首页 > 最新文献

2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Impact of the control-channel transmission rate in a multi-channel wireless network 多信道无线网络中控制信道传输速率的影响
Junseok Kim, M. Krunz
Multi-channel medium access control (MMAC) has the potential to significantly improve the network throughput by enabling parallel transmissions over different frequency channels. In many MMAC protocols, nodes exchange control packets over a dedicated control channel (CC). The CC transmission rate (CCR) is usually set to the lowest possible value, so as to maximize the reachability of control packets. However, in a multi-hop ad hoc network, this choice of the CCR may lead to a CC bottleneck, especially under high traffic load. While increasing the CCR can alleviate this bottleneck and improve the single-hop MMAC performance, it may also increase the number of hops along the path and hence degrade the end-to-end network performance. In this paper, we investigate the impact of the CCR on the performance of a multi-channel, multi-hop wireless network under a general MMAC protocol. To derive the queuing and channel access delays, we model the network as a G/G/1 queuing system. In our analysis, we consider detailed packet-level operations and non-saturated traffic. The average number of hops is also analytically obtained when nodes are randomly distributed. Our analysis is evaluated via network simulations, using 802.11a parameters. The simulation and numerical results reveal that the lowest transmission rate is not the optimal CCR. Our simulations show that the received power threshold has a significant impact on the optimal CCR.
多通道介质访问控制(MMAC)通过支持不同频率通道上的并行传输,具有显著提高网络吞吐量的潜力。在许多MMAC协议中,节点通过专用控制通道(CC)交换控制数据包。为了使控制报文的可达性最大化,通常将CC传输速率(CCR)设置为尽可能小的值。然而,在多跳自组织网络中,这种CCR的选择可能导致CC瓶颈,特别是在高流量负载下。虽然增加CCR可以缓解这一瓶颈并提高单跳MMAC性能,但它也可能增加路径上的跳数,从而降低端到端网络性能。本文研究了在通用MMAC协议下,CCR对多通道、多跳无线网络性能的影响。为了得到排队和通道访问延迟,我们将网络建模为G/G/1排队系统。在我们的分析中,我们考虑了详细的包级操作和非饱和流量。当节点随机分布时,也可以解析得到平均跳数。我们的分析是通过使用802.11a参数的网络模拟来评估的。仿真和数值结果表明,最低传输速率并非最优CCR。仿真结果表明,接收功率阈值对最优CCR有显著影响。
{"title":"Impact of the control-channel transmission rate in a multi-channel wireless network","authors":"Junseok Kim, M. Krunz","doi":"10.1109/WoWMoM.2013.6583389","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583389","url":null,"abstract":"Multi-channel medium access control (MMAC) has the potential to significantly improve the network throughput by enabling parallel transmissions over different frequency channels. In many MMAC protocols, nodes exchange control packets over a dedicated control channel (CC). The CC transmission rate (CCR) is usually set to the lowest possible value, so as to maximize the reachability of control packets. However, in a multi-hop ad hoc network, this choice of the CCR may lead to a CC bottleneck, especially under high traffic load. While increasing the CCR can alleviate this bottleneck and improve the single-hop MMAC performance, it may also increase the number of hops along the path and hence degrade the end-to-end network performance. In this paper, we investigate the impact of the CCR on the performance of a multi-channel, multi-hop wireless network under a general MMAC protocol. To derive the queuing and channel access delays, we model the network as a G/G/1 queuing system. In our analysis, we consider detailed packet-level operations and non-saturated traffic. The average number of hops is also analytically obtained when nodes are randomly distributed. Our analysis is evaluated via network simulations, using 802.11a parameters. The simulation and numerical results reveal that the lowest transmission rate is not the optimal CCR. Our simulations show that the received power threshold has a significant impact on the optimal CCR.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks 移动无人值守无线传感器网络中的保密性和可用性问题
R. D. Pietro, Stefano Guarino
In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. MUWSNs, other than being a reference model for an increasing number of military and civilian applications, also capture a few important characteristics of emerging computing paradigms like Participatory Sensing (PS). In this paper, we start by identifying the main features and issues of MUWSNs, revising the related work in the area and highlighting their shortcomings. We then propose a new approach based on secret sharing and information diffusion to improve data integrity and confidentiality, and present experimental results confirming the effectiveness of this solution. The rationale is that information sharing among neighboring nodes, combined with nodes mobility, helps distributing the information into the network in a way that, at the same time, facilitates data recovering and is resilient to data loss or stealing. This is a first step towards the general objective of providing closed results about how secret sharing schemes and nodes mobility can help in assuring data security using local communications only, and understanding how to set system parameters to achieve the desired trade-off between confidentiality and availability.
在移动无人值守无线传感器网络(muwsn)中,节点感知环境并存储获取的数据,直到可信数据接收器到达。muwsn除了作为越来越多的军事和民用应用的参考模型外,还捕获了参与式传感(PS)等新兴计算范式的一些重要特征。本文首先分析了微wsn的主要特点和存在的问题,对相关工作进行了评述,并指出了其不足之处。然后,我们提出了一种基于秘密共享和信息扩散的新方法来提高数据的完整性和保密性,并给出了实验结果,验证了该方案的有效性。其基本原理是相邻节点之间的信息共享,结合节点的移动性,有助于将信息分发到网络中,同时促进数据恢复,并对数据丢失或被盗具有弹性。这是实现总体目标的第一步,即提供关于秘密共享方案和节点移动性如何仅使用本地通信来帮助确保数据安全性的封闭结果,并了解如何设置系统参数以实现机密性和可用性之间的期望权衡。
{"title":"Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks","authors":"R. D. Pietro, Stefano Guarino","doi":"10.1109/WoWMoM.2013.6583467","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583467","url":null,"abstract":"In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. MUWSNs, other than being a reference model for an increasing number of military and civilian applications, also capture a few important characteristics of emerging computing paradigms like Participatory Sensing (PS). In this paper, we start by identifying the main features and issues of MUWSNs, revising the related work in the area and highlighting their shortcomings. We then propose a new approach based on secret sharing and information diffusion to improve data integrity and confidentiality, and present experimental results confirming the effectiveness of this solution. The rationale is that information sharing among neighboring nodes, combined with nodes mobility, helps distributing the information into the network in a way that, at the same time, facilitates data recovering and is resilient to data loss or stealing. This is a first step towards the general objective of providing closed results about how secret sharing schemes and nodes mobility can help in assuring data security using local communications only, and understanding how to set system parameters to achieve the desired trade-off between confidentiality and availability.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115277066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A cognitive-based solution for semantic knowledge and content dissemination in opportunistic networks 机会网络中语义知识和内容传播的认知解决方案
M. Mordacchini, L. Valerio, M. Conti, A. Passarella
Opportunistic networking is one of the key paradigms to support direct communication between devices in a mobile scenario. In this context, the high volatility and dynamicity of information and the fact that mobile nodes have to make decisions in condition of partial or incomplete knowledge, makes the development of effective and efficient data dissemination schemes very challenging. In this paper we present algorithms based on well-established models in cognitive sciences, in order to disseminate both data items, and semantic information associated with them. In our approach, semantic information represents both meta-data associated to data items (e.g., tags associated to them), and meta-data describing the interests of the users (e.g., topics for which they would like to receive data items). Our solution exploits dissemination of semantic data about the users' interests to guide the dissemination of the corresponding data items. Both dissemination processes are based on models coming from the cognitive sciences field, named cognitive heuristics, which describe how humans organise information in their memory and exchange it during interactions based on partial and incomplete information. We exploit a model describing how semantic data can be organised in each node in a semantic network, based on how humans organise information in their memory. Then, we define algorithms based on cognitive heuristics to disseminate both semantic data and data items between nodes upon encounters. Finally, we provide initial performance results about the diffusion of interests among users, and the corresponding diffusion of data items.
机会网络是支持移动场景中设备之间直接通信的关键范例之一。在这种情况下,信息的高波动性和动态性以及移动节点必须在部分或不完全知识的情况下做出决策,使得开发有效和高效的数据传播方案非常具有挑战性。在本文中,我们提出了基于认知科学中成熟模型的算法,以传播数据项和与之相关的语义信息。在我们的方法中,语义信息既表示与数据项相关的元数据(例如,与它们相关的标签),也表示描述用户兴趣的元数据(例如,他们希望接收数据项的主题)。我们的解决方案利用有关用户兴趣的语义数据的传播来指导相应数据项的传播。这两种传播过程都基于认知科学领域的模型,称为认知启发式,它描述了人类如何在记忆中组织信息,并在基于部分和不完整信息的交互过程中交换信息。我们利用一个模型来描述语义数据如何在语义网络的每个节点中组织,该模型基于人类如何在其记忆中组织信息。然后,我们定义了基于认知启发式的算法,在节点之间传播语义数据和数据项。最后,我们提供了用户之间兴趣扩散的初步性能结果,以及相应的数据项扩散。
{"title":"A cognitive-based solution for semantic knowledge and content dissemination in opportunistic networks","authors":"M. Mordacchini, L. Valerio, M. Conti, A. Passarella","doi":"10.1109/WoWMoM.2013.6583437","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583437","url":null,"abstract":"Opportunistic networking is one of the key paradigms to support direct communication between devices in a mobile scenario. In this context, the high volatility and dynamicity of information and the fact that mobile nodes have to make decisions in condition of partial or incomplete knowledge, makes the development of effective and efficient data dissemination schemes very challenging. In this paper we present algorithms based on well-established models in cognitive sciences, in order to disseminate both data items, and semantic information associated with them. In our approach, semantic information represents both meta-data associated to data items (e.g., tags associated to them), and meta-data describing the interests of the users (e.g., topics for which they would like to receive data items). Our solution exploits dissemination of semantic data about the users' interests to guide the dissemination of the corresponding data items. Both dissemination processes are based on models coming from the cognitive sciences field, named cognitive heuristics, which describe how humans organise information in their memory and exchange it during interactions based on partial and incomplete information. We exploit a model describing how semantic data can be organised in each node in a semantic network, based on how humans organise information in their memory. Then, we define algorithms based on cognitive heuristics to disseminate both semantic data and data items between nodes upon encounters. Finally, we provide initial performance results about the diffusion of interests among users, and the corresponding diffusion of data items.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A packet encoding algorithm for network coding with multiple next hop neighbor consideration and its integration with delta routing 一种考虑多下一跳邻居的网络编码算法及其与增量路由的集成
Maulik Desai, N. Maxemchuk, T. Klein
We propose an efficient encoding algorithm that considers multiple neighbors as next hop candidates for a packet, while searching for an optimal packet combination to transmit. Our algorithm, based on bipartite graphs, lets a node exhaustively search its queue to identify the maximum set of packets that can be combined in a single transmission. This algorithm can be easily integrated with a routing scheme in which a node considers multiple neighbors before choosing to forward a packet to one of them. We demonstrate this by integrating our algorithm with delta routing. Throughput benefit offered due to network coding is often hampered by congested nodes in a network. Delta routing improves throughput of a network by helping packets circumnavigate congestion. We demonstrate how our packet encoding algorithm can be coupled with such a routing mechanism in order to leverage the benefits offered by an efficient encoding scheme and enhanced routing both.
我们提出了一种高效的编码算法,该算法考虑多个邻居作为数据包的下一跳候选,同时搜索最优的数据包组合进行传输。我们的算法,基于二部图,让一个节点彻底搜索它的队列,以确定在一次传输中可以组合的最大数据包集。该算法可以很容易地与路由方案集成,在路由方案中,节点在选择向其中一个邻居转发数据包之前考虑多个邻居。我们通过将我们的算法与增量路由集成来证明这一点。网络编码带来的吞吐量优势常常受到网络中拥塞节点的阻碍。增量路由通过帮助数据包绕过拥塞来提高网络的吞吐量。我们演示了如何将我们的包编码算法与这样的路由机制相结合,以便利用有效的编码方案和增强的路由所提供的好处。
{"title":"A packet encoding algorithm for network coding with multiple next hop neighbor consideration and its integration with delta routing","authors":"Maulik Desai, N. Maxemchuk, T. Klein","doi":"10.1109/WoWMoM.2013.6583404","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583404","url":null,"abstract":"We propose an efficient encoding algorithm that considers multiple neighbors as next hop candidates for a packet, while searching for an optimal packet combination to transmit. Our algorithm, based on bipartite graphs, lets a node exhaustively search its queue to identify the maximum set of packets that can be combined in a single transmission. This algorithm can be easily integrated with a routing scheme in which a node considers multiple neighbors before choosing to forward a packet to one of them. We demonstrate this by integrating our algorithm with delta routing. Throughput benefit offered due to network coding is often hampered by congested nodes in a network. Delta routing improves throughput of a network by helping packets circumnavigate congestion. We demonstrate how our packet encoding algorithm can be coupled with such a routing mechanism in order to leverage the benefits offered by an efficient encoding scheme and enhanced routing both.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting context information for V2X dissemination in vehicular networks 利用车载网络中V2X传播的上下文信息
Michele Rondinone, J. Gozálvez, Jérémie Leguay, V. Conan
Cooperative ITS systems are expected to highly improve the efficiency of road mobility. Wireless communications are used by these systems to disseminate centralized real-time traffic information to radio-equipped vehicles. Current proposals for traffic information dissemination either exploit dedicated cellular transmissions to interested vehicles, or cooperatively relay the information through vehicular ad-hoc networks. However, dedicated cellular transmissions may pose energy cost and traffic scalability issues to network operators. On the contrary, purely ad-hoc solutions may suffer from network disconnections and not always ensure adequate service reliability. To overcome these limitations, this paper introduces RoAHD, a hybrid approach in which a few messages injected through the cellular system are followed by a cooperative multi-hop dissemination in the vehicular network. RoAHD exploits multi-hop road connectivity information obtained at a low channel cost. Thanks to this knowledge, it is capable to operate smart injection decisions to ensure good levels of message delivery.
协作式ITS系统有望大大提高道路机动效率。这些系统使用无线通信向配备无线电的车辆传播集中的实时交通信息。目前的交通信息传播方案要么利用专用的蜂窝传输到感兴趣的车辆,要么通过车辆自组织网络合作地传递信息。然而,专用蜂窝传输可能会给网络运营商带来能源成本和流量可扩展性问题。相反,纯粹的ad-hoc解决方案可能会受到网络中断的影响,并且不能始终确保足够的服务可靠性。为了克服这些限制,本文引入了一种混合方法,即通过蜂窝系统注入少量消息,然后在车载网络中进行合作多跳传播。roadhd利用以低信道成本获得的多跳道路连接信息。由于这些知识,它能够操作智能注入决策,以确保良好的消息传递级别。
{"title":"Exploiting context information for V2X dissemination in vehicular networks","authors":"Michele Rondinone, J. Gozálvez, Jérémie Leguay, V. Conan","doi":"10.1109/WoWMoM.2013.6583373","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583373","url":null,"abstract":"Cooperative ITS systems are expected to highly improve the efficiency of road mobility. Wireless communications are used by these systems to disseminate centralized real-time traffic information to radio-equipped vehicles. Current proposals for traffic information dissemination either exploit dedicated cellular transmissions to interested vehicles, or cooperatively relay the information through vehicular ad-hoc networks. However, dedicated cellular transmissions may pose energy cost and traffic scalability issues to network operators. On the contrary, purely ad-hoc solutions may suffer from network disconnections and not always ensure adequate service reliability. To overcome these limitations, this paper introduces RoAHD, a hybrid approach in which a few messages injected through the cellular system are followed by a cooperative multi-hop dissemination in the vehicular network. RoAHD exploits multi-hop road connectivity information obtained at a low channel cost. Thanks to this knowledge, it is capable to operate smart injection decisions to ensure good levels of message delivery.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123026510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A tunable framework for performance evaluation of spectrum sharing in LTE networks LTE网络频谱共享性能评估的可调框架
L. Badia, R. Re, F. Guidolin, A. Orsino, M. Zorzi
Current spectrum allocation policies, imposing exclusive usage of a licensed operator, may lead to inefficient management and waste of resources. Spectrum sharing, i.e., usage by the same frequency band by multiple operators, can improve the efficiency of the allocation. We analyze a scenario where two mobile operators managing neighboring cells also share a fraction of their available spectrum and quantify the performance gain. To this end, we propose a framework based on the definition of the Interference Suppression Ratio, which models effects such as beamforming or directional antennas. Depending on its value, mutual interference among the operators is reduced and sharing gains can be achieved. We implemented this framework in the well known open-source simulator ns-3 and we ran a parametric analysis of the impacting factors, including noise and cell radius. Simulation results confirm that significant gains can be achieved in terms of network capacity and throughput, provided that the Interference Suppression Ratio is above a given value.
现行的频谱分配政策规定只有持牌营办商才能使用,可能导致管理效率低下和资源浪费。频谱共享,即多个运营商使用同一频段,可以提高分配效率。我们分析了一个场景,其中两个移动运营商管理相邻的小区也共享其可用频谱的一小部分,并量化了性能增益。为此,我们提出了一个基于干扰抑制比定义的框架,该框架可以模拟波束形成或定向天线等效应。根据其值,可以减少运营商之间的相互干扰,实现收益共享。我们在著名的开源模拟器ns-3中实现了这个框架,并对影响因素进行了参数化分析,包括噪声和小区半径。仿真结果证实,在干扰抑制比高于给定值的情况下,可以在网络容量和吞吐量方面取得显著的增益。
{"title":"A tunable framework for performance evaluation of spectrum sharing in LTE networks","authors":"L. Badia, R. Re, F. Guidolin, A. Orsino, M. Zorzi","doi":"10.1109/WoWMoM.2013.6583414","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583414","url":null,"abstract":"Current spectrum allocation policies, imposing exclusive usage of a licensed operator, may lead to inefficient management and waste of resources. Spectrum sharing, i.e., usage by the same frequency band by multiple operators, can improve the efficiency of the allocation. We analyze a scenario where two mobile operators managing neighboring cells also share a fraction of their available spectrum and quantify the performance gain. To this end, we propose a framework based on the definition of the Interference Suppression Ratio, which models effects such as beamforming or directional antennas. Depending on its value, mutual interference among the operators is reduced and sharing gains can be achieved. We implemented this framework in the well known open-source simulator ns-3 and we ran a parametric analysis of the impacting factors, including noise and cell radius. Simulation results confirm that significant gains can be achieved in terms of network capacity and throughput, provided that the Interference Suppression Ratio is above a given value.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure and efficient handover protocols for WMNs 安全高效的wmn切换协议
André Egners, Patrick Herrmann, Ulrike Meyer
Wireless Mesh Networks (WMN) consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh gateways. Mesh clients on the other hand connect to these routers. To make full use of the connectivity and services offered by a WMN, users should be able to securely hand over from one router to the next. In particular, keying material has to be supplied to the new router. Handover protocols designed for infrastructure WLAN cannot be directly applied here as they have clearly been designed with a trusted backbone in mind. In this paper we propose three complementary secure, efficient, and practical proactive handover protocols, which are able to cope with the unique characteristics of WMNs such as the wireless infrastructure and untrusted intermediaries.We have also implemented and evaluated our protocols using our WMN testbed and thus show the feasibility of our solution in time critical contexts.
无线网状网络(WMN)由网状路由器的无线基础设施组成,这些路由器通过网状网关连接到互联网。另一方面,Mesh客户端连接到这些路由器。为了充分利用WMN提供的连接和服务,用户应该能够安全地从一个路由器切换到另一个路由器。特别是,必须向新路由器提供键控材料。为基础设施WLAN设计的切换协议不能直接应用于此,因为它们在设计时显然考虑了可信主干网。在本文中,我们提出了三种互补的安全、高效和实用的主动切换协议,它们能够应对无线网络的独特特点,如无线基础设施和不可信中介。我们还使用我们的WMN测试平台实现和评估了我们的协议,从而展示了我们的解决方案在时间关键环境中的可行性。
{"title":"Secure and efficient handover protocols for WMNs","authors":"André Egners, Patrick Herrmann, Ulrike Meyer","doi":"10.1109/WoWMoM.2013.6583410","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583410","url":null,"abstract":"Wireless Mesh Networks (WMN) consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh gateways. Mesh clients on the other hand connect to these routers. To make full use of the connectivity and services offered by a WMN, users should be able to securely hand over from one router to the next. In particular, keying material has to be supplied to the new router. Handover protocols designed for infrastructure WLAN cannot be directly applied here as they have clearly been designed with a trusted backbone in mind. In this paper we propose three complementary secure, efficient, and practical proactive handover protocols, which are able to cope with the unique characteristics of WMNs such as the wireless infrastructure and untrusted intermediaries.We have also implemented and evaluated our protocols using our WMN testbed and thus show the feasibility of our solution in time critical contexts.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart parking solutions for urban areas 城市地区的智能停车解决方案
Elena Polycarpou, L. Lambrinos, Eftychios E. Protopapadakis
Finding a parking place in a busy city centre is often a frustrating task for many drivers; time and fuel are wasted in the quest for a vacant spot and traffic in the area increases due to the slow moving vehicles circling around. In this paper, we present the results of a survey on the needs of drivers from parking infrastructures from a smart services perspective. As smart parking systems are becoming a necessity in today's urban areas, we discuss the latest trends in parking availability monitoring, parking reservation and dynamic pricing schemes. We also examine how these schemes can be integrated forming technologically advanced parking infrastructures whose aim is to benefit both the drivers and the parking operators alike.
对许多司机来说,在繁忙的市中心找个停车位往往是一件令人沮丧的事情;时间和燃料都浪费在寻找空位上,而且由于周围缓慢行驶的车辆增加了该地区的交通流量。在本文中,我们从智能服务的角度提出了一项关于停车基础设施对驾驶员需求的调查结果。随着智能停车系统成为当今城市的必需品,我们讨论了停车位可用性监控,停车位预订和动态定价方案的最新趋势。我们还研究了这些方案如何整合形成技术先进的停车基础设施,其目的是使司机和停车运营商都受益。
{"title":"Smart parking solutions for urban areas","authors":"Elena Polycarpou, L. Lambrinos, Eftychios E. Protopapadakis","doi":"10.1109/WoWMoM.2013.6583499","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583499","url":null,"abstract":"Finding a parking place in a busy city centre is often a frustrating task for many drivers; time and fuel are wasted in the quest for a vacant spot and traffic in the area increases due to the slow moving vehicles circling around. In this paper, we present the results of a survey on the needs of drivers from parking infrastructures from a smart services perspective. As smart parking systems are becoming a necessity in today's urban areas, we discuss the latest trends in parking availability monitoring, parking reservation and dynamic pricing schemes. We also examine how these schemes can be integrated forming technologically advanced parking infrastructures whose aim is to benefit both the drivers and the parking operators alike.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"28 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Decoupling context management and application logic: A new framework 解耦上下文管理和应用程序逻辑:一个新的框架
Bachir Chihani, E. Bertin, N. Crespi
Several frameworks have already been proposed to simplify the development of context-aware applications. These frameworks are focused on collecting and publishing contextual data, and on providing common semantics, definitions and representations of these data. This implies that applications share the same semantics, which limits the range of use cases where a framework can be used since that assumption induces a strong coupling between context management and application logic. This article proposes a framework that decouples context management from application business logic. The aim is to reduce the overhead for applications that run on resource-limited devices while still providing efficient mechanisms to support context-awareness and behavior adaptation. This framework implements an innovative approach that involves third parties in the process of context processing definition by structuring it in atomic functions, and describing it with an XML-based programming language. Its implementation and evaluation demonstrates the benefits, in terms of flexibility, of using trusted design patterns from software engineering for developing context-aware application.
已经提出了几个框架来简化上下文感知应用程序的开发。这些框架的重点是收集和发布上下文数据,并提供这些数据的通用语义、定义和表示。这意味着应用程序共享相同的语义,这限制了可以使用框架的用例范围,因为该假设导致上下文管理和应用程序逻辑之间的强耦合。本文提出了一个将上下文管理与应用程序业务逻辑分离的框架。其目的是减少在资源有限的设备上运行的应用程序的开销,同时仍然提供有效的机制来支持上下文感知和行为适应。该框架实现了一种创新的方法,通过在原子函数中构建上下文处理定义,并使用基于xml的编程语言对其进行描述,从而使第三方参与上下文处理定义的过程。就灵活性而言,它的实现和评估证明了使用来自软件工程的可信设计模式来开发上下文感知应用程序的好处。
{"title":"Decoupling context management and application logic: A new framework","authors":"Bachir Chihani, E. Bertin, N. Crespi","doi":"10.1109/WoWMoM.2013.6583486","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583486","url":null,"abstract":"Several frameworks have already been proposed to simplify the development of context-aware applications. These frameworks are focused on collecting and publishing contextual data, and on providing common semantics, definitions and representations of these data. This implies that applications share the same semantics, which limits the range of use cases where a framework can be used since that assumption induces a strong coupling between context management and application logic. This article proposes a framework that decouples context management from application business logic. The aim is to reduce the overhead for applications that run on resource-limited devices while still providing efficient mechanisms to support context-awareness and behavior adaptation. This framework implements an innovative approach that involves third parties in the process of context processing definition by structuring it in atomic functions, and describing it with an XML-based programming language. Its implementation and evaluation demonstrates the benefits, in terms of flexibility, of using trusted design patterns from software engineering for developing context-aware application.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"769 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Track me if you can: Transparent obfuscation for Location based Services 如果可以的话跟踪我:基于位置的服务的透明混淆
R. D. Pietro, Roberto Mandati, Nino Vincenzo Verde
Although Location-based Services (LBSs) offer evident advantages to their users, many privacy concerns are sought when user tracking data are shared with the service provider. Existing privacy enhancing solutions (e.g. k-anonymity) usually degrade service precision, and also require the collaboration of the service provider-this latter one not always willing to lose control over the user's location data. In this paper, we propose a solution that is able to obfuscate the user's path to the service provider, while preserving (for the LBS) the capability to compute a few functions-useful for the user-over the obfuscated path. In particular, we provide several contributions: first, we formalize the concept of obfuscation function, and we propose a solution that provides user privacy while allowing users to continue leveraging the services offered by the service provider. Moreover, we formally prove the privacy preserving properties of our approach. Finally, an extensive experimental campaign supports the feasibility of our approach, showing that the proposed solution can be efficiently implemented over mobile device.
尽管基于位置的服务(lbs)为其用户提供了明显的优势,但在与服务提供商共享用户跟踪数据时,会遇到许多隐私问题。现有的隐私增强解决方案(例如k-匿名)通常会降低服务精度,并且还需要服务提供者的合作——后者并不总是愿意失去对用户位置数据的控制。在本文中,我们提出了一种解决方案,该解决方案能够混淆用户到服务提供者的路径,同时保留(对于LBS)在混淆的路径上计算一些对用户有用的函数的能力。特别是,我们提供了几个贡献:首先,我们形式化了混淆函数的概念,并且我们提出了一个解决方案,该解决方案在允许用户继续利用服务提供者提供的服务的同时提供了用户隐私。此外,我们正式证明了该方法的隐私保护性质。最后,广泛的实验活动支持我们的方法的可行性,表明所提出的解决方案可以有效地在移动设备上实现。
{"title":"Track me if you can: Transparent obfuscation for Location based Services","authors":"R. D. Pietro, Roberto Mandati, Nino Vincenzo Verde","doi":"10.1109/WoWMoM.2013.6583401","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583401","url":null,"abstract":"Although Location-based Services (LBSs) offer evident advantages to their users, many privacy concerns are sought when user tracking data are shared with the service provider. Existing privacy enhancing solutions (e.g. k-anonymity) usually degrade service precision, and also require the collaboration of the service provider-this latter one not always willing to lose control over the user's location data. In this paper, we propose a solution that is able to obfuscate the user's path to the service provider, while preserving (for the LBS) the capability to compute a few functions-useful for the user-over the obfuscated path. In particular, we provide several contributions: first, we formalize the concept of obfuscation function, and we propose a solution that provides user privacy while allowing users to continue leveraging the services offered by the service provider. Moreover, we formally prove the privacy preserving properties of our approach. Finally, an extensive experimental campaign supports the feasibility of our approach, showing that the proposed solution can be efficiently implemented over mobile device.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1