首页 > 最新文献

2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks最新文献

英文 中文
Active Protection in Wireless Networking 无线网络中的主动保护
Ming Lei, Yang Xiao, Susan V. Vrbsky
Adversaries can easily launch an attack, by taking advantage of the free wireless networking available to the public at many conferences, airports or cafes. Meanwhile in these environments, it is very difficult to identify the adversaries. In this paper, we present a scheme that is designed to defend against potential attacks at a very early stage, in order to minimize the damage to the victims and the entire network. Instead of taking actions only after the attacks arrive at the host, our scheme makes the access point the one who monitors, identifies and prevents potential attacks. In this active protection way, the system can respond more quickly and can also prevent much of the malicious network traffic.
攻击者可以很容易地利用在许多会议、机场或咖啡馆向公众提供的免费无线网络发起攻击。同时,在这些环境中,很难识别出攻击者。在本文中,我们提出了一个方案,旨在防御潜在的攻击在非常早期的阶段,以尽量减少对受害者和整个网络的损害。我们的方案使接入点成为监视、识别和防止潜在攻击的接入点,而不是在攻击到达主机后才采取行动。在这种主动防护方式下,系统的响应速度更快,也可以防止大量的恶意网络流量。
{"title":"Active Protection in Wireless Networking","authors":"Ming Lei, Yang Xiao, Susan V. Vrbsky","doi":"10.1109/MSN.2008.33","DOIUrl":"https://doi.org/10.1109/MSN.2008.33","url":null,"abstract":"Adversaries can easily launch an attack, by taking advantage of the free wireless networking available to the public at many conferences, airports or cafes. Meanwhile in these environments, it is very difficult to identify the adversaries. In this paper, we present a scheme that is designed to defend against potential attacks at a very early stage, in order to minimize the damage to the victims and the entire network. Instead of taking actions only after the attacks arrive at the host, our scheme makes the access point the one who monitors, identifies and prevents potential attacks. In this active protection way, the system can respond more quickly and can also prevent much of the malicious network traffic.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connectivity Based Greedy Algorithm with Multipoint Relaying for Mobile Ad Hoc Networks 移动Ad Hoc网络中基于连通性的贪心多点中继算法
Y. Fu, Xinyu Wang, Wei Shi, Shanping Li
It is proved that multipoint relaying (MPR) is an efficient strategy for on-the-fly broadcasting in mobile ad hoc networks . Upon receiving a flooding packet, each relaying node designated by the packet selects nodes from its neighbors for next packet relay. All the selected relaying nodes finally form a connected dominating set (CDS) for the network. However, computing a minimum size CDS is NP hard. Several existing algorithms use the idea of MPR to reduce the size of the CDS. In this paper, we observed two drawbacks in the existing algorithms and proposed a new greedy algorithm based on node connectivity. Also, a connectivity based rule based on the new greedy algorithm is proposed to reduce the CDS size of Wupsilas EMPR . Both theoretical analysis and experiment results show that the new greedy algorithm outperforms the existing broadcasting algorithms in the terms of number of relaying nodes.
实践证明,多点中继是移动自组网中实时广播的一种有效策略。当接收到泛洪报文时,由该报文指定的每个中继节点从其邻居中选择节点进行下一个报文中继。所有被选择的中继节点最终形成网络的连通支配集(CDS)。然而,计算最小大小的CDS是NP困难的。现有的几种算法使用MPR的思想来减小cd的大小。本文观察了现有贪心算法的两个缺陷,提出了一种基于节点连通性的贪心算法。在贪心算法的基础上,提出了一种基于连通性的规则来减小Wupsilas EMPR的CDS大小。理论分析和实验结果表明,新的贪心算法在中继节点数量上优于现有的广播算法。
{"title":"Connectivity Based Greedy Algorithm with Multipoint Relaying for Mobile Ad Hoc Networks","authors":"Y. Fu, Xinyu Wang, Wei Shi, Shanping Li","doi":"10.1109/MSN.2008.15","DOIUrl":"https://doi.org/10.1109/MSN.2008.15","url":null,"abstract":"It is proved that multipoint relaying (MPR) is an efficient strategy for on-the-fly broadcasting in mobile ad hoc networks . Upon receiving a flooding packet, each relaying node designated by the packet selects nodes from its neighbors for next packet relay. All the selected relaying nodes finally form a connected dominating set (CDS) for the network. However, computing a minimum size CDS is NP hard. Several existing algorithms use the idea of MPR to reduce the size of the CDS. In this paper, we observed two drawbacks in the existing algorithms and proposed a new greedy algorithm based on node connectivity. Also, a connectivity based rule based on the new greedy algorithm is proposed to reduce the CDS size of Wupsilas EMPR . Both theoretical analysis and experiment results show that the new greedy algorithm outperforms the existing broadcasting algorithms in the terms of number of relaying nodes.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
LACONIC: History-Based Code Dissemination in Programmable Wireless Sensor Networks 可编程无线传感器网络中基于历史的代码传播
Seungki Hong, Yeon-Jun Choi, Yang Yu, Loren J. Rittle
Reprogramming over the network is an essential requirement in large-scale, long term wireless sensor network deployments. In this paper, we present LACONIC, a history-based code dissemination technique, for programmable wireless sensor networks supporting multiple applications. In order to attain network traffic abatement and timely code delivery, LACONIC exploits (1) application calling history and (2) code dissemination history. The application calling history is modeled by a Application Call Graph(ACG) which represents the calling relationships among multiple applications. Second, the code dissemination history as a set of observed previous code forwarding paths indicates previous code forwarding path of the associated application in the context of the application calling history. Therefore, the code request triggered by a requester is reached to the responder by traveling along the path, not being consecutively flooded. Using a flooding-based existing code dissemination work as the baseline, we show the effectiveness of Laconic in terms of network traffic and time delay through both probability model-based analysis and simulation results.
网络上的重新编程是大规模、长期无线传感器网络部署的基本要求。在本文中,我们提出了LACONIC,一种基于历史的代码分发技术,用于支持多种应用的可编程无线传感器网络。为了实现网络流量的减少和及时的代码交付,LACONIC利用了(1)应用程序调用历史和(2)代码传播历史。应用程序调用历史由应用程序调用图(ACG)建模,ACG表示多个应用程序之间的调用关系。第二,作为一组观察到的先前代码转发路径的代码传播历史表明在应用程序调用历史的上下文中关联应用程序的先前代码转发路径。因此,由请求者触发的代码请求是沿着路径到达响应者的,而不是连续被淹没。以基于洪水的现有代码传播工作为基准,通过基于概率模型的分析和仿真结果,证明了Laconic在网络流量和时间延迟方面的有效性。
{"title":"LACONIC: History-Based Code Dissemination in Programmable Wireless Sensor Networks","authors":"Seungki Hong, Yeon-Jun Choi, Yang Yu, Loren J. Rittle","doi":"10.1109/MSN.2008.46","DOIUrl":"https://doi.org/10.1109/MSN.2008.46","url":null,"abstract":"Reprogramming over the network is an essential requirement in large-scale, long term wireless sensor network deployments. In this paper, we present LACONIC, a history-based code dissemination technique, for programmable wireless sensor networks supporting multiple applications. In order to attain network traffic abatement and timely code delivery, LACONIC exploits (1) application calling history and (2) code dissemination history. The application calling history is modeled by a Application Call Graph(ACG) which represents the calling relationships among multiple applications. Second, the code dissemination history as a set of observed previous code forwarding paths indicates previous code forwarding path of the associated application in the context of the application calling history. Therefore, the code request triggered by a requester is reached to the responder by traveling along the path, not being consecutively flooded. Using a flooding-based existing code dissemination work as the baseline, we show the effectiveness of Laconic in terms of network traffic and time delay through both probability model-based analysis and simulation results.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speed-Based Probability-Driven Seamless Handover Scheme between WLAN and UMTS 无线局域网与UMTS之间基于速度的概率驱动无缝切换方案
Zhiwei Yan, Huachun Zhou, Hongke Zhang, Sidong Zhang
The next generation of mobile/wireless communication system is expected to include heterogeneous broadband wireless networks that will coexist and use a common IP core to offer a diverse range of high data rate multimedia services to end users with contemporary mobile devices. The mobile devices will be equipped with multiple network interfaces since the networks have characteristics that complement each other. This requires the provision of seamless vertical handover. In this paper, a probability driven handover scheme which uses the mobile's speed (SPHO) is developed to support seamless and adaptive handover management between WLAN and UMTS. Extensive simulation experiments show that this scheme effectively achieves seamless handover between heterogeneous networks and guarantees quality of communication during handover.
下一代移动/无线通信系统预计将包括异构宽带无线网络,这些网络将共存,并使用通用IP核心,为拥有现代移动设备的最终用户提供各种高数据速率多媒体服务。移动设备将配备多个网络接口,因为网络具有相互补充的特性。这需要提供无缝的垂直切换。本文提出了一种利用移动速度(SPHO)的概率驱动切换方案,以支持WLAN和UMTS之间的无缝和自适应切换管理。大量的仿真实验表明,该方案有效地实现了异构网络间的无缝切换,保证了切换时的通信质量。
{"title":"Speed-Based Probability-Driven Seamless Handover Scheme between WLAN and UMTS","authors":"Zhiwei Yan, Huachun Zhou, Hongke Zhang, Sidong Zhang","doi":"10.1109/MSN.2008.26","DOIUrl":"https://doi.org/10.1109/MSN.2008.26","url":null,"abstract":"The next generation of mobile/wireless communication system is expected to include heterogeneous broadband wireless networks that will coexist and use a common IP core to offer a diverse range of high data rate multimedia services to end users with contemporary mobile devices. The mobile devices will be equipped with multiple network interfaces since the networks have characteristics that complement each other. This requires the provision of seamless vertical handover. In this paper, a probability driven handover scheme which uses the mobile's speed (SPHO) is developed to support seamless and adaptive handover management between WLAN and UMTS. Extensive simulation experiments show that this scheme effectively achieves seamless handover between heterogeneous networks and guarantees quality of communication during handover.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122430697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks 移动自组织网络的拥塞避免和性能增强方案
Chen Chen, Qingqi Pei, Jianfeng Ma
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive real-time available bandwidth measurement scheme to solve the congestion problem. Finally, we propose a new metric as the routing selection criteria, which combines fame, available bandwidth and minimum hops by weight. Simulation results show, Compared with DSR, fairness between nodes is improved and congestion control and load balance is implemented using NIMR without additionally increasing the network load. At the same time average life-span and end-to-end throughput is increased, average end-to-end delay is decreased using NIMR.
在分析了节点自私性和最小跳选择方法作为自组织网络唯一路由选择标准的缺点的基础上,提出了一种非侵入式多度量自组织路由协议——nimr。通过计算和存储节点名声,NIMR极大地减弱了节点自私的影响;通过MAC层和网络层之间的交叉设计,采用非侵入式实时可用带宽测量方案来解决拥塞问题。最后,我们提出了一个新的度量作为路由选择标准,它结合了名气、可用带宽和最小跳数的权重。仿真结果表明,与DSR相比,NIMR在不增加网络负载的情况下提高了节点间的公平性,实现了拥塞控制和负载均衡。同时,使用NIMR可以提高平均寿命和端到端吞吐量,降低平均端到端延迟。
{"title":"A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks","authors":"Chen Chen, Qingqi Pei, Jianfeng Ma","doi":"10.1109/MSN.2008.51","DOIUrl":"https://doi.org/10.1109/MSN.2008.51","url":null,"abstract":"Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive real-time available bandwidth measurement scheme to solve the congestion problem. Finally, we propose a new metric as the routing selection criteria, which combines fame, available bandwidth and minimum hops by weight. Simulation results show, Compared with DSR, fairness between nodes is improved and congestion control and load balance is implemented using NIMR without additionally increasing the network load. At the same time average life-span and end-to-end throughput is increased, average end-to-end delay is decreased using NIMR.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Holistic Routing Protocol Design in Underground Wireless Sensor Networks 地下无线传感器网络整体路由协议设计
Di Wu, Renfa Li, L. Bao
The traditional networking builds on layered protocol architecture to isolate the complexities in different layers. It has been realized that real-life wireless sensor networks (WSNs) must be considered holistically across different layers for optimum performance. We consider a special case of WSNs that is deployed in underground tunnels. Underground communications present unique signal propagation characteristics due to the geographic and geological features, which in turn impact the underground network deployment and multi-hop routing patterns. We propose an efficient routing algorithm, called BRIT (bounce routing in tunnels), for underground WSNs, and evaluate BRIT against the bottomline AODV in terms of network throughput, packet loss rate, stability and latencies using simulations. The contributions of the paper include a hybrid signal propagation model in three dimentional underground tunnels, an assortment of sensor deployment strategies in tunnels, an integrated routing metric (forwarding speed), and a route suppression mechanism.
传统的网络建立在分层协议架构上,将复杂性隔离在不同的层上。人们已经认识到,现实生活中的无线传感器网络(WSNs)必须跨不同层进行整体考虑,以获得最佳性能。我们考虑了部署在地下隧道中的无线传感器网络的一个特例。由于地理和地质特征,地下通信具有独特的信号传播特性,这反过来又影响了地下网络的部署和多跳路由模式。我们提出了一种高效的路由算法,称为BRIT(隧道反弹路由),用于地下wsn,并通过模拟在网络吞吐量,丢包率,稳定性和延迟方面评估BRIT与底线AODV。本文的贡献包括三维地下隧道中的混合信号传播模型,隧道中传感器部署策略的分类,综合路由度量(转发速度)和路由抑制机制。
{"title":"A Holistic Routing Protocol Design in Underground Wireless Sensor Networks","authors":"Di Wu, Renfa Li, L. Bao","doi":"10.1109/MSN.2008.41","DOIUrl":"https://doi.org/10.1109/MSN.2008.41","url":null,"abstract":"The traditional networking builds on layered protocol architecture to isolate the complexities in different layers. It has been realized that real-life wireless sensor networks (WSNs) must be considered holistically across different layers for optimum performance. We consider a special case of WSNs that is deployed in underground tunnels. Underground communications present unique signal propagation characteristics due to the geographic and geological features, which in turn impact the underground network deployment and multi-hop routing patterns. We propose an efficient routing algorithm, called BRIT (bounce routing in tunnels), for underground WSNs, and evaluate BRIT against the bottomline AODV in terms of network throughput, packet loss rate, stability and latencies using simulations. The contributions of the paper include a hybrid signal propagation model in three dimentional underground tunnels, an assortment of sensor deployment strategies in tunnels, an integrated routing metric (forwarding speed), and a route suppression mechanism.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Geography-Aware Fume Diffusion Spotting in Sensor Networks 传感器网络中地理感知的烟雾扩散点
Xiaoning Cui, Qing Li, Bao-hua Zhao
A series of environmental disasters have aroused peoplepsilas attention to the issue of diffusing-event monitoring through sensor networks. In this paper, a geography-aware fume-diffusion-spotting sensor network is investigated based on the hull theory, giving inspiration for a suite of similar diffusion-monitoring applications. In our approach, the energy consumption and the event coverage rate are tested, with the results showing notable advantage compared to the conventional random method. The experiments also indicate that the density of the network has little influence on the performance of our approach, inferring that our approach can be extended to meet the needs of network deployment in various real-world conditions.
一系列的环境灾害引起了人们对传感器网络扩散事件监测问题的高度重视。本文基于船体理论,研究了一种地理感知烟雾扩散点传感器网络,为一系列类似的扩散监测应用提供了灵感。在我们的方法中,对能量消耗和事件覆盖率进行了测试,结果表明与传统的随机方法相比有明显的优势。实验还表明,网络密度对我们方法的性能影响很小,这表明我们的方法可以扩展以满足各种现实条件下的网络部署需求。
{"title":"Geography-Aware Fume Diffusion Spotting in Sensor Networks","authors":"Xiaoning Cui, Qing Li, Bao-hua Zhao","doi":"10.1109/MSN.2008.30","DOIUrl":"https://doi.org/10.1109/MSN.2008.30","url":null,"abstract":"A series of environmental disasters have aroused peoplepsilas attention to the issue of diffusing-event monitoring through sensor networks. In this paper, a geography-aware fume-diffusion-spotting sensor network is investigated based on the hull theory, giving inspiration for a suite of similar diffusion-monitoring applications. In our approach, the energy consumption and the event coverage rate are tested, with the results showing notable advantage compared to the conventional random method. The experiments also indicate that the density of the network has little influence on the performance of our approach, inferring that our approach can be extended to meet the needs of network deployment in various real-world conditions.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Selection of Aggregation Nodes in Sensor Networks with Time Delay Constraint 时延约束下传感器网络中汇聚节点的最优选择
Bo-guang Sun, Suixiang Gao, Zhipeng Jiang
A critical problem in wireless sensor networks is to maximize their lifetimes. Data aggregation is an effective method to reduce redundant data and minimize the overall energy consumption. This method requires data to be delayed and processed in their paths to the sink node, so it causes extra time delay to the networks. This paper studies the aggregation node selection problem in sensor networks with time delay constraint, and the objective is to minimize the overall energy consumption of networks. A dynamic programming algorithm is proposed to solve the problem. This algorithm can turn out the optimal solution in polynomial time. Extensive simulations have been conducted to evaluate the performance of the proposed algorithm; the results show the efficiency of the algorithm in energy consumption reduction.
无线传感器网络的一个关键问题是使其寿命最大化。数据聚合是减少冗余数据、降低整体能耗的有效方法。这种方法要求数据在到达汇聚节点的路径上进行延迟和处理,给网络带来额外的时间延迟。研究了具有时延约束的传感器网络中汇聚节点的选择问题,其目标是使网络的总能耗最小。提出了一种动态规划算法来解决这一问题。该算法可以在多项式时间内求出最优解。已经进行了大量的仿真来评估所提出算法的性能;实验结果表明了该算法在降低能耗方面的有效性。
{"title":"Optimal Selection of Aggregation Nodes in Sensor Networks with Time Delay Constraint","authors":"Bo-guang Sun, Suixiang Gao, Zhipeng Jiang","doi":"10.1109/MSN.2008.18","DOIUrl":"https://doi.org/10.1109/MSN.2008.18","url":null,"abstract":"A critical problem in wireless sensor networks is to maximize their lifetimes. Data aggregation is an effective method to reduce redundant data and minimize the overall energy consumption. This method requires data to be delayed and processed in their paths to the sink node, so it causes extra time delay to the networks. This paper studies the aggregation node selection problem in sensor networks with time delay constraint, and the objective is to minimize the overall energy consumption of networks. A dynamic programming algorithm is proposed to solve the problem. This algorithm can turn out the optimal solution in polynomial time. Extensive simulations have been conducted to evaluate the performance of the proposed algorithm; the results show the efficiency of the algorithm in energy consumption reduction.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Lightweight Group Rekeying Scheme with Speedy Node Revocation for Wireless Sensor Networks 一种无线传感器网络节点快速撤销的分布式轻量级组密钥更新方案
Zeng Wei-ni, Lin Ya-ping, Liu Yong-he
In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised nodes should be revoked as soon as possible. As there is no such node that can always be trusted in sensor network, a distributed group rekeying scheme with speedy compromised node revocation is proposed in this paper. Based on a novelly constructed authentication polynomial, group rekeying is initiated by local network collaboratively in our scheme. Compared with the existing schemes, the proposed scheme can not only rekey in real-time, but reduce more communication overheads and provide a high level of security at the same time.
在无人值守或战场等恶劣环境中,传感器节点可能会受到损害。如果有一个节点被泄露,则应实时更新由所有组成员共享的组密钥,并尽快撤销被泄露的节点。针对传感器网络中不存在永远可信的节点,提出了一种快速撤销妥协节点的分布式组密钥更新方案。该方案基于一个新构造的认证多项式,由本地网络协同发起组密钥更新。与现有方案相比,所提出的方案不仅可以实时地进行密钥交换,而且减少了通信开销,同时提供了较高的安全性。
{"title":"A Distributed Lightweight Group Rekeying Scheme with Speedy Node Revocation for Wireless Sensor Networks","authors":"Zeng Wei-ni, Lin Ya-ping, Liu Yong-he","doi":"10.1109/MSN.2008.39","DOIUrl":"https://doi.org/10.1109/MSN.2008.39","url":null,"abstract":"In unattended or hostile environment like battlefield, sensor nodes may be compromised. If one node is compromised, group key which is shared by all the group members should be rekeyed in real-time and the compromised nodes should be revoked as soon as possible. As there is no such node that can always be trusted in sensor network, a distributed group rekeying scheme with speedy compromised node revocation is proposed in this paper. Based on a novelly constructed authentication polynomial, group rekeying is initiated by local network collaboratively in our scheme. Compared with the existing schemes, the proposed scheme can not only rekey in real-time, but reduce more communication overheads and provide a high level of security at the same time.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Gossip-Enabled Spatial Index for Moving Object Management over Wireless Sensor Networks 无线传感器网络中移动对象管理的空间索引
Chao-Chun Chen, Chiang Lee, Yen-Liang Liu
More and more users or applications showed high interest in obtaining moving object locations from a wireless sensor network. However, a moving object usually updates its location very frequently, and thus, a great number of messages for updating the locations in the wireless sensor networks are incurred. In this paper, we propose an index structure, called the gossip-enabled spatial index tree (GSI-tree), to support efficient communication for location updates. Our idea is to utilize the gossip property of the sensor communication to let the neighboring paths of the GSI-tree share the transmitted message. In this way, the nodes managing a past location can deregister the object location independently by hearing the registration messages from the neighboring nodes.
越来越多的用户或应用对通过无线传感器网络获取运动物体的位置表现出浓厚的兴趣。然而,运动物体通常更新其位置非常频繁,因此在无线传感器网络中产生了大量更新位置的消息。在本文中,我们提出了一种索引结构,称为支持八卦的空间索引树(GSI-tree),以支持有效的位置更新通信。我们的想法是利用传感器通信的八卦特性,让gsi树的相邻路径共享传输的消息。通过这种方式,管理过去位置的节点可以通过听取来自相邻节点的注册消息来独立地注销对象位置。
{"title":"A Gossip-Enabled Spatial Index for Moving Object Management over Wireless Sensor Networks","authors":"Chao-Chun Chen, Chiang Lee, Yen-Liang Liu","doi":"10.1109/MSN.2008.19","DOIUrl":"https://doi.org/10.1109/MSN.2008.19","url":null,"abstract":"More and more users or applications showed high interest in obtaining moving object locations from a wireless sensor network. However, a moving object usually updates its location very frequently, and thus, a great number of messages for updating the locations in the wireless sensor networks are incurred. In this paper, we propose an index structure, called the gossip-enabled spatial index tree (GSI-tree), to support efficient communication for location updates. Our idea is to utilize the gossip property of the sensor communication to let the neighboring paths of the GSI-tree share the transmitted message. In this way, the nodes managing a past location can deregister the object location independently by hearing the registration messages from the neighboring nodes.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1