首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments 面向服务环境下基于优先级的服务选择信任模型
Xing Su, Minjie Zhang, Y. Mu, K. Sim
How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich context format, including attributes of the service, the priority distribution on attributes and a rating value for each attribute from a third party, (2) The concept of `Similarity' is introduced to measure the difference in terms of distributions of priorities on attributes between requested service and a refereed service in order to precisely predict the performance of a potential provider on the requested service, (3) The concept of general performance of a service provider on a service in history is also introduced to improve the success rate on the requested service. The experimental results can prove that PBtrust has a better performance than that of the CR model in a service-oriented environment.
如何在开放和动态的环境中选择服务消费者在服务质量和成功率方面可以信任的最佳服务提供者(代理),是许多面向服务的应用(如基于internet的网格系统、电子交易系统以及面向服务的计算系统)中一个具有挑战性的问题。提出了一种基于优先级的信任(PBTrust)模型,用于一般面向服务环境下的服务选择。从几个角度来看,PBTrust是稳健和新颖的。(1)服务提供商的声誉来源于作为第三方的裁判,这些裁判以丰富的上下文格式与提供商进行交互,包括服务的属性、属性的优先级分布以及第三方对每个属性的评级值;(2)介绍了“相似”的概念来衡量不同的分布属性优先级的请求服务和执法服务之间为了精确地预测潜在供应商的性能所请求的服务,(3)的概念一般性能服务提供者的服务在历史上也介绍了提高所请求的服务的成功率。实验结果表明,在面向服务的环境下,PBtrust模型比CR模型具有更好的性能。
{"title":"PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments","authors":"Xing Su, Minjie Zhang, Y. Mu, K. Sim","doi":"10.1109/EUC.2010.129","DOIUrl":"https://doi.org/10.1109/EUC.2010.129","url":null,"abstract":"How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich context format, including attributes of the service, the priority distribution on attributes and a rating value for each attribute from a third party, (2) The concept of `Similarity' is introduced to measure the difference in terms of distributions of priorities on attributes between requested service and a refereed service in order to precisely predict the performance of a potential provider on the requested service, (3) The concept of general performance of a service provider on a service in history is also introduced to improve the success rate on the requested service. The experimental results can prove that PBtrust has a better performance than that of the CR model in a service-oriented environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks 水声传感器网络表面网关结构研究
Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An
Recently, the importance of a water resource is highly concerned. Therefore, Underwater Wireless Sensor Networks (UASNs) technologies are vigorously studied for monitoring underwater environment. The UASNs gather various underwater environmental data that should be delivered to a Monitoring Center where nearby or far from UASNs are deployed. To deliver data form underwater to the Monitoring Center or vice versa, a surface gateway should change acoustic signal to RF (Radio Frequency) signal. Depends on the service requirement, the surface gateway can adopt various wireless communication channels such as Cellular network, Zigbee and so on. In this paper, we propose the architecture of surface gateway that has several wireless communication channels and communication protocol.
最近,水资源的重要性引起了人们的高度关注。因此,水下无线传感器网络(uasn)技术被大力研究用于水下环境监测。uasn收集各种水下环境数据,这些数据应该被传送到附近或远离uasn部署的监测中心。为了将水下的数据传输到监测中心或反之,水面网关应该将声信号转换为RF(射频)信号。根据不同的业务需求,地面网关可以采用蜂窝网络、Zigbee等多种无线通信信道。本文提出了一种具有多个无线通信通道和通信协议的表面网关架构。
{"title":"The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks","authors":"Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An","doi":"10.1109/EUC.2010.50","DOIUrl":"https://doi.org/10.1109/EUC.2010.50","url":null,"abstract":"Recently, the importance of a water resource is highly concerned. Therefore, Underwater Wireless Sensor Networks (UASNs) technologies are vigorously studied for monitoring underwater environment. The UASNs gather various underwater environmental data that should be delivered to a Monitoring Center where nearby or far from UASNs are deployed. To deliver data form underwater to the Monitoring Center or vice versa, a surface gateway should change acoustic signal to RF (Radio Frequency) signal. Depends on the service requirement, the surface gateway can adopt various wireless communication channels such as Cellular network, Zigbee and so on. In this paper, we propose the architecture of surface gateway that has several wireless communication channels and communication protocol.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems 调度交换:一种分布式嵌入式系统的温度管理技术
Farzad Samie Ghahfarokhi, A. Ejlali
A distributed embedded system consists of different processing elements (PEs) communicating via communication links. PEs have various power characteristics and in turn, have different thermal profiles. With new technologies, processor power density is dramatically increased which results in high temperature. This alarming trend underscores the importance of temperature management methods in system design. The majority of proposed techniques to address thermal issues, impose severe penalties on performance and reliability. We present Schedule Swapping, a technique for reducing peak temperature in distributed embedded systems while satisfying real-time constraints. Contrary to many other approaches, our proposed technique does not use slack time for reducing power dissipation but leaves it to be used by recovery mechanisms (rollback re-execution). The more slack time, the more the number of possible recoveries and the more reliability. We also introduce a simple yet effective scheme to ensure that all the deadlines will be met if our technique is used. This scheme also determines the order in which tasks should transmit their data in Schedule Swapping. Our experimental results show up to 18.1C reduction in peak temperature. On average, Schedule Swapping achieves the peak temperature reduction of 11.13C.
分布式嵌入式系统由不同的处理单元(pe)通过通信链路进行通信组成。pe具有不同的功率特性,从而具有不同的热分布。随着新技术的发展,处理器的功率密度急剧增加,导致温度升高。这种令人担忧的趋势强调了温度管理方法在系统设计中的重要性。大多数提出的解决热问题的技术都对性能和可靠性造成了严重的影响。我们提出了一种调度交换技术,它可以在满足实时约束的情况下降低分布式嵌入式系统的峰值温度。与许多其他方法相反,我们提出的技术不使用空闲时间来减少功耗,而是将其留给恢复机制(回滚重新执行)使用。松弛时间越长,可能的恢复次数越多,可靠性越高。我们还介绍了一个简单而有效的方案,以确保如果使用我们的技术,所有的截止日期都将被满足。该方案还决定了任务在调度交换中传输数据的顺序。我们的实验结果表明,峰值温度降低了18.1℃。平均而言,调度交换实现了11.13C的峰值温度降低。
{"title":"Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems","authors":"Farzad Samie Ghahfarokhi, A. Ejlali","doi":"10.1109/EUC.2010.11","DOIUrl":"https://doi.org/10.1109/EUC.2010.11","url":null,"abstract":"A distributed embedded system consists of different processing elements (PEs) communicating via communication links. PEs have various power characteristics and in turn, have different thermal profiles. With new technologies, processor power density is dramatically increased which results in high temperature. This alarming trend underscores the importance of temperature management methods in system design. The majority of proposed techniques to address thermal issues, impose severe penalties on performance and reliability. We present Schedule Swapping, a technique for reducing peak temperature in distributed embedded systems while satisfying real-time constraints. Contrary to many other approaches, our proposed technique does not use slack time for reducing power dissipation but leaves it to be used by recovery mechanisms (rollback re-execution). The more slack time, the more the number of possible recoveries and the more reliability. We also introduce a simple yet effective scheme to ensure that all the deadlines will be met if our technique is used. This scheme also determines the order in which tasks should transmit their data in Schedule Swapping. Our experimental results show up to 18.1C reduction in peak temperature. On average, Schedule Swapping achieves the peak temperature reduction of 11.13C.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks 移动Ad Hoc网络中路由入侵的检测与预防
P. Moradiya, S. Sampalli
There has been a tremendous interest in recent years in the design of mobile ad hoc networks (MANETs) because of their dynamic topology, self-organization and ease of deployment. However, the lack of security in their routing protocols make MANETs vulnerable to a variety of routing intrusions that can compromise the data or the entire network itself. This paper presents a novel scheme for the detection and prevention of intrusions on the Optimized Link State Routing (OLSR) protocol for MANETs. This scheme is patched to the OLSR implementation and runs independently on each MANET node. The mechanism verifies specifications in control messages sent by intruder nodes in the network and addresses a unique vulnerability in the implementation of the OLSR protocol. Furthermore, this technique helps each MANET node maintain a reliable routing table which is very important to prevent intrusions. Keywords-mobile ad hoc networks, wireless security, routing protocol security, intrusion detection and prevention.
近年来,由于移动自组织网络(manet)具有动态拓扑、自组织和易于部署的特点,其设计引起了人们极大的兴趣。然而,路由协议缺乏安全性使得manet容易受到各种路由入侵的攻击,这些入侵可能会危及数据或整个网络本身。本文提出了一种基于优化链路状态路由(OLSR)协议的入侵检测和防御新方案。该方案被修补到OLSR实现中,并在每个MANET节点上独立运行。该机制验证了网络中入侵者节点发送的控制消息中的规范,并解决了OLSR协议实现中的一个独特漏洞。此外,该技术有助于每个MANET节点维护可靠的路由表,这对防止入侵非常重要。关键词:移动自组网,无线安全,路由协议安全,入侵检测与防御。
{"title":"Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks","authors":"P. Moradiya, S. Sampalli","doi":"10.1109/EUC.2010.135","DOIUrl":"https://doi.org/10.1109/EUC.2010.135","url":null,"abstract":"There has been a tremendous interest in recent years in the design of mobile ad hoc networks (MANETs) because of their dynamic topology, self-organization and ease of deployment. However, the lack of security in their routing protocols make MANETs vulnerable to a variety of routing intrusions that can compromise the data or the entire network itself. This paper presents a novel scheme for the detection and prevention of intrusions on the Optimized Link State Routing (OLSR) protocol for MANETs. This scheme is patched to the OLSR implementation and runs independently on each MANET node. The mechanism verifies specifications in control messages sent by intruder nodes in the network and addresses a unique vulnerability in the implementation of the OLSR protocol. Furthermore, this technique helps each MANET node maintain a reliable routing table which is very important to prevent intrusions. Keywords-mobile ad hoc networks, wireless security, routing protocol security, intrusion detection and prevention.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies 通过DPM和DVFS策略在线和自适应相互作用的实时嵌入式系统电源管理
Muhammad Khurram Bhatti, C. Belleudy, M. Auguin
This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic power management (DPM) and dynamic voltage & frequency scaling (DVFS) capabilities. Early research reports that while both DPM and DVFS policies perform well individually for a specific set of conditions, they often outperform each other under different workload and/or architecture configuration. Thus, no single policy fits perfectly all operating conditions. Instead of designing new policies for specific operating conditions, this paper proposes a generic power management scheme, called the Hybrid Power Management (HyPowMan) scheme. This scheme takes a set of well-known existing (DPM and DVFS) policies, each of which performs well for a given set of conditions, and adapts at runtime to the best-performing policy for any given workload. We performed experiments with state-of the-art DPM and DVFS techniques and results show that HyPowMan scheme adapts well to the changing workload and always achieves overall energy savings comparable to the best-performing policy at any point in time.
本文研究了在具有动态电源管理(DPM)和动态电压频率缩放(DVFS)功能的多处理器平台上调度的周期性实时任务的功率/能量最小化问题。早期的研究报告称,虽然DPM和DVFS策略在特定条件下各自表现良好,但在不同的工作负载和/或体系结构配置下,它们的表现往往优于对方。因此,没有一种政策能完美地适应所有的操作条件。本文提出了一种通用的电源管理方案,称为混合电源管理(HyPowMan)方案,而不是针对特定的运行条件设计新的策略。该方案采用一组已知的现有(DPM和DVFS)策略,其中每个策略在给定的一组条件下执行良好,并在运行时适应任何给定工作负载的最佳性能策略。我们使用最先进的DPM和DVFS技术进行了实验,结果表明HyPowMan方案能够很好地适应不断变化的工作负载,并且在任何时间点都能达到与最佳策略相当的总体节能效果。
{"title":"Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies","authors":"Muhammad Khurram Bhatti, C. Belleudy, M. Auguin","doi":"10.1109/EUC.2010.35","DOIUrl":"https://doi.org/10.1109/EUC.2010.35","url":null,"abstract":"This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic power management (DPM) and dynamic voltage & frequency scaling (DVFS) capabilities. Early research reports that while both DPM and DVFS policies perform well individually for a specific set of conditions, they often outperform each other under different workload and/or architecture configuration. Thus, no single policy fits perfectly all operating conditions. Instead of designing new policies for specific operating conditions, this paper proposes a generic power management scheme, called the Hybrid Power Management (HyPowMan) scheme. This scheme takes a set of well-known existing (DPM and DVFS) policies, each of which performs well for a given set of conditions, and adapts at runtime to the best-performing policy for any given workload. We performed experiments with state-of the-art DPM and DVFS techniques and results show that HyPowMan scheme adapts well to the changing workload and always achieves overall energy savings comparable to the best-performing policy at any point in time.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks 水下传感器网络中具有分布式浮动信标的全方位跟踪系统
Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim
This paper presents a bearings-only tracking (BOT) scheme based on distributed floating beacons in underwater sensor networks (UWSNs). Conventional BOT systems extract target-originated bearings in noisy measurements, locate and track targets based on the bearings in real time. We propose a tracking scheme by modifying BOT systems for UWSNs where a multidimensional assignment (MDA) method is used to extract target-originated bearings and to associate them with corresponding targets. In addition, a threshold-based decision in extracting bearings in MDA and a local Kalman filter is proposed to keep tracking information at a floating beacon even if a target is undetected. Simulation results show that the proposed scheme has advantage of tracking accuracy over recently known work under low detection probability.
提出了一种基于分布式浮动信标的水下传感器网络纯方位跟踪(BOT)方案。传统的BOT系统在噪声测量中提取目标源方位,根据方位实时定位和跟踪目标。我们提出了一种改进BOT系统的UWSNs跟踪方案,其中使用多维分配(MDA)方法提取目标源方位并将其与相应的目标相关联。此外,提出了一种基于阈值的MDA定位提取决策和一种局部卡尔曼滤波器,即使目标未被检测到,也能在浮动信标处保持跟踪信息。仿真结果表明,在低检测概率的情况下,该方法具有较现有方法跟踪精度高的优点。
{"title":"Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks","authors":"Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim","doi":"10.1109/EUC.2010.51","DOIUrl":"https://doi.org/10.1109/EUC.2010.51","url":null,"abstract":"This paper presents a bearings-only tracking (BOT) scheme based on distributed floating beacons in underwater sensor networks (UWSNs). Conventional BOT systems extract target-originated bearings in noisy measurements, locate and track targets based on the bearings in real time. We propose a tracking scheme by modifying BOT systems for UWSNs where a multidimensional assignment (MDA) method is used to extract target-originated bearings and to associate them with corresponding targets. In addition, a threshold-based decision in extracting bearings in MDA and a local Kalman filter is proposed to keep tracking information at a floating beacon even if a target is undetected. Simulation results show that the proposed scheme has advantage of tracking accuracy over recently known work under low detection probability.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116894408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Replay Debugging for Multi-threaded Embedded Software 多线程嵌入式软件的重放调试
Yann-Hang Lee, Y. Song, Rohit Girme, Sagar Zaveri, Yan Chen
The non-deterministic behavior of multi-threaded embedded software makes cyclic debugging difficult. Even with the same input data, consecutive runs may result in different executions and reproducing the same bug is itself a challenge. Despite the fact that several approaches have been proposed for deterministic replay, none of them attends to the capabilities and functionalities that replay can comprise for better debugging. This paper introduces a practical replay mechanism for multi-threaded embedded software. The Replay Debugger, based on Lamport clock, offers a user controlled debugging environment in which the program execution follows the identical partially ordered happened-before dependency among threads and IO events as that of the recorded run. With the order of thread synchronizations assured, users can focus their debugging effort in the program behavior of any threads while having a comprehension of thread-level concurrency. Using a set of benchmark programs, experiment results of a prototyped implementation show that, in average, the software based approach incurs a small probe effect of 3.3% in its record stage.
多线程嵌入式软件的不确定性给循环调试带来了困难。即使使用相同的输入数据,连续运行也可能导致不同的执行,再现相同的错误本身就是一个挑战。尽管已经为确定性重播提出了几种方法,但它们都没有考虑到重播可以包含的性能和功能,从而更好地进行调试。本文介绍了一种实用的多线程嵌入式软件重放机制。基于Lamport时钟的Replay Debugger提供了一个用户控制的调试环境,在这个环境中,程序执行遵循线程和IO事件之间相同的部分排序的happens -before依赖关系,就像记录运行一样。在保证了线程同步顺序之后,用户可以在理解线程级并发性的同时,将调试工作集中在任何线程的程序行为上。使用一组基准程序,原型实现的实验结果表明,平均而言,基于软件的方法在其记录阶段产生的探测效应很小,为3.3%。
{"title":"Replay Debugging for Multi-threaded Embedded Software","authors":"Yann-Hang Lee, Y. Song, Rohit Girme, Sagar Zaveri, Yan Chen","doi":"10.1109/EUC.2010.13","DOIUrl":"https://doi.org/10.1109/EUC.2010.13","url":null,"abstract":"The non-deterministic behavior of multi-threaded embedded software makes cyclic debugging difficult. Even with the same input data, consecutive runs may result in different executions and reproducing the same bug is itself a challenge. Despite the fact that several approaches have been proposed for deterministic replay, none of them attends to the capabilities and functionalities that replay can comprise for better debugging. This paper introduces a practical replay mechanism for multi-threaded embedded software. The Replay Debugger, based on Lamport clock, offers a user controlled debugging environment in which the program execution follows the identical partially ordered happened-before dependency among threads and IO events as that of the recorded run. With the order of thread synchronizations assured, users can focus their debugging effort in the program behavior of any threads while having a comprehension of thread-level concurrency. Using a set of benchmark programs, experiment results of a prototyped implementation show that, in average, the software based approach incurs a small probe effect of 3.3% in its record stage.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Fast Heuristic for Solving the D1EC Coloring Problem 一种快速求解D1EC染色问题的启发式算法
F. Campoccia, V. Mancuso
In this paper we propose an efficient heuristic for solving the Distance-1 Edge Coloring problem (D1EC) for the on-the-fly assignment of orthogonal wireless channels in wireless as soon as a topology change occurs. The coloring algorithm exploits the simulated annealing paradigm, i.e., a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a sub optimal coloring scheme even for the case of dynamic channel allocation. However, a stateful implementation of the D1EC scheme is needed in order to speed-up the network coloring upon topology changes. In fact, a stateful D1EC reduces the algorithm’s convergence time by more than 60% in comparison to stateless algorithms.
本文提出了一种有效的启发式算法,用于解决在拓扑发生变化时无线正交信道的即时分配中的距离-1边着色问题。着色算法利用模拟退火模式,即蒙特卡罗方法的推广,以解决组合问题。我们证明,即使在动态信道分配的情况下,基于模拟退火的着色也能快速收敛到次优着色方案。然而,为了加快拓扑变化时的网络着色速度,需要有状态地实现D1EC方案。事实上,与无状态算法相比,有状态D1EC将算法的收敛时间减少了60%以上。
{"title":"A Fast Heuristic for Solving the D1EC Coloring Problem","authors":"F. Campoccia, V. Mancuso","doi":"10.1109/EUC.2010.71","DOIUrl":"https://doi.org/10.1109/EUC.2010.71","url":null,"abstract":"In this paper we propose an efficient heuristic for solving the Distance-1 Edge Coloring problem (D1EC) for the on-the-fly assignment of orthogonal wireless channels in wireless as soon as a topology change occurs. The coloring algorithm exploits the simulated annealing paradigm, i.e., a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a sub optimal coloring scheme even for the case of dynamic channel allocation. However, a stateful implementation of the D1EC scheme is needed in order to speed-up the network coloring upon topology changes. In fact, a stateful D1EC reduces the algorithm’s convergence time by more than 60% in comparison to stateless algorithms.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131254372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Management in Wireless Mobile Networks with Cooperative Communications 协作通信无线移动网络中的信任管理
Reyhaneh Changiz, H. Halabian, F. Yu, I. Lambadaris, Helen Tang
Cooperative communication makes use of the broadcast nature of the wireless medium where adjacent nodes overhear the message transmitted by the source and assist in the transmission by relaying the overheard message to the destination. Although cooperative communication brings in significant benefits, it also raises serious security issues to wireless mobile networks. For example, there exists a possibility that a node refuses to cooperate when it is selected for cooperation or deliberately drop the received packets. In wireless mobile networks with cooperative communication, trust management is an important mechanism to monitor such networks for violations of security. In this paper, we propose a trust management method for wireless mobile networks with cooperative communications. Conventional Bayesian methodology is insufficient for the cooperative communication paradigm, as it is biased by the channel conditions and relay selection decision processes. Therefore, we modify the conventional trust management method by incorporating not only the relay selection policy but also the dynamic wireless channel conditions among the source, relays and destination. Simulation results are presented to show the effectiveness of the proposed scheme.
协作通信利用无线媒体的广播性质,其中相邻节点无意中听到源传输的消息,并通过将无意中听到的消息中继到目的地来协助传输。协作通信在带来巨大效益的同时,也给无线移动网络带来了严重的安全问题。例如,当一个节点被选择合作时,它可能会拒绝合作,或者故意丢弃接收到的数据包。在协作通信的无线移动网络中,信任管理是监控网络安全违规行为的重要机制。本文提出了一种基于协作通信的无线移动网络信任管理方法。由于受信道条件和中继选择决策过程的影响,传统的贝叶斯方法在协作通信范式中是不充分的。因此,我们对传统的信任管理方法进行了改进,不仅考虑了中继选择策略,而且考虑了源、中继和目标之间的动态无线信道条件。仿真结果表明了该方案的有效性。
{"title":"Trust Management in Wireless Mobile Networks with Cooperative Communications","authors":"Reyhaneh Changiz, H. Halabian, F. Yu, I. Lambadaris, Helen Tang","doi":"10.1109/EUC.2010.82","DOIUrl":"https://doi.org/10.1109/EUC.2010.82","url":null,"abstract":"Cooperative communication makes use of the broadcast nature of the wireless medium where adjacent nodes overhear the message transmitted by the source and assist in the transmission by relaying the overheard message to the destination. Although cooperative communication brings in significant benefits, it also raises serious security issues to wireless mobile networks. For example, there exists a possibility that a node refuses to cooperate when it is selected for cooperation or deliberately drop the received packets. In wireless mobile networks with cooperative communication, trust management is an important mechanism to monitor such networks for violations of security. In this paper, we propose a trust management method for wireless mobile networks with cooperative communications. Conventional Bayesian methodology is insufficient for the cooperative communication paradigm, as it is biased by the channel conditions and relay selection decision processes. Therefore, we modify the conventional trust management method by incorporating not only the relay selection policy but also the dynamic wireless channel conditions among the source, relays and destination. Simulation results are presented to show the effectiveness of the proposed scheme.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure Mobile Business Information Processing 安全移动商务信息处理
N. Kuntze, R. Rieke, Günther Diederich, R. Sethmann, K. Sohr, Tanveer Mustafa, Kai-Oliver Detken
An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in.
越来越多的功能被整合到移动电话中,随着新的移动电话平台(如iPhone或Android)得到更广泛的应用,这一趋势将继续下去。然而,伴随着这一趋势,新的风险也随之出现,特别是对于使用移动电话进行商业智能(BI)等安全关键应用程序的企业而言。尽管像Android这样的平台已经实现了复杂的安全机制,但仍有安全漏洞的报道。此外,不同的利益相关者可以访问手机,如不同的企业、服务提供商、运营商或制造商。为了保护对安全至关重要的业务应用,需要一个值得信赖的移动电话平台。从典型的攻击场景开始,我们描述了一个基于可信计算概念的Android手机安全架构。特别是,这种架构允许动态更改策略,以反映手机正在使用的当前环境。
{"title":"Secure Mobile Business Information Processing","authors":"N. Kuntze, R. Rieke, Günther Diederich, R. Sethmann, K. Sohr, Tanveer Mustafa, Kai-Oliver Detken","doi":"10.1109/EUC.2010.107","DOIUrl":"https://doi.org/10.1109/EUC.2010.107","url":null,"abstract":"An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128685506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1