Wireless Sensor Networks (WSNs) are collection of large number of sensor nodes that are used for essential monitoring purposes. they include many applications such as military and security applications, elementary mon...
详细信息
ISBN:
(纸本)9781509030385
Wireless Sensor Networks (WSNs) are collection of large number of sensor nodes that are used for essential monitoring purposes. they include many applications such as military and security applications, elementary monitoring, seismic monitoring, industrialized automation, wellness and robust monitoring etc. Due to its distributed nature and interconnected network approach, they are considered common target among attackers. WSNs are unprotected due to many attacks like illegal access, malicious node attack, wormhole attack, jamming attack, insider attack, cloning attack, routing attack and node capturing attack etc. Node capturing attack leads to node replication attack which is considered dangerous because after capturing node, attacker may extract all the encrypted information and further introduce many insider attacks. In node replication attack, attacker tries to capture the sensor node and if he becomes successful then he generates the replica which appears to be genuine. this paper reviews the various types of identification schemes and protocols contrary to replication attack.
Object tracking is an important application of Wireless Sensor Networks (WSNs). One of the main challenges for designing an object tracking technique is energy conservation. Prediction based strategies are used to sav...
详细信息
ISBN:
(纸本)9781509030385
Object tracking is an important application of Wireless Sensor Networks (WSNs). One of the main challenges for designing an object tracking technique is energy conservation. Prediction based strategies are used to save energy. We consider an application where a WSN is installed in a forest for tracking the movement of animals (objects). Since, animals move in certain paths rather moving entirely randomly, we attempt to use this property. the movement patterns of the objects are extracted using a data mining technique. this information is used to predict the object movement withthe aim to reduce the energy consumption in tracking. In situations where the prediction is erroneous, we propose a systematic recovery mechanism. the recovery mechanism has three levels. the number of additional nodes woken up progressively increases withthe increase in the recovery level. If an object has been detected at a lower level, normal operations are resumed. It is observed that there are significant energy savings due to this systematic recovery mechanism. the proposed technique, called DESPOT, is fully distributed and energy efficient. We have carried out extensive simulation of DESPOT and have compared its performance with an existing technique, called PTSP. Simulation results show that DESPOT conserves significant energy and it has a better tracking efficiency than PTSP.
Simulating systems with evolving relational structures on massively parallel computers require the computational work to be evenly distributed across the processing resources throughout the simulation. Adaptive, unstr...
详细信息
the proceedings contain 16 papers. the special focus in this conference is on Cloud computing, Software Defined networking, Internet-of-the-things, Vehicular Networks, Algorithms for Cellular Networks, Security and Se...
ISBN:
(纸本)9783319527116
the proceedings contain 16 papers. the special focus in this conference is on Cloud computing, Software Defined networking, Internet-of-the-things, Vehicular Networks, Algorithms for Cellular Networks, Security and Self-organizing Networks. the topics include: Estimation of synchronization time in cloud computing architecture;case study on synchronization of educational data;novel core network architecture for 5G based on mobile service chaining;RF-based monitoring, sensing and localization of mobile wireless nodes;a solution for tracking visitors in smart shopping environments;communication requirements for optimal utilization of LV power distribution systems;proposing a new solution to reduce the international roaming call cost;generic wireless network system modeler;distributedcomputing of management data in a telecommunications network;coding schemes for heterogeneous communication links using channel bundling;security in mobile computing;attack vectors, solutions, and challenges;information security risk analysis of vehicular ad hoc networks;automatic definition and application of similarity measures for self-operation of network and processing time comparison of a hardware-based firewall and its virtualized counterpart.
MapReduce is the renowned distributed and parallel programming model with an extensive support for large scale computing. However, the performance of MapReduce is currently limited by the default scheduler as it is no...
详细信息
ISBN:
(纸本)9781509030385
MapReduce is the renowned distributed and parallel programming model with an extensive support for large scale computing. However, the performance of MapReduce is currently limited by the default scheduler as it is not suitable for heterogeneous environments and it does not consider certain user constraints such as deadlines. the paper proposes a deadline aware scheduling algorithm that selectively uses speculative execution when the job approaches its deadline in order to expedite job's execution. the algorithm is implemented on the heterogeneous Hadoop cluster and the evaluation shows significant improvement in the performance. the performance improvement was observed as the number of jobs that miss the deadlines as well as overall execution time for different workloads was minimized
Web technology is ubiquitous in modern life, enabling various forms of communication in real time between the users and computers, as well as between network devices, by means of artificial (markup) languages and casc...
ISBN:
(纸本)9781614997726
Web technology is ubiquitous in modern life, enabling various forms of communication in real time between the users and computers, as well as between network devices, by means of artificial (markup) languages and cascading style sheets (CSS). Multimedia packages implemented in the WWW can also further expand the user groups to include, for example, the amblyopic or the hearing-impaired. According to Microsoft, Web technology also encompasses Web servers and programming languages for building Web applications. But such a breathtaking development that meets dynamically changing new emerging networking standards demands a large-scale infrastructure that will enable us to access digital information in its every form, whatever its purpose. this book presents 20 papers and 3 keynote speeches from the 8thinternationalconference on Applications of Digital Information and Web Technologies (ICADIWT 2017), held at the Universidad Autnoma de Ciudad Jurez, Jurez City, Chihuahua, Mexico, in March 2017. Over the years, the ICADIWT conference has created its own research community of participants from many countries, who attend the event each year to demonstrate and discuss their research findings. the community is growing every year. the scope of the ICADIWT 2017 conference covers a wide range of research areas, and the papers in the book are divided into 7 subject areas: pattern recognition; distributedcomputing; mobile technologies; digital technologies for aerospace; medical systems applications; system engineering; and control systems.
In deregulated electricity market determination of available transfer capability (ATC) in advance becomes necessary to use whole existing transmission network efficiently and economically. this work considers optimal ...
详细信息
ISBN:
(纸本)9781509030385
In deregulated electricity market determination of available transfer capability (ATC) in advance becomes necessary to use whole existing transmission network efficiently and economically. this work considers optimal power flow (OPF) based method to estimate ATC when probabilistic solar power is injected into the system as active power source. Novel voltage sensitivity indices are considered for the optimal placement of solar power generation into the transmission network. Probabilistic demand is incorporated by considering load variations as normally distributed random variables. Monte Carlo sampling (MCS) and Latin Hypercube sampling (LHS) techniques are considered to extract samples from the normally distributed load samples. Simulation result shows a significant reduction in ATC values occur when probabilistic load is taken into account, as compare to the steady load.
Pervasive computing provides an exciting paradigm for supporting anywhere anytime services, and is built on the tremendous advances made in a broad spectrum of technologies including wireless communication, wireless a...
Pervasive computing provides an exciting paradigm for supporting anywhere anytime services, and is built on the tremendous advances made in a broad spectrum of technologies including wireless communication, wireless and sensor networking, mobile and distributedcomputing, as well as signal and information processing. Pervasive computing enables computers to interact withthe real world in a ubiquitous and natural manner. the objective of the 8th IEEE PerCom international Workshop on Information Quality and Quality of Service for Pervasive computing (IQ2S 2017) is to provide a forum to exchange ideas, present results, share experience, and enhance collaborations among researchers, professionals, and application developers in various aspects of Quality of Information, Quality of Experience, and Quality of Service for pervasive computing in network contexts including wireless, mobile and sensor networks.
Ensuring dynamic behavior, accountability, and flexible management is required by any traffic engineering solution. Software Defined networking (SDN), presenting a central management control, is a promising solution i...
详细信息
Ensuring dynamic behavior, accountability, and flexible management is required by any traffic engineering solution. Software Defined networking (SDN), presenting a central management control, is a promising solution in this context. However, the migration to SDN is not straightforward. SDN and non-SDN based networks will coexist for a long period of time. this hybrid mode brings together the distributednetworking scheme benefits in terms of robustness and scalability, and the SDN management power gained by the control centralization. At the same time, it avoids the centralization single point of failure and the distributed scheme's management complexity. In this paper, we review research work related to hybrid networks and we present a solution to guarantee Quality of Service (QoS) for time-critical applications over a hybrid network.
the need for a safe and economically efficient traffic represents a challenge for creating traffic management systems. this paper deals with merging three basic concepts, namely cloud-based technologies, agent-based a...
详细信息
ISBN:
(纸本)9781509041237
the need for a safe and economically efficient traffic represents a challenge for creating traffic management systems. this paper deals with merging three basic concepts, namely cloud-based technologies, agent-based approaches and fuzzy cognitive maps to solve the localisation and path planing for several vehicles of different types in the form of independent agents, which communicate with a supervisory system located on the cloud. the proposed system was directly tested on a playground and obtained results were analysed using several selected criteria. Finally, some further possibilities of potential utilization and future research are mentioned.
暂无评论