this paper presents a light-weight hybrid protocol called Bin-MAC (Binary Medium Access Control) for highly resource-constrained wireless sensor nodes. In addition to simplicity and low footprint, a distinguishing fea...
详细信息
this paper presents a light-weight hybrid protocol called Bin-MAC (Binary Medium Access Control) for highly resource-constrained wireless sensor nodes. In addition to simplicity and low footprint, a distinguishing feature of Bin-MAC is its deterministic contention resolution mechanism, which enables it to achieve bounded latency on data transmissions. As a result, Bin-MAC can be applied to delay-sensitive applications with real-time constraints, a feature not provide by most of the existing hybrid protocols. Another feature of the proposed protocol is that it requires carrier-sensing hardware only on the base station side, and sensor nodes do not have to possess such capability. Bin-MAC does not require clock synchronization, and thus clock drifts have no impact on its performance. Experimental results show Bin-MAC to be scalable and able to handle large network sizes without noticeable performance degradation.
A P2P network is an important computing model because of its scalability, adaptability, self-organization, etc. How to organize the nodes in P2P networks effectively is an important research issue. the node clustering...
详细信息
ISBN:
(纸本)9783642173127
A P2P network is an important computing model because of its scalability, adaptability, self-organization, etc. How to organize the nodes in P2P networks effectively is an important research issue. the node clustering aims to provide an effective method to organize the nodes in P2P networks. this paper proposes a distributed node clustering mechanism based on nodes' queries in P2P networks. In this mechanism, we propose three algorithms: maintaining of node clusters, merging of node clusters and splitting of node clusters. theoretical analysis shows the time and communication complexity of this clustering mechanism is low. Simulation results show that the clustering accuracy of this clustering mechanism is high.
the fast-paced evolution of ICT technology is revolutionizing our every day life, endowing us with a seamless digital assistant accessible through smart-devices. In this context, even the way we approach tourism and h...
详细信息
this paper discusses a supporting tool for distributed individual work to develop specifications in cooperative situation. Our supporting tool consists of two parts—one is method base for individual use, and another ...
详细信息
In classifying malware, an open research question is how to combine similar extracted data from program analyzers in such a way that the advantages of the analyzers accrue and the errors are minimized. We propose an a...
详细信息
the proceedings contain 29 papers. the special focus in this conference is on Ad Hoc Networks and Wireless. the topics include: Demo: Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle ...
ISBN:
(纸本)9783030002466
the proceedings contain 29 papers. the special focus in this conference is on Ad Hoc Networks and Wireless. the topics include: Demo: Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle attack;a fuzzy based energy aware unequal clustering for wireless sensor networks;the trade-offs of cell over-provisioning in ieee 802.15.4 TSCH networks;wireless network for in-car communication;Enhanced dynamic duty cycle in LoRaWAN network;Specificities of the LoRa™ physical layer for the development of new ad hoc MAC layers;A comparative evaluation of the performance of the multi-hop IoB-DTN routing protocol;Performance of selection combining macro diversity with outage probability constraint in LPWAN;Authenticated preambles for denial of service mitigation in LPWANs;Multi-path selection in RPL based on replication and elimination;communication architecture for unmanned aerial vehicle system;DACAR: distributed & adaptable crosslayer anticollision and routing protocol for RFID;low frequency mobile communications in underwater networks;FPMIPV6-S: An enhanced mobility protocol for 6LoWPAN-based wireless mobile sensor networks;collaborative state estimation and actuator scheduling for cyber-physical systems under random multiple events;game-based data muling as a service in infrastructureless area;distributed computations in wireless sensor networks by local interactions;SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale;constructing customized multi-hop topologies in dense wireless network testbeds;f-Interop platform and tools: Validating IoT implementations faster;performance evaluation of a rpl hybrid objective function for the smart grid network;latency and lifetime optimization for k-anycast routing algorithm in wireless sensor networks.
Existing network reprogramming protocols target the efficient, reliable, multi-hop dissemination of application updates in sensor networks, but assume correct or fail-stop behavior from participating sensors. Compromi...
详细信息
Existing network reprogramming protocols target the efficient, reliable, multi-hop dissemination of application updates in sensor networks, but assume correct or fail-stop behavior from participating sensors. Compromised nodes can subvert such protocols to result in the propagation and remote installation of malicious code. Sluice aims for the progressive, resource-sensitive verification of updates in sensor networks to ensure that malicious updates are not disseminated or installed, while trusted updates continue to be efficiently disseminated. Our verification mechanism provides authenticity and integrity through a hash-chain construction that amortizes the cost of a single digital signature over an entire update. We integrate Sluice with an existing network reprogramming protocol and empirically evaluate its effectiveness both in a real sensor testbed and through simulation.
Spatially distributedsensor nodes can be used to monitor systems and humans conditions in a wide range of application domains. A network of body sensors in a community of people generates large amounts of contextual ...
详细信息
Spatially distributedsensor nodes can be used to monitor systems and humans conditions in a wide range of application domains. A network of body sensors in a community of people generates large amounts of contextual data that requires a scalable approach for storage and processing. Cloud computing can provide a powerful, scalable storage and processing infrastructure to perform both online and offline analysis and mining of body sensor data streams. this paper presents BodyCloud, a system architecture based on Cloud computing for the management and monitoring of body sensor data streams. It incorporates key concepts such as scalability and flexibility of resources, sensor heterogeneity, and the dynamic deployment and management of user and community applications.
A lot of attention has been given to network quality of service and efforts to make layers on top of the network also QoS-aware increase noticeably. this paper explores QoS-aware service provisioning at a level close ...
详细信息
the ieee 802.16 standard of wireless mesh networks includes various scheduling algorithms, both centralized and distributed, to determine the proper time slot that each wireless node can transmit its data. In this pap...
详细信息
the ieee 802.16 standard of wireless mesh networks includes various scheduling algorithms, both centralized and distributed, to determine the proper time slot that each wireless node can transmit its data. In this paper, we introduce a new scheduling scheme to improve scalability and resource utilization in wireless mesh networks where all nodes compete to gain access to the transmission time slot. In our proposed method, the transmission time of a node is modified according to the transmission status of its neighbors, resulting in a shorter holdoff time, and consequently, reducing the transmission delay and throughput. the simulation results confirm the efficiency and performance of the proposed algorithm over the ieee 802.16-mesh standard in terms of throughput and delay.
暂无评论