首页 > 最新文献

International Conference on Wireless Technologies for Humanitarian Relief最新文献

英文 中文
Identity based secure AODV and TCP for mobile ad hoc networks 用于移动自组织网络的基于身份的安全AODV和TCP
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185308
Uttam Ghosh, R. Datta
Security is a prime requirement for communication between authorized hosts in mobile ad hoc networks(MANETs). Recently, several approaches have been proposed to secure the routing of MANET. However, most of the approaches do not consider the security aspect on data transmission of transmission control protocol (TCP). As a result, several types of security threats in TCP can be observed. In this paper, we propose an identity (ID) based scheme that secures AODV and transmit TCP data to the authorized hosts. The proposed scheme secures the AODV using sequential aggregate signatures (SAS) based on RSA and also securely generates the session key for the MANET nodes to secure the TCP. In the proposed scheme, each node have an ID which is evaluated from its public key and messages are sent along with signature/MAC for authentication purpose. Following the proposed scheme a node cannot change its ID throughout the lifetime of the MANET. Therefore, the scheme is secure against the attacks that are associated with AODV and TCP in MANET. Performance analysis shows that our proposed scheme is secure and efficient against various types of attacks with fairly good overhead.
安全是移动自组织网络(manet)中授权主机之间通信的首要要求。近年来,人们提出了几种方法来保证MANET的路由安全。然而,大多数方法都没有考虑传输控制协议(TCP)在数据传输方面的安全性。因此,可以观察到TCP中几种类型的安全威胁。在本文中,我们提出了一种基于身份(ID)的方案来保护AODV并将TCP数据传输到授权的主机。提出的方案使用基于RSA的顺序聚合签名(SAS)来保护AODV,并为MANET节点安全地生成会话密钥以保护TCP。在提出的方案中,每个节点都有一个从其公钥评估的ID,并且消息与签名/MAC一起发送以进行身份验证。在该方案下,节点在MANET的整个生命周期内不能更改其ID。因此,该方案是安全的,可以抵御与MANET中的AODV和TCP相关的攻击。性能分析表明,我们提出的方案对各种类型的攻击是安全有效的,并且开销相当大。
{"title":"Identity based secure AODV and TCP for mobile ad hoc networks","authors":"Uttam Ghosh, R. Datta","doi":"10.1145/2185216.2185308","DOIUrl":"https://doi.org/10.1145/2185216.2185308","url":null,"abstract":"Security is a prime requirement for communication between authorized hosts in mobile ad hoc networks(MANETs). Recently, several approaches have been proposed to secure the routing of MANET. However, most of the approaches do not consider the security aspect on data transmission of transmission control protocol (TCP). As a result, several types of security threats in TCP can be observed. In this paper, we propose an identity (ID) based scheme that secures AODV and transmit TCP data to the authorized hosts. The proposed scheme secures the AODV using sequential aggregate signatures (SAS) based on RSA and also securely generates the session key for the MANET nodes to secure the TCP. In the proposed scheme, each node have an ID which is evaluated from its public key and messages are sent along with signature/MAC for authentication purpose. Following the proposed scheme a node cannot change its ID throughout the lifetime of the MANET. Therefore, the scheme is secure against the attacks that are associated with AODV and TCP in MANET. Performance analysis shows that our proposed scheme is secure and efficient against various types of attacks with fairly good overhead.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Contextual information integration platform for humanitarian relief 人道主义救援情境信息整合平台
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185243
Shivsubramani Krishnamoorthy, A. Agrawala
It is well recognized that context plays a significant role in all human endeavors. All decisions are based on information which has to be interpreted in context. By making the information systems context-aware we can have systems that significantly improve the human capabilities to handle situations context. In this paper, we highlight the significance of Context that wireless devices should be able to support, especially in the event of a calamity or a disaster to provide much more effective support to the relief efforts. In such situations, where wireless device users need to be provided with critical information for purposes such as evacuation, relief work etc., it is equally important to provide information that suits current situation of the user while taking into account the current environment around the user. We present Rover II, framework for contextual information integration for wireless devices. With our belief that information processing systems should only provide support to the human decision maker (and not attempt to replace him/her), the Rover provides means for supporting the flow of information filtered and augmented using relevant contextual information. Our framework uses a paradigm for handling context information that includes user specific context combined with activity context and common context. We outline the significance of context-awareness with the help of a mobile application/system developed at Maryland on how effective such systems can be in situations of disaster or calamity.
众所周知,语境在人类的一切活动中起着重要作用。所有的决定都是基于信息,而这些信息必须在上下文中进行解释。通过使信息系统具有上下文意识,我们可以拥有显著提高人类处理情境能力的系统。在本文中,我们强调了上下文的重要性,即无线设备应该能够支持,特别是在发生灾难或灾难的情况下,为救灾工作提供更有效的支持。在这种情况下,需要向无线设备用户提供关键信息,如疏散、救援工作等,在考虑用户周围当前环境的同时,提供适合用户当前情况的信息同样重要。我们提出了Rover II,无线设备的上下文信息集成框架。我们相信信息处理系统只应该为人类决策者提供支持(而不是试图取代他/她),Rover提供了支持使用相关上下文信息过滤和增强信息流的方法。我们的框架使用一个范例来处理上下文信息,包括用户特定的上下文与活动上下文和公共上下文的结合。我们通过马里兰大学开发的移动应用程序/系统概述了上下文感知的重要性,以了解此类系统在灾难或灾难情况下的有效性。
{"title":"Contextual information integration platform for humanitarian relief","authors":"Shivsubramani Krishnamoorthy, A. Agrawala","doi":"10.1145/2185216.2185243","DOIUrl":"https://doi.org/10.1145/2185216.2185243","url":null,"abstract":"It is well recognized that context plays a significant role in all human endeavors. All decisions are based on information which has to be interpreted in context. By making the information systems context-aware we can have systems that significantly improve the human capabilities to handle situations context. In this paper, we highlight the significance of Context that wireless devices should be able to support, especially in the event of a calamity or a disaster to provide much more effective support to the relief efforts. In such situations, where wireless device users need to be provided with critical information for purposes such as evacuation, relief work etc., it is equally important to provide information that suits current situation of the user while taking into account the current environment around the user. We present Rover II, framework for contextual information integration for wireless devices. With our belief that information processing systems should only provide support to the human decision maker (and not attempt to replace him/her), the Rover provides means for supporting the flow of information filtered and augmented using relevant contextual information. Our framework uses a paradigm for handling context information that includes user specific context combined with activity context and common context. We outline the significance of context-awareness with the help of a mobile application/system developed at Maryland on how effective such systems can be in situations of disaster or calamity.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PhoneGuard: a smartphone in the coalmine PhoneGuard:煤矿里的智能手机
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185299
Nicolas Mayor, J. Wagen, Abhishek Samanta, Ravi Sundaram
In the short span of less than a decade the mobile phone has become a ubiquitous feature of life in India. Everyone from the chai-wallah to the CEO has a cell-phone and in recent years many of these are smart-phones capable of running smart-apps. Our focus is on conceiving a practical and useful app that can aid in disaster prevention and actually implementing and testing it. Towards this end we created PhoneGuard -- a smart-app that converts the phone into a remote monitoring device -- you leave the phone in a sensitive location like on the banks of a river or inside a coal-mine and it periodically takes pictures, does simple image analysis and checks for coherence over time, if warranted (e.g. in case of flooding of the river or buckling of beams in a coal-mine) it raises an alarm and follows an escalation procedure to push live images to a webpage. A complete working system was developed using standardized software and tested using realistic conditions. We believe that the image analysis and its integration into an escalation procedure is a novel aspect of our system.
在不到十年的时间里,手机已经成为印度生活中无处不在的特征。从主席到首席执行官,每个人都有一部手机,近年来,其中许多都是能够运行智能应用程序的智能手机。我们的重点是构思一个实用而有用的应用程序,可以帮助预防灾难,并实际实施和测试它。为此我们创建PhoneGuard smart-app,将手机转换为一个远程监控设备——你离开电话在一个敏感的位置像河流或在一个煤矿的银行定期拍照,做简单的图像分析和检查一致性随着时间的推移,如果必要的(如在河的洪水或屈曲梁煤矿)它将发出警报,升级过程将实时图像到一个网页。采用标准化软件开发了完整的工作系统,并在实际条件下进行了测试。我们认为,图像分析及其集成到升级程序是我们系统的一个新颖方面。
{"title":"PhoneGuard: a smartphone in the coalmine","authors":"Nicolas Mayor, J. Wagen, Abhishek Samanta, Ravi Sundaram","doi":"10.1145/2185216.2185299","DOIUrl":"https://doi.org/10.1145/2185216.2185299","url":null,"abstract":"In the short span of less than a decade the mobile phone has become a ubiquitous feature of life in India. Everyone from the chai-wallah to the CEO has a cell-phone and in recent years many of these are smart-phones capable of running smart-apps. Our focus is on conceiving a practical and useful app that can aid in disaster prevention and actually implementing and testing it. Towards this end we created PhoneGuard -- a smart-app that converts the phone into a remote monitoring device -- you leave the phone in a sensitive location like on the banks of a river or inside a coal-mine and it periodically takes pictures, does simple image analysis and checks for coherence over time, if warranted (e.g. in case of flooding of the river or buckling of beams in a coal-mine) it raises an alarm and follows an escalation procedure to push live images to a webpage. A complete working system was developed using standardized software and tested using realistic conditions. We believe that the image analysis and its integration into an escalation procedure is a novel aspect of our system.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134309170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LTE for rural applications and humanitarian relief LTE用于农村应用和人道主义救援
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185293
K. Sivarajan
India faces a huge challenge in providing health services in rural areas. India, with only 8 skilled health workers per 10,000 people compared to the international norm of 25. needs to use wireless broadband technology along with cost-effective devices and cloud telemedicine apps, to extend healthcare to rural areas. The proper use of wireless broadband will ensure that advanced medical facilities, which are concentrated today in urban areas, is available to rural areas. In addition to the rural health divide and lack of health care in remote area get more chronic especially during natural disaster. India has lost close to 35,000 lives in major quakes in last 20 years. Every year 30 million are affected by flood and another 50 million are affected by drought. Sadly, all these natural disaster seem to happen at regular intervals. The key effect of natural disasters as per WHO are deaths, severe injuries needing extensive treatment, damage to health facilities and water systems, spread of communicable disease etc. In this talk, we will explain how LTE and LTE-Advanced provide various new technological enhancements which help to address these ill effects caused by natural disaster. LTE and LTE-Advanced technologies provide very high spectral efficiency and hence is well suited as a cost effective mechanism to deliver wireless connectivity to the end user. The ability of TDD mode operation of LTE technology to change the ratio of downlink to uplink data rate can come handy when disaster zones usually become content generator rather than content consumer. The support of MBSFN (Multicast Broadcast Single Frequency Network) can be used to provide proactive training on best practices to be followed before and after the disaster. This will help to reduce the level of mortality through direct effect of disaster during the disaster and indirect effect like communicable diseases which can happen after a disaster. M2M (machine to Machine) enhancements provided in LTE-Advanced can be used for centralized monitoring of logistic telemetry so that efficient delivery of food, water, tent, Blanket etc can occur after a disaster. SON (Self-Organizing Network) capability in LTE will allow the establishment of mobile base station at disaster zone without much technical expertise and can bring back connectivity in a short time in case of site damages caused by earthquakes, cyclone etc.
印度在向农村地区提供保健服务方面面临巨大挑战。印度,每1万人中只有8名熟练的卫生工作者,而国际标准是25名。需要使用无线宽带技术以及具有成本效益的设备和云远程医疗应用程序,将医疗保健扩展到农村地区。适当使用无线宽带将确保农村地区能够获得目前集中在城市地区的先进医疗设施。此外,农村卫生鸿沟和偏远地区缺乏卫生保健变得更加慢性,特别是在自然灾害期间。在过去20年里,印度在大地震中失去了近3.5万人的生命。每年有3000万人受洪水影响,另有5000万人受干旱影响。可悲的是,所有这些自然灾害似乎都是定期发生的。根据世卫组织的说法,自然灾害的主要影响是死亡、需要广泛治疗的重伤、对卫生设施和供水系统的破坏、传染病的传播等。在这次演讲中,我们将解释LTE和LTE- advanced如何提供各种新的技术增强,以帮助解决自然灾害造成的这些不良影响。LTE和LTE- advanced技术提供了非常高的频谱效率,因此非常适合作为一种具有成本效益的机制,向最终用户提供无线连接。当灾区通常成为内容生成器而不是内容消费者时,LTE技术的TDD模式操作改变下行与上行数据速率比率的能力就会派上用场。MBSFN(多播广播单频网络)的支持可用于提供有关灾难前后应遵循的最佳实践的主动培训。这将有助于通过灾害期间的直接影响和灾后可能发生的传染病等间接影响降低死亡率。LTE-Advanced提供的M2M(机器对机器)增强功能可用于集中监控物流遥测,以便在灾难发生后有效地提供食物、水、帐篷、毯子等。LTE的SON(自组织网络)功能将允许在灾区建立移动基站,而无需太多技术专长,并且可以在地震,飓风等造成现场损坏的情况下在短时间内恢复连接。
{"title":"LTE for rural applications and humanitarian relief","authors":"K. Sivarajan","doi":"10.1145/2185216.2185293","DOIUrl":"https://doi.org/10.1145/2185216.2185293","url":null,"abstract":"India faces a huge challenge in providing health services in rural areas. India, with only 8 skilled health workers per 10,000 people compared to the international norm of 25. needs to use wireless broadband technology along with cost-effective devices and cloud telemedicine apps, to extend healthcare to rural areas. The proper use of wireless broadband will ensure that advanced medical facilities, which are concentrated today in urban areas, is available to rural areas.\u0000 In addition to the rural health divide and lack of health care in remote area get more chronic especially during natural disaster. India has lost close to 35,000 lives in major quakes in last 20 years. Every year 30 million are affected by flood and another 50 million are affected by drought. Sadly, all these natural disaster seem to happen at regular intervals. The key effect of natural disasters as per WHO are deaths, severe injuries needing extensive treatment, damage to health facilities and water systems, spread of communicable disease etc. In this talk, we will explain how LTE and LTE-Advanced provide various new technological enhancements which help to address these ill effects caused by natural disaster.\u0000 LTE and LTE-Advanced technologies provide very high spectral efficiency and hence is well suited as a cost effective mechanism to deliver wireless connectivity to the end user. The ability of TDD mode operation of LTE technology to change the ratio of downlink to uplink data rate can come handy when disaster zones usually become content generator rather than content consumer. The support of MBSFN (Multicast Broadcast Single Frequency Network) can be used to provide proactive training on best practices to be followed before and after the disaster. This will help to reduce the level of mortality through direct effect of disaster during the disaster and indirect effect like communicable diseases which can happen after a disaster. M2M (machine to Machine) enhancements provided in LTE-Advanced can be used for centralized monitoring of logistic telemetry so that efficient delivery of food, water, tent, Blanket etc can occur after a disaster. SON (Self-Organizing Network) capability in LTE will allow the establishment of mobile base station at disaster zone without much technical expertise and can bring back connectivity in a short time in case of site damages caused by earthquakes, cyclone etc.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utility based video scheduling for quality maximization in 4G WiMAX wireless networks 基于效用的4G WiMAX无线网络质量最大化视频调度
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185277
Kumar Ritikesh, A. Jagannatham
In this work we propose a novel utility based algorithm for dynamic frame scheduling of a scalable video stream for video transmission over a 4G OFDMA wireless network. We consider the GOP structure of a temporally scalable video sequence and derive a scheme to compute the average utility and packet sizes of the frames belonging to the base and enhancement layers. This scheme is based on the rate models derived employing the H.264 joint scalable video model (JSVM) developed by the JVT and MPEG groups, and is hence readily applicable in practical scenarios. Based on the above rate models and standard video quality models existing in literature, we propose a utility index based optimal scheme for time-frequency (TF) resource scheduling in 4G OFDMA wireless systems towards video quality maximization. Simulation results in the context of 4G WiMAX cellular networks clearly demonstrate the superior performance of the proposed scheme compared to competing scheduling schemes existing in literature.
在这项工作中,我们提出了一种新的基于实用程序的算法,用于在4G OFDMA无线网络上进行视频传输的可扩展视频流的动态帧调度。我们考虑了一个时间可扩展视频序列的GOP结构,并推导了一种方案来计算属于基础层和增强层的帧的平均效用和数据包大小。该方案基于由JVT组和MPEG组开发的H.264联合可扩展视频模型(JSVM)衍生的速率模型,因此易于应用于实际场景。在上述速率模型和文献中已有的标准视频质量模型的基础上,我们提出了一种基于效用指数的4G OFDMA无线系统时频资源调度优化方案,以实现视频质量最大化。在4G WiMAX蜂窝网络环境下的仿真结果清楚地表明,与现有的竞争调度方案相比,所提出的方案具有优越的性能。
{"title":"Utility based video scheduling for quality maximization in 4G WiMAX wireless networks","authors":"Kumar Ritikesh, A. Jagannatham","doi":"10.1145/2185216.2185277","DOIUrl":"https://doi.org/10.1145/2185216.2185277","url":null,"abstract":"In this work we propose a novel utility based algorithm for dynamic frame scheduling of a scalable video stream for video transmission over a 4G OFDMA wireless network. We consider the GOP structure of a temporally scalable video sequence and derive a scheme to compute the average utility and packet sizes of the frames belonging to the base and enhancement layers. This scheme is based on the rate models derived employing the H.264 joint scalable video model (JSVM) developed by the JVT and MPEG groups, and is hence readily applicable in practical scenarios. Based on the above rate models and standard video quality models existing in literature, we propose a utility index based optimal scheme for time-frequency (TF) resource scheduling in 4G OFDMA wireless systems towards video quality maximization. Simulation results in the context of 4G WiMAX cellular networks clearly demonstrate the superior performance of the proposed scheme compared to competing scheduling schemes existing in literature.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131059819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing an efficient PCA based data model for wireless sensor networks 基于PCA的无线传感器网络数据模型设计
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185262
N. Chitradevi, K. Baskaran, V. Palanisamy, D. Aswini
Recent technology in wireless communication has enabled the development of low-cost sensor networks. Sensors at different locations can generate streaming data, which can be analyzed in real-time to identify events of interest. Wireless sensor networks (WSNs) usually have limited energy and transmission capacity, which cannot match the transmission of a large number of data collected by sensor nodes. So, it is necessary to perform in-network data aggregation in the WSN which is performed by aggregator node. Since, the nodes in WSN are vulnerable to malicious attackers and physical impairment; the data collected in WSNs may be unreliable. So, in this paper, we propose an efficient model based technique to detect the unreliable data. Data model is designed using the sound statistical multivariate technique called Principal Component Analysis (PCA). But as a drawback, it is not robust to outliers. Hence, if the input data is corrupted, an arbitrarily wrong representation is obtained. To overcome this problem, we propose two approaches namely Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) to design robust PCA which aids in design of a noise-free data model. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach is effective and efficient.
无线通信的最新技术使低成本传感器网络得以发展。不同位置的传感器可以生成流数据,这些数据可以实时分析,以识别感兴趣的事件。无线传感器网络通常能量和传输能力有限,无法匹配传感器节点采集的大量数据的传输。因此,有必要在WSN中通过聚合器节点进行网内数据聚合。由于WSN中的节点容易受到恶意攻击者的攻击和物理损伤;无线传感器网络采集到的数据可能不可靠。因此,本文提出了一种有效的基于模型的不可靠数据检测方法。数据模型的设计采用了完善的多元统计技术——主成分分析(PCA)。但作为一个缺点,它对异常值的鲁棒性不强。因此,如果输入数据损坏,就会得到任意错误的表示。为了克服这一问题,我们提出了最小体积椭球(MVE)和最小协方差行行式(MCD)两种方法来设计鲁棒PCA,从而帮助设计无噪声数据模型。通过对该方法的性能进行评价,并与已有方法进行了比较,结果表明该方法是有效的。
{"title":"Designing an efficient PCA based data model for wireless sensor networks","authors":"N. Chitradevi, K. Baskaran, V. Palanisamy, D. Aswini","doi":"10.1145/2185216.2185262","DOIUrl":"https://doi.org/10.1145/2185216.2185262","url":null,"abstract":"Recent technology in wireless communication has enabled the development of low-cost sensor networks. Sensors at different locations can generate streaming data, which can be analyzed in real-time to identify events of interest. Wireless sensor networks (WSNs) usually have limited energy and transmission capacity, which cannot match the transmission of a large number of data collected by sensor nodes. So, it is necessary to perform in-network data aggregation in the WSN which is performed by aggregator node. Since, the nodes in WSN are vulnerable to malicious attackers and physical impairment; the data collected in WSNs may be unreliable. So, in this paper, we propose an efficient model based technique to detect the unreliable data. Data model is designed using the sound statistical multivariate technique called Principal Component Analysis (PCA). But as a drawback, it is not robust to outliers. Hence, if the input data is corrupted, an arbitrarily wrong representation is obtained. To overcome this problem, we propose two approaches namely Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) to design robust PCA which aids in design of a noise-free data model. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach is effective and efficient.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cyber-physical and networked sensor systems: challenges and opportunities 网络物理和网络传感器系统:挑战和机遇
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185226
S. Das
Rapid advancements in embedded systems, sensors and wireless communication technologies have led to the development of cyber-physical systems, pervasive computing and smart environments with important applications such as smart grids, sustainability, health care and security. Wireless sensor networks play significant role in building such systems as they can effectively act as the human-physical interface with the digital world through sensing, communication, computing and control or actuation. However, the inherent characteristics of wireless sensor networks, typified by resource constraints, high degree of uncertainty, heterogeneity and distributed control pose significant challenges. This tutorial will provide a guided tour of (i) the characteristics and applications of cyber-physical systems and sensor networks, (ii) associated technical challenges and opportunities, and (iii) novel algorithmic frameworks and solutions for data collection from sensor streams, sensor data fusion, multi-modal context recognition, and situation-aware decision making. The common goal is to minimize energy consumption (i.e., maximize life time) and increase information accuracy (i.e., context quality) in wireless sensor networks. The tutorial will be concluded with open issues and future directions of research.
嵌入式系统、传感器和无线通信技术的快速发展推动了网络物理系统、普适计算和智能环境的发展,这些技术在智能电网、可持续性、医疗保健和安全等领域具有重要应用。无线传感器网络可以通过传感、通信、计算和控制或驱动,有效地充当人与数字世界的物理接口,在构建这样的系统中发挥着重要作用。然而,无线传感器网络固有的资源约束、高度不确定性、异构性和分布式控制等特点给无线传感器网络的实现带来了巨大的挑战。本教程将提供以下内容的导览:(i)网络物理系统和传感器网络的特点和应用,(ii)相关的技术挑战和机遇,以及(iii)从传感器流收集数据的新算法框架和解决方案,传感器数据融合,多模态上下文识别和态势感知决策。在无线传感器网络中,共同的目标是最小化能源消耗(即最大化使用寿命)并提高信息准确性(即上下文质量)。本导论将以尚未解决的问题和未来的研究方向作结。
{"title":"Cyber-physical and networked sensor systems: challenges and opportunities","authors":"S. Das","doi":"10.1145/2185216.2185226","DOIUrl":"https://doi.org/10.1145/2185216.2185226","url":null,"abstract":"Rapid advancements in embedded systems, sensors and wireless communication technologies have led to the development of cyber-physical systems, pervasive computing and smart environments with important applications such as smart grids, sustainability, health care and security. Wireless sensor networks play significant role in building such systems as they can effectively act as the human-physical interface with the digital world through sensing, communication, computing and control or actuation. However, the inherent characteristics of wireless sensor networks, typified by resource constraints, high degree of uncertainty, heterogeneity and distributed control pose significant challenges.\u0000 This tutorial will provide a guided tour of (i) the characteristics and applications of cyber-physical systems and sensor networks, (ii) associated technical challenges and opportunities, and (iii) novel algorithmic frameworks and solutions for data collection from sensor streams, sensor data fusion, multi-modal context recognition, and situation-aware decision making. The common goal is to minimize energy consumption (i.e., maximize life time) and increase information accuracy (i.e., context quality) in wireless sensor networks. The tutorial will be concluded with open issues and future directions of research.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cache based ant colony routing algorithm for mobile ad hoc networks 基于缓存的移动自组网蚁群路由算法
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185336
S. Sathish, K. Thangavel, V. Vaidehi
Mobile adhoc networks are formed dynamically without any infrastructure and each node is responsible for routing information among them. Ant colony optimization (ACO) algorithms are used to find an optimized solution for various problems. The change in topology makes the route from source to destination as dynamic fixed and changes with respect to time. The nature of network requires the optimized algorithm to perform route discovery, maintain route and detect failure along the path between two nodes. This paper proposes a cache based ant colony routing for mobile ad hoc networks for building highly adaptive and on-demand source initiated routing algorithm.
移动自组织网络是动态形成的,没有任何基础设施,每个节点负责路由信息。蚁群优化算法用于寻找各种问题的最优解。拓扑结构的变化使得从源到目的的路由动态固定,并随时间变化。网络的性质要求优化算法沿着两个节点之间的路径进行路由发现、路由维护和故障检测。提出了一种基于缓存的移动自组织网络蚁群路由算法,用于构建高度自适应的按需源发起路由算法。
{"title":"Cache based ant colony routing algorithm for mobile ad hoc networks","authors":"S. Sathish, K. Thangavel, V. Vaidehi","doi":"10.1145/2185216.2185336","DOIUrl":"https://doi.org/10.1145/2185216.2185336","url":null,"abstract":"Mobile adhoc networks are formed dynamically without any infrastructure and each node is responsible for routing information among them. Ant colony optimization (ACO) algorithms are used to find an optimized solution for various problems. The change in topology makes the route from source to destination as dynamic fixed and changes with respect to time. The nature of network requires the optimized algorithm to perform route discovery, maintain route and detect failure along the path between two nodes. This paper proposes a cache based ant colony routing for mobile ad hoc networks for building highly adaptive and on-demand source initiated routing algorithm.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effective frequency offset correction in OFDM systems with extended Kalman filtering technique 扩展卡尔曼滤波技术在OFDM系统中的有效频偏校正
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185330
K. V. Babu, G. Ramachandra Reddy, J. Prakash
Disaster Management System (DMS) is a key solution for humanitarian relief from natural disasters and manmade disasters. This paper discusses the use of Orthogonal Frequency Division Multiplexing (OFDM) in DMS. OFDM is a multicarrier modulation (MCM) in which single data stream is transmitted over a number of lower rate sub carriers. The main reason to use OFDM is to increase the robustness against frequency selective fading and narrow band interference. However an important issue like inter carrier interference (ICI) caused due to Doppler frequency offset and variations in local oscillators distorts the transmitted OFDM signal. In this letter a novel ICI mitigation method which uses Extended Kalman Filter (EKF) is proposed to mitigate the ICI effects. Final simulated results show that the proposed method in this paper outperforms the conventional ICI mitigation techniques.
灾害管理系统(DMS)是自然灾害和人为灾害人道主义救援的关键解决方案。本文讨论了正交频分复用(OFDM)技术在DMS中的应用。OFDM是一种多载波调制(MCM),其中单个数据流在许多较低速率的子载波上传输。使用OFDM的主要原因是为了提高对频率选择性衰落和窄带干扰的鲁棒性。然而,由于多普勒频偏和本振的变化引起的载波间干扰(ICI)等重要问题会使传输的OFDM信号失真。本文提出了一种利用扩展卡尔曼滤波(EKF)来缓解ICI效应的方法。最后的仿真结果表明,本文提出的方法优于传统的ICI缓解技术。
{"title":"Effective frequency offset correction in OFDM systems with extended Kalman filtering technique","authors":"K. V. Babu, G. Ramachandra Reddy, J. Prakash","doi":"10.1145/2185216.2185330","DOIUrl":"https://doi.org/10.1145/2185216.2185330","url":null,"abstract":"Disaster Management System (DMS) is a key solution for humanitarian relief from natural disasters and manmade disasters. This paper discusses the use of Orthogonal Frequency Division Multiplexing (OFDM) in DMS. OFDM is a multicarrier modulation (MCM) in which single data stream is transmitted over a number of lower rate sub carriers. The main reason to use OFDM is to increase the robustness against frequency selective fading and narrow band interference. However an important issue like inter carrier interference (ICI) caused due to Doppler frequency offset and variations in local oscillators distorts the transmitted OFDM signal. In this letter a novel ICI mitigation method which uses Extended Kalman Filter (EKF) is proposed to mitigate the ICI effects. Final simulated results show that the proposed method in this paper outperforms the conventional ICI mitigation techniques.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123396590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless network security 无线网络安全
Pub Date : 2011-12-18 DOI: 10.1145/2185216.2185235
S. Kasera
The need for ubiquitous network access and services is fueling tremendous growth of wireless technologies, networks, and applications. Mobile and wireless devices are being increasingly used for a variety of applications including multimedia, information search and retrieval, entertainment, social, business, and medical applications, and sensing and actuation, among others. However, the broadcast nature of wireless communications, wireless device mobility and resource limitations, have given rise to newer security challenges. An understanding of these challenges and potential solutions is necessary for designing secure wireless and mobile systems and applications and, at the very least, for increasing user awareness. In this tutorial, we will first describe security tools, including the cryptographic ones, and then elaborate how these tools can be used to secure wireless networks. Specifically, we will examine security vulnerabilities and solutions related to authentication, private communication, anonymity, and jamming. We will strengthen the concepts we cover with examples from WiFi networks, cellular networks, mobile ad hoc networks, and wireless sensor networks. We will also present some of the commonly deployed wireless security standards.
对无处不在的网络访问和服务的需求正在推动无线技术、网络和应用程序的巨大增长。移动和无线设备正越来越多地用于各种应用,包括多媒体、信息搜索和检索、娱乐、社会、商业和医疗应用以及传感和驱动等。然而,无线通信的广播性质、无线设备的移动性和资源限制,已经引起了新的安全挑战。了解这些挑战和潜在的解决方案对于设计安全的无线和移动系统和应用程序,至少对于提高用户意识是必要的。在本教程中,我们将首先描述安全工具,包括加密工具,然后详细说明如何使用这些工具来保护无线网络。具体来说,我们将研究安全漏洞和解决方案,涉及身份验证、私人通信、匿名和干扰。我们将通过WiFi网络、蜂窝网络、移动自组织网络和无线传感器网络的例子来加强我们所涵盖的概念。我们还将介绍一些常用的无线安全标准。
{"title":"Wireless network security","authors":"S. Kasera","doi":"10.1145/2185216.2185235","DOIUrl":"https://doi.org/10.1145/2185216.2185235","url":null,"abstract":"The need for ubiquitous network access and services is fueling tremendous growth of wireless technologies, networks, and applications. Mobile and wireless devices are being increasingly used for a variety of applications including multimedia, information search and retrieval, entertainment, social, business, and medical applications, and sensing and actuation, among others. However, the broadcast nature of wireless communications, wireless device mobility and resource limitations, have given rise to newer security challenges. An understanding of these challenges and potential solutions is necessary for designing secure wireless and mobile systems and applications and, at the very least, for increasing user awareness. In this tutorial, we will first describe security tools, including the cryptographic ones, and then elaborate how these tools can be used to secure wireless networks. Specifically, we will examine security vulnerabilities and solutions related to authentication, private communication, anonymity, and jamming. We will strengthen the concepts we cover with examples from WiFi networks, cellular networks, mobile ad hoc networks, and wireless sensor networks. We will also present some of the commonly deployed wireless security standards.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Wireless Technologies for Humanitarian Relief
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1