this paper focuses on the optimization of computation cost for agent platform, which appears due to complex security operations. Traditionally, a security manager is integrated within an agent platform, which performs...
详细信息
ISBN:
(纸本)9781424408504
this paper focuses on the optimization of computation cost for agent platform, which appears due to complex security operations. Traditionally, a security manager is integrated within an agent platform, which performs these operations for every mobile agent visiting the platform. To reduce the security costs at the agent platform, a detached security manager is used, which performs complex security operations on behalf of multiple agent platforms. the detached security manager is a security controlling authority for a set of agent platforms. It provides load balancing of mobile agents and enables quick agent migration between platforms. A variation of the detached security manager is a distributed security manager which provides fault tolerant and reliability in terms of a security process. A comparison of these variations of security concludes that the gained merits - savings in efficiency and performance depend very much upon the requirements of the system which adopt it.
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. the motivation for tackling this problem comes directly front the highly constrained nature of WSN and...
详细信息
ISBN:
(纸本)9781424410309
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. the motivation for tackling this problem comes directly front the highly constrained nature of WSN and its easy exposure to insecure conditions. In this paper, we adopt a reputation-based methodology which has not been studied in depth as an appropriate solution for secure routing in WSN. this research work proposes an optimized reputation system framework for WSN, named as WSNodeRater which includes some novel sensor node monitoring and rating techniques. Moreover, different optimization methods are also proposed to achieve more efficiency in the reputation system, in terms of security and resources usage.
QoS routing in a wireless sensor network is difficult because the network topology may change constantly, and the available state information for routing is inherently imprecise. Ever more complex sensors have become ...
详细信息
ISBN:
(纸本)9781424410309
QoS routing in a wireless sensor network is difficult because the network topology may change constantly, and the available state information for routing is inherently imprecise. Ever more complex sensors have become available to create and maintain situational awareness during missions. Choosing the most suited sensor for the execution of a sensor function is based on sensor capabilities and function attributes. To increase performance of the entire sensor network, the total set of sensors should be scheduled in a single system. this paper puts forward for scheduling prioritised tasks in sensor networks. Use a reinforcement learning formalism to optimise the set of schedules. In this paper, node actively infer the state of other nodes, using a reinforcement learning based more particularly Q-learning, thereby achieving high throughput by improving the delay for a wide range of traffic conditions.
Mobile sensor Networks (MSNs) consist of large number of small and computationally impoverished devices deployed over an area to track mobile objects. Mobility is becoming an important feature of MSNs. Recently, senso...
详细信息
ISBN:
(纸本)9781424410309
Mobile sensor Networks (MSNs) consist of large number of small and computationally impoverished devices deployed over an area to track mobile objects. Mobility is becoming an important feature of MSNs. Recently, sensors have began to be deployed on mobile platforms such as robots. In this paper, we propose an evaluation of the mobility impact on MSN tracking efficiency. More precisely, we consider the Doppler effect on the results of several target location approaches. Two radar-based angle estimation techniques. have been considered: Frequency-Modulated Continuous. Wave (FMCW) Radar, and monopulse angle estimation. We also analyze the control of the uncertainty due to Doppler shift through a manipulation of the area coverage (i.e., number of sensors per area coverage).
this paper examines the structures that are used by traditional real-time and networked operating systems in order to show that they are poorly suited to providing efficient access to remote devices. It also argues th...
详细信息
ISBN:
(纸本)9780769529752
this paper examines the structures that are used by traditional real-time and networked operating systems in order to show that they are poorly suited to providing efficient access to remote devices. It also argues that efficiency can be improved by being more specific and by making better use of the network mediums characteristics.
Recently, the research trend and developmental tendency of ubiquitous computing technologies have been heading in the direction which seamlessly provides the optimum service to users through context-awareness, analogy...
详细信息
ISBN:
(纸本)9780769528670
Recently, the research trend and developmental tendency of ubiquitous computing technologies have been heading in the direction which seamlessly provides the optimum service to users through context-awareness, analogy and networking with various sensor nodes. there is an overwhelming need to develop the USN middleware platforms that have the functions for processing data, monitoring, merged communication environments and mutual compatibility with a variety of sensor networks. While research on a base technique in regard to hardware and communication of sensor networks is actively advancing, the middleware technique is still in the early stages. this paper identifies some drawbacks in the previous work. USN middleware was proposed to control application services through context-awareness processing, information collection from sensor networks and design of event-centric architecture.
Wireless sensor networks consist of very large number of resource constrained nodes. therefore, protocols and applications for wireless sensor networks need to be very scalable and efficient. To properly evaluate the ...
详细信息
ISBN:
(纸本)9781424410309
Wireless sensor networks consist of very large number of resource constrained nodes. therefore, protocols and applications for wireless sensor networks need to be very scalable and efficient. To properly evaluate the performance of these networks a scalable ad-hoc wireless network simulator is needed. the JIST/SWANS is a highly scalable ad hoc wireless network simulator that has been recently developed. However, JIST/SWANS does not have an energy model or a MAC protocol for wireless sensor networks. In recent work, we developed an energy model for JiST/SWANS. this work presents our implementation of the S-MAC protocol for the JiST/SWANS simulator. the implementation is validated through simulations. Results using JiST/SWANS and NS-2 are obtained and compared for similar network scenarios.
Terminal Mobility is a much more common activity today then it was anticipated a few years back. Mobility itself is a complex phenomenon which is further complicated in a distributed application environment due to abs...
详细信息
ISBN:
(纸本)9781424410309
Terminal Mobility is a much more common activity today then it was anticipated a few years back. Mobility itself is a complex phenomenon which is further complicated in a distributed application environment due to abstraction of cross-platform details and cross-realm handoffs. CORBA is a widely used middleware service used for remote method invocation in distributed applications. Vertical handoffs in cross-realm environment puts a serious constraint on effective resolution of resource names and hence CORBA utility in mobile heterogeneous environment. We propose a robust middleware architecture which takes into account multiple access I services at link-layer performs optimization of connectivity services at middleware withthe help of decision making support provided by application needs and network status. the proposed architecture promises resilient middleware services for terminal mobility.
Empirical studies show that wireless sensor networks (WSNs) are extremely prone to the hidden terminal problem. As much as 50% of packet losses have been blamed to the hidden terminal problem under bursty communicatio...
详细信息
Pervasive computing environments have traditionally used distributedsensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could additionally provide identification informa...
详细信息
暂无评论