The following topics are dealt with: embedded and real-time computingsystems and applications; scheduling; operating systems; communications; QoS support; sensor networks and information systems; energy aware design;...
The following topics are dealt with: embedded and real-time computingsystems and applications; scheduling; operating systems; communications; QoS support; sensor networks and information systems; energy aware design; data services; distributed/multiprocessor systems; hardware/software co-design and mobile and ubiquitous computing.
In a pure sensor network thousands of sensors are distributed over a large area. sensor data is relayed from sensor node to node until it reaches the edge node, where it is then routed by wire to the host. In this pap...
详细信息
In a pure sensor network thousands of sensors are distributed over a large area. sensor data is relayed from sensor node to node until it reaches the edge node, where it is then routed by wire to the host. In this paper we study the effect of data collection on the battery and buffer of a sensor node, and on the overall sensor network. We determine the relationship among battery life, sampling frequency, buffer size, etc. We claim that using identical sensors throughout a large scale sensor network may not achieve the best result. We suggest some guidelines for deploying a large scale sensor network. We then propose routing algorithms that are robust, truly distributed, and efficient in utilizing the sensor network.
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. Ho...
详细信息
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. However, they are not viable in sensor networks. In this paper, we propose a light-weight identity certificate method to defeat Sybil attacks. Our proposed method uses one-way key chains and Merkle hash trees. The method thereby avoids the need for public key cryptography. In addition, the method provides a means for authentication of all data messages. A variant of this method is presented that has lower computational requirements under certain conditions. The security of each method is analyzed, and is as good or better than previously-proposed approaches, with fewer assumptions. The overhead (computation, storage, and messages) is also shown to be acceptable for use in sensor networks.
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propagation to disseminate security-critica...
详细信息
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propagation to disseminate security-critical information in a network. Wireless sensor networks can benefit from a thorough understanding of worm propagation over sensor networks to defend from worms and to efficiently disseminate security-critical information. In this paper, we develop a topologically-aware worm propagation model (TWPM) for wireless sensor networks. In addition to simultaneously capturing both time and space propagation dynamics, the TWPM also incorporates physical, MAC and network layer considerations of practical sensor networks. Simulation results show that the proposed model follows actual propagation dynamics quite closely.
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks because manual or assisted localization is ...
详细信息
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks because manual or assisted localization is often impractical due to time requirements, economic constraints or inherent limitations of deployment scenarios. We have developed a service for reliably localizing wireless sensor networks in environments conducive to ranging errors by using a custom hardware-software solution for acoustic ranging and a family of self-localization algorithms. The ranging solution improves on previous work, extending the practical measurement range threefold (20-30m) while maintaining a distance-invariant median measurement error of about 1% of maximum range (33cm). The localization scheme is based on least squares scaling with soft constraints. Evaluation using ranging results obtained from sensor network field experiments shows that the localization scheme is resilient against large-magnitude ranging errors and sparse range measurements, both of which are common in large-scale outdoor sensor network deployments
A distributed system for approximate query answering on sensor network data is proposed, where a suitable compression technique is exploited to represent data and support query answering. Each node of the system store...
详细信息
A distributed system for approximate query answering on sensor network data is proposed, where a suitable compression technique is exploited to represent data and support query answering. Each node of the system stores either detailed or summarized sensor readings. Query answers are computed by identifying the set of nodes that contain (either compressed or not) data involved in the query, and eventually partitioning the query in a set of sub-queries to be evaluated at different nodes. Queries are partitioned according to a cost model aiming at making the evaluation efficient and guaranteeing the desired degree of accuracy of query answers.
Wireless sensor networks (WSNs) are important for a number of strategic applications. Target localization is an important task in WSNs. In this paper, a distributed and cooperative target localization algorithm in wir...
详细信息
Wireless sensor networks (WSNs) are important for a number of strategic applications. Target localization is an important task in WSNs. In this paper, a distributed and cooperative target localization algorithm in wireless distributedsensor network system is presented. Based on the signal energy decay model, the distances between the target and sensors are obtained, and then a distributed and simplified localization algorithm is used to locate the target. Extensive simulation results show that this new approach is accurate and robust. Besides, it can reduce the complexity of the processing. Therefore, it is a feasible and attractive localization method for the wireless sensor network system.
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor network. A key advantage of MobiQuery li...
详细信息
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor network. A key advantage of MobiQuery lies in its capability to meet stringent spatiotemporal performance constraints crucial to many applications. These constraints include query latency, data freshness and fidelity, and changing query areas due to user mobility. A novel just-in-time prefetching algorithm enables MobiQuery to maintain robust spatiotemporal guarantees even when nodes operate under extremely low duty cycles. Furthermore, it significantly reduces the storage cost and network contention caused by continuous queries from mobile users. We validate our approach through both theoretical analysis and simulation results under a range of realistic settings
Wireless networked sensors raise a great number of programming challenges in applications. In this paper, we present AntC, a systems programming language, which focuses on the super-micro embedded system that supports...
详细信息
Wireless networked sensors raise a great number of programming challenges in applications. In this paper, we present AntC, a systems programming language, which focuses on the super-micro embedded system that supports wireless networked sensors. It provides four broad characteristics: it is a component-oriented application design; it integrates an embedded OS with two-level dispatcher; it improves the fault tolerance in run-time; furthermore, the improvement on multiplatform adaptability allows AntC program to be easily transplanted to other platforms with different embedded processors.
sensor networks have emerged as a promising technology with various applications, and power consumption is one of the key issues. Since each full function device can act as a coordinator or a device in ieee 802.15.4 s...
详细信息
sensor networks have emerged as a promising technology with various applications, and power consumption is one of the key issues. Since each full function device can act as a coordinator or a device in ieee 802.15.4 standard, 802.15.4-based sensor networks have various possible network topologies. In this paper, we try to construct network topologies with small number of coordinators while still maintaining network connectivity. By reducing the number of coordinators, the average duty cycle is reduced and the battery life is prolonged. Three topology control algorithms are proposed in this paper. Self-pruning is the simplest one with O(l) running time. Ordinal pruning significantly improves self-pruning in terms of power saving with O(n) running time. Layered pruning is a tradeoff between the first two pruning algorithms with O(radicn) running time and a little higher power consumption than ordinal pruning. Furthermore, all three algorithms are independent of the physical radio propagation characteristics
暂无评论