首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Wireless Sensor Networks for Organizational Network Analysis 组织网络分析的无线传感器网络
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382478
D. Manjunath, S. Gopalaiah, Vijay Dewangan
Since their emergence, wireless sensor networks (WSNs) have become increasingly popular in the pervasive computing industry. This is particularly true within the past five years, which has seen sensor networks being adapted for wide variety of applications. Most of these applications are restricted to ambience monitoring and military use, however, very few commercial sensor applications have been explored till date. For WSNs to be truly ubiquitous, many more commercial sensor applications are yet to be investigated. As an effort to probe for such an application, we explore the potential of using WSNs in the field of Organizational Network Analysis (ONA). In this short paper, we propose a WSN based framework for analyzing organizational networks. We describe the role of WSNs in learning relationships among the people of an organization and investigate the research challenges involved in realizing the proposed framework.
自出现以来,无线传感器网络(wsn)在普适计算行业中越来越受欢迎。在过去的五年中尤其如此,传感器网络已经适应了各种各样的应用。这些应用大多局限于环境监测和军事用途,然而,迄今为止,很少有商业传感器应用被探索。为了使无线传感器网络真正无处不在,还需要研究更多的商业传感器应用。为了探索这种应用,我们探索了在组织网络分析(ONA)领域使用WSNs的潜力。在这篇短文中,我们提出了一个基于WSN的组织网络分析框架。我们描述了wsn在组织人员之间学习关系中的作用,并调查了实现所提出框架所涉及的研究挑战。
{"title":"Wireless Sensor Networks for Organizational Network Analysis","authors":"D. Manjunath, S. Gopalaiah, Vijay Dewangan","doi":"10.1109/COMSWA.2007.382478","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382478","url":null,"abstract":"Since their emergence, wireless sensor networks (WSNs) have become increasingly popular in the pervasive computing industry. This is particularly true within the past five years, which has seen sensor networks being adapted for wide variety of applications. Most of these applications are restricted to ambience monitoring and military use, however, very few commercial sensor applications have been explored till date. For WSNs to be truly ubiquitous, many more commercial sensor applications are yet to be investigated. As an effort to probe for such an application, we explore the potential of using WSNs in the field of Organizational Network Analysis (ONA). In this short paper, we propose a WSN based framework for analyzing organizational networks. We describe the role of WSNs in learning relationships among the people of an organization and investigate the research challenges involved in realizing the proposed framework.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and Efficient Software Management in Sensor Networks 传感器网络中的鲁棒和高效软件管理
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382471
Wolfgang Schröder-Preikschat, R. Kapitza, J. Kleinöder, M. Felser, Katja Karmeier, T. H. Labella, F. Dressler
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitations of devices, and energy restrictions in general. Consequently, software deployment has to be performed with great care otherwise resources might be wasted or nodes become unavailable due to failed updates. The overall objective for software management in sensor networks is to enable a robust and efficient way to build deployable software images that take into account all the needs from application requirements to node-specific resource restrictions. In this article, we outline the current state-of-the-art for software management in WSN and (network-based) sensor network (re-)programming. We provide insights into three different approaches enabling a more comprehensive management of WSN while challenging the robustness and efficiency of software configurations and reprogramming. Additionally, we outline research challenges in the area of software management and sensor network operation.
软件部署和部署代码的更新是无线传感器网络(WSN)领域的一个关键问题。原因通常是网络连接不可靠、设备资源限制和能源限制。因此,必须非常小心地执行软件部署,否则可能会浪费资源,或者由于更新失败而导致节点不可用。传感器网络中软件管理的总体目标是启用一种健壮而有效的方法来构建可部署的软件映像,该软件映像考虑了从应用程序需求到节点特定资源限制的所有需求。在本文中,我们概述了WSN和(基于网络的)传感器网络(重新)编程中软件管理的最新技术。我们提供了三种不同的方法,能够更全面地管理WSN,同时挑战软件配置和重新编程的鲁棒性和效率。此外,我们概述了软件管理和传感器网络操作领域的研究挑战。
{"title":"Robust and Efficient Software Management in Sensor Networks","authors":"Wolfgang Schröder-Preikschat, R. Kapitza, J. Kleinöder, M. Felser, Katja Karmeier, T. H. Labella, F. Dressler","doi":"10.1109/COMSWA.2007.382471","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382471","url":null,"abstract":"Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitations of devices, and energy restrictions in general. Consequently, software deployment has to be performed with great care otherwise resources might be wasted or nodes become unavailable due to failed updates. The overall objective for software management in sensor networks is to enable a robust and efficient way to build deployable software images that take into account all the needs from application requirements to node-specific resource restrictions. In this article, we outline the current state-of-the-art for software management in WSN and (network-based) sensor network (re-)programming. We provide insights into three different approaches enabling a more comprehensive management of WSN while challenging the robustness and efficiency of software configurations and reprogramming. Additionally, we outline research challenges in the area of software management and sensor network operation.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks 分层虚拟专用网访问策略的有效管理方法
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382593
K. Okayama, N. Yamai, Hayato Ishibashi, K. Abe, T. Matsuura
VPN (virtual private network) is one of the most important technologies on the Internet. With VPN, we can securely access to resources in the organizational network via the Internet. In VPNs having hierarchical structure, since each VPN domain has different access policy (whether VPN gateway should perform authentication, data encryption, and so on or not), an administrator of a VPN domain may need to configure access policies which are different from every VPN sub-domain. However, in the existing VPN methods, since access policies are stored in a static configuration file of each VPN gateway, an administrator of a VPN domain has to cooperate with the other administrators of its sub-domains. Therefore, management cost of access policies becomes considerably large if the organization has large and complicated structure. In this paper, we propose an efficient management method of access policies for hierarchical VPNs. In order to reduce management cost, we introduce a database with hierarchical structure to represent access policies easily and policy servers to get access policies automatically. The effectiveness of our proposed method is confirmed by an experiment on an actual network using policy servers based on the proposed method.
虚拟专用网(VPN)是Internet上最重要的技术之一。使用VPN,我们可以通过Internet安全地访问组织网络中的资源。在具有分层结构的VPN中,由于每个VPN域都有不同的访问策略(VPN网关是否需要进行认证、数据加密等),因此VPN域的管理员可能需要为每个VPN子域配置不同的访问策略。但是,在现有的VPN方式中,由于访问策略存储在每个VPN网关的静态配置文件中,因此VPN域的管理员必须与其子域的管理员协同工作。因此,如果组织结构庞大而复杂,访问策略的管理成本就会相当大。本文提出了一种有效的分层vpn访问策略管理方法。为了降低管理成本,我们引入了层次结构的数据库来方便地表示访问策略,并引入了策略服务器来自动获取访问策略。通过在实际网络中使用基于该方法的策略服务器的实验,验证了该方法的有效性。
{"title":"An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks","authors":"K. Okayama, N. Yamai, Hayato Ishibashi, K. Abe, T. Matsuura","doi":"10.1109/COMSWA.2007.382593","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382593","url":null,"abstract":"VPN (virtual private network) is one of the most important technologies on the Internet. With VPN, we can securely access to resources in the organizational network via the Internet. In VPNs having hierarchical structure, since each VPN domain has different access policy (whether VPN gateway should perform authentication, data encryption, and so on or not), an administrator of a VPN domain may need to configure access policies which are different from every VPN sub-domain. However, in the existing VPN methods, since access policies are stored in a static configuration file of each VPN gateway, an administrator of a VPN domain has to cooperate with the other administrators of its sub-domains. Therefore, management cost of access policies becomes considerably large if the organization has large and complicated structure. In this paper, we propose an efficient management method of access policies for hierarchical VPNs. In order to reduce management cost, we introduce a database with hierarchical structure to represent access policies easily and policy servers to get access policies automatically. The effectiveness of our proposed method is confirmed by an experiment on an actual network using policy servers based on the proposed method.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Enhancement in Hierarchical Peer-to-Peer Systems 分层点对点系统的性能增强
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382555
B. K. Shrivastava, G. Khataniar, D. Goswami
Increased popularity of decentralized peer-to-peer (P2P) architecture comes with several challenges, like how to handle efficient lookup and query routing, frequent joining and leaving of nodes and scalability problem. Several key based deterministic routing approaches in a structured P2P networks have been proposed to overcome with these problems. Still, problems become worse if nodes are heterogenous in processing speed, power, stability and storage capability. To bridge the heterogeneity, we propose a 2-tier hierarchical distributed hash table (DHT) in which nodes are classified into three categories: temporary, stable and fully stable nodes. We have achieved intra-group lookup and query routing in O(log(|Gj|)) steps, where |Gj| is the number of (super)peers in destination group Gj, while inter-group lookup in O(1) steps. We have also saved at least 66.67% messages in repairing the routing table due to frequent joining and leaving of nodes in average case.
分散式点对点(P2P)架构的日益普及带来了一些挑战,例如如何处理高效的查找和查询路由、频繁的节点加入和离开以及可伸缩性问题。为了克服这些问题,提出了结构化P2P网络中几种基于密钥的确定性路由方法。然而,如果节点在处理速度、功率、稳定性和存储能力上是异构的,问题就会变得更糟。为了消除异构性,我们提出了一个两层分层分布式哈希表(DHT),其中节点分为三类:临时节点、稳定节点和完全稳定节点。我们在O(log(|Gj|))步内实现了组内查找和查询路由,其中|Gj|为目标组Gj中的(超级)对等体数,而组间查找则在O(1)步内实现。在平均情况下,由于节点的频繁加入和离开,我们在修复路由表时至少节省了66.67%的消息。
{"title":"Performance Enhancement in Hierarchical Peer-to-Peer Systems","authors":"B. K. Shrivastava, G. Khataniar, D. Goswami","doi":"10.1109/COMSWA.2007.382555","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382555","url":null,"abstract":"Increased popularity of decentralized peer-to-peer (P2P) architecture comes with several challenges, like how to handle efficient lookup and query routing, frequent joining and leaving of nodes and scalability problem. Several key based deterministic routing approaches in a structured P2P networks have been proposed to overcome with these problems. Still, problems become worse if nodes are heterogenous in processing speed, power, stability and storage capability. To bridge the heterogeneity, we propose a 2-tier hierarchical distributed hash table (DHT) in which nodes are classified into three categories: temporary, stable and fully stable nodes. We have achieved intra-group lookup and query routing in O(log(|Gj|)) steps, where |Gj| is the number of (super)peers in destination group Gj, while inter-group lookup in O(1) steps. We have also saved at least 66.67% messages in repairing the routing table due to frequent joining and leaving of nodes in average case.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Situation-Aware Software Engineering for Sensor Networks 传感器网络的态势感知软件工程
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382426
V. Phoha, S. Phoha
Sensor networks represent a new frontier in technology that holds the promise of unprecedented levels of autonomy in the execution of complex dynamic missions by harnessing the power of many inexpensive electromechanical devices. A sensor network operates on an infrastructure for sensing, computation, and communication, through which it perceives the time evolution of physical dynamic processes in its operational environment. Hence the communications and computation software that enables the distributed time critical interactions of individual devices is characteristically different from traditional software. In particular, the operational environment for its execution is not predetermined and operational specifications are dynamic and therefore difficult to pin down. Hence existing programming methods like structured programming are not applicable. The ad hoc build, test, scrap approach will not work. This paper presents a deliberate high assurance design and debugging methodology, akin to the spiral model for software development, for building and validating dynamic, interoperable, programmable applications of sensor networks that involve management, information gathering, querying and tasking of the nodes for resource-constrained time-critical missions. A middleware architecture has been developed for sensor networks that extends agent communication languages for designing specific behaviors of sensor networks. Building on this architecture, we develop a high assurance software design coordination network for designing and validating dynamic agents that maintain desired behaviors of sensor network software despite faults, failures, uncertainties and environmental perturbations.
传感器网络代表了一个新的技术前沿,通过利用许多廉价的机电设备的力量,在执行复杂的动态任务时具有前所未有的自主性。传感器网络运行在传感、计算和通信的基础设施上,通过它感知其运行环境中物理动态过程的时间演变。因此,通信和计算软件使单个设备的分布式时间临界交互具有与传统软件不同的特征。特别是,其执行的操作环境不是预先确定的,操作规范是动态的,因此很难确定。因此,现有的编程方法(如结构化编程)不适用。临时构建、测试、废弃的方法是行不通的。本文提出了一种精心设计的高保证设计和调试方法,类似于软件开发的螺旋模型,用于构建和验证传感器网络的动态、可互操作、可编程应用程序,这些应用程序涉及管理、信息收集、查询和节点任务,用于资源受限的时间关键任务。针对传感器网络,开发了一种中间件体系结构,扩展了智能体通信语言,用于设计传感器网络的特定行为。在此架构的基础上,我们开发了一个高保证的软件设计协调网络,用于设计和验证动态代理,这些代理可以在故障、故障、不确定性和环境扰动的情况下保持传感器网络软件的期望行为。
{"title":"Situation-Aware Software Engineering for Sensor Networks","authors":"V. Phoha, S. Phoha","doi":"10.1109/COMSWA.2007.382426","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382426","url":null,"abstract":"Sensor networks represent a new frontier in technology that holds the promise of unprecedented levels of autonomy in the execution of complex dynamic missions by harnessing the power of many inexpensive electromechanical devices. A sensor network operates on an infrastructure for sensing, computation, and communication, through which it perceives the time evolution of physical dynamic processes in its operational environment. Hence the communications and computation software that enables the distributed time critical interactions of individual devices is characteristically different from traditional software. In particular, the operational environment for its execution is not predetermined and operational specifications are dynamic and therefore difficult to pin down. Hence existing programming methods like structured programming are not applicable. The ad hoc build, test, scrap approach will not work. This paper presents a deliberate high assurance design and debugging methodology, akin to the spiral model for software development, for building and validating dynamic, interoperable, programmable applications of sensor networks that involve management, information gathering, querying and tasking of the nodes for resource-constrained time-critical missions. A middleware architecture has been developed for sensor networks that extends agent communication languages for designing specific behaviors of sensor networks. Building on this architecture, we develop a high assurance software design coordination network for designing and validating dynamic agents that maintain desired behaviors of sensor network software despite faults, failures, uncertainties and environmental perturbations.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of an Instant Messaging System with Focus on Protection of User Presence 一个关注用户存在保护的即时通讯系统的实现
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382413
Karsten Loesing, Maximilian Röglinger, Christian Wilms, G. Wirtz
Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].
即时通讯(IM)系统向用户提供其联系人当前在线的信息。这种存在信息补充了IM系统的文本通信,并且与其他同步通信媒体相比具有附加价值。未经授权的用户可以利用用户的在线状态信息非法生成用户的在线日志。公共IM系统缺乏可靠的手段来保护用户的存在,并迫使用户信任中央注册中心服务器。在本文中,我们提出了一个IM系统,它被明确地设计为保护用户的存在,而不需要一个可信的中央注册中心。我们提出了一个基于匿名通信网络Tor[1]、加密套件Bouncy Castle[2]和分布式哈希表OpenDHT[3]的Java实现。
{"title":"Implementation of an Instant Messaging System with Focus on Protection of User Presence","authors":"Karsten Loesing, Maximilian Röglinger, Christian Wilms, G. Wirtz","doi":"10.1109/COMSWA.2007.382413","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382413","url":null,"abstract":"Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Improved Time-of-Arrival Estimation for WLAN-Based Local Positioning 一种改进的无线局域网局部定位到达时间估计
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382578
H. Reddy, M. Chandra, P. Balamuralidhar, G. HariharaS., Kaushik Bhattacharya, E. Joseph
Local positioning, particularly in indoor environments, poses challenges that are not faced by global and terrestrial positioning systems. Many a times, it is cost effective to build these localization schemes on the existing wireless local area networks (WLANs). This paper presents a novel time-of-arrival estimation technique for IEEE 802.11a WLAN system, which provides better accuracy than the traditional correlation-based scheme.
局部定位,特别是在室内环境中,带来了全球和地面定位系统所没有面临的挑战。很多时候,在现有的无线局域网(wlan)上建立这些定位方案是经济有效的。本文提出了一种新的IEEE 802.11a无线局域网系统到达时间估计技术,该技术比传统的基于相关的到达时间估计方案具有更高的精度。
{"title":"An Improved Time-of-Arrival Estimation for WLAN-Based Local Positioning","authors":"H. Reddy, M. Chandra, P. Balamuralidhar, G. HariharaS., Kaushik Bhattacharya, E. Joseph","doi":"10.1109/COMSWA.2007.382578","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382578","url":null,"abstract":"Local positioning, particularly in indoor environments, poses challenges that are not faced by global and terrestrial positioning systems. Many a times, it is cost effective to build these localization schemes on the existing wireless local area networks (WLANs). This paper presents a novel time-of-arrival estimation technique for IEEE 802.11a WLAN system, which provides better accuracy than the traditional correlation-based scheme.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Analysis of Dynamic Sensor Networks: Power Law Then What? 动态传感器网络分析:幂律然后是什么?
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382427
E. Fleury, Jean-Loup Guillaume, C. Robardet, A. Scherrer
Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these networks, we will show that this is not sufficient to describe properly the dynamics of sensor networks. We will present some coupled arguments from data mining, random processes and graph theory to describe more accurately the dynamics with the use of a random model to show the limits of an approach limited to power law contact durations.
近年来对无线传感器网络(WSN)的研究表明,接触时间和接触间时间均呈幂律分布。虽然这是这些网络的一个强大特性,但我们将表明,这不足以正确描述传感器网络的动态。我们将提出一些来自数据挖掘、随机过程和图论的耦合论点,以使用随机模型更准确地描述动力学,以显示受幂律接触持续时间限制的方法的局限性。
{"title":"Analysis of Dynamic Sensor Networks: Power Law Then What?","authors":"E. Fleury, Jean-Loup Guillaume, C. Robardet, A. Scherrer","doi":"10.1109/COMSWA.2007.382427","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382427","url":null,"abstract":"Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these networks, we will show that this is not sufficient to describe properly the dynamics of sensor networks. We will present some coupled arguments from data mining, random processes and graph theory to describe more accurately the dynamics with the use of a random model to show the limits of an approach limited to power law contact durations.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the capacity of certain virtual MIMO schemes for mobie communications 移动通信中某些虚拟MIMO方案的容量研究
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382615
Anubala S. Varikat
We consider a virtual multiple-input-multiple-output (MIMO) system, where mobile user equipments (UE) in the vicinity of each other act as antennas for each other for communication with a multiple-antenna base station (BS). The UEs communicate with each other on an 'Interlink', and with the BS on an Up/Downlink. A 'Sample-and-Forward' strategy is proposed for the downlink. The capacity of the proposed scheme and of a conventional Decode-and-Forward scheme for the uplink are investigated. Rules for optimal partitioning of time and bandwidth resources between the Interlink and the Up/Downlink are obtained. Capacity outage curves are provided to compare the virtual MIMO schemes with conventional MIMO and single-input-single-output (SISO) schemes.
我们考虑了一个虚拟多输入多输出(MIMO)系统,其中彼此相邻的移动用户设备(UE)相互充当天线,用于与多天线基站(BS)通信。ue通过“Interlink”相互通信,并通过Up/Downlink与BS通信。对下行链路提出了“采样转发”策略。研究了该方案和传统的上行译码转发方案的容量。得到了Interlink和Up/Downlink之间时间和带宽资源的最优分配规则。给出了容量中断曲线,将虚拟MIMO方案与传统MIMO方案和单输入单输出(SISO)方案进行比较。
{"title":"On the capacity of certain virtual MIMO schemes for mobie communications","authors":"Anubala S. Varikat","doi":"10.1109/COMSWA.2007.382615","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382615","url":null,"abstract":"We consider a virtual multiple-input-multiple-output (MIMO) system, where mobile user equipments (UE) in the vicinity of each other act as antennas for each other for communication with a multiple-antenna base station (BS). The UEs communicate with each other on an 'Interlink', and with the BS on an Up/Downlink. A 'Sample-and-Forward' strategy is proposed for the downlink. The capacity of the proposed scheme and of a conventional Decode-and-Forward scheme for the uplink are investigated. Rules for optimal partitioning of time and bandwidth resources between the Interlink and the Up/Downlink are obtained. Capacity outage curves are provided to compare the virtual MIMO schemes with conventional MIMO and single-input-single-output (SISO) schemes.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Mesh Networks: A Novel Solution for Home Scenario 保护网状网络:家庭场景的新解决方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382598
A. Prasad
This paper analyzes the security concerns of IEEE 802.11 WLAN based mesh networking for the home scenario. The paper also provides a novel solution to setup the wireless home area network (WHAN) with minimal user intervention. The proposed solution makes use of the concept of resurrecting duckling. Once the network is setup the proposed solution takes care that not only data but also management and control/signaling are secured. The paper also presents a security analysis of the novel solution.
本文分析了基于IEEE 802.11无线局域网的网状家庭网络的安全问题。本文还提出了一种以最少用户干预建立无线家庭区域网络(WHAN)的新方案。提出的解决方案利用了复活小鸭的概念。一旦建立了网络,建议的解决方案不仅要注意数据,而且要注意管理和控制/信令的安全性。本文还对该方案进行了安全性分析。
{"title":"Securing Mesh Networks: A Novel Solution for Home Scenario","authors":"A. Prasad","doi":"10.1109/COMSWA.2007.382598","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382598","url":null,"abstract":"This paper analyzes the security concerns of IEEE 802.11 WLAN based mesh networking for the home scenario. The paper also provides a novel solution to setup the wireless home area network (WHAN) with minimal user intervention. The proposed solution makes use of the concept of resurrecting duckling. Once the network is setup the proposed solution takes care that not only data but also management and control/signaling are secured. The paper also presents a security analysis of the novel solution.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1