A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. this paper shows how WSNs can be ...
ISBN:
(纸本)9783642136504
A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmission. this paper shows how WSNs can be dimensioned, deployed and operated such that both reliable and timely data delivery is ensured while scarce energy is preserved. the presented solution employs a novel Medium Access Control (MAC) protocol that incorporates topology control mechanisms to ensure timely data delivery and reliability control mechanisms to deal with inherently fluctuating wireless links. An industrial process automation and control scenario at an oil refinery in Portugal is used to define protocol requirements. the paper details a TinyOS implementation of the protocol and its evaluation in a testbed. Under high traffic load, the protocol delivers 100% of data in time using a maximum node duty cycle as little as 2.48%. In an idle network a maximum node duty cycle of only 0.62% is achieved. this proposed protocol is thus an extremely energy efficient solution for time-critical data delivery.
Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employed as an ...
详细信息
ISBN:
(纸本)9783642136504
Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers the boundary problem when the target moves across or along the boundary among clusters. In this paper, we propose a novel scheme, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. To overcome the boundary problem, when the target moves close to the boundary among clusters, a dynamic cluster will be constructed for the management of target tracking. As the target moves, static clusters and on-demand dynamic clusters alternately manage the tracking task. Simulation results show that the proposed scheme performs better in tracking the moving target when compared with other typical target tracking protocols.
Wireless Mesh Network (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoin...
详细信息
Wireless Mesh Network (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoint-to-multipoint (M2M) multicasting in a WMN which aims to use the minimum number of time slots to exchange messages among a group of k mesh nodes in a multi-hop WMN with n mesh nodes. We study the M2M multicasting problem in a distributed environment where each participant only knows that there are k participants and it does not know who are other k -1 participants among n mesh nodes. It is known that the computation of an optimal M2M multicasting schedule is NP-hard. We present a fully distributed deterministic algorithm for such an M2M multicasting problem and analyze its time complexity. We show that if the maximum hop distance between any two out of the k participants is d, then the studied M2M multicasting problem can be solved in time O(d log 2 n+k log 3 n/log k) with a polynomial-time computation, which is an almost optimal scheme due to the lower bound Omega(d+ k log n/log k) given in [5]. Our algorithm also improves the currently best known result with running time O(d log 2 n + k log 4 n) in [13]. In this paper, we also propose a distributed deterministic algorithm which accomplishes the M2M multicasting in time O(d+k) with a polynomial-time computation in unit disk graphs. this is an asymptotically optimal algorithm in the sense that there exists a WMN topology, e.g., a line, a ring, a star or a complete graph, in which the M2M multicasting cannot be completed in less than Omega(d+k) units of time.
Most sensor network applications are dominated by the acquisition of sensor values. Due to energy limitations and high energy costs of communication, in-network processing has been proposed as a means to reduce data t...
ISBN:
(纸本)9783642136504
Most sensor network applications are dominated by the acquisition of sensor values. Due to energy limitations and high energy costs of communication, in-network processing has been proposed as a means to reduce data transfers. As application demands may change over time and nodes run low on energy, get overloaded, or simply face debasing communication capabilities, runtime adaptation is required. In either case, it is useful to be able to migrate computations between neighboring nodes without losing runtime state that might be costly or even impossible to recompute. We propose stateful mobile modules as a basic infrastructure building block to improve adaptiveness and robustness of in-network processing applications. Stateful mobile modules are binary modules linked on the node itself. Even more importantly, they can be transparently migrated from one node to another, thereby keeping statically as well as dynamically allocated memory. this is achieved by an optimized binary format, a memory-efficient linking process and an advanced programming support.
Synchronization is widely considered as an important service in distributedsystems which may simplify protocol design. Phase clock is a general synchronization tool that provides a form of a logical time. this paper ...
详细信息
ISBN:
(纸本)9783642136504
Synchronization is widely considered as an important service in distributedsystems which may simplify protocol design. Phase clock is a general synchronization tool that provides a form of a logical time. this paper presents a self-stabilizing (a tolerating state-corrupting transient faults) phase clock algorithm suited to the model of population protocols with covering. this model has been proposed recently for sensor networks with a very large, possibly unknown number of anonymous mobile agents having small memory. Agents interact in pairs in an asynchronous way subject to the constraints expressed in terms of the cover times of agents. the cover time expresses the “frequency” of an agent to communicate with all the others and abstracts agent’s communication characteristics (e.g. moving speed/patterns, transmitting/receiving capabilities). We show that a phase clock is impossible in the model with only constant-state agents. Hence, we assume an existence of resource-unlimited agent - the base *** clock size and duration of each phase of the proposed phase clock tool are adjustable by the user. We provide application examples of this tool and demonstrate how it can simplify the design of protocols. In particular, it yields a solution to Group Mutual Exclusion problem.
We recently proposed in [19,20] to use sequential graph coloring as a systematic algorithmic method to build (1−ε) dominating sets partition in Wireless sensor Networks (WSN) modeled as Random Geometric Graphs (RGG)....
详细信息
ISBN:
(纸本)9783642136504
We recently proposed in [19,20] to use sequential graph coloring as a systematic algorithmic method to build (1−ε) dominating sets partition in Wireless sensor Networks (WSN) modeled as Random Geometric Graphs (RGG). the resulting partition of the network into dominating and almost dominating sets can be used as a series of rotating backbones in a WSN to prolong the network lifetime for the benefit of various applications. Graph coloring algorithms in RGGs offer proven constant approximation guarantees on the chromatic number. In this paper, we demonstrate that by combining a local vertex ordering withthe greedy color selection strategy, we can in practice, minimize the number of colors used to color an RGG within a very narrow window of the chromatic number and concurrently also obtain a domatic partition size within a competitive factor of the domatic number. We also show that the minimal number of colors results in the first (δ+1) color classes being provably dense enough to form independent sets that are (1−ε) dominating. the resulting first (δ+1) independent sets, where δ is the minimum degree of the graph, are shown to cover typically over 99% of the nodes (e.g. ε<0.01), with at least 20% being fully dominating. these independent sets are subsequently made connected through virtual links using localized proximity rules to constitute planar connected backbones. the novelty of this paper is that we extend our recent work in [20] into the distributed setting and present an extensive experimental evaluation of known distributed coloring algorithms to answer the (1−ε) dominating sets partition problem. these algorithms are both topology and geometry-based and yield O(1) times the chromatic number. they are also shown to be inherently localized with running times in O(Δ) where Δ is the maximum degree of the graph.
Big data analytics, in essence, is becoming the revolution of business intelligence around the world. this momentum has given rise to the hype around analytic technologies, including Apache Hadoop. Hadoop was not orig...
详细信息
ISBN:
(数字)9781728176512
ISBN:
(纸本)9781728176529
Big data analytics, in essence, is becoming the revolution of business intelligence around the world. this momentum has given rise to the hype around analytic technologies, including Apache Hadoop. Hadoop was not originally developed with security in mind. Despite the evolving efforts to integrate security in Hadoop through developing new tools (e.g., Apache Sentry and Ranger) and employing traditional mechanisms (e.g., Kerberos and LDAP), they mainly focus on providing encryption and authentication features, albeit with limited authorization support. Existing solutions in the literature extended these evolving efforts. However, they suffer from limitations, hindering them from providing robust authorization that effectively meets the unique requirements of big data environments. Towards covering this gap, this paper proposes a hybrid authority (HBD-Authority) as a formal attribute-based access control model with context support. this model is established on a novel hybrid approach of authorization transparency that pertains to three fundamental properties of accuracy: correctness, security, and completeness. the model leverages streaming data analytics to foster distributed parallel processing capabilities that achieve multifold benefits: a) efficiently managing the security policies and promptly updating the privileges assigned to a high number of users interacting withthe analytic services; b) swiftly deciding and enforcing authorization of requests over data characterized by the 5Vs; and c) providing dynamic protection for data which is frequently updated. the implementation details and experimental evaluation of the proposed model are presented, demonstrating its performance efficiency.
Service Oriented Architecture (SOA) is a prevalent paradigm to construct a loose coupling,flexible,scalable *** are many researches on service computing and building applications with *** many enterprises do not only ...
详细信息
Service Oriented Architecture (SOA) is a prevalent paradigm to construct a loose coupling,flexible,scalable *** are many researches on service computing and building applications with *** many enterprises do not only have data-centric applications but also have real-time application systems which need more reliability,efficiency and real *** real-time applications must collect and analyses data from a large variety of heterogeneous sensors and give decisions *** such real-time applications with SOA methodology becomes a *** researches on Internet of things (IOT) and Cyber Physical systems (CPS) are facing similar problems that how to construct distributed control application systems with novel service *** this paper,we show a SOA-based real-time service bus model which can be used to support constructing such distributed Real-time Control systems (DRCS) and discuss the bus mechanism in detail.
暂无评论