To provide application-oriented network services, a variety of overlay networks are deployed over physical IP networks. Since they share and compete for the same physical network resources, their selfish behaviors aff...
详细信息
ISBN:
(纸本)0819464856
To provide application-oriented network services, a variety of overlay networks are deployed over physical IP networks. Since they share and compete for the same physical network resources, their selfish behaviors affect each other and, as a result, their performance deteriorates. In this paper, we propose a mechanism for pure P2P networks of file-sharing applications to cooperate with each other. In our proposal, a cooperative peer first finds another P2P network and establishes a logical link to a cooperative peer in the found network. Both ends of the logical link decide whether they cooperate or not from a viewpoint of the mutualism. When they consider they benefit from the cooperation, messages and files are exchanged among cooperative P2P networks through the logical link. For an efficient and effective cooperation, our mechanism has an algorithm for the selection of cooperative peers and a caching mechanism to avoid putting too much load on cooperative peers and cooperating networks. Simulation results showed that the number of discovered providing peers and the ratio of search hits increased about twice, while the load by the cooperation among P2P networks was reduced about half by caching.
Advances in wireless networking, micro-fabrication and integration, and embedded microprocessors have enabled a new generation of massive-scale sensornetworks. Because each sensor node is limited in size and capacity...
详细信息
ISBN:
(纸本)9788955191318
Advances in wireless networking, micro-fabrication and integration, and embedded microprocessors have enabled a new generation of massive-scale sensornetworks. Because each sensor node is limited in size and capacity, it is very important to design a new simple and energy efficient protocol. Among conventional sensornetworks' routing protocols, the directed diffusion scheme is widely known because of its simplicity. This scheme, however, has a defect in that sending interest and exploratory data messages while setting connection paths consumes much energy because of its flooding scheme. Therefore, this paper proposes a new sensor network routing protocol, called sequenced directed diffusion with a threshold control, which compromises the conventional DD scheme's defect and offers an energy efficient routing idea. With a computer simulation, its performance is evaluated and compared to the conventional DD scheme. Numerical results show that the proposed scheme offers energy efficiency while routing packets, and resolves ill-balanced energy consumption among sensor nodes.
Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in r...
详细信息
ISBN:
(纸本)9780769530482
Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in reducing the damages a compromised node may cause to a sensor network, but its operation tends to consume large-scale memory space of the hardware-constrained sensor nodes. To reduce such complexity, this paper presents a new distributed voting revocation scheme based on the one-way hash chain, the concept of threshold secret sharing, the certificate revocation list and the public-key cryptography.
Wireless sensornetworks will play an important role in the nextgeneration pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the com...
详细信息
ISBN:
(纸本)9780769536101
Wireless sensornetworks will play an important role in the nextgeneration pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless sensornetworks based on intrusion detection. It can prevent most of attacks. Then an analysis of each layer of networks in our security model is discussed and the security management measures in the data link layer and network layer are described in detail especially.
The proceedings contain 114 papers. The topics discussed include: undersea wireless sensor network for ocean pollution prevention;an effective group-based key establishment scheme for large-scale wireless sensor netwo...
详细信息
ISBN:
(纸本)9781424417971
The proceedings contain 114 papers. The topics discussed include: undersea wireless sensor network for ocean pollution prevention;an effective group-based key establishment scheme for large-scale wireless sensornetworks using bivariate polynomials;performance evaluation of a new overloading scheme for cellular DS-CDMA with iterative multistage interference cancellation receiver;experiments with low power commodity hardware platforms for challenged networks;smart middleware for mutual service-network awareness in evolving 3GPP networks;power allocation schemes for cognitive radios;communication in personal healthcare;hierarchical modeling of the Axis2 Web services framework with FMC-QE;extracting dense communities from telecom call graphs;OFDM-MAC algorithms and their impact on TCP in nextgeneration mobile networks;and a slotted ALOHA joint MAC-cum-routing protocol for data gathering sensor network applications.
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secret symmetric keys for communication privacy, integrity and authenticity can be generated. In a wireless sensor networ...
详细信息
ISBN:
(纸本)1595936955
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secret symmetric keys for communication privacy, integrity and authenticity can be generated. In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approach to protect network communications but it is difficult due to the ad hoc nature, intermittent connectivity, and resource limitations of the sensornetworks. In this paper, we propose a key distribution scheme based on random key pre-distribution for heterogeneous sensor network (HSN) to achieve better performance and security as compared to homogeneous network which suffer from high communication overhead, computation overhead, and/or high storage requirements. In a key generation process, instead of generating a large pool of random keys, a key pool is represented by a small number of generation keys. For a given generation key and publicly known seed value, a one-way hash function generates a key chain, and these key chains collectively make a key pool. Each sensor node is assigned a small number of randomly selected generation keys. The proposed scheme reduces the storage requirements while maintaining the same security strength. Copyright 2007 ACM.
The task of gait-based subject recognition (SR) in ubiquitous sensor environments has become popular due to its wide range of applications in biometric authentication and smart home products. In recent times, a signif...
详细信息
ISBN:
(纸本)9781728131870
The task of gait-based subject recognition (SR) in ubiquitous sensor environments has become popular due to its wide range of applications in biometric authentication and smart home products. In recent times, a significant amount of work has been done in SR using supervised learning algorithms on datasets having high modality. However, the process of annotation for SR is difficult due to the challenges like privacy and high manual cost, which results in a scarcity of labeled data samples. Also, for the datasets having less modality, the task of SR in a semi-supervised domain is sparsely explored and challenging. In this work, we analyze the effect of these two factors (sparse labels and low modality) which are critical for SR in ubiquitous data. We select two datasets of ubiquitous data that are relatively unexplored in the context of SR. The datasets, namely OPPORTUNITY and Smartphone used to perform SR using conventional supervised learning algorithms to benchmark the results. Then we perform extensive experimentation to analyze the effect of the aforementioned factors over the task of SR by studying the variations in classification accuracies. next, we propose our semi-supervised framework for SR based on the concept of pseudo labels to counter the adverse effects of low modality and lack of labels. Experimental results show that our approach offers up to 77% and 98% accuracy on the Smartphone and OPPORTUNITY dataset respectively.
Wireless sensornetworks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize ...
详细信息
ISBN:
(纸本)9781509032570
Wireless sensornetworks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.
A new fixed-rate layered multicast congestion control algorithm called FLMCC is proposed. The sender of a multicast session transmits data packets at a fixed rate on each layer, while receivers each obtain different t...
详细信息
ISBN:
(纸本)0819464856
A new fixed-rate layered multicast congestion control algorithm called FLMCC is proposed. The sender of a multicast session transmits data packets at a fixed rate on each layer, while receivers each obtain different throughput by cumulatively subscribing to deferent number of layers based on their expected rates. In order to provide TCP-friendliness and estimate the expected rate accurately, a window-based mechanism implemented at receivers is presented. To achieve this, each receiver maintains a congestion window, adjusts it based on the GAIMD algorithm, and from the congestion window an expected rate is calculated. To measure RTT, a new method is presented which combines an accurate measurement with a rough estimation. A feedback suppression based on a random timer mechanism is given to avoid feedback implosion in the accurate measurement. The protocol is simple in its implementation. Simulations indicate that FLMCC shows good TCP-friendliness, responsiveness as well as intra-protocol fairness, and provides high link utilization.
With the development of information technology, the next-generation information technologies such as artificial intelligence, digital twin and reconfigurable intelligent surface have become key research areas for curr...
详细信息
ISBN:
(纸本)9798350329285
With the development of information technology, the next-generation information technologies such as artificial intelligence, digital twin and reconfigurable intelligent surface have become key research areas for current 6G networks. In addition, to improve the end-to-end information processing capability in the next-generationnetworks and better meet the demand for high-speed communication and high-precision sensing for digital twin, Virtual Reality and Augmented Reality immersive services in the 6G networks, integrated sensing and communications (ISAC) has emerged. To deal with the conflict between high-quality communication services and low-latency sensing targets in an ISAC architecture, this paper investigates a UAV-assisted ISAC system in which the UAV adopts a flight-hover-communication protocol. In particular, the UAV communicates with Internet of Things (IoT) devices during the hovering period, while it senses the location of targets during the flying period. To maximize the number of connected IoT devices and minimize the energy consumption of the UAV, a deep reinforcement learning (DRL) based trajectory planning algorithm is designed. The numerical results demonstrate that the proposed algorithm can effectively detect sensor devices as well as collect sensor data.
暂无评论