Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro...
详细信息
Recently,Opportunistic networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc networks that have arisen thanks to the development of intelligent *** are characterized by a rough...
详细信息
Recently,Opportunistic networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc networks that have arisen thanks to the development of intelligent *** are characterized by a rough and dynamic topology as well as unpredictable contacts and contact *** is forwarded and stored in intermediate nodes until the next opportunity ***,achieving a high delivery ratio in OppNets is a challenging *** is imperative that any routing protocol use network resources,as far as they are available,in order to achieve higher network *** this article,we introduce the Resource-Aware Routing(ReAR)protocol which dynamically controls the buffer usage with the aim of balancing the load in resource-constrained,stateless and non-social *** ReAR protocol invokes our recently introduced mutual informationbased weighting approach to estimate the impact of the buffer size on the network performance and ultimately to regulate the buffer consumption in real *** proposed routing protocol is proofed conceptually and simulated using the Opportunistic Network Environment *** show that the ReAR protocol outperforms a set of well-known routing protocols such as EBR,Epidemic MaxProp,energy-aware Spray and Wait and energy-aware PRoPHETin terms of message delivery ratio and overhead ratio.
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weighted case to incorporate various user pr...
详细信息
ISBN:
(纸本)9781605583259
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weighted case to incorporate various user preferences into hypervolume-based search algorithms. There are two main open questions in this context: (i) how does the specified weight influence the distribution of a fixed number of points that maximize the weighted hypervolume indicator? (ii) how can the user articulate her preferences easily without specifying a certain weight distribution function? In this paper, we tackle both questions. First, we theoretically investigate optimal distributions of μ points that maximize the weighted hypervolume indicator. Second, based on the obtained theoretical results, we propose a new approach to articulate user preferences within biobjective hypervolume-based optimization in terms of specifying a desired density of points on a predefined (imaginary) Pareto front. Within this approach, a new exact algorithm based on dynamic programming is proposed which selects the set of μ points that maximizes the (weighted) hypervolume indicator. Experiments on various test functions show the usefulness of this new preference articulation approach and the agreement between theory and practice. Copyright 2009 ACM.
It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ...
详细信息
Anomaly detection methods typically operate on preprocessed traffic traces. Firstly, most traffic capturing devices today employ random packet sampling, where each packet is selected with a certain probability, to cop...
详细信息
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as syn...
详细信息
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as synchronous dataflow graphs and Petri nets have a state transition system that may be described and analyzed in the RSM *** particular, the proposed approach unifies methods known for the above-mentioned subclasses and yields new results concerning boundedness, deadlocks, scheduling, and formal verification.
The goal of the study presented in this work is to evaluate the performance of MIMO-WCDMA networks in spatial multiplexing transmission mode. In this context, different bit streams are transmitted from each transmit a...
详细信息
In this paper, we present the design of our prototype of an automated real-time and affordable pollen sensing system. The design consists of three main subsystems: (1) a trap with automatic filtering, (2) a particle c...
详细信息
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it rema...
ISBN:
(纸本)9781450331432
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it remains an error-prone and time-consuming task to manually select the set of nodes acting as jammers and their individual transmit powers. We present an automated configuration approach based on simulated annealing to overcome this problem. A preliminary evaluation based on two testbeds shows that our approach can find near-optimal solutions within at most a few hours. We believe our approach can facilitate the widespread adoption of controlled interference experiments by the sensornet community.
暂无评论