首页 > 最新文献

2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Virtual Object access rights to enable multi-party use of sensors 虚拟对象访问权限,使多方使用传感器
P. Tilanus, B. Ran, M. Faeth, Dimitris Kelaidonis, V. Stavroulaki
Today there are more sensors and actuators in isolated intranets of things than in the overall internet of things (IoT). This paper discusses the motives to open up an intranet of things and make the things part of the global IoT, identifies the requirements from the involved parties, and extracts the essential architectural implications from these requirements. The proposed solution comprises the definition and control of Access Rights to the discovery and use of Virtual Objects (VO). This approach builds upon the widely accepted view that Virtual Objects serve as digital representation and gateway to Real World Objects (sensors, actuators, etc), and where VO databases serve to find these virtual counterparts. The Access Rights determine not only who may use a function of a Virtual Object and the conditions for that access, but also determine their discoverability when searching the database of virtual objects counterparts. Access Rights solve important requirements for security, privacy, and accountability, that are prerequisite to the expected economic and innovation benefits of an internet of things across organisational domains. Since verification of Access Rights to a VO plays a central role in the deployment of the IoT the scalable implementation with semantic technologies remains a challenge.
如今,孤立的物联网中的传感器和执行器比整个物联网(IoT)中的传感器和执行器要多。本文讨论了开放物联网的动机,使物联网成为全球物联网的一部分,确定了相关各方的需求,并从这些需求中提取了基本的架构含义。提出的解决方案包括对虚拟对象(VO)的发现和使用的访问权限的定义和控制。这种方法建立在广泛接受的观点之上,即虚拟对象作为数字表示和通往真实世界对象(传感器,执行器等)的门户,并且VO数据库用于查找这些虚拟对应物。访问权限不仅决定谁可以使用虚拟对象的功能和访问的条件,而且还决定在搜索虚拟对象对应数据库时它们的可发现性。访问权解决了对安全、隐私和问责制的重要要求,这是跨组织领域物联网预期经济和创新效益的先决条件。由于VO访问权限的验证在物联网的部署中起着核心作用,因此使用语义技术的可扩展实现仍然是一个挑战。
{"title":"Virtual Object access rights to enable multi-party use of sensors","authors":"P. Tilanus, B. Ran, M. Faeth, Dimitris Kelaidonis, V. Stavroulaki","doi":"10.1109/WoWMoM.2013.6583492","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583492","url":null,"abstract":"Today there are more sensors and actuators in isolated intranets of things than in the overall internet of things (IoT). This paper discusses the motives to open up an intranet of things and make the things part of the global IoT, identifies the requirements from the involved parties, and extracts the essential architectural implications from these requirements. The proposed solution comprises the definition and control of Access Rights to the discovery and use of Virtual Objects (VO). This approach builds upon the widely accepted view that Virtual Objects serve as digital representation and gateway to Real World Objects (sensors, actuators, etc), and where VO databases serve to find these virtual counterparts. The Access Rights determine not only who may use a function of a Virtual Object and the conditions for that access, but also determine their discoverability when searching the database of virtual objects counterparts. Access Rights solve important requirements for security, privacy, and accountability, that are prerequisite to the expected economic and innovation benefits of an internet of things across organisational domains. Since verification of Access Rights to a VO plays a central role in the deployment of the IoT the scalable implementation with semantic technologies remains a challenge.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Location privacy in vehicular networks 车载网络中的位置隐私
Karim Emara
Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aim to protect vehicles from being tracked. Most of research work concern changing pseudonyms effectively to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacon messages make them vulnerable to tracking even if beacons are totally anonymous. In this thesis, we consider how to protect vehicles from being tracked while they are sharing sensitive information in beacons. The high beacon rate, high precision of shared information and strict latency constraints of application are the main challenges to our objective. We propose two solutions for this issue. The first one is to send the precise information only every period of time while sending inaccurate beacons in between. The second solution is to use secure group communication to prevent attacker from overhearing broadcast information. Both choices will be implemented and evaluated against a state-of-the-art tracker.
位置隐私是车辆自组织网络(VANET)的主要挑战之一,其目的是保护车辆不被跟踪。大多数研究工作都是关于有效地改变假名,以避免通过假名链接信息。然而,车辆定期在信标信息中发送敏感信息,即使信标是完全匿名的,也容易被跟踪。在本文中,我们考虑如何保护车辆在信标中共享敏感信息时不被跟踪。高信标速率、高共享信息精度和应用程序严格的延迟限制是实现目标的主要挑战。对于这个问题,我们提出了两个解决方案。第一种方法是每隔一段时间发送准确的信息,中间发送不准确的信标。第二种解决方案是使用安全组通信来防止攻击者偷听广播信息。这两种选择都将根据最先进的跟踪器进行实施和评估。
{"title":"Location privacy in vehicular networks","authors":"Karim Emara","doi":"10.1109/WoWMoM.2013.6583427","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583427","url":null,"abstract":"Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aim to protect vehicles from being tracked. Most of research work concern changing pseudonyms effectively to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacon messages make them vulnerable to tracking even if beacons are totally anonymous. In this thesis, we consider how to protect vehicles from being tracked while they are sharing sensitive information in beacons. The high beacon rate, high precision of shared information and strict latency constraints of application are the main challenges to our objective. We propose two solutions for this issue. The first one is to send the precise information only every period of time while sending inaccurate beacons in between. The second solution is to use secure group communication to prevent attacker from overhearing broadcast information. Both choices will be implemented and evaluated against a state-of-the-art tracker.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the limits of DTN monitoring 浅谈DTN监控的局限性
Victor Ramiro, E. Lochin, P. Sénac, T. Rakotoarivelo
Compared to wired networks, Delay/Disruption Tolerant Networks (DTN) are challenging to monitor due to their lack of infrastructure and the absence of end-to-end paths. This work studies the feasibility, limits and convergence of monitoring such DTNs. More specifically, we focus on the efficient monitoring of intercontact time distribution (ICT) between DTN participants. Our contribution is two-fold. First we propose two schemes to sample data using monitors deployed within the DTN. In particular, we sample and estimate the ICT distribution. Second, we evaluate this scheme over both simulated DTN networks and real DTN traces. Our initial results show that (i) there is a high correlation between the quality of sampling and the sampled mobility type, and (ii) the number and placement of monitors impact the estimation of the ICT distribution of the whole DTN.
与有线网络相比,延迟/中断容忍网络(DTN)由于缺乏基础设施和缺乏端到端路径而难以监控。本文研究了监测此类dtn的可行性、局限性和收敛性。更具体地说,我们侧重于有效监测DTN参与者之间的相互接触时间分布(ICT)。我们的贡献是双重的。首先,我们提出了使用部署在DTN内的监视器对数据进行采样的两种方案。特别是,我们对ICT分布进行了抽样和估计。其次,我们在模拟DTN网络和实际DTN跟踪上对该方案进行了评估。我们的初步结果表明:(i)采样质量与采样移动类型之间存在高度相关性,(ii)监测仪的数量和位置影响整个DTN的ICT分布估计。
{"title":"On the limits of DTN monitoring","authors":"Victor Ramiro, E. Lochin, P. Sénac, T. Rakotoarivelo","doi":"10.1109/WoWMoM.2013.6583441","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583441","url":null,"abstract":"Compared to wired networks, Delay/Disruption Tolerant Networks (DTN) are challenging to monitor due to their lack of infrastructure and the absence of end-to-end paths. This work studies the feasibility, limits and convergence of monitoring such DTNs. More specifically, we focus on the efficient monitoring of intercontact time distribution (ICT) between DTN participants. Our contribution is two-fold. First we propose two schemes to sample data using monitors deployed within the DTN. In particular, we sample and estimate the ICT distribution. Second, we evaluate this scheme over both simulated DTN networks and real DTN traces. Our initial results show that (i) there is a high correlation between the quality of sampling and the sampled mobility type, and (ii) the number and placement of monitors impact the estimation of the ICT distribution of the whole DTN.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Toward a context-aware and automatic evaluation of elderly dependency in smart homes and cities 在智能家居和城市中实现对老年人依赖的情境感知和自动评估
Tayeb Lemlouma, Sébastien Laborie, P. Roose
In this work, we propose a framework for automatic dependency evaluation that can notify the changes of the elderly dependency, hence providing persons with required services in time. In order to validate our approach, we target the French dependent population. Especially, we focus our proposal on the AGGIR dependency model used in the French medical field. Our objective is to provide a flexible architecture and an extensible model linked to opened data that can refer to a wide variety of services (hardware sensors and software; simple or composed services).
在这项工作中,我们提出了一个自动依赖评估框架,可以通知老年人依赖的变化,从而及时为人们提供所需的服务。为了验证我们的方法,我们以依赖法国的人口为目标。特别是,我们的建议集中在法国医学领域使用的AGGIR依赖模型上。我们的目标是提供一个灵活的架构和一个可扩展的模型,链接到开放数据,可以引用各种各样的服务(硬件传感器和软件;简单或组合服务)。
{"title":"Toward a context-aware and automatic evaluation of elderly dependency in smart homes and cities","authors":"Tayeb Lemlouma, Sébastien Laborie, P. Roose","doi":"10.1109/WoWMoM.2013.6583501","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583501","url":null,"abstract":"In this work, we propose a framework for automatic dependency evaluation that can notify the changes of the elderly dependency, hence providing persons with required services in time. In order to validate our approach, we target the French dependent population. Especially, we focus our proposal on the AGGIR dependency model used in the French medical field. Our objective is to provide a flexible architecture and an extensible model linked to opened data that can refer to a wide variety of services (hardware sensors and software; simple or composed services).","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
ROAM: Supporting safety critical applications in MANETs with cross-layer middleware ROAM:通过跨层中间件支持manet中的安全关键应用
Sarogini Grace Pease
Provision of instantaneous, mobile and dependable media communications in military and disaster scenarios must overcome certain wireless network issues: lack of reliable existing infrastructure, immutability of safety-certified protocols and layer-2 dynamics with contributing factors including hidden transmitters and fading channels. This extended abstract investigates a cross-layer methodology to provide timely MANET communications through optimal channel selection and dynamic contention reduction, without protocol modification. This is done using ROAM: a new Real-time Optimised Ad hoc Middleware based architecture that has been implemented and validated in the ns2-MIRACLE simulator.
在军事和灾难场景中提供即时、移动和可靠的媒体通信必须克服某些无线网络问题:缺乏可靠的现有基础设施、安全认证协议的不变性以及具有隐藏发射机和衰落信道等因素的第二层动态。本扩展摘要研究了一种跨层方法,通过最佳信道选择和动态减少争用,在不修改协议的情况下提供及时的MANET通信。这是使用ROAM完成的:一种新的基于实时优化的临时中间件的架构,已经在ns2-MIRACLE模拟器中实现和验证。
{"title":"ROAM: Supporting safety critical applications in MANETs with cross-layer middleware","authors":"Sarogini Grace Pease","doi":"10.1109/WoWMoM.2013.6583432","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583432","url":null,"abstract":"Provision of instantaneous, mobile and dependable media communications in military and disaster scenarios must overcome certain wireless network issues: lack of reliable existing infrastructure, immutability of safety-certified protocols and layer-2 dynamics with contributing factors including hidden transmitters and fading channels. This extended abstract investigates a cross-layer methodology to provide timely MANET communications through optimal channel selection and dynamic contention reduction, without protocol modification. This is done using ROAM: a new Real-time Optimised Ad hoc Middleware based architecture that has been implemented and validated in the ns2-MIRACLE simulator.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experience from testbeds and management platforms towards mesh networking with heterogeneous wireless access 从测试平台和管理平台到异构无线接入的网状网络的经验
Vangelis Angelakis, A. Capone, Alexandros G. Fragkiadakis, S. Napoli, Stefanos Papadakis, G. Perantinos, Vassilis Spitadakis, E. Tragos, D. Yuan
The MESH-WISE project is aiming to address key fundamental issues in wireless mesh networking that span from fundamental performance characterization to prototyping heterogeneous-access mesh networking solutions for emergency response scenarios. In this paper we present the infrastructures that will be leveraged in this project and the latest results that have been acquired from the ones that are deployed. We further discuss the state of the art in academic and industrial resource and network management platforms and discuss how we will use existing know-how towards a centralized solution.
mesh - wise项目旨在解决无线网状网络中的关键基础问题,从基本性能表征到针对应急响应场景的异构接入网状网络解决方案原型。在本文中,我们展示了将在该项目中使用的基础设施,以及从部署的基础设施中获得的最新结果。我们进一步讨论了学术和工业资源和网络管理平台的最新技术,并讨论了我们将如何利用现有的专有技术实现集中解决方案。
{"title":"Experience from testbeds and management platforms towards mesh networking with heterogeneous wireless access","authors":"Vangelis Angelakis, A. Capone, Alexandros G. Fragkiadakis, S. Napoli, Stefanos Papadakis, G. Perantinos, Vassilis Spitadakis, E. Tragos, D. Yuan","doi":"10.1109/WOWMOM.2013.6583449","DOIUrl":"https://doi.org/10.1109/WOWMOM.2013.6583449","url":null,"abstract":"The MESH-WISE project is aiming to address key fundamental issues in wireless mesh networking that span from fundamental performance characterization to prototyping heterogeneous-access mesh networking solutions for emergency response scenarios. In this paper we present the infrastructures that will be leveraged in this project and the latest results that have been acquired from the ones that are deployed. We further discuss the state of the art in academic and industrial resource and network management platforms and discuss how we will use existing know-how towards a centralized solution.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aggregation-aware routing in wireless multi-hop networks with frame aggregation 具有帧聚合的无线多跳网络中的聚合感知路由
Sascha Gübner, C. Lindemann
Recently, two trends in wireless communication are observable. First, traffic patterns tend to be unsaturated, due to an enormous increase of traffic types like mobile video and voice streaming. Second, new standards like IEEE 802.11n or IEEE 802.11ac allow huge physical data rates up to several Gbit/s. However, to utilize these data rates an efficient usage of the new frame aggregation feature is necessary. We formulate an analytical model that captures the impact of frame aggregation on routing and transform it into an integer linear program. Furthermore, we propose a heuristic approach that simplifies the computational complexity and show both through extensive simulations and real-world testbed experiments that an aggregation-aware routing scheme helps to efficiently aggregate several unsaturated flows and leads to decreased end-to-end delay and decreased contention in wireless multi-hop networks.
近年来,无线通信有两种发展趋势。首先,由于移动视频和语音流等流量类型的巨大增长,流量模式往往不饱和。其次,像IEEE 802.11n或IEEE 802.11ac这样的新标准允许高达几Gbit/s的巨大物理数据速率。然而,为了利用这些数据速率,必须有效地使用新的帧聚合特性。我们制定了一个分析模型,捕捉帧聚合对路由的影响,并将其转化为整数线性规划。此外,我们提出了一种简化计算复杂性的启发式方法,并通过广泛的模拟和现实世界的测试平台实验表明,聚合感知路由方案有助于有效地聚合多个不饱和流,从而减少无线多跳网络中的端到端延迟和争用。
{"title":"Aggregation-aware routing in wireless multi-hop networks with frame aggregation","authors":"Sascha Gübner, C. Lindemann","doi":"10.1109/WoWMoM.2013.6583475","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583475","url":null,"abstract":"Recently, two trends in wireless communication are observable. First, traffic patterns tend to be unsaturated, due to an enormous increase of traffic types like mobile video and voice streaming. Second, new standards like IEEE 802.11n or IEEE 802.11ac allow huge physical data rates up to several Gbit/s. However, to utilize these data rates an efficient usage of the new frame aggregation feature is necessary. We formulate an analytical model that captures the impact of frame aggregation on routing and transform it into an integer linear program. Furthermore, we propose a heuristic approach that simplifies the computational complexity and show both through extensive simulations and real-world testbed experiments that an aggregation-aware routing scheme helps to efficiently aggregate several unsaturated flows and leads to decreased end-to-end delay and decreased contention in wireless multi-hop networks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114138191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and analysis of virtualization framework for Wireless Sensor Networks 无线传感器网络虚拟化框架的设计与分析
Imran Khan
Wireless Sensor Networks (WSNs) are used in many application areas including health, agriculture and gaming. New advances in sensor technology make it pertinent to consider sharing a deployed WSN infrastructure by multiple applications, including applications which are designed after the WSN deployment. For my PhD research I propose a novel WSN virtualization framework that allows multiple users to run their application tasks over underlying WSN resources in a transparent way. This paper presents the overview of the proposed WSN virtualization framework, related work, current status and future work.
无线传感器网络(WSNs)广泛应用于健康、农业和游戏等领域。传感器技术的新进展使得考虑多个应用(包括在WSN部署后设计的应用)共享已部署的WSN基础设施变得相关。在我的博士研究中,我提出了一个新颖的WSN虚拟化框架,它允许多个用户以透明的方式在底层WSN资源上运行他们的应用程序任务。本文对提出的无线传感器网络虚拟化框架、相关工作、现状和未来工作进行了概述。
{"title":"Design and analysis of virtualization framework for Wireless Sensor Networks","authors":"Imran Khan","doi":"10.1109/WoWMoM.2013.6583425","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583425","url":null,"abstract":"Wireless Sensor Networks (WSNs) are used in many application areas including health, agriculture and gaming. New advances in sensor technology make it pertinent to consider sharing a deployed WSN infrastructure by multiple applications, including applications which are designed after the WSN deployment. For my PhD research I propose a novel WSN virtualization framework that allows multiple users to run their application tasks over underlying WSN resources in a transparent way. This paper presents the overview of the proposed WSN virtualization framework, related work, current status and future work.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Deploying applications with Community-Lab in wireless community networks 在无线社区网络中使用community - lab部署应用程序
M. Aymerich, Roger Baig, P. Garcia, Ivan Vilata i Balaguer, Axel Neumann, Davide Vega, E. López, Felix Freitag, L. Navarro
Community-Lab is a testbed for researchers to carry out experiments within wireless community networks. Community networks are an emergent model of infrastructures built with off-the-shelf communication equipment that aims to satisfy a community's demand for Internet access and ICT services. Community-Lab consists of a set of nodes that are integrated in existing community networks, thus giving researchers access to community networks and allowing them to conduct experimental evaluation of applications deployed there. ICT services and applications beyond Internet access are an important milestone - yet not completely reached - to add value to community networks. The challenging environment of community networks however needs a careful evaluation of application performance to make the user experience successful. This paper focuses on demonstrating the deployment of applications in Community-Lab. By means of selected applications, we show how Community-Lab can be used by researchers to perform experiments with applications in community networks.
社区实验室是研究人员在无线社区网络中进行实验的试验台。社区网络是一种新兴的基础设施模式,使用现成的通信设备,旨在满足社区对互联网接入和信息通信技术服务的需求。community - lab由一组节点组成,这些节点集成在现有的社区网络中,从而使研究人员能够访问社区网络,并允许他们对部署在那里的应用程序进行实验评估。互联网接入以外的信息通信技术服务和应用是为社区网络增加价值的一个重要里程碑——但尚未完全实现。然而,社区网络具有挑战性的环境需要仔细评估应用程序的性能,以使用户体验成功。本文的重点是演示应用程序在Community-Lab中的部署。通过选定的应用程序,我们展示了研究人员如何使用community - lab在社区网络中的应用程序进行实验。
{"title":"Deploying applications with Community-Lab in wireless community networks","authors":"M. Aymerich, Roger Baig, P. Garcia, Ivan Vilata i Balaguer, Axel Neumann, Davide Vega, E. López, Felix Freitag, L. Navarro","doi":"10.1109/WoWMoM.2013.6583362","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583362","url":null,"abstract":"Community-Lab is a testbed for researchers to carry out experiments within wireless community networks. Community networks are an emergent model of infrastructures built with off-the-shelf communication equipment that aims to satisfy a community's demand for Internet access and ICT services. Community-Lab consists of a set of nodes that are integrated in existing community networks, thus giving researchers access to community networks and allowing them to conduct experimental evaluation of applications deployed there. ICT services and applications beyond Internet access are an important milestone - yet not completely reached - to add value to community networks. The challenging environment of community networks however needs a careful evaluation of application performance to make the user experience successful. This paper focuses on demonstrating the deployment of applications in Community-Lab. By means of selected applications, we show how Community-Lab can be used by researchers to perform experiments with applications in community networks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authorization framework for the Internet-of-Things 物联网授权框架
L. Seitz, G. Selander, C. Gehrmann
This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implementing the device part of the framework.
本文描述了一个框架,该框架允许对具有非常有限的处理能力和内存的连接设备进行细粒度和灵活的访问控制。我们为此设置提出了一组安全和性能要求,并推导出一个授权框架,在受约束的设备和受约束较少的后端服务器之间分配处理成本,同时将与受约束设备的消息交换保持在最低限度。作为概念验证,我们展示了实现该框架的设备部分的原型的性能结果。
{"title":"Authorization framework for the Internet-of-Things","authors":"L. Seitz, G. Selander, C. Gehrmann","doi":"10.1109/WoWMoM.2013.6583465","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583465","url":null,"abstract":"This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implementing the device part of the framework.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
期刊
2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1