Network neighborhoods are a key communication abstraction in sensor networks, allowing sensor nodes to collect and aggregate sensor data from nearby other nodes. In many applications, multi-hop neighborhoods of severa...
详细信息
ISBN:
(纸本)9784907764319
Network neighborhoods are a key communication abstraction in sensor networks, allowing sensor nodes to collect and aggregate sensor data from nearby other nodes. In many applications, multi-hop neighborhoods of several nodes overlap, such that nodes participate in many neighborhoods, having to contribute their data items to all containing neighborhoods. We consider two orthogonal approaches to efficiently support this data aggregation problem. A push-based approach, where each node floods its data item in a multi-hop neighborhood, and a pull-based approach, where each node collects data from nodes in a multi-hop network neighborhood using a spanning tree. Our goal is to identify situations where one approach outperforms the other. For this, we Implement these protocols in TOSSIM, study overhead and yield as a function of the fraction of nodes in the network that perform data aggregation over a multi-hop neighborhood, and report our findings.
this paper outlines a new research project (CREST) for structure health monitoring. the purpose is to develop a networked sensor for static, full-axis deformation of large and long structures such as bridges, roads, a...
详细信息
ISBN:
(纸本)9784907764319
this paper outlines a new research project (CREST) for structure health monitoring. the purpose is to develop a networked sensor for static, full-axis deformation of large and long structures such as bridges, roads, and railways. We propose a novel technique based on the combined use of an optical vortex (OV) beam and correlation image sensors (CIS). Since the beam profile of OV involves definitive features known as zeros or phase singularities and they are invariant through propagation, we can encode and transmit information to determine geometrical relations between the sender and receiver nodes. By demodulating in amplitude and phase profile of OV using the CIS, all (three lateral and three rotational) displacement components can be determined. the basic optical setup is presented and the results of the fundamental experiments are shown.
Improvement of localization technique for wireless sensor nodes is an important challenge to realize free applications of wireless sensor networks. Effective utilization of range data is necessary because constraints ...
详细信息
ISBN:
(纸本)9784907764319
Improvement of localization technique for wireless sensor nodes is an important challenge to realize free applications of wireless sensor networks. Effective utilization of range data is necessary because constraints on their hardware resources are very hard and specific on their situations. Utilization or wireless connection strengths (WCS) Is efficient strategy;however, localization performances of conventional methods using a WCS are not stable because the amount of range data varies depending on network topology and the methods can use only "single" WCS. In this paper, two types or range data fusions arc proposed to advance the effective utilization of range data. In the first, "multiple' WCS are utilized by the range-inequality-based localization method to allow a localization on free network topology. In the second, both known ranges and range inequalities are utilized to allow free node design suited for each situation.
Information fusion still faces many problems in WSN (Wireless sensor Networks). So far, uniform and accurate definition about information fusion of WSN is rare. Because WSN provides set-vice to the users, we take user...
详细信息
ISBN:
(纸本)9780769532882
Information fusion still faces many problems in WSN (Wireless sensor Networks). So far, uniform and accurate definition about information fusion of WSN is rare. Because WSN provides set-vice to the users, we take user's requirements as a springboard. To analyze common information fusion definitions and considering adequately the most important factor-users requirements, then, a novel definition about information fusion of WSN appeared;hereby an original method of information fusion classification in view of user's requirements based on SOM (Self-Organizing Feature Map) is given. SOM is powerful in processing magnanimous clustering information. It is the point that we take it as one infusion method in our structure. Experiments were done proved that different methods fitted different users requirements to make user satisfied the advantage is that such classification and disposal method according with particular characters of WSN not only can obtain more exact and more general information in application but also can assist in intelligence decision-making later.
We propose a set of distributed algorithms for in-network path planning that enables a distributedsensor network navigation service in dynamic environments. Different from existing algorithms that use frequent or per...
详细信息
We propose a set of distributed algorithms for in-network path planning that enables a distributedsensor network navigation service in dynamic environments. Different from existing algorithms that use frequent or periodic flooding, our algorithms exploit geographic information of sensors to construct and maintain navigation links. Based on a partial reversal method of directed acyclic graphs, our algorithms ensure that each source sensor has at least one safe navigation path to one of the multiple destination sensors.
We address the problem of pollution attacks in coding based distributed storage systems proposed for wireless sensor networks. In a pollution attack, the adversary maliciously alters some of the stored encoded packets...
详细信息
We address the problem of pollution attacks in coding based distributed storage systems proposed for wireless sensor networks. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets. We believe that our proposed algorithms are suitable in practical systems.
We propose a fair bandwidth allocation scheme for multi-radio multi-channel wireless mesh networks (WMNs) using distributed algorithm. through an extensive simulation, we show that our scheme ensures per node fairness...
详细信息
We propose a fair bandwidth allocation scheme for multi-radio multi-channel wireless mesh networks (WMNs) using distributed algorithm. through an extensive simulation, we show that our scheme ensures per node fairness without loss of the total aggregate throughput.
We have been developing wireless communication technologies for industrial applications. In industrial plants, there art many radio obstacles such as metal pipes and walls. Even in the severe environment, wireless com...
详细信息
ISBN:
(纸本)9784907764319
We have been developing wireless communication technologies for industrial applications. In industrial plants, there art many radio obstacles such as metal pipes and walls. Even in the severe environment, wireless communication has to be reliable and time has to be scheduled to maintain plant stability. For easy-to-use management, features of ad-hoc construction and low power management are also required. Our research is to develop architecture and technologies that satisfy these features. In this demonstration, we will explain core technologies and industrial applications that we developed.
the proceedings contain 23 papers. the special focus in this conference is on NCUS 2006 Symposium. the topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechani...
ISBN:
(纸本)3540688544
the proceedings contain 23 papers. the special focus in this conference is on NCUS 2006 Symposium. the topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechanism in peer-to-peer networks;ubiqstor: server and proxy for remote storage of mobile devices;packet length adaptation for energy-proportional routing in clustered sensor networks;a new context script language for developing context-aware application systems in ubiquitous computing;dynamic replication strategies for object storage systems;a cost-effective mobility modelling in nested network mobility;completing uml model of component-based system with middleware for performance evaluation;energy efficient PNC selection procedure for the ieee 802.15.3-Based HR-WPAN;an efficient multicast routing protocol in multi-rate wireless ad hoc networks;WPAN platform design in handset integrating cellular network and its application to mobile games;reliable transporting and optimal routing on rate-based for ad hoc networks;and automatic extraction of conversation protocols from a choreography specification of ubiquitous web services;inter-sector interference mitigation method in triple-sectored OFDMA systems.
We propose five slot scheduling algorithms for wireless mesh networks (WMNs) using a time division multiple access (TDMA)-based medium access control (MAC) protocol. A preliminary comparative study is carried out thro...
详细信息
We propose five slot scheduling algorithms for wireless mesh networks (WMNs) using a time division multiple access (TDMA)-based medium access control (MAC) protocol. A preliminary comparative study is carried out through simulation.
暂无评论