In this paper we present a monitoring assisted routing scheme for wireless mesh networks which exploits the broadcast nature of wireless transmissions at special rowers with added monitoring functionalities. These rou...
详细信息
ISBN:
(纸本)9781424414543
In this paper we present a monitoring assisted routing scheme for wireless mesh networks which exploits the broadcast nature of wireless transmissions at special rowers with added monitoring functionalities. These routers listen to the transmissions in neighborhood and compare, the routing behavior against the routing state collectively maintained by them. If any inconsistency is found, as a result of software/hardware malfunction, these routers try to determine the node causing it and recover from it in a timely fashion. The scheme is developed for wireless mesh networks where the communication overhead is a critical issue. The performance evaluation of our scheme shows considerable improvement in reliability (i.e., delivery ratio) with minimal overhead under situations of malfunctions.
Low-power wireless sensornetworks (WSNs) consist of a large number of battery-operated sensors deployed over an area for objectives such as monitoring environments, tracking objects, and controlling various industria...
详细信息
Emergency networks, especially networks of disaster recovery, have been the focus of active research in many countries. That is due to the broad impact of disasters' frequent occurrences, and casualties. The Hybri...
详细信息
Wireless sensornetworks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack cal...
详细信息
ISBN:
(纸本)9780769529431
Wireless sensornetworks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.
Computing model of nodes has an important effect on the network performance and the mobile agent computing model for the nextgeneration network has attracted more and more attentions. The background of mobile agent a...
详细信息
ISBN:
(纸本)9781424413119
Computing model of nodes has an important effect on the network performance and the mobile agent computing model for the nextgeneration network has attracted more and more attentions. The background of mobile agent applied In the wireless sensor network is first analyzed. Then a framework based on mobile agent is proposed from two levels, namely network and nodes. After introducing the basic elements, functional definitions and interfaces of the framework, an implementation mechanism based on directed diffusion for mobile agent is presented in detail.
The proceedings contain 20 papers. The topics discussed include: combined contention and TDMA-based communication in wireless sensornetworks;outage probability, average transmission time, and quality of experience fo...
ISBN:
(纸本)9781467316347
The proceedings contain 20 papers. The topics discussed include: combined contention and TDMA-based communication in wireless sensornetworks;outage probability, average transmission time, and quality of experience for cognitive radio networks over general fading channels;cognitive radio networks with elastic traffic;optimal intercell coordination for multiple user classes with elastic traffic;flow-level modeling and analysis of dynamic TDD in LTE;cognitive radio spectrum decision based on channel usage prediction;beacon-enabled cognitive access for dynamic spectrum access;pricing and regulating quality of experience;content dependency of the traffic control in the Darwin streaming server;a wireless sensor and actuator network for improving the electrical power grid dependability;real-time multimedia monitoring in large-scale wireless multimedia sensornetworks: research challenges;and reliable multicast on a WDM optical packet ring.
The need for security is obviously growing very fast with the dramatic development in computer network communication. It is a fact, that sending information over any public network can be exposed to possible unauthori...
详细信息
ISBN:
(纸本)9780769528786
The need for security is obviously growing very fast with the dramatic development in computer network communication. It is a fact, that sending information over any public network can be exposed to possible unauthorized access or malicious attacks. It becomes increasingly important to secure the data flow path. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper we propose an IPsec-based secure call admission control (SCAC) with multiple cryptographic accelerators. Our proposed IPsec-based Multifence Secure Call Admission Control in heterogeneous networks enhanced with Malicious Packets Filter (MPF), is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SCAC also provides support for quality of service. High-level simulations and the related results are provided to show the effectiveness of the SCAC.
In location tracking, there is a trade-off between data accuracy of mobile targets and energy efficiency of sensor nodes. If the number of nodes is increased to track a mobile target, the level of data accuracy increa...
详细信息
ISBN:
(纸本)9783540748328
In location tracking, there is a trade-off between data accuracy of mobile targets and energy efficiency of sensor nodes. If the number of nodes is increased to track a mobile target, the level of data accuracy increases, but the energy consumption of nodes increases. In this paper, we propose a new location tracking scheme that considers these two factors. The proposed scheme is designed to track mobile targets in a cluster-based sensor network. In order to increase the energy efficiency of sensor nodes, a portion of nodes that detect the mobile target is selected to track the target using the backoff procedure. In addition, we consider data accuracy as controlling the number of nodes by varying the transmission range of the nodes. We perform a simulation to evaluate the performance of the proposed scheme over sensornetworks. We provide simulation results comparing the proposed scheme with the general approach. The simulation results show that the proposed scheme has the excellent performance over a broad range of parameters.
We engineer and simulate the scalability and bandwidth elasticity of a nextgeneration PON. Our scalable PON hierarchically combines WDM and TDM, and it connects 16,000 end-users with elastic bandwidth on demand with ...
详细信息
In the applying based WSNs issue, energy and bandwidth of those items are respected strategies and essential to obtain proficiently. Information collected at the base station by distinct nodes sparks the excess of inf...
详细信息
ISBN:
(纸本)9781509026128
In the applying based WSNs issue, energy and bandwidth of those items are respected strategies and essential to obtain proficiently. Information collected at the base station by distinct nodes sparks the excess of information which effects in optimum energy usage. To reduce this dilemma a whole new data aggregation method has been in the offing called distributed likeness based clustering and squeezed forwarding that has increased the efficiency of the WSNs utilizing the group based data aggregation. This accomplish has particular in assessing the performance of nodes aimed DEA protocol. That comparison has demonstrated that the outcomes of in the offing accomplish are quite a lot better compared to prevailing results.
暂无评论