The second generation of Advanced Telecom Computing Architecture (ATCA) based on PCI Industrial Computer Manufacturers Group (PICMG) specification has evolved to a live deployment phase. Products from world renowned t...
详细信息
作者:
Yu, LuSE Univ
Sch Informat Sci & Engn Nanjing 210096 Peoples R China
In this paper we establish a first passage time analysis for event-driven sensornetworks with single hop. Our model can be regarded as a theoretical analysis for time cost of message transmission to sink node in an e...
详细信息
ISBN:
(纸本)9780769530482
In this paper we establish a first passage time analysis for event-driven sensornetworks with single hop. Our model can be regarded as a theoretical analysis for time cost of message transmission to sink node in an event-driven process in which Slotted ALOHA protocol is implemented. The first passage time T-n,T-lambda depends on the size n of activated nodes and their transmission rate lambda. Given n, we study the optimal lambda and give the approximation root 1nn/n, further more we give the estimate of the size n from the view point of sink node. So that we can adjust the transmission rate lambda to attain the optimal expected time cost T-min (n). Numerical result indicates that given the size of active nodes n, the optimal time cost of the procedure increases nearly linearly with n increasing which implies that ALOHA protocol is efficient even in dense event-driven sensornetworks.
The paper explores survivability concepts for the migration to carrier class nextgeneration IP services over optical transport networks. Design criteria for highly available optical networks are proposed and tradeoff...
详细信息
Clustering is proven method for energy efficient topology generation. However, in cluster formation high focus is given on cluster head selection while intra-cluster topology generation is not given much attention. In...
详细信息
Clustering is proven method for energy efficient topology generation. However, in cluster formation high focus is given on cluster head selection while intra-cluster topology generation is not given much attention. In this paper, we have proposed intra-cluster topology-generation method for heterogeneous wireless sensor network (WSN). For cluster formation, we have used Voronoi tessellation with fix number of cluster heads. We have used leveling method to position the cluster nodes in the network to generate level based intracluster topology and exploited the property of variable transmission power of cluster nodes and cluster head.
In Dynamic key management systems, while frequent control messaging may be necessary for robustness of security, it is detrimental to energy resources of wireless sensornetworks. The problem is further exacerbated fo...
详细信息
ISBN:
(纸本)9780769529431
In Dynamic key management systems, while frequent control messaging may be necessary for robustness of security, it is detrimental to energy resources of wireless sensornetworks. The problem is further exacerbated for sleep enabled sensornetworks as a) malicious nodes penetrate into a network by spoofing the ids of legitimate nodes that are in sleeping state b) it is possible for legitimate sensor nodes to be entirely compromised. In this paper, the abovementioned aspects of keying are addressed as tierce to optimize communication. First a secure key generation mechanism is presented that aims at optimizing communication. Second, a sleep schedule cognizant protocol is presented to prevent id spoofing of sleeping nodes. Third, a post attack mechanism is proposed to prevent the compromised nodes to join the network. Our threesome solution not only saves energy by minimizing the communication overhead in establishing keys among sensor nodes but also provides high but secure connectivity for sleep state nodes.
In location tracking, there is a trade-off between data accuracy of mobile targets and energy efficiency of sensor nodes. If the number of nodes is increased to track a mobile target, the level of data accuracy increa...
详细信息
ISBN:
(纸本)9783540748328
In location tracking, there is a trade-off between data accuracy of mobile targets and energy efficiency of sensor nodes. If the number of nodes is increased to track a mobile target, the level of data accuracy increases, but the energy consumption of nodes increases. In this paper, we propose a new location tracking scheme that considers these two factors. The proposed scheme is designed to track mobile targets in a cluster-based sensor network. In order to increase the energy efficiency of sensor nodes, a portion of nodes that detect the mobile target is selected to track the target using the backoff procedure. In addition, we consider data accuracy as controlling the number of nodes by varying the transmission range of the nodes. We perform a simulation to evaluate the performance of the proposed scheme over sensornetworks. We provide simulation results comparing the proposed scheme with the general approach. The simulation results show that the proposed scheme has the excellent performance over a broad range of parameters.
Efficiently moving sensor data from its collection to use points is both the fundamental and the most difficult challenge in wireless sensornetworks, as any data movement incurs cost. In this work, we focus on routin...
详细信息
ISBN:
(纸本)9781424414543
Efficiently moving sensor data from its collection to use points is both the fundamental and the most difficult challenge in wireless sensornetworks, as any data movement incurs cost. In this work, we focus on routing data to multiple, possibly mobile sinks. To deal with the dynamics of the environment arising from mobility and failures, we choose a reinforcement learning approach where neighboring nodes exchange small amounts of information allowing them to learn the next, best hop to reach all sinks. Preliminary evaluation demonstrates that our technique results in low cost routes with low overhead for the learning process.
The need for security is obviously growing very fast with the dramatic development in computer network communication. It is a fact, that sending information over any public network can be exposed to possible unauthori...
详细信息
ISBN:
(纸本)9780769528786
The need for security is obviously growing very fast with the dramatic development in computer network communication. It is a fact, that sending information over any public network can be exposed to possible unauthorized access or malicious attacks. It becomes increasingly important to secure the data flow path. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper we propose an IPsec-based secure call admission control (SCAC) with multiple cryptographic accelerators. Our proposed IPsec-based Multifence Secure Call Admission Control in heterogeneous networks enhanced with Malicious Packets Filter (MPF), is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SCAC also provides support for quality of service. High-level simulations and the related results are provided to show the effectiveness of the SCAC.
Current wireless sensor nodes use simple, battery-powered general-purpose processors and provide secure communication using software-implemented cryptographic protocols. next-generationsensor nodes will likely operat...
详细信息
Current wireless sensor nodes use simple, battery-powered general-purpose processors and provide secure communication using software-implemented cryptographic protocols. next-generationsensor nodes will likely operate without batteries, harvesting energy instead from ambient sources. To provide cryptographic functions for ubiquitous computing devices, designers must make power consumption their first priority. The challenge of future research is to find an algorithm that has at its core a simple, scalable primitive that could serve as a common element for secret and public-key functions.
In this paper, we investigate the problem of grouping the sensor nodes into clusters to enhance the overall scalability of the network. A selected set of nodes, known as gateway nodes, will act as cluster-heads for ea...
详细信息
ISBN:
(纸本)9781424403523
In this paper, we investigate the problem of grouping the sensor nodes into clusters to enhance the overall scalability of the network. A selected set of nodes, known as gateway nodes, will act as cluster-heads for each cluster and the objective is to balance the load among these gateways. Load balanced clustering increases system stability and improves the communication between the various nodes in the network. We call the problem addressed in this paper as the Load-Balanced Clustering Problem (LBCP). We first show that a special case of LBCP (whereby the traffic load contributed by all sensor nodes are the same) is optimally solvable in polynomial time. We next prove that the general case of LBCP is NP-hard. We then proposed an efficient 3/2-approximation algorithm for the problem.
暂无评论