Recent advances in wireless sensors network (WSN) technology have made possible the manufacturing of tiny low-cost, low-power sensors with wireless multi-hop communication and sensing capabilities. Energy conservation for WSNs is a primary objective that needs to be addressed at all layers of the networking protocol stack. In many applications latency is another crucial factor to be addressed. However this must be done in the context of the energy constraints imposed by the network. In this paper we present an experimental evaluation of two node scheduling regimes within MERLIN (MAC energy efficient, routing and localization integrated), an energy-efficient low-latency integrated protocol for WSNs. In particular we contrast the X and V scheduling family schemes with respect to the following properties: network setup time, network lifetime and message latency. We conduct our experiments within the OmNet++ simulator.
{"title":"An energy-efficient and low-latency routing protocol for wireless sensor networks","authors":"A. Ruzzelli, R. Tynan, Gregory M. P. O'Hare","doi":"10.1109/ICW.2005.25","DOIUrl":"https://doi.org/10.1109/ICW.2005.25","url":null,"abstract":"Recent advances in wireless sensors network (WSN) technology have made possible the manufacturing of tiny low-cost, low-power sensors with wireless multi-hop communication and sensing capabilities. Energy conservation for WSNs is a primary objective that needs to be addressed at all layers of the networking protocol stack. In many applications latency is another crucial factor to be addressed. However this must be done in the context of the energy constraints imposed by the network. In this paper we present an experimental evaluation of two node scheduling regimes within MERLIN (MAC energy efficient, routing and localization integrated), an energy-efficient low-latency integrated protocol for WSNs. In particular we contrast the X and V scheduling family schemes with respect to the following properties: network setup time, network lifetime and message latency. We conduct our experiments within the OmNet++ simulator.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vasileios Theodorakopoulos, M. Woodward, K. Sotiropoulou
This paper introduces a unique set of techniques to support reliable and efficient video transmission over mobile channels. The twin class uniform and nonuniform partitioned M-level Quadrature Amplitude Modulation (QAM) system is used to transport a compressed video bitstream which is partitioned to match the bit-error sensitivity of the transmitted symbol in terms of mapping in the constellation diagram and picture quality. The partitioning scheme is based on a separation of the Variable Length (VL) coded Discrete Cosine Transforms (DCT) coefficients within each block, and is applied to split the ITU-T H.263 coded bitstream. Various scenarios for splitting the bitstream are investigated and their results are compared and analysed thoroughly. The performance of the transmission system is evaluated under Additive White Gaussian Noise (AWGN) conditions. The results show video partitioning forms an effective method for transmitting video information over mobile channels.
{"title":"Comparison of uniform and non-uniform M-QAM schemes for mobile video applications","authors":"Vasileios Theodorakopoulos, M. Woodward, K. Sotiropoulou","doi":"10.1109/ICW.2005.38","DOIUrl":"https://doi.org/10.1109/ICW.2005.38","url":null,"abstract":"This paper introduces a unique set of techniques to support reliable and efficient video transmission over mobile channels. The twin class uniform and nonuniform partitioned M-level Quadrature Amplitude Modulation (QAM) system is used to transport a compressed video bitstream which is partitioned to match the bit-error sensitivity of the transmitted symbol in terms of mapping in the constellation diagram and picture quality. The partitioning scheme is based on a separation of the Variable Length (VL) coded Discrete Cosine Transforms (DCT) coefficients within each block, and is applied to split the ITU-T H.263 coded bitstream. Various scenarios for splitting the bitstream are investigated and their results are compared and analysed thoroughly. The performance of the transmission system is evaluated under Additive White Gaussian Noise (AWGN) conditions. The results show video partitioning forms an effective method for transmitting video information over mobile channels.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123434036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The task of detecting, repulsing and preventing attacks in wireless environments is becoming more and more difficult as a result of several factors including defective design and improper requirements specification of wireless intrusion detection systems. Systems specifications provide the basics and framework to design an effective system, and for wireless intrusion detection systems, this assumes greater importance due to the complexity of wireless environments, and the architectural and functional constraints created by such environments. In the light of this, this paper discusses the architectural and functional issues involved in intrusion systems design for mobile and adhoc networks (wireless environments); and also proposes a new way of making systems requirements specification more effective and responsive to the needs of wireless implementations.
{"title":"Architectural and functional issues in systems requirements specifications for wireless intrusion detection systems implementation","authors":"Charles Iheagwara, A. Blyth, M. Bennett","doi":"10.1109/ICW.2005.29","DOIUrl":"https://doi.org/10.1109/ICW.2005.29","url":null,"abstract":"The task of detecting, repulsing and preventing attacks in wireless environments is becoming more and more difficult as a result of several factors including defective design and improper requirements specification of wireless intrusion detection systems. Systems specifications provide the basics and framework to design an effective system, and for wireless intrusion detection systems, this assumes greater importance due to the complexity of wireless environments, and the architectural and functional constraints created by such environments. In the light of this, this paper discusses the architectural and functional issues involved in intrusion systems design for mobile and adhoc networks (wireless environments); and also proposes a new way of making systems requirements specification more effective and responsive to the needs of wireless implementations.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Embedded into the communication protocols, the signal change detection will allow data compression for improving network efficiency. It enhances reliability and security also. The proposed change detector employs a neural network function prediction in order to determine if the sensor outputs have changed In addition to the change detection system, a modification to a standard neural network function predictor is proposed that allows the change detection system to quickly learn how to accurately predict next sensor outputs. The parameter choice and the relationship between the threshold values and false alarm and change missing rates are studied The protocol is implemented and tested in real life environments with sensor networks built from Crossbow MICA-2 motes. Sensor network change detection system, which is designed to become a protocol core utility, is described The test results are analyzed and recommendations on applications are derived.
{"title":"Intelligent protocols based on sensor signal change detection","authors":"L. Reznik, G. V. Pless, Tayeb Al Karim","doi":"10.1109/ICW.2005.52","DOIUrl":"https://doi.org/10.1109/ICW.2005.52","url":null,"abstract":"Embedded into the communication protocols, the signal change detection will allow data compression for improving network efficiency. It enhances reliability and security also. The proposed change detector employs a neural network function prediction in order to determine if the sensor outputs have changed In addition to the change detection system, a modification to a standard neural network function predictor is proposed that allows the change detection system to quickly learn how to accurately predict next sensor outputs. The parameter choice and the relationship between the threshold values and false alarm and change missing rates are studied The protocol is implemented and tested in real life environments with sensor networks built from Crossbow MICA-2 motes. Sensor network change detection system, which is designed to become a protocol core utility, is described The test results are analyzed and recommendations on applications are derived.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127628768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User-oriented image quality assessment has become a key factor in wireless multimedia communications. In particular, perceptual quality assessment methods are required to measure the overall perceived service quality based on the grading given by human subjects. This paper focuses on the development of a reduced-reference perceptual image quality metric, which can be applied for in-service quality monitoring and link adaptation purposes. In contrast to the conventional image fidelity metrics such as the peak signal-to-noise ratio (PSNR), the proposed hybrid image quality metric (HIQM) takes the human perception into account. In addition, HIQM does not rely on the availability of the full reference of the original image at the receiver.
{"title":"On the development of a reduced-reference perceptual image quality metric","authors":"T. M. Kusuma, H. Zepernick, M. Caldera","doi":"10.1109/ICW.2005.60","DOIUrl":"https://doi.org/10.1109/ICW.2005.60","url":null,"abstract":"User-oriented image quality assessment has become a key factor in wireless multimedia communications. In particular, perceptual quality assessment methods are required to measure the overall perceived service quality based on the grading given by human subjects. This paper focuses on the development of a reduced-reference perceptual image quality metric, which can be applied for in-service quality monitoring and link adaptation purposes. In contrast to the conventional image fidelity metrics such as the peak signal-to-noise ratio (PSNR), the proposed hybrid image quality metric (HIQM) takes the human perception into account. In addition, HIQM does not rely on the availability of the full reference of the original image at the receiver.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jose Miguel Villalón Millán, F. Micó, P. Cuenca, L. Orozco-Barbosa
During the past few years, we have been witnessing the massive deployment of IEEE 802.11 wireless LANs. Even though the widespread deployment of such wireless LANs, many studies are still underway aiming to design and develop simple yet effective QoS mechanisms for supporting time-constrained services over such platforms. In this paper, we first overview five different QoS mechanisms recently introduced in the literature as well as the upcoming IEEE 802.11e (EDCA) standard. We then carry out a comparative performance evaluation of all the QoS mechanisms. We focus our study on the effectiveness of the various QoS mechanisms for supporting time-constrained services.
{"title":"QoS support for time-constrained multimedia communications in IEEE 802.11 WLANs: a performance evaluation","authors":"Jose Miguel Villalón Millán, F. Micó, P. Cuenca, L. Orozco-Barbosa","doi":"10.1109/ICW.2005.71","DOIUrl":"https://doi.org/10.1109/ICW.2005.71","url":null,"abstract":"During the past few years, we have been witnessing the massive deployment of IEEE 802.11 wireless LANs. Even though the widespread deployment of such wireless LANs, many studies are still underway aiming to design and develop simple yet effective QoS mechanisms for supporting time-constrained services over such platforms. In this paper, we first overview five different QoS mechanisms recently introduced in the literature as well as the upcoming IEEE 802.11e (EDCA) standard. We then carry out a comparative performance evaluation of all the QoS mechanisms. We focus our study on the effectiveness of the various QoS mechanisms for supporting time-constrained services.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131910418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Steffan, Ludger Fiege, Mariano Cilia, A. Buchmann
Current wireless sensor network (WSN) architectures are based on the assumption that all sensor nodes are participating in a single global task. In many scenarios, however it will be desirable to use a single sensor network for multiple concurrent applications. In order to enable such multipurpose WSNs efficiently, delimiting each application to its specific set of relevant nodes is one of the key issues that needs to be solved. We present scoping as a general concept for the creation and maintenance of network-wide node subsets and describe a flexible and modular architecture that meets the requirements of multi-purpose WSNs.
{"title":"Towards multi-purpose wireless sensor networks","authors":"J. Steffan, Ludger Fiege, Mariano Cilia, A. Buchmann","doi":"10.1109/ICW.2005.77","DOIUrl":"https://doi.org/10.1109/ICW.2005.77","url":null,"abstract":"Current wireless sensor network (WSN) architectures are based on the assumption that all sensor nodes are participating in a single global task. In many scenarios, however it will be desirable to use a single sensor network for multiple concurrent applications. In order to enable such multipurpose WSNs efficiently, delimiting each application to its specific set of relevant nodes is one of the key issues that needs to be solved. We present scoping as a general concept for the creation and maintenance of network-wide node subsets and describe a flexible and modular architecture that meets the requirements of multi-purpose WSNs.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We introduce a real-time, node-based anomaly detection algorithm that observes the arrival processes experienced by a sensor node. Sensor nodes are resource constrained from many aspects. However they have specific properties such as lack of mobility and relatively predictable traffic patterns that allows for detection of anomalies in their networking behavior We develop a new arrival model for the traffic that can be received by a sensor node and devise a scheme to detect anomalous changes in this arrival process. Our detection algorithm keeps short-term dynamic statistics using a multi-level, sliding window event storage scheme. In this algorithm, arrival processes at different time scales are compared using node resourcewise computable, low-complexity, aggregate features.
{"title":"A real-time node-based traffic anomaly detection algorithm for wireless sensor networks","authors":"Ilker Onat, A. Miri","doi":"10.1109/ICW.2005.16","DOIUrl":"https://doi.org/10.1109/ICW.2005.16","url":null,"abstract":"We introduce a real-time, node-based anomaly detection algorithm that observes the arrival processes experienced by a sensor node. Sensor nodes are resource constrained from many aspects. However they have specific properties such as lack of mobility and relatively predictable traffic patterns that allows for detection of anomalies in their networking behavior We develop a new arrival model for the traffic that can be received by a sensor node and devise a scheme to detect anomalous changes in this arrival process. Our detection algorithm keeps short-term dynamic statistics using a multi-level, sliding window event storage scheme. In this algorithm, arrival processes at different time scales are compared using node resourcewise computable, low-complexity, aggregate features.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfiguration based on exploration of the design space of the application. The design space is represented by formally modeling all the software components, their alternative implementations and their interactions. Reconfiguration is triggered by monitoring the system and is performed by transitioning to a new configuration that satisfies the system constraints. The approach is demonstrated using experimental results for a representative tracking application.
{"title":"Dynamic software reconfiguration in sensor networks","authors":"Sachin Kogekar, S. Neema, X. Koutsoukos","doi":"10.1109/ICW.2005.44","DOIUrl":"https://doi.org/10.1109/ICW.2005.44","url":null,"abstract":"Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfiguration based on exploration of the design space of the application. The design space is represented by formally modeling all the software components, their alternative implementations and their interactions. Reconfiguration is triggered by monitoring the system and is performed by transitioning to a new configuration that satisfies the system constraints. The approach is demonstrated using experimental results for a representative tracking application.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured timestamps. The main result is that the security adds a significant delay that may affect future killer applications over ad hoc sensor networks like secure medical application, robotics applications, voice over IP (VoIP) and other delay-sensitive multimedia applications
{"title":"Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP","authors":"Mohammad Saleh, I. A. Khatib","doi":"10.1109/ICW.2005.67","DOIUrl":"https://doi.org/10.1109/ICW.2005.67","url":null,"abstract":"This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured timestamps. The main result is that the security adds a significant delay that may affect future killer applications over ad hoc sensor networks like secure medical application, robotics applications, voice over IP (VoIP) and other delay-sensitive multimedia applications","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}