首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks 基于两层集群的无线传感器网络路由协议
Asif U. Khattak, G. Shah, M. Ahsan
Over the recent years, one of the most important problems in wireless sensor networks (WSNs) is to develope an energy-efficient and reliable routing protocol and provide network robustness. To achieve these objectives, we propose a new architecture for data dissemination called Two Tier Cluster Based Routing Protocol (TTCRP) for reliable data delivery in WSNs. TTCRP uses resource rich cluster heads with dual channels to form the clusters for efficient data delivery. While it provides power control algorithm to connect the isolated low power sensor nodes with minimum required power that achieves the network robustness. Simulation results reveal that TTCRP is efficient and provides reliability in both uniform as well as non-uniform sensor nodes deployment.
近年来,开发高效、可靠的路由协议并保证网络的鲁棒性是无线传感器网络的一个重要问题。为了实现这些目标,我们提出了一种新的数据传播架构,称为基于两层集群的路由协议(TTCRP),用于wsn中可靠的数据传输。TTCRP利用资源丰富的簇头和双通道组成簇,实现高效的数据传输。同时提供功率控制算法,以最小的功耗连接隔离的低功耗传感器节点,实现网络的鲁棒性。仿真结果表明,无论在均匀分布还是非均匀分布的传感器节点上,TTCRP都是高效可靠的。
{"title":"Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks","authors":"Asif U. Khattak, G. Shah, M. Ahsan","doi":"10.1109/EUC.2010.68","DOIUrl":"https://doi.org/10.1109/EUC.2010.68","url":null,"abstract":"Over the recent years, one of the most important problems in wireless sensor networks (WSNs) is to develope an energy-efficient and reliable routing protocol and provide network robustness. To achieve these objectives, we propose a new architecture for data dissemination called Two Tier Cluster Based Routing Protocol (TTCRP) for reliable data delivery in WSNs. TTCRP uses resource rich cluster heads with dual channels to form the clusters for efficient data delivery. While it provides power control algorithm to connect the isolated low power sensor nodes with minimum required power that achieves the network robustness. Simulation results reveal that TTCRP is efficient and provides reliability in both uniform as well as non-uniform sensor nodes deployment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Hierarchical Certificateless Signatures 分层无证书签名
Lei Zhang, Qianhong Wu, J. Domingo-Ferrer, Bo Qin
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.
无证书加密消除了基于身份的加密中的密钥托管问题。分层密码学利用实用的安全模型来反映现实世界中的组织层次结构。在本文中,为了结合这两种类型的密码系统的优点,我们通过形式化分层证书少签名的概念来实例化分层证书少加密。此外,我们提出了一种HCLS方案,在计算Diffie-Hellman (CDH)问题的硬度下,证明了该方案在随机oracle模型中对自适应选择消息攻击具有存在不可伪造性。至于效率,我们的方案具有恒定的复杂性,而不考虑层次结构的深度。因此,该建议对于实际应用来说是安全且可扩展的。
{"title":"Hierarchical Certificateless Signatures","authors":"Lei Zhang, Qianhong Wu, J. Domingo-Ferrer, Bo Qin","doi":"10.1109/EUC.2010.92","DOIUrl":"https://doi.org/10.1109/EUC.2010.92","url":null,"abstract":"Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TARo: Trusted Anonymous Routing for MANETs 可信匿名路由的manet
Jiefeng Chen, R. Boreli, V. Sivaraman
The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper, we propose a novel anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using a novel efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.
目前提出的移动自组织网络匿名路由机制使网络实体能够匿名、安全地相互通信。然而,由于加密操作带来的延迟和开销,提供高级别匿名性的协议通常具有较差的可伸缩性,而其他方法则牺牲匿名性以获得更好的性能。在本文中,我们提出了一种新的匿名路由协议,它提供了改进的匿名性和安全性,同时实现了与现有提案相似或更好的性能。我们的建议使用一种新的高效的基于密钥哈希链的隐形隐式寻址解决方案来实现匿名,并通过一种新的一对多Diffie-Hellman机制的应用来实现安全性,该机制用于交换对称加密的密钥。最后的贡献包括一种机制,通过验证中间节点之间的连接来促进可信路由的选择。通过分析和仿真,我们证明了与以前的方法相比,我们的建议的好处。
{"title":"TARo: Trusted Anonymous Routing for MANETs","authors":"Jiefeng Chen, R. Boreli, V. Sivaraman","doi":"10.1109/EUC.2010.119","DOIUrl":"https://doi.org/10.1109/EUC.2010.119","url":null,"abstract":"The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper, we propose a novel anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using a novel efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks 无线传感器网络中具有机会合作的多通道MAC协议
Jinbao Li, Desheng Zhang, Longjiang Guo
To handle the triple hidden terminal problems, this paper proposes OCO, an asynchronous multi-channel MAC protocol with opportunistic cooperation for wireless sensor networks. By adopting opportunistic cooperation, OCO effectively alleviates, if not eliminates, the triple hidden terminal problems. More importantly, OCO is fully distributed with no requirements of time synchronization or multi-radio scheme, so it is easy to be implemented on the real sensor nodes. Via the theoretical analysis, the opportunistic probability that a node cooperates with its neighbor is obtained. To validate the effectiveness of opportunistic cooperation, extensive simulations and real test bed experiments were con-ducted. The simulation and experimental results show that when the number of channels is large or the network loads are heavy, OCO improves energy efficiency and throughput significantly compared with other works in the literature.
为了解决无线传感器网络的三重隐藏终端问题,本文提出了一种基于机会协作的异步多通道MAC协议OCO。OCO通过机会主义合作,即使不能完全消除,也能有效缓解三重隐性终端问题。更重要的是,OCO是完全分布式的,不需要时间同步,也不需要多无线电方案,因此易于在真实传感器节点上实现。通过理论分析,得到了节点与其相邻节点合作的机会概率。为了验证机会合作的有效性,进行了大量的模拟和真实试验台实验。仿真和实验结果表明,在信道数量较大或网络负载较重的情况下,与文献中其他工作相比,OCO显著提高了能效和吞吐量。
{"title":"OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks","authors":"Jinbao Li, Desheng Zhang, Longjiang Guo","doi":"10.1109/EUC.2010.45","DOIUrl":"https://doi.org/10.1109/EUC.2010.45","url":null,"abstract":"To handle the triple hidden terminal problems, this paper proposes OCO, an asynchronous multi-channel MAC protocol with opportunistic cooperation for wireless sensor networks. By adopting opportunistic cooperation, OCO effectively alleviates, if not eliminates, the triple hidden terminal problems. More importantly, OCO is fully distributed with no requirements of time synchronization or multi-radio scheme, so it is easy to be implemented on the real sensor nodes. Via the theoretical analysis, the opportunistic probability that a node cooperates with its neighbor is obtained. To validate the effectiveness of opportunistic cooperation, extensive simulations and real test bed experiments were con-ducted. The simulation and experimental results show that when the number of channels is large or the network loads are heavy, OCO improves energy efficiency and throughput significantly compared with other works in the literature.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cloud Architecture of Virtual Trusted Platform Modules 虚拟可信平台模块的云架构
Dongxi Liu, Jack Lee, Julian Jang, S. Nepal, J. Zic
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms. Moreover, users can access their keys and data in the same TPM instance even if they move to other platforms. The TPM functionality in cloud is easy to access for applications developed in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by using it to implement the Needham-Schroeder public-key protocol for web authentication.
我们提出并实现了一个虚拟tpm的云架构。在这个体系结构中,可以按需从TPM云中获得TPM实例。因此,在本地平台中没有TPM芯片的应用程序也可以使用TPM功能。此外,即使用户迁移到其他平台,他们也可以在同一个TPM实例中访问他们的密钥和数据。对于用不同语言开发的应用程序,云中的TPM功能很容易访问,因为云计算以标准协议提供服务。通过使用TPM云来实现用于web身份验证的Needham-Schroeder公钥协议,可以演示TPM云的功能。
{"title":"A Cloud Architecture of Virtual Trusted Platform Modules","authors":"Dongxi Liu, Jack Lee, Julian Jang, S. Nepal, J. Zic","doi":"10.1109/EUC.2010.125","DOIUrl":"https://doi.org/10.1109/EUC.2010.125","url":null,"abstract":"We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms. Moreover, users can access their keys and data in the same TPM instance even if they move to other platforms. The TPM functionality in cloud is easy to access for applications developed in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by using it to implement the Needham-Schroeder public-key protocol for web authentication.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc Networks 移动Ad Hoc网络间接互惠合作中利他惩罚的代价
M. Seredynski, P. Bouvry
Reciprocity-based cooperation on packet forwarding in mobile ad hoc networks means that before passing on a packet to the next hop intermediate nodes verify whether the sender of the packet is trustworthy (i.e., cooperative in the past) or not. One of the key questions is what data should be used to evaluate the trustworthiness. This paper demonstrates that if cooperation is based on indirect reciprocity and a classic watchdog-based mechanism for data collection is used, discarding packets can be seen as an act of altruistic punishment. An intermediate node that decides to discard packets from a selfish sender pays the cost (expressed in decrease of trustworthiness among other nodes). However, if the cost of punishing free-riders is too high then nobody has the incentive to be the punisher. This paper demonstrates that the cost is significant and reduces an overall performance of the network. Using computational experiments it is shown that a simple modification of the classic watchdog-based trust data collection mechanism can result in minimisation of the cost and improvement of the throughput of the network.
在移动自组织网络中,基于互惠合作的数据包转发是指在将数据包传递到下一跳之前,中间节点验证数据包发送方是否可信(即过去是否合作)。其中一个关键问题是应该使用什么数据来评估可信度。本文证明,如果合作是基于间接互惠的,并且使用了经典的基于监管机构的数据收集机制,那么丢弃数据包可以被视为一种利他惩罚行为。中间节点如果决定丢弃来自自私发送方的数据包,就要付出代价(表现为与其他节点之间可信度的降低)。然而,如果惩罚搭便车者的成本太高,那么没有人有动力去惩罚。本文证明了成本是显著的,并降低了网络的整体性能。通过计算实验表明,对经典的基于监管机构的信任数据收集机制进行简单修改可以使成本最小化并提高网络的吞吐量。
{"title":"The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc Networks","authors":"M. Seredynski, P. Bouvry","doi":"10.1109/EUC.2010.118","DOIUrl":"https://doi.org/10.1109/EUC.2010.118","url":null,"abstract":"Reciprocity-based cooperation on packet forwarding in mobile ad hoc networks means that before passing on a packet to the next hop intermediate nodes verify whether the sender of the packet is trustworthy (i.e., cooperative in the past) or not. One of the key questions is what data should be used to evaluate the trustworthiness. This paper demonstrates that if cooperation is based on indirect reciprocity and a classic watchdog-based mechanism for data collection is used, discarding packets can be seen as an act of altruistic punishment. An intermediate node that decides to discard packets from a selfish sender pays the cost (expressed in decrease of trustworthiness among other nodes). However, if the cost of punishing free-riders is too high then nobody has the incentive to be the punisher. This paper demonstrates that the cost is significant and reduces an overall performance of the network. Using computational experiments it is shown that a simple modification of the classic watchdog-based trust data collection mechanism can result in minimisation of the cost and improvement of the throughput of the network.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks 基于进化HMM的无线传感器网络高效聚类算法
Rouhollah Goudarzi, Behrouz Jedari, M. Sabaei
Energy efficiency should be considered as a key design objective in wireless sensor networks (WSNs), since a sensor node can only be equipped with a limited energy supply. Clustering is one of the well-known design methods for managing the energy consumption in WSNs. Rotating role of cluster heads (CH) among nodes in these networks is an important issue in some of clustering methods. Directly collecting information about the energy level of nodes in each round increases the cost of CH role rotation, in the field of centralized hierarchical methods. In this paper, we proposed a centralized clustering algorithm that utilize hidden Markov model (HMM) optimized by particle swarm optimization (PSO) to predict the energy level of the network. In the next step, the appropriate CHs are selected by PSO algorithm. Our proposed method reduces the cost of clustering and in the mean time increases clustering performance. Evaluation results demonstrate by comparison with famous clustering algorithms, our scheme is energy efficient and increase network life time.
在无线传感器网络(WSNs)中,由于传感器节点只能配备有限的能量供应,因此应将能源效率作为一个关键的设计目标。聚类是wsn中众所周知的能耗管理设计方法之一。在这些网络中,簇头在节点间的旋转作用是一些聚类方法中的重要问题。在集中式分层方法中,直接收集每轮节点的能量水平信息会增加CH角色轮换的成本。本文提出了一种利用粒子群算法优化的隐马尔可夫模型(HMM)预测网络能级的集中聚类算法。下一步,通过粒子群算法选择合适的CHs。该方法在降低聚类成本的同时,提高了聚类性能。通过与著名聚类算法的比较,评价结果表明,该方案具有节能和提高网络寿命的优点。
{"title":"An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks","authors":"Rouhollah Goudarzi, Behrouz Jedari, M. Sabaei","doi":"10.1109/EUC.2010.67","DOIUrl":"https://doi.org/10.1109/EUC.2010.67","url":null,"abstract":"Energy efficiency should be considered as a key design objective in wireless sensor networks (WSNs), since a sensor node can only be equipped with a limited energy supply. Clustering is one of the well-known design methods for managing the energy consumption in WSNs. Rotating role of cluster heads (CH) among nodes in these networks is an important issue in some of clustering methods. Directly collecting information about the energy level of nodes in each round increases the cost of CH role rotation, in the field of centralized hierarchical methods. In this paper, we proposed a centralized clustering algorithm that utilize hidden Markov model (HMM) optimized by particle swarm optimization (PSO) to predict the energy level of the network. In the next step, the appropriate CHs are selected by PSO algorithm. Our proposed method reduces the cost of clustering and in the mean time increases clustering performance. Evaluation results demonstrate by comparison with famous clustering algorithms, our scheme is energy efficient and increase network life time.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Transferring Ontologies between Mobile Devices and Knowledge-Based Systems 在移动设备和基于知识的系统之间转移本体
Xiang Su, J. Riekki
With the advancement of mobile devices' capabilities, it is possible to implement knowledge-based systems on the mobile devices. This development introduces a challenge of transferring knowledge between mobile devices and knowledge-based systems on the server side. This paper presents a novel representation, Entity Notation, to tackle this challenge. It can represent ontology knowledge in a straightforward fashion and allows incremental transfer of ontology. This unique feature makes Entity Notation an ideal solution for transferring knowledge in highly dynamic ubiquitous environments. Moreover, Entity Notation has a short format suitable for communication when resources are constrained. We address the design issues of the representation, demonstrate its usability by a small ontology, and evaluate it based on a set of ubiquitous ontologies.
随着移动设备功能的进步,在移动设备上实现基于知识的系统成为可能。这种发展带来了在移动设备和服务器端基于知识的系统之间传递知识的挑战。本文提出了一种新颖的表示——实体表示法来解决这一挑战。它可以直观地表示本体知识,并允许本体的增量转移。这种独特的特性使实体符号成为在高度动态的无处不在的环境中传递知识的理想解决方案。此外,实体表示法具有适合资源受限时通信的简短格式。我们解决了表示的设计问题,通过一个小型本体展示了它的可用性,并基于一组无处不在的本体对其进行了评估。
{"title":"Transferring Ontologies between Mobile Devices and Knowledge-Based Systems","authors":"Xiang Su, J. Riekki","doi":"10.1109/EUC.2010.28","DOIUrl":"https://doi.org/10.1109/EUC.2010.28","url":null,"abstract":"With the advancement of mobile devices' capabilities, it is possible to implement knowledge-based systems on the mobile devices. This development introduces a challenge of transferring knowledge between mobile devices and knowledge-based systems on the server side. This paper presents a novel representation, Entity Notation, to tackle this challenge. It can represent ontology knowledge in a straightforward fashion and allows incremental transfer of ontology. This unique feature makes Entity Notation an ideal solution for transferring knowledge in highly dynamic ubiquitous environments. Moreover, Entity Notation has a short format suitable for communication when resources are constrained. We address the design issues of the representation, demonstrate its usability by a small ontology, and evaluate it based on a set of ubiquitous ontologies.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Localization with a Mobile Beacon in Underwater Sensor Networks 水下传感器网络中移动信标的定位
Sangho Lee, Kiseon Kim
In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Since range-based schemes require additional device and precise time synchronization for measuring distances in underwater environments, range-free schemes are promising in the view point of energy consumption and implementation. Coarseness of range-free schemes in the localization accuracy can be compensated utilizing a mobile beacon. In this paper, we propose a new range-free localization scheme with a mobile beacon which estimates two candidates for the location of a sensor node utilizing geometry and then determines the final location out of the two candidates. During simulations, the proposed scheme was indeed shown to provide higher localization accuracy with respect to irregularities in acoustic range.
在水下传感器网络中,定位是最重要的问题之一,因为传感器节点很难部署在确定的位置。由于基于距离的方案需要额外的设备和精确的时间同步来测量水下环境中的距离,因此从能耗和实施的角度来看,无距离方案是有前途的。利用移动信标可以补偿无距离方案在定位精度上的粗糙性。在本文中,我们提出了一种新的移动信标定位方案,该方案利用几何图形估计传感器节点位置的两个候选点,然后从两个候选点中确定最终位置。在模拟过程中,所提出的方案确实证明了相对于声学范围的不规则性提供更高的定位精度。
{"title":"Localization with a Mobile Beacon in Underwater Sensor Networks","authors":"Sangho Lee, Kiseon Kim","doi":"10.1109/EUC.2010.52","DOIUrl":"https://doi.org/10.1109/EUC.2010.52","url":null,"abstract":"In underwater sensor networks, localization is one of the most important issues because sensor nodes are considerably difficult to be deployed at determined locations. Since range-based schemes require additional device and precise time synchronization for measuring distances in underwater environments, range-free schemes are promising in the view point of energy consumption and implementation. Coarseness of range-free schemes in the localization accuracy can be compensated utilizing a mobile beacon. In this paper, we propose a new range-free localization scheme with a mobile beacon which estimates two candidates for the location of a sensor node utilizing geometry and then determines the final location out of the two candidates. During simulations, the proposed scheme was indeed shown to provide higher localization accuracy with respect to irregularities in acoustic range.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114179533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Towards Precise Synchronisation in Wireless Sensor Networks 无线传感器网络中的精确同步
L. Cheng, S. Hailes, Alan M. Wilson
Many existing Wireless Sensor Network (WSN) synchronisation protocols have demonstrated microsecond-level accuracy is achievable. Furthermore, sub-microsecond-level accuracy has recently been reported, although rather sophisticated, relatively bulky and custom-designed hardware were needed. This paper addresses a fundamental problem in WSN synchronisation: is there a more elegant way to achieve precise synchronisation in WSN? What are the obstacles to pushing the limit in WSN synchronisation? This paper identified the drawbacks caused by the assumptions made in existing WSN synchronisation protocols, and presented and discussed a range of novel solutions to improve the accuracy, reliability and scalability of WSN synchronisation through fusing various types of information and a sensible selection of hardware.
许多现有的无线传感器网络(WSN)同步协议已经证明可以实现微秒级的精度。此外,最近报道了亚微秒级的精度,尽管需要相当复杂、相对笨重和定制设计的硬件。本文解决了WSN同步中的一个基本问题:有没有一种更优雅的方法来实现WSN的精确同步?推动WSN同步极限的障碍是什么?本文指出了现有WSN同步协议的假设所带来的缺陷,并提出并讨论了一系列新的解决方案,通过融合各种类型的信息和合理的硬件选择来提高WSN同步的准确性、可靠性和可扩展性。
{"title":"Towards Precise Synchronisation in Wireless Sensor Networks","authors":"L. Cheng, S. Hailes, Alan M. Wilson","doi":"10.1109/EUC.2010.38","DOIUrl":"https://doi.org/10.1109/EUC.2010.38","url":null,"abstract":"Many existing Wireless Sensor Network (WSN) synchronisation protocols have demonstrated microsecond-level accuracy is achievable. Furthermore, sub-microsecond-level accuracy has recently been reported, although rather sophisticated, relatively bulky and custom-designed hardware were needed. This paper addresses a fundamental problem in WSN synchronisation: is there a more elegant way to achieve precise synchronisation in WSN? What are the obstacles to pushing the limit in WSN synchronisation? This paper identified the drawbacks caused by the assumptions made in existing WSN synchronisation protocols, and presented and discussed a range of novel solutions to improve the accuracy, reliability and scalability of WSN synchronisation through fusing various types of information and a sensible selection of hardware.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1