A current trend in computer network intrusion detection is to deploy a network of traffic sensors, or agents, throughout the network and forward sensed information back to a central processor. As these systems start t...
详细信息
A current trend in computer network intrusion detection is to deploy a network of traffic sensors, or agents, throughout the network and forward sensed information back to a central processor. As these systems start to incorporate hundreds, even thousands, of sensors, managing and presenting the information from these sensors is becoming an increasingly difficult task. This paper explores the use of conversation exchange dynamics (CED) to integrate and display sensor information from multiple nodes. We present an experimental setup consisting of multiple sensors reporting individual findings to a central server for aggregated analysis. Different scenarios of network attacks and intrusions were planned to investigate the effectiveness of the distributed system. The network attacks were taken from the M.I.T. Lincoln Lab 1999 Data Sets. The distributed system was subjected to different combinations of network attacks in various parts of the network. The results were then analyzed to understand the behavior of the distributed system in response to the different attacks. In general, the distributed system detected all attacks under each scenario. Some surprising observations also indicated attack responses occurring in unanticipated scenarios. (C) 2007 Elsevier B.V. All rights reserved.
This paper presents the design of Pool, an efficient and scalable data storage scheme for supporting multidimensional queries. The foundation of the work that makes the Pool approach superior in executing multi-dimens...
详细信息
sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, an attacker can easily mislead a cluste...
详细信息
When there are multiple queries posed to the resourceconstrained wireless sensor network, it is critical to process them efficiently. In this paper, we propose a Two-Tier Multiple Query Optimization (TTMQO) scheme. Th...
详细信息
Many emergent distributed sensing applications need to keep track of mobile entities across multiple sensor networks connected via an IP network. To simplify the realization of such applications, we present MLDS, a Mu...
详细信息
ISBN:
(纸本)9783540730897
Many emergent distributed sensing applications need to keep track of mobile entities across multiple sensor networks connected via an IP network. To simplify the realization of such applications, we present MLDS, a Multi-resolution Location Directory Service for tiered sensor networks. MLDS provides a rich set of spatial query services ranging from simple queries about entity location, to complex nearest neighbor queries. Furthermore, MLDS supports multiple query granularities which allow an application to achieve the desired tradeoff between query accuracy and communication cost. We implemented MLDS on Agimone, a unified middleware for sensor and IP networks. We then deployed and evaluated the service on a tiered testbed consisting of tmote nodes and base stations. Our experimental results show that, when compared to a centralized approach, MLDS achieves significant savings in communication cost while still providing a high degree of accuracy, both within a single sensor network and across multiple sensor networks.
With the field of wireless sensor networks rapidly maturing, the focus shifts from "easy" deployments, like remote monitoring, to more difficult domains where applications impose strict, real-time constraint...
详细信息
ISBN:
(纸本)9783540730897
With the field of wireless sensor networks rapidly maturing, the focus shifts from "easy" deployments, like remote monitoring, to more difficult domains where applications impose strict, real-time constraints on performance. One such class of applications is safety critical systems, like fire and burglar alarms, where events detected by sensor nodes have to be reported reliably and timely to a sink node. A complicating factor is that systems must operate for years without manual intervention, which puts very strong demands on the energy efficiency of protocols running on current sensor-node platforms. Since we are not aware of a solution that meets all requirements of safety-critical systems, i.e. provides reliable data delivery and low latency and low energy consumption, we present Dwarf, an energy-efficient, robust and dependable forwarding algorithm. The core idea is to use unicast-based partial flooding along with a delay-aware node selection strategy. Our analysis and extensive simulations of real-world scenarios show that Dwarf tolerates large fractions of link and node failures, yet is energy efficient enough to allow for an operational lifetime of several years.
A new junior level embedded systems course uses the notion of distributed Collaborative Adaptive Sensing as a unifying theme. The content of the course is inspired by research in weather radar networks but is mapped t...
详细信息
ISBN:
(纸本)9780769528496
A new junior level embedded systems course uses the notion of distributed Collaborative Adaptive Sensing as a unifying theme. The content of the course is inspired by research in weather radar networks but is mapped to an imaging system for a more manageable and tangible application. "Big-picture" lectures present concepts and applications in modern embedded systems. The labs involve problem solving in sensor data acquisition, signal processing and networked computing. The Altera DE2 board with System on Programmable Chip (SOPC) development platform, the NIOS soft-core [1] and other peripherals is used along with a digital camera [7]. Assessment of the outcomes and impressions of the course indicates a significant improvement over a more traditional embedded systems course. The course materials are available online [2].
We present a distributedsystems architecture that uses Grid computing to combine basic nodes of wireless sensor networks with complex sensor nodes of wired networks. Three kinds of complex sensor nodes are identified...
详细信息
In self-organizing networks of battery-powered wireless sensors that can sense, process, and communicate, energy is the most crucial and scarce resource. However, since sensor network applications generally exhibit sp...
详细信息
ISBN:
(纸本)9783540730897
In self-organizing networks of battery-powered wireless sensors that can sense, process, and communicate, energy is the most crucial and scarce resource. However, since sensor network applications generally exhibit specific limited behaviors, there is both a need and an opportunity for adapting the network architecture to match the application in order to optimize resource utilization. Many applications-such as large-scale collaborative sensing, distributed signal processing, and distributed data assimilation-require sensor data to be available at multiple resolutions, or allow fidelity to be traded-off for energy efficiency. We believe that cross-layering and application-specific adaptability are the primary design principles needed to build sensor networking protocols. In previous work, we proposed an adaptive cross-layered self-organizing hierarchical data service under COMPASS architecture, that enables multi-scale collaboration and communication. In this paper we propose a time division multiplexing medium scheduling protocol tailored for this hierarchical data service, to take advantage of the communication and routing characteristics to achieve close to optimal latency and energy usage. We present an analytical proof on the bounds achieved by the protocol and analyze the performance via detailed simulations.
The proceedings contain 66 papers. The topics discussed include: a virtual node-based tracking algorithm for mobile networks;streaming algorithms for robust, real-time detection of DDoS attacks;protocol design and opt...
详细信息
ISBN:
(纸本)0769528376
The proceedings contain 66 papers. The topics discussed include: a virtual node-based tracking algorithm for mobile networks;streaming algorithms for robust, real-time detection of DDoS attacks;protocol design and optimization for delay/fault-tolerant mobile sensor networks;automated storage reclamation using temporal importance annotations;a high throughput atomic storage algorithms;fusible data structures for fault-tolerance;secure event dissemination in publish-subscribe networks;testing security properties of protocol implementations: a machine learning based approach;distributed density estimation using non-parametric statistics;scale-free overlay topologies with hard cutoffs for unstructured peer-to-peer networks;supporting multi-dimensional range query for sensor networks;a weighted moving average-based approach for cleaning sensor data;and resilient cluster formation for sensor networks.
暂无评论