首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum 直接序列扩频水声通信研究
Jeong-woo Han, Se-Young Kim, Ki-Man Kim, Won-seok Choi, Min-jae Kim, Seung-Yong Chun, Kwon Son
Spread spectrum techniques are used in communication systems to provide low probability of intercept and jamming, to overcome the channel where the transmitted signal is distorted by multipath propagation. In this paper, we consider spread spectrum modulation and demodulation techniques to overcome the inter symbol interference (ISI) by multipath propagation in underwater acoustic communication channels. We consider the quadrature phase shift keying (QPSK) direct sequence spread spectrum (DSSS). We confirm the performance of underwater acoustic communication by the simulation with underwater channel impulse response and experiment in underwater. As a result, the QPSK-DSSS technique presented low bit error rate (BER) than QPSK.
扩频技术用于通信系统中,以提供低截获和干扰概率,克服传输信号因多径传播而失真的信道。在水声通信信道中,采用扩频调制解调技术来克服多径传播的码间干扰。我们考虑了正交相移键控(QPSK)直接序列扩频(DSSS)。通过水下信道脉冲响应仿真和水下实验验证了水声通信的性能。因此,与QPSK相比,QPSK- dsss技术具有较低的误码率。
{"title":"A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum","authors":"Jeong-woo Han, Se-Young Kim, Ki-Man Kim, Won-seok Choi, Min-jae Kim, Seung-Yong Chun, Kwon Son","doi":"10.1109/EUC.2010.56","DOIUrl":"https://doi.org/10.1109/EUC.2010.56","url":null,"abstract":"Spread spectrum techniques are used in communication systems to provide low probability of intercept and jamming, to overcome the channel where the transmitted signal is distorted by multipath propagation. In this paper, we consider spread spectrum modulation and demodulation techniques to overcome the inter symbol interference (ISI) by multipath propagation in underwater acoustic communication channels. We consider the quadrature phase shift keying (QPSK) direct sequence spread spectrum (DSSS). We confirm the performance of underwater acoustic communication by the simulation with underwater channel impulse response and experiment in underwater. As a result, the QPSK-DSSS technique presented low bit error rate (BER) than QPSK.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks 基于两层集群的无线传感器网络路由协议
Asif U. Khattak, G. Shah, M. Ahsan
Over the recent years, one of the most important problems in wireless sensor networks (WSNs) is to develope an energy-efficient and reliable routing protocol and provide network robustness. To achieve these objectives, we propose a new architecture for data dissemination called Two Tier Cluster Based Routing Protocol (TTCRP) for reliable data delivery in WSNs. TTCRP uses resource rich cluster heads with dual channels to form the clusters for efficient data delivery. While it provides power control algorithm to connect the isolated low power sensor nodes with minimum required power that achieves the network robustness. Simulation results reveal that TTCRP is efficient and provides reliability in both uniform as well as non-uniform sensor nodes deployment.
近年来,开发高效、可靠的路由协议并保证网络的鲁棒性是无线传感器网络的一个重要问题。为了实现这些目标,我们提出了一种新的数据传播架构,称为基于两层集群的路由协议(TTCRP),用于wsn中可靠的数据传输。TTCRP利用资源丰富的簇头和双通道组成簇,实现高效的数据传输。同时提供功率控制算法,以最小的功耗连接隔离的低功耗传感器节点,实现网络的鲁棒性。仿真结果表明,无论在均匀分布还是非均匀分布的传感器节点上,TTCRP都是高效可靠的。
{"title":"Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks","authors":"Asif U. Khattak, G. Shah, M. Ahsan","doi":"10.1109/EUC.2010.68","DOIUrl":"https://doi.org/10.1109/EUC.2010.68","url":null,"abstract":"Over the recent years, one of the most important problems in wireless sensor networks (WSNs) is to develope an energy-efficient and reliable routing protocol and provide network robustness. To achieve these objectives, we propose a new architecture for data dissemination called Two Tier Cluster Based Routing Protocol (TTCRP) for reliable data delivery in WSNs. TTCRP uses resource rich cluster heads with dual channels to form the clusters for efficient data delivery. While it provides power control algorithm to connect the isolated low power sensor nodes with minimum required power that achieves the network robustness. Simulation results reveal that TTCRP is efficient and provides reliability in both uniform as well as non-uniform sensor nodes deployment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Cloud Architecture of Virtual Trusted Platform Modules 虚拟可信平台模块的云架构
Dongxi Liu, Jack Lee, Julian Jang, S. Nepal, J. Zic
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms. Moreover, users can access their keys and data in the same TPM instance even if they move to other platforms. The TPM functionality in cloud is easy to access for applications developed in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by using it to implement the Needham-Schroeder public-key protocol for web authentication.
我们提出并实现了一个虚拟tpm的云架构。在这个体系结构中,可以按需从TPM云中获得TPM实例。因此,在本地平台中没有TPM芯片的应用程序也可以使用TPM功能。此外,即使用户迁移到其他平台,他们也可以在同一个TPM实例中访问他们的密钥和数据。对于用不同语言开发的应用程序,云中的TPM功能很容易访问,因为云计算以标准协议提供服务。通过使用TPM云来实现用于web身份验证的Needham-Schroeder公钥协议,可以演示TPM云的功能。
{"title":"A Cloud Architecture of Virtual Trusted Platform Modules","authors":"Dongxi Liu, Jack Lee, Julian Jang, S. Nepal, J. Zic","doi":"10.1109/EUC.2010.125","DOIUrl":"https://doi.org/10.1109/EUC.2010.125","url":null,"abstract":"We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms. Moreover, users can access their keys and data in the same TPM instance even if they move to other platforms. The TPM functionality in cloud is easy to access for applications developed in different languages since cloud computing delivers services in standard protocols. The functionality of the TPM cloud is demonstrated by using it to implement the Needham-Schroeder public-key protocol for web authentication.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
M-Trust: A Trust Management Scheme for Mobile P2P Networks M-Trust:移动P2P网络的信任管理方案
B. Qureshi, G. Min, D. Kouvatsos
The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless communications, pervasive devices and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we first investigate and analyze various existing decentralized and distributed trust management schemes. Based on the analytical results, an efficient, accurate, robust and scalable light weight trust ratings aggregation scheme, referred to as M-trust, is proposed for mobile P2P networks. Extensive simulation results show that this proposed scheme can decrease the time required to compute the list of trust ratings and reduce the required storage space. The comparison to other schemes demonstrates that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree.
移动资源共享、内容共享、移动社交网络和复杂网络物理系统等新兴技术的快速发展,对信任和安全管理提出了重大挑战。为了应对P2P系统的安全威胁,近年来提出了几种信任管理方案。然而,由于系统移动性、无线通信、普及设备和动态网络拓扑带来的困难,对分散和分布式信任管理方案的要求越来越高。在本文中,我们首先调查和分析了现有的各种分散和分布式信任管理方案。在此基础上,提出了一种高效、准确、鲁棒、可扩展的移动P2P网络轻量级信任评级聚合方案——M-trust。大量的仿真结果表明,该方案可以减少计算信任等级列表所需的时间和减少所需的存储空间。与其他方案的比较表明,在各种移动性、信任阈值和网络出度约束下,M-trust在准确性、可靠性、收敛速度和检测率等方面具有优异的综合性能。
{"title":"M-Trust: A Trust Management Scheme for Mobile P2P Networks","authors":"B. Qureshi, G. Min, D. Kouvatsos","doi":"10.1109/EUC.2010.79","DOIUrl":"https://doi.org/10.1109/EUC.2010.79","url":null,"abstract":"The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless communications, pervasive devices and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we first investigate and analyze various existing decentralized and distributed trust management schemes. Based on the analytical results, an efficient, accurate, robust and scalable light weight trust ratings aggregation scheme, referred to as M-trust, is proposed for mobile P2P networks. Extensive simulation results show that this proposed scheme can decrease the time required to compute the list of trust ratings and reduce the required storage space. The comparison to other schemes demonstrates that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Transferring Ontologies between Mobile Devices and Knowledge-Based Systems 在移动设备和基于知识的系统之间转移本体
Xiang Su, J. Riekki
With the advancement of mobile devices' capabilities, it is possible to implement knowledge-based systems on the mobile devices. This development introduces a challenge of transferring knowledge between mobile devices and knowledge-based systems on the server side. This paper presents a novel representation, Entity Notation, to tackle this challenge. It can represent ontology knowledge in a straightforward fashion and allows incremental transfer of ontology. This unique feature makes Entity Notation an ideal solution for transferring knowledge in highly dynamic ubiquitous environments. Moreover, Entity Notation has a short format suitable for communication when resources are constrained. We address the design issues of the representation, demonstrate its usability by a small ontology, and evaluate it based on a set of ubiquitous ontologies.
随着移动设备功能的进步,在移动设备上实现基于知识的系统成为可能。这种发展带来了在移动设备和服务器端基于知识的系统之间传递知识的挑战。本文提出了一种新颖的表示——实体表示法来解决这一挑战。它可以直观地表示本体知识,并允许本体的增量转移。这种独特的特性使实体符号成为在高度动态的无处不在的环境中传递知识的理想解决方案。此外,实体表示法具有适合资源受限时通信的简短格式。我们解决了表示的设计问题,通过一个小型本体展示了它的可用性,并基于一组无处不在的本体对其进行了评估。
{"title":"Transferring Ontologies between Mobile Devices and Knowledge-Based Systems","authors":"Xiang Su, J. Riekki","doi":"10.1109/EUC.2010.28","DOIUrl":"https://doi.org/10.1109/EUC.2010.28","url":null,"abstract":"With the advancement of mobile devices' capabilities, it is possible to implement knowledge-based systems on the mobile devices. This development introduces a challenge of transferring knowledge between mobile devices and knowledge-based systems on the server side. This paper presents a novel representation, Entity Notation, to tackle this challenge. It can represent ontology knowledge in a straightforward fashion and allows incremental transfer of ontology. This unique feature makes Entity Notation an ideal solution for transferring knowledge in highly dynamic ubiquitous environments. Moreover, Entity Notation has a short format suitable for communication when resources are constrained. We address the design issues of the representation, demonstrate its usability by a small ontology, and evaluate it based on a set of ubiquitous ontologies.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks 基于进化HMM的无线传感器网络高效聚类算法
Rouhollah Goudarzi, Behrouz Jedari, M. Sabaei
Energy efficiency should be considered as a key design objective in wireless sensor networks (WSNs), since a sensor node can only be equipped with a limited energy supply. Clustering is one of the well-known design methods for managing the energy consumption in WSNs. Rotating role of cluster heads (CH) among nodes in these networks is an important issue in some of clustering methods. Directly collecting information about the energy level of nodes in each round increases the cost of CH role rotation, in the field of centralized hierarchical methods. In this paper, we proposed a centralized clustering algorithm that utilize hidden Markov model (HMM) optimized by particle swarm optimization (PSO) to predict the energy level of the network. In the next step, the appropriate CHs are selected by PSO algorithm. Our proposed method reduces the cost of clustering and in the mean time increases clustering performance. Evaluation results demonstrate by comparison with famous clustering algorithms, our scheme is energy efficient and increase network life time.
在无线传感器网络(WSNs)中,由于传感器节点只能配备有限的能量供应,因此应将能源效率作为一个关键的设计目标。聚类是wsn中众所周知的能耗管理设计方法之一。在这些网络中,簇头在节点间的旋转作用是一些聚类方法中的重要问题。在集中式分层方法中,直接收集每轮节点的能量水平信息会增加CH角色轮换的成本。本文提出了一种利用粒子群算法优化的隐马尔可夫模型(HMM)预测网络能级的集中聚类算法。下一步,通过粒子群算法选择合适的CHs。该方法在降低聚类成本的同时,提高了聚类性能。通过与著名聚类算法的比较,评价结果表明,该方案具有节能和提高网络寿命的优点。
{"title":"An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks","authors":"Rouhollah Goudarzi, Behrouz Jedari, M. Sabaei","doi":"10.1109/EUC.2010.67","DOIUrl":"https://doi.org/10.1109/EUC.2010.67","url":null,"abstract":"Energy efficiency should be considered as a key design objective in wireless sensor networks (WSNs), since a sensor node can only be equipped with a limited energy supply. Clustering is one of the well-known design methods for managing the energy consumption in WSNs. Rotating role of cluster heads (CH) among nodes in these networks is an important issue in some of clustering methods. Directly collecting information about the energy level of nodes in each round increases the cost of CH role rotation, in the field of centralized hierarchical methods. In this paper, we proposed a centralized clustering algorithm that utilize hidden Markov model (HMM) optimized by particle swarm optimization (PSO) to predict the energy level of the network. In the next step, the appropriate CHs are selected by PSO algorithm. Our proposed method reduces the cost of clustering and in the mean time increases clustering performance. Evaluation results demonstrate by comparison with famous clustering algorithms, our scheme is energy efficient and increase network life time.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TARo: Trusted Anonymous Routing for MANETs 可信匿名路由的manet
Jiefeng Chen, R. Boreli, V. Sivaraman
The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper, we propose a novel anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using a novel efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.
目前提出的移动自组织网络匿名路由机制使网络实体能够匿名、安全地相互通信。然而,由于加密操作带来的延迟和开销,提供高级别匿名性的协议通常具有较差的可伸缩性,而其他方法则牺牲匿名性以获得更好的性能。在本文中,我们提出了一种新的匿名路由协议,它提供了改进的匿名性和安全性,同时实现了与现有提案相似或更好的性能。我们的建议使用一种新的高效的基于密钥哈希链的隐形隐式寻址解决方案来实现匿名,并通过一种新的一对多Diffie-Hellman机制的应用来实现安全性,该机制用于交换对称加密的密钥。最后的贡献包括一种机制,通过验证中间节点之间的连接来促进可信路由的选择。通过分析和仿真,我们证明了与以前的方法相比,我们的建议的好处。
{"title":"TARo: Trusted Anonymous Routing for MANETs","authors":"Jiefeng Chen, R. Boreli, V. Sivaraman","doi":"10.1109/EUC.2010.119","DOIUrl":"https://doi.org/10.1109/EUC.2010.119","url":null,"abstract":"The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper, we propose a novel anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using a novel efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards Precise Synchronisation in Wireless Sensor Networks 无线传感器网络中的精确同步
L. Cheng, S. Hailes, Alan M. Wilson
Many existing Wireless Sensor Network (WSN) synchronisation protocols have demonstrated microsecond-level accuracy is achievable. Furthermore, sub-microsecond-level accuracy has recently been reported, although rather sophisticated, relatively bulky and custom-designed hardware were needed. This paper addresses a fundamental problem in WSN synchronisation: is there a more elegant way to achieve precise synchronisation in WSN? What are the obstacles to pushing the limit in WSN synchronisation? This paper identified the drawbacks caused by the assumptions made in existing WSN synchronisation protocols, and presented and discussed a range of novel solutions to improve the accuracy, reliability and scalability of WSN synchronisation through fusing various types of information and a sensible selection of hardware.
许多现有的无线传感器网络(WSN)同步协议已经证明可以实现微秒级的精度。此外,最近报道了亚微秒级的精度,尽管需要相当复杂、相对笨重和定制设计的硬件。本文解决了WSN同步中的一个基本问题:有没有一种更优雅的方法来实现WSN的精确同步?推动WSN同步极限的障碍是什么?本文指出了现有WSN同步协议的假设所带来的缺陷,并提出并讨论了一系列新的解决方案,通过融合各种类型的信息和合理的硬件选择来提高WSN同步的准确性、可靠性和可扩展性。
{"title":"Towards Precise Synchronisation in Wireless Sensor Networks","authors":"L. Cheng, S. Hailes, Alan M. Wilson","doi":"10.1109/EUC.2010.38","DOIUrl":"https://doi.org/10.1109/EUC.2010.38","url":null,"abstract":"Many existing Wireless Sensor Network (WSN) synchronisation protocols have demonstrated microsecond-level accuracy is achievable. Furthermore, sub-microsecond-level accuracy has recently been reported, although rather sophisticated, relatively bulky and custom-designed hardware were needed. This paper addresses a fundamental problem in WSN synchronisation: is there a more elegant way to achieve precise synchronisation in WSN? What are the obstacles to pushing the limit in WSN synchronisation? This paper identified the drawbacks caused by the assumptions made in existing WSN synchronisation protocols, and presented and discussed a range of novel solutions to improve the accuracy, reliability and scalability of WSN synchronisation through fusing various types of information and a sensible selection of hardware.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor Networks 无线传感器网络中节点覆盖分组盲期的避免
Chow-Sing Lin, Chih-Chung Chen
In our previous work, we proposed a novel approach to partition sensors on wireless sensor network, called node coverage grouping (NCG), where sensors in the connectivity group are within sensing range of each other, and their collected data are assumed to be similar. Power saving was achieved by alternatively turning on a sensor in a connectivity group for working. We also proved that partitioning n nodes by node coverage grouping into connectivity groups is a NP-hard problem, and proposed a heuristic algorithm of node coverage grouping with the time complexity of O(n3). In this paper, we present two approaches, called periodic probing and next-turn probing, to address the avoidance of blind period for the node coverage grouping. The experimental results showed that the NCG applying the avoidance of blind period would have shorter blind period than two other power saving approaches on wireless sensor network, the Lightweight Deployment-Aware Scheduling (LDAS) and the Probing Environment and Adaptive Sleeping (PEAS). In conclusion, the NCG-next-turn probing outperformed the LDAS and the PEAS with more number of living nodes, more coverage, and shorter blind period with respect to the proceeding of the system lifetime.
在我们之前的工作中,我们提出了一种新的方法来划分无线传感器网络中的传感器,称为节点覆盖分组(NCG),其中连接组中的传感器彼此处于感知范围内,并且假设它们收集的数据相似。通过交替打开连接组中的传感器进行工作来实现节能。我们还证明了通过节点覆盖分组将n个节点划分为连通性组是一个np困难问题,并提出了一种时间复杂度为O(n3)的节点覆盖分组启发式算法。本文提出了周期探测和下一轮探测两种方法来解决节点覆盖分组中盲期的避免问题。实验结果表明,与轻型部署感知调度(LDAS)和探测环境与自适应睡眠(PEAS)两种无线传感器网络节能方法相比,采用避免盲期的NCG具有更短的盲期。综上所述,NCG-next-turn探测在系统生命周期的进展方面优于LDAS和PEAS,具有更多的活节点数量、更大的覆盖范围和更短的盲期。
{"title":"Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor Networks","authors":"Chow-Sing Lin, Chih-Chung Chen","doi":"10.1109/EUC.2010.74","DOIUrl":"https://doi.org/10.1109/EUC.2010.74","url":null,"abstract":"In our previous work, we proposed a novel approach to partition sensors on wireless sensor network, called node coverage grouping (NCG), where sensors in the connectivity group are within sensing range of each other, and their collected data are assumed to be similar. Power saving was achieved by alternatively turning on a sensor in a connectivity group for working. We also proved that partitioning n nodes by node coverage grouping into connectivity groups is a NP-hard problem, and proposed a heuristic algorithm of node coverage grouping with the time complexity of O(n3). In this paper, we present two approaches, called periodic probing and next-turn probing, to address the avoidance of blind period for the node coverage grouping. The experimental results showed that the NCG applying the avoidance of blind period would have shorter blind period than two other power saving approaches on wireless sensor network, the Lightweight Deployment-Aware Scheduling (LDAS) and the Probing Environment and Adaptive Sleeping (PEAS). In conclusion, the NCG-next-turn probing outperformed the LDAS and the PEAS with more number of living nodes, more coverage, and shorter blind period with respect to the proceeding of the system lifetime.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks 无线传感器网络中具有机会合作的多通道MAC协议
Jinbao Li, Desheng Zhang, Longjiang Guo
To handle the triple hidden terminal problems, this paper proposes OCO, an asynchronous multi-channel MAC protocol with opportunistic cooperation for wireless sensor networks. By adopting opportunistic cooperation, OCO effectively alleviates, if not eliminates, the triple hidden terminal problems. More importantly, OCO is fully distributed with no requirements of time synchronization or multi-radio scheme, so it is easy to be implemented on the real sensor nodes. Via the theoretical analysis, the opportunistic probability that a node cooperates with its neighbor is obtained. To validate the effectiveness of opportunistic cooperation, extensive simulations and real test bed experiments were con-ducted. The simulation and experimental results show that when the number of channels is large or the network loads are heavy, OCO improves energy efficiency and throughput significantly compared with other works in the literature.
为了解决无线传感器网络的三重隐藏终端问题,本文提出了一种基于机会协作的异步多通道MAC协议OCO。OCO通过机会主义合作,即使不能完全消除,也能有效缓解三重隐性终端问题。更重要的是,OCO是完全分布式的,不需要时间同步,也不需要多无线电方案,因此易于在真实传感器节点上实现。通过理论分析,得到了节点与其相邻节点合作的机会概率。为了验证机会合作的有效性,进行了大量的模拟和真实试验台实验。仿真和实验结果表明,在信道数量较大或网络负载较重的情况下,与文献中其他工作相比,OCO显著提高了能效和吞吐量。
{"title":"OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks","authors":"Jinbao Li, Desheng Zhang, Longjiang Guo","doi":"10.1109/EUC.2010.45","DOIUrl":"https://doi.org/10.1109/EUC.2010.45","url":null,"abstract":"To handle the triple hidden terminal problems, this paper proposes OCO, an asynchronous multi-channel MAC protocol with opportunistic cooperation for wireless sensor networks. By adopting opportunistic cooperation, OCO effectively alleviates, if not eliminates, the triple hidden terminal problems. More importantly, OCO is fully distributed with no requirements of time synchronization or multi-radio scheme, so it is easy to be implemented on the real sensor nodes. Via the theoretical analysis, the opportunistic probability that a node cooperates with its neighbor is obtained. To validate the effectiveness of opportunistic cooperation, extensive simulations and real test bed experiments were con-ducted. The simulation and experimental results show that when the number of channels is large or the network loads are heavy, OCO improves energy efficiency and throughput significantly compared with other works in the literature.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1