Wireless sensornetworks will play an important role in the nextgeneration pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the com...
详细信息
ISBN:
(纸本)9780769536101
Wireless sensornetworks will play an important role in the nextgeneration pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless sensornetworks based on intrusion detection. It can prevent most of attacks. Then an analysis of each layer of networks in our security model is discussed and the security management measures in the data link layer and network layer are described in detail especially.
Energy efficiency is one of the determining factors for survivability and lifetime of wireless sensornetworks (WSNs). In this paper, an energy optimization approach based on cross-layer for wireless sensornetworks i...
详细信息
ISBN:
(纸本)9783642108433
Energy efficiency is one of the determining factors for survivability and lifetime of wireless sensornetworks (WSNs). In this paper, an energy optimization approach based on cross-layer for wireless sensornetworks is proposed, which consider the joint optimal design of the physical, medium access control, and routing layer. The approach focuses on the computation of optimal transmission power, routing, and duty-cycle schedule that optimize the WSNs energy-efficiency. The approach is validated on a CROSSBOW's MicaZ mote platform, and evaluated using the TOSSIM simulator. the simulation results show that it is an energy-efficient approach and able to achieve significant performance improvement as well.
The proceedings contain 79 papers. The topics discussed include: secure key exchange and encryption mechanism for ad hoc networks;impact of sink mobility on network performance in wireless sensornetworks;intelligent ...
ISBN:
(纸本)9780769539249
The proceedings contain 79 papers. The topics discussed include: secure key exchange and encryption mechanism for ad hoc networks;impact of sink mobility on network performance in wireless sensornetworks;intelligent clustering in wireless sensornetworks;a novel algorithm for graded precision localization in wireless sensornetworks;MSTBBN: M-way search tree based base station to node communication protocol for wireless sensornetworks;energy efficient wireless sensor MAC protocol for collision avoidance;multiple mobile routers based seamless handover scheme for nextgeneration heterogeneous networks;a practical approach for planning WLAN deployment under 3G cellular network;AMOBIROUTE: an advanced mobility based ad hoc routing protocol for mobile ad hoc networks;node mobility support scheme between the mobile network and PMIPv6 networks;an analytical model of multi-service call admission control in nextgeneration wireless overlay networks;and an improved method of detecting spoofed attack in wireless LAN.
sensornetworks are the nextgeneration of technology for use in various applications, including tracking, monitoring and control. However, sensornetworks still have some inherent security and hardware problems. The ...
详细信息
ISBN:
(纸本)9788955191387
sensornetworks are the nextgeneration of technology for use in various applications, including tracking, monitoring and control. However, sensornetworks still have some inherent security and hardware problems. The cluster routing scheme has been proposed in attempt to reduce duplication reports. Moreover, statistical en-route filtering (SEF) has been proposed to detect and drop the injected fabricated report found in the sensor network. When SEF method is applied in cluster-based sensornetworks, their detection capabilities may be quite poor because the proposed schemes do not consider each possible feature that may be present. To solve this problem, we propose a cluster adaptation method to enhance the performance of SEF. The proposed method uses a fuzzy logic approach to form an efficient cluster for SEF. The sufficient performance of the proposed method is shown by the simulation results.
Route optimization support in mobile networks is one of the most important concerns in nextgenerationnetworks (NGNs). NGNs require an efficient route optimization scheme, optimized specially to support nesting of mo...
详细信息
In this paper we present a collection of graph-based methods for determining if a team of mobile robots, subjected to sensor and communication range constraints, can persistently achieve a specified formation. What we...
详细信息
In this paper we present a collection of graph-based methods for determining if a team of mobile robots, subjected to sensor and communication range constraints, can persistently achieve a specified formation. What we mean by this is that the formation, once achieved, will be preserved by the direct maintenance of the smallest subset of all possible pairwise inter-agent distances. In this context, formations are defined by sets of points separated by distances corresponding to desired inter-agent distances. Further, we provide graph operations to describe agent interactions that implement a given formation, as well as an algorithm that, given a persistent formation, automatically generates a sequence of such operations. Experimental results are presented that illustrate the operation of the proposed methods on real robot platforms.
A Prioritized Medium Access Control (PMAC) protocol is proposed for wireless sensornetworks, based on a binary count down approach. PMAC effectively, eliminates data collision and optimizes channel allocation. Moreov...
详细信息
ISBN:
(纸本)9781424443093
A Prioritized Medium Access Control (PMAC) protocol is proposed for wireless sensornetworks, based on a binary count down approach. PMAC effectively, eliminates data collision and optimizes channel allocation. Moreover as many networks nowadays compose traffic with several priorities, the simple yet effective design of PMAC offers strict service differentiation for prioritized packets. In this paper PMAC is evaluated by collision probability, reneging/dropping probability, network throughput and channel efficiency. Our simulations show that the protocol effectively supports traffic differentiation and achieves very low pocket dropping (both reneging and blocking) probabilities under the channel capacity When the network is overloaded, it still maintains extremely stable and high channel throughput. It is demonstrated that PMAC performs superior in multihop networks, further proving the advantages of the proposed protocol. Featured with efficiency, simplicity, scalability, fairness, mobility and QoS provisioning, PMAC may be well served for the next-generation wireless networks.
Traditional static spectrum allocation policies have been to grant each wireless service exclusive usage of certain frequency bands, leaving several spectrum bands unlicensed for industrial, scientific and medical pur...
详细信息
ISBN:
(纸本)9781424444885
Traditional static spectrum allocation policies have been to grant each wireless service exclusive usage of certain frequency bands, leaving several spectrum bands unlicensed for industrial, scientific and medical purposes. The rapid proliferation of low-cost wireless applications in unlicensed spectrum bands has resulted in spectrum scarcity among those bands. Since most applications in Wireless sensornetworks (WSNs) utilize the unlicensed spectrum, network-wide performance of WSNs will inevitably degrade as their popularity increases. Sharing of under-utilized licensed spectrum among unlicensed devices is a promising solution to the spectrum scarcity issue. Cognitive Radio (CR) is a new paradigm in wireless communication that allows sensor nodes as the unlicensed users or Secondary Users (SUs) to detect and use the under-utilized licensed spectrum temporarily. Given that the licensed or Primary Users (PUs) are oblivious to the presence of SUs, the SUs access the licensed spectrum opportunistically without interfering the PUs, while improving their own performance. In this paper, we propose an approach to build Cognitive Radio-based Wireless sensornetworks (CR-WSNs). We believe that CR-WSN is the next-generation WSN. Realizing that both WSNs and CR present unique challenges to the design of CR-WSNs, we provide an overview and conceptual design of WSNs from the perspective of CR. The open issues are discussed to motivate new research interests in this field. We also present our method to achieving context-awareness and intelligence, which are the key components in CR networks, to address an open issue in CR-WSN.
The low power wireless communication technology has enabled the development of nextgeneration low cost wireless sensor network One important performance index of routing mechanism in sensornetworks is sensor life sp...
详细信息
ISBN:
(纸本)9781424452507
The low power wireless communication technology has enabled the development of nextgeneration low cost wireless sensor network One important performance index of routing mechanism in sensornetworks is sensor life span. How we utilize limited energy in wireless sensor network, directly affects the lifetime and cost of the network. As sensors are energy constrained by batteries and located for away from the access point. A sensor dies if its battery dies. Since the radio transmission consumes a lot of energy, we propose network routing protocols to save energy to prolong the sensor lifespan.
Emergency communication in heterogeneous networks with fragile connectivity is a challenging task. Emergency Delay-Tolerant Network (EDTN) is a new network architecture based on the concept of Delay Tolerant networks ...
详细信息
ISBN:
(纸本)9781424454686
Emergency communication in heterogeneous networks with fragile connectivity is a challenging task. Emergency Delay-Tolerant Network (EDTN) is a new network architecture based on the concept of Delay Tolerant networks (DTNs) to provide emergency service. However, existing transport protocols like TCP are not suitable to provide emergency service well with instable bandwidth and connectivity, because EDTN use opportunistic forwarding to achieve end-to-end communication. The paper proposes a Hybrid layered network architecture for EDTN based on cluster classification without infrastructure. Especial investigation in the network model by introducing the data layer and control layer is also brought forward, which presents the various DTNs nodes and layer information interactions based on Session Initiation Protocol (SIP). Moreover, we have extended the usage of EDTN in nextgeneration network, which leads to the insights for the future theoretic study and project design.
暂无评论