure of the network, even when the traffic is encrypted. Defeating timing analysis attacks requires expensive traffic mixing measures that equalize the transmission pattern at all nodes;such measures are especially expensive for battery operated wireless devices. In this paper, we first introduce TARP, a traffic mixing approach for defeating timing analysis tailored towards sensor networks. While TARP improves on traffic mixing approaches by combining multiple packets destined to different destinations in a single frame (amortizing packet overhead), traffic mixing remains expensive. To this end, we propose two techniques for improving the energy efficiency of TARP: (1) Using multi-path routing to exploit the available capacity engineered to defeat timing analysis;and (2) Adaptive transmission control to allow the transmission pattern to be adapted to the offered load without exposing the structure of the network. Furthermore, we define and explore the notion of relaxed timing analysis resilience where resilience is provided with a limited scope that is well defined in space and/or time. By controlling the scope to fit the application requirements, substantial savings in energy (or delay) can be achieved, while retaining desired levels of timing analysis resilience. Together, the proposed techniques significantly reduce the overhead of TARP, making timing analysis resilience more affordable for critical applications.
AODV routing protocol, which is simple and efficient, is often used in the wireless sensor network to transmit data. However, AODV routing protocol constructs the path from the source node that detects the target to t...
详细信息
there is considerable interest in using wireless and mobile technologies in patient monitoring in diverse environments particularly in hospitals and nursing homes. there is growing research interest in determining how...
详细信息
the localization technology is very important in wireless sensor network. Many localization algorithms have been proposed in recent year, in which DV-Hop is the prevail localization algorithm. But the DV-Hop algorithm...
详细信息
暂无评论