While extensive studies have been carried out in the past several years for many sensor applications, they cannot be applied to the network with extremely low and intermittent connectivity, dubbed the Delay/Fault-Tole...
详细信息
Recent advancements in the design, fabrication and packaging of micro electro-mechanical (MEM) sensors with embedded computing and wireless communication capabilities have made positive impacts on persistent surveilla...
详细信息
sensor networks, ad-hoc networking and supporting infrastructure (e.g. middleware) are major building blocks for pervasive computing and pervasive services. Our experience has made it clear that sensor networks, and i...
详细信息
The diminution in size and power consumption of digital circuitry, wireless communication and micro electro-mechanical systems (MEMS) are influencing the progression towards the smart dust era. Smart dusts are wireles...
详细信息
ISBN:
(纸本)1424410312
The diminution in size and power consumption of digital circuitry, wireless communication and micro electro-mechanical systems (MEMS) are influencing the progression towards the smart dust era. Smart dusts are wireless sensors with own battery power, computing and communication facility. It is envisaged that from the application's perspective, in the area of military, health, environmental, industrial and home automation wireless sensor networks (WSN) will have a significant impact. Accordingly, WSN will witness a huge growth in the near future and both the academia and industry have commenced intensive research. Routing protocol design in WSN is one of the most important areas of active research due to the open issues and its importance. WSNs usually contain a large number of nodes typically with highly correlated collected data. These networks can be categorized according to the network structure and their protocol operations. Network structure based categorization of WSN can be flat or hierarchical. In flat networks, all the nodes in the networks take the same responsibility, while in hierarchical networks the cluster-heads perform several special functions such as maintaining the clusters and aggregation. To support large-scale wireless sensor network management and local data aggregation, hierarchical routing techniques can be regarded as superior to flat routing approaches. Low power consumption as well as smart way of distributing the load is crucial to the routing protocol design in order to attain elongated WSN lifetime. We have already proposed a distributed routing algorithm;optimized forwarding by fuzzy inference systems (OFFIS) for the flat networks, where the decision is based on the distance power and link uses. In addition, we have proposed a two-layer OFFIS (2L-OFFIS) for environmental data collection in cluster-based sensor networks. In this talk, major routing protocols for the WSNs will be presented and the results will be compared with those tha
Publish/Subscribe (Pub/Sub) systems have been used in traditional distributedcomputing applications to provide effective and efficient event services. Recently, the design of Pub/Sub systems are proposed for wireless...
详细信息
ISBN:
(纸本)9781424415014
Publish/Subscribe (Pub/Sub) systems have been used in traditional distributedcomputing applications to provide effective and efficient event services. Recently, the design of Pub/Sub systems are proposed for wireless sensor networks (WSNs). Some of the proposed Pub/Sub protocols address the issue of establishing event delivery path with low routing cost by using geographic information. However, they have not considered how to reduce redundant event delivery, which may cause high resource consumption and poor system scalability. In this paper, we propose protocols which address both issues. More specifically, our protocols use geographic information to save routing cost, and meanwhile reduce redundant event delivery by letting the subscribers share the event delivery paths. Three highly scalable and efficient Pub/Sub protocols for WSNs, namely Shortest Delivery Path (SDP), Shortest Delivery Path with Lower Delivery Overhead (SDP-LDO), and Lowest Delivery Overhead (LDO), are designed to achieve different performance goals. The results of theoretical and experimental evaluation show that the proposed protocols can significantly improve the resource efficiency and scalability of a Pub/Sub system compared to the previous solutions. Our protocols can also be used to achieve a good tradeoff between the costs of event subscribing and event delivery.
The proceedings contain 333 papers. The topics discussed include: resource discovery in ubiquitous health care;managing privacy in LBAC systems;pervasive computing with frugal objects;a modular architecture for contex...
详细信息
ISBN:
(纸本)0769528473
The proceedings contain 333 papers. The topics discussed include: resource discovery in ubiquitous health care;managing privacy in LBAC systems;pervasive computing with frugal objects;a modular architecture for context sensing;performance evaluation of RFID anti-collision algorithm with FPGA implementation;cross layer routing for multihop cellular networks;an optimal node selection scheme in multi-hop wireless network;rank theorems for forward secrecy in group key management protocols;a secure group agreement (SGA) protocol for peer-to-peer applications;service provider implementation of sip regarding security;a service architecture for countering distributed denial of service attacks;effective caching in wireless sensor network;multi-agent coordination mechanism based on indirect interaction;and on the miscollaboration of congestion control mechanisms at the transport and the network layers.
The proceedings contain 333 papers. The topics discussed include: resource discovery in ubiquitous health care;managing privacy in LBAC systems;pervasive computing with frugal objects;a modular architecture for contex...
详细信息
ISBN:
(纸本)0769528473
The proceedings contain 333 papers. The topics discussed include: resource discovery in ubiquitous health care;managing privacy in LBAC systems;pervasive computing with frugal objects;a modular architecture for context sensing;performance evaluation of RFID anti-collision algorithm with FPGA implementation;cross layer routing for multihop cellular networks;an optimal node selection scheme in multi-hop wireless network;rank theorems for forward secrecy in group key management protocols;a secure group agreement (SGA) protocol for peer-to-peer applications;service provider implementation of sip regarding security;a service architecture for countering distributed denial of service attacks;effective caching in wireless sensor network;multi-agent coordination mechanism based on indirect interaction;and on the miscollaboration of congestion control mechanisms at the transport and the network layers.
The following topics are discussed: embedded and real-time computingsystems and applications; resource sharing; memory management; multiprocessor scheduling; ubiquitous wireless networks; middleware; ubiquitous compu...
The following topics are discussed: embedded and real-time computingsystems and applications; resource sharing; memory management; multiprocessor scheduling; ubiquitous wireless networks; middleware; ubiquitous computing; distributedsystems; power-aware design; databases; wireless sensor networks; uniprocessor scheduling; compiler techniques; context awareness and privacy; and system-on-chip.
Energy efficiency remains a critical design issue for wireless sensor networks. How to maintain the network connectivity and, at the same time, to minimize the energy consumption is a very challenging problem. Differe...
详细信息
Energy efficiency remains a critical design issue for wireless sensor networks. How to maintain the network connectivity and, at the same time, to minimize the energy consumption is a very challenging problem. Different from many previous excellent results, we explore the topology control problem for heterogeneous wireless sensor networks. Our objective is to propose distributed topology control algorithms, where only local information is kept for all of the nodes. The experimental results show the strengths of the proposed algorithms in the average edge length and the average link length.
In-network data storage techniques can provide robustness against failure of dedicated sink nodes in sensor networks. For storing data in the network it is critical to ensure that the data can be accessed from other n...
详细信息
In-network data storage techniques can provide robustness against failure of dedicated sink nodes in sensor networks. For storing data in the network it is critical to ensure that the data can be accessed from other nodes for a long period of time. As replicating the data will increase consumption of resources, we propose a technique for data relocation that optimizes the accessibility of the data in the network. The two challenging constraints for solving this problem are "limited sensor lifetime" and "cost of data relocation". We study both centralized and distributed approaches for computing accessibility of each node. Using extensive simulations, we evaluate the performance of our techniques.
暂无评论