首页 > 最新文献

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)最新文献

英文 中文
Sensitivity of wireless network simulations to a two-state Markov model channel approximation 无线网络仿真对双态马尔可夫模型信道逼近的敏感性
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258328
J. McDougall, Scott L. Miller
In this paper, we investigate the appropriateness of wireless network simulations that employ a two-state Markov model to approximate a flat Rayleigh fading channel. Our approach first analyzes the statistical similarities and differences between block error processes generated by 1) an 802.11b defined communication scheme in the presence of flat Rayleigh fading and 2) a representative two-state Markov model. It is shown that, at low SNR, the Markov model does not generate an adequate frame error process. Furthermore, we quantify the effects of said statistical deviations through ns2 network simulations. This work further advances the understanding of the appropriate, and inappropriate, environments under which the two-state Markov model is a suitable approximation of a fading channel.
在本文中,我们研究了无线网络模拟的适当性,采用双状态马尔可夫模型来近似一个平坦的瑞利衰落信道。我们的方法首先分析了1)在平坦瑞利衰落下802.11b定义的通信方案和2)具有代表性的两态马尔可夫模型产生的块错误过程的统计异同。结果表明,在低信噪比下,马尔可夫模型不能产生足够的帧误差处理。此外,我们通过ns2网络模拟量化了上述统计偏差的影响。这项工作进一步推进了对适当和不适当的环境的理解,在这种环境下,两态马尔可夫模型是衰落信道的适当近似。
{"title":"Sensitivity of wireless network simulations to a two-state Markov model channel approximation","authors":"J. McDougall, Scott L. Miller","doi":"10.1109/GLOCOM.2003.1258328","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258328","url":null,"abstract":"In this paper, we investigate the appropriateness of wireless network simulations that employ a two-state Markov model to approximate a flat Rayleigh fading channel. Our approach first analyzes the statistical similarities and differences between block error processes generated by 1) an 802.11b defined communication scheme in the presence of flat Rayleigh fading and 2) a representative two-state Markov model. It is shown that, at low SNR, the Markov model does not generate an adequate frame error process. Furthermore, we quantify the effects of said statistical deviations through ns2 network simulations. This work further advances the understanding of the appropriate, and inappropriate, environments under which the two-state Markov model is a suitable approximation of a fading channel.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
RBWA: an efficient random-bit window-based authentication protocol RBWA:一种高效的基于随机位窗口的认证协议
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258464
F. Zhao, Yongjoo Shin, S. F. Wu, H. Johnson, A. Nilsson
Given the wide and rapid deployment of "visitor networks" (Dory Leifer 2002), how to authenticate the user and account the usage on the per-packet basis securely and yet efficiently is still a challenging problem. In this paper, we explore the tradeoff between performance and security, and propose a per-data-packet authentication and access control protocol called RBWA (random-bit window-based authentication). Deployed in the IP layer, RBWA can work with various underlying linker layer specific mechanisms and network topologies. And compared with IPSec, it dramatically reduces the overhead and power consumption by adding only a few bits to each data packet. Furthermore, RBWA is strong against a suite of attacks such as replay attack, denial-of-service attack and spoofing etc. In particular, a robust antireplay window scheme is developed to counter the severe packet reordering. The performance of RBWA is evaluated via the simulation.
鉴于“访问者网络”的广泛和快速部署(Dory Leifer 2002),如何安全而有效地对用户进行身份验证并对每个数据包的使用情况进行记录仍然是一个具有挑战性的问题。在本文中,我们探讨了性能和安全性之间的权衡,并提出了一种称为RBWA(基于随机位窗口的身份验证)的逐数据包身份验证和访问控制协议。RBWA部署在IP层,可以使用各种底层链接器层特定机制和网络拓扑。与IPSec相比,它只在每个数据包中添加几个比特,从而大大降低了开销和功耗。此外,RBWA对诸如重放攻击、拒绝服务攻击和欺骗等一系列攻击具有很强的抵御能力。特别地,开发了一种鲁棒的防重放窗口方案来对抗严重的数据包重排序。通过仿真对RBWA的性能进行了评价。
{"title":"RBWA: an efficient random-bit window-based authentication protocol","authors":"F. Zhao, Yongjoo Shin, S. F. Wu, H. Johnson, A. Nilsson","doi":"10.1109/GLOCOM.2003.1258464","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258464","url":null,"abstract":"Given the wide and rapid deployment of \"visitor networks\" (Dory Leifer 2002), how to authenticate the user and account the usage on the per-packet basis securely and yet efficiently is still a challenging problem. In this paper, we explore the tradeoff between performance and security, and propose a per-data-packet authentication and access control protocol called RBWA (random-bit window-based authentication). Deployed in the IP layer, RBWA can work with various underlying linker layer specific mechanisms and network topologies. And compared with IPSec, it dramatically reduces the overhead and power consumption by adding only a few bits to each data packet. Furthermore, RBWA is strong against a suite of attacks such as replay attack, denial-of-service attack and spoofing etc. In particular, a robust antireplay window scheme is developed to counter the severe packet reordering. The performance of RBWA is evaluated via the simulation.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
UWB multipath channel model based on time-domain UTD technique 基于时域UTD技术的超宽带多径信道模型
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258430
R. Yao, G. Gao, Zheng Chen, Wenwu Zhu
In this paper, we develop a deterministic UWB multipath channel model based on time-domain uniform geometrical theory of diffraction (TD-UTD) technique. The solution includes the three basic ray mechanisms of geometrical optics (GO) and UTD, i.e., directed ray, multireflected rays from lossy surfaces, and diffracted ray from lossy edge. Since the analysis is conducted in time-domain electromagnetic field, unlike statistical model, the approach for UWB channel model can determine not only signal attenuation, but also waveform distortion in terms of pulse shape and pulse duration when the UWB signal propagates in multipath environments. Here, a generic impulse response model by taking into account channel impulse response as well as transmitter and receiver antenna impulse responses is given. Then, the analytical description of time-domain single reflected ray and reflection coefficients of horizontal polarization and vertical polarization is provided. The time-domain multiple reflected rays are expressed by the convolution of individual reflection coefficient from lossy surfaces with different electromagnetic properties. The time-domain diffraction ray is described as time-domain diffraction coefficients and reflection coefficient. Finally, the simulation results in a typical office room are presented.
本文建立了一种基于时域均匀几何衍射理论(TD-UTD)技术的确定性超宽带多径信道模型。该解决方案包括几何光学(GO)和UTD的三种基本射线机制,即定向射线、来自有损表面的多反射射线和来自有损边缘的衍射射线。由于分析是在时域电磁场中进行的,与统计模型不同,UWB信道模型方法不仅可以确定信号衰减,还可以确定UWB信号在多径环境中传播时的脉冲形状和脉冲持续时间等波形畸变。文中给出了一个综合考虑信道冲击响应和收发天线冲击响应的通用冲击响应模型。然后给出了时域单反射射线的解析描述以及水平偏振和垂直偏振的反射系数。时域多重反射射线由具有不同电磁特性的有损表面的单个反射系数的卷积表示。时域衍射射线用时域衍射系数和反射系数来描述。最后给出了典型办公室内的仿真结果。
{"title":"UWB multipath channel model based on time-domain UTD technique","authors":"R. Yao, G. Gao, Zheng Chen, Wenwu Zhu","doi":"10.1109/GLOCOM.2003.1258430","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258430","url":null,"abstract":"In this paper, we develop a deterministic UWB multipath channel model based on time-domain uniform geometrical theory of diffraction (TD-UTD) technique. The solution includes the three basic ray mechanisms of geometrical optics (GO) and UTD, i.e., directed ray, multireflected rays from lossy surfaces, and diffracted ray from lossy edge. Since the analysis is conducted in time-domain electromagnetic field, unlike statistical model, the approach for UWB channel model can determine not only signal attenuation, but also waveform distortion in terms of pulse shape and pulse duration when the UWB signal propagates in multipath environments. Here, a generic impulse response model by taking into account channel impulse response as well as transmitter and receiver antenna impulse responses is given. Then, the analytical description of time-domain single reflected ray and reflection coefficients of horizontal polarization and vertical polarization is provided. The time-domain multiple reflected rays are expressed by the convolution of individual reflection coefficient from lossy surfaces with different electromagnetic properties. The time-domain diffraction ray is described as time-domain diffraction coefficients and reflection coefficient. Finally, the simulation results in a typical office room are presented.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Shadowing and blockage in indoor optical wireless communications 室内无线光通信中的遮挡和阻塞
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258840
S. Jivkova, M. Kavehrad
In this paper, we investigate vulnerability of a so called "cellular" and that of a multi-spot diffusing (MSD) multi-input-multi-output (MIMO) architecture to shadowing and its effect on communications cell size and the required transmit power. Because signal path obstruction by furniture is easier to predict and avoid, we are mainly concerned with shadowing and blockage caused by people either sitting or standing. To avoid blockage of communication link by a user of portable units, maximum radiation angle at the transmitter in both configurations must not exceed 45/spl deg/. This restricts communication cell size. We show the probability of blockage of a cellular link depends almost linearly on the distance of the portable unit from the communication cell center. Unlike cellular links, MSD-MIMO links can be designed to be robust against blockage, though still vulnerable to shadowing. In a typical office having a height of 3 m, probability of shadowing is less than 2% and in majority of cases shadowing causes less than 50% reduction in the received signal power. Power penalty due to shadowing is insignificant (less than 0.1 dB) with a 1% outage.
在本文中,我们研究了所谓的“蜂窝”和多点扩散(MSD)多输入多输出(MIMO)架构对阴影的脆弱性及其对通信单元尺寸和所需发射功率的影响。因为家具对信号路径的阻碍更容易预测和避免,所以我们主要关注的是坐着或站着的人造成的阴影和阻塞。为避免便携式设备用户阻塞通信链路,两种配置下发射机的最大辐射角不得超过45/spl°/。这限制了通信单元的大小。我们显示蜂窝链路阻塞的概率几乎线性地依赖于便携设备与通信蜂窝中心的距离。与蜂窝链路不同,MSD-MIMO链路可以设计成抗阻塞的坚固性,尽管仍然容易受到阴影的影响。在高度为3米的典型办公室中,遮挡的概率小于2%,在大多数情况下,遮挡导致接收到的信号功率下降不超过50%。在1%的停电情况下,阴影造成的功率损失微不足道(小于0.1 dB)。
{"title":"Shadowing and blockage in indoor optical wireless communications","authors":"S. Jivkova, M. Kavehrad","doi":"10.1109/GLOCOM.2003.1258840","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258840","url":null,"abstract":"In this paper, we investigate vulnerability of a so called \"cellular\" and that of a multi-spot diffusing (MSD) multi-input-multi-output (MIMO) architecture to shadowing and its effect on communications cell size and the required transmit power. Because signal path obstruction by furniture is easier to predict and avoid, we are mainly concerned with shadowing and blockage caused by people either sitting or standing. To avoid blockage of communication link by a user of portable units, maximum radiation angle at the transmitter in both configurations must not exceed 45/spl deg/. This restricts communication cell size. We show the probability of blockage of a cellular link depends almost linearly on the distance of the portable unit from the communication cell center. Unlike cellular links, MSD-MIMO links can be designed to be robust against blockage, though still vulnerable to shadowing. In a typical office having a height of 3 m, probability of shadowing is less than 2% and in majority of cases shadowing causes less than 50% reduction in the received signal power. Power penalty due to shadowing is insignificant (less than 0.1 dB) with a 1% outage.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Mutual authentication method for ubiquitous service environments 通用服务环境的相互认证方法
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258466
M. Matsumoto, Yasushi Takagi
This paper proposes a mutual authentication method to achieve high scalability using a simple mechanism. Communication records with a corresponding node are used as a seed to generate the secret key, so mutual authentication is executed using this generated secret key. This will reduce the number of authentication keys required for mutual authentication and processing loads per user in the entire communication network. We show the validity of this proposed method by applying an assumed ubiquitous network model.
本文提出了一种通过简单机制实现高可扩展性的相互认证方法。与相应节点的通信记录用作生成密钥的种子,因此使用生成的密钥执行相互身份验证。这将减少整个通信网络中每个用户进行相互身份验证所需的身份验证密钥的数量和处理负载。我们通过一个假设的泛在网络模型证明了该方法的有效性。
{"title":"Mutual authentication method for ubiquitous service environments","authors":"M. Matsumoto, Yasushi Takagi","doi":"10.1109/GLOCOM.2003.1258466","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258466","url":null,"abstract":"This paper proposes a mutual authentication method to achieve high scalability using a simple mechanism. Communication records with a corresponding node are used as a seed to generate the secret key, so mutual authentication is executed using this generated secret key. This will reduce the number of authentication keys required for mutual authentication and processing loads per user in the entire communication network. We show the validity of this proposed method by applying an assumed ubiquitous network model.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay 具有有限往返延迟的马尔可夫信道上ARQ数据包传递延迟的精确统计
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258857
M. Rossi, L. Badia, M. Zorzi
In this paper the packet delay statistics of a fully reliable selective-repeat ARQ scheme is investigated. It is assumed that the sender continuously transmits packets whose error process is characterized by means of a two-state discrete time Markov channel. At the receiver these packets are checked for errors and ACK/NACK messages (assumed error-free) are sent back to the sender accordingly. The feedback message is known at the transmitter m channel slots (round-trip delay) after the packet transmission started. An appropriate Markov model has been developed in order to find the exact statistics of the delays experienced by ARQ packets after their first transmission.
研究了一种完全可靠的选择性重复ARQ方案的包延迟统计。假设发送端连续发送数据包,数据包的错误过程用两态离散时间马尔可夫信道表征。接收端检查这些数据包是否有错误,并相应地将ACK/NACK消息(假设没有错误)发送回发送方。在数据包传输开始后,反馈消息在发送器的m信道槽(往返延迟)上是已知的。为了找到ARQ数据包在第一次传输后所经历的延迟的确切统计数据,已经开发了一个适当的马尔可夫模型。
{"title":"Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay","authors":"M. Rossi, L. Badia, M. Zorzi","doi":"10.1109/GLOCOM.2003.1258857","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258857","url":null,"abstract":"In this paper the packet delay statistics of a fully reliable selective-repeat ARQ scheme is investigated. It is assumed that the sender continuously transmits packets whose error process is characterized by means of a two-state discrete time Markov channel. At the receiver these packets are checked for errors and ACK/NACK messages (assumed error-free) are sent back to the sender accordingly. The feedback message is known at the transmitter m channel slots (round-trip delay) after the packet transmission started. An appropriate Markov model has been developed in order to find the exact statistics of the delays experienced by ARQ packets after their first transmission.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Call admission method for call dropping probability guarantee in LEO satellite networks 低轨道卫星网络中保证掉话概率的呼叫接纳方法
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258421
Bong-Ju Lee, Young-Chon Kim
This paper proposes a new call admission control scheme considering the call dropping probability of ongoing calls in LEO satellite networks. Quality of service (QoS) provisioning of low handover failure probability is used in the proposed call admission control (CAC) scheme to guarantee predefined acceptable call dropping probability for each call. To ensure the call dropping probability the handover failure probability has been formulated using the classification of the local traffic conditions and the derivation of generation probability for the equivalent case of handover failure event. The performance of the proposed scheme has been evaluated in terms of call dropping probability and handover failure probability. The performance evaluation results have clearly shown that the proposed CAC scheme guarantees the continuity of call connections with predefined QoS levels.
本文提出了一种考虑低轨道卫星网络中正在进行的呼叫丢失概率的呼叫接纳控制方案。提出的呼叫接纳控制(CAC)方案采用低切换失败概率的服务质量(QoS)提供,保证每个呼叫预定义可接受的掉线概率。为了保证掉话概率,通过对本地话务条件的分类和对切换失败事件等效情况的生成概率的推导,建立了切换失败概率。从掉话概率和切换失败概率两方面对所提方案的性能进行了评价。性能评估结果清楚地表明,所提出的CAC方案以预定义的QoS级别保证了呼叫连接的连续性。
{"title":"Call admission method for call dropping probability guarantee in LEO satellite networks","authors":"Bong-Ju Lee, Young-Chon Kim","doi":"10.1109/GLOCOM.2003.1258421","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258421","url":null,"abstract":"This paper proposes a new call admission control scheme considering the call dropping probability of ongoing calls in LEO satellite networks. Quality of service (QoS) provisioning of low handover failure probability is used in the proposed call admission control (CAC) scheme to guarantee predefined acceptable call dropping probability for each call. To ensure the call dropping probability the handover failure probability has been formulated using the classification of the local traffic conditions and the derivation of generation probability for the equivalent case of handover failure event. The performance of the proposed scheme has been evaluated in terms of call dropping probability and handover failure probability. The performance evaluation results have clearly shown that the proposed CAC scheme guarantees the continuity of call connections with predefined QoS levels.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126701819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Termite: ad-hoc networking with stigmergy 白蚁:带有耻辱感的特别网络
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258772
Martin Roth, S. Wicker
A biologically inspired algorithm is presented to route messages in mobile wireless ad-hoc networks. The principles of swarm intelligence are used to define a probabilistic algorithm for which routing through paths of maximum throughput is an emergent property. This adaptive algorithm, dubbed termite, uses stigmergy to reduce the amount of control traffic needed to maintain a high data goodput. Stigmergy is a process by which information is indirectly communicated between individuals through their environment The termite environment is the contents of all routing tables. The movement of packets is influenced at each node, and communicating nodes observe this influence to update their own tables. Strong routing robustness is achieved through the use of multiple paths; each packet is routed randomly and independently.
提出了一种受生物学启发的移动无线自组织网络消息路由算法。利用群体智能的原理定义了一种概率算法,该算法通过最大吞吐量路径的路由是一种紧急属性。这种自适应算法被称为“白蚁”,它使用污名化来减少维持高数据质量所需的控制流量。污名化是个体间通过环境间接传递信息的过程,白蚁环境是所有路由表的内容。数据包的移动在每个节点上都受到影响,通信节点观察到这种影响来更新自己的表。通过使用多路径实现强路由鲁棒性;每个数据包都是随机和独立路由的。
{"title":"Termite: ad-hoc networking with stigmergy","authors":"Martin Roth, S. Wicker","doi":"10.1109/GLOCOM.2003.1258772","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258772","url":null,"abstract":"A biologically inspired algorithm is presented to route messages in mobile wireless ad-hoc networks. The principles of swarm intelligence are used to define a probabilistic algorithm for which routing through paths of maximum throughput is an emergent property. This adaptive algorithm, dubbed termite, uses stigmergy to reduce the amount of control traffic needed to maintain a high data goodput. Stigmergy is a process by which information is indirectly communicated between individuals through their environment The termite environment is the contents of all routing tables. The movement of packets is influenced at each node, and communicating nodes observe this influence to update their own tables. Strong routing robustness is achieved through the use of multiple paths; each packet is routed randomly and independently.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
An energy-efficient approach to securing tree-zone-based sensor networks 保护基于树区传感器网络的节能方法
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258474
Fei Hu, J. Tillett, J. Ziobro, N. Sharma
Large-scale ad hoc sensor networks (ASN), when deployed among mobile patients, can provide a dynamic data query architecture to allow the medical specialists to monitor patients at any place. We propose a low-energy, distributed, concentric-zone-based data query mechanism that has the advantages of both proactive and reactive ad hoc routing algorithms to collect medical results from large-scale mobile patients for medical specialists. In order to secure that tree-zone-based ASN, we suggest the using of key-chain to predistribute keys in each sensor. Then we further secure data fusion based on our telemedicine hierarchical architecture. We also propose a scalable global session-key generation mechanism in our tree-zone-based sensor networks.
大规模自组织传感器网络(ASN)在移动患者中部署时,可以提供动态数据查询体系结构,使医疗专家能够在任何地方监测患者。我们提出了一种低功耗、分布式、基于同心区的数据查询机制,该机制具有主动和被动自组织路由算法的优点,可以为医学专家收集大规模移动患者的医疗结果。为了确保基于树-区域的ASN,我们建议使用密钥链在每个传感器中预分发密钥。然后,基于我们的远程医疗分层体系结构进一步保护数据融合。我们还在基于树区的传感器网络中提出了一种可扩展的全局会话密钥生成机制。
{"title":"An energy-efficient approach to securing tree-zone-based sensor networks","authors":"Fei Hu, J. Tillett, J. Ziobro, N. Sharma","doi":"10.1109/GLOCOM.2003.1258474","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258474","url":null,"abstract":"Large-scale ad hoc sensor networks (ASN), when deployed among mobile patients, can provide a dynamic data query architecture to allow the medical specialists to monitor patients at any place. We propose a low-energy, distributed, concentric-zone-based data query mechanism that has the advantages of both proactive and reactive ad hoc routing algorithms to collect medical results from large-scale mobile patients for medical specialists. In order to secure that tree-zone-based ASN, we suggest the using of key-chain to predistribute keys in each sensor. Then we further secure data fusion based on our telemedicine hierarchical architecture. We also propose a scalable global session-key generation mechanism in our tree-zone-based sensor networks.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering 基于传感器网络的波束形成和动态空时聚类混合定位与目标跟踪
Pub Date : 2003-12-01 DOI: 10.1109/GLOCOM.2003.1258775
S. Phoha, N. Jacobson, D. Friedlander, R. Brooks
The severe power, time and processing constraints on ad hoc wireless sensor networks for area surveillance require in-situ adaptations to conserve resources and optimize performance. In particular, it may be necessary to make dynamic tradeoffs between centralized processing algorithms, like beamforming, and knowledge based distributed processing algorithms like dynamic space-time clustering (DSTC) that rely on local processing of raw sensor data. Beamforming methods can achieve high levels of accuracy in estimating direction of arrival with a sound wave even when the source is in the far field. Hence accurate localization can be achieved with a relatively sparse sensor network. However, beamforming has severe limitations when the number of nodes increases. It requires orders of magnitude higher energy for transporting the entire time series over the network. DSTC methods, on the other hand, work well when the number of nodes is large because clusters can be formed within a smaller space-time window. This work examines the operational domains of the two centralized and distributed algorithms by analyzing sources of error, dependence on sensor density, sensor geometries, energy usage, control logic for data processing and the effects of network topology on the two algorithms. Based on this analysis, we develop hybrid algorithms that take advantage of the operational characteristics of each one in designing a high performance sensor network.
用于区域监视的自组织无线传感器网络存在严重的功率、时间和处理限制,因此需要进行现场调整以节省资源并优化性能。特别是,可能有必要在集中式处理算法(如波束成形)和基于知识的分布式处理算法(如依赖于原始传感器数据的本地处理的动态时空聚类(DSTC))之间进行动态权衡。即使声源在远场,波束形成方法在估计声波到达方向方面也能达到很高的精度。因此,相对稀疏的传感器网络可以实现精确的定位。然而,当节点数量增加时,波束形成有严重的限制。在网络上传输整个时间序列需要更高数量级的能量。另一方面,DSTC方法在节点数量大的情况下工作得很好,因为集群可以在较小的时空窗口内形成。这项工作通过分析误差来源、对传感器密度的依赖、传感器几何形状、能源使用、数据处理的控制逻辑以及网络拓扑对两种算法的影响,检查了两种集中式和分布式算法的操作域。基于此分析,我们开发了混合算法,利用每种算法的操作特性来设计高性能传感器网络。
{"title":"Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering","authors":"S. Phoha, N. Jacobson, D. Friedlander, R. Brooks","doi":"10.1109/GLOCOM.2003.1258775","DOIUrl":"https://doi.org/10.1109/GLOCOM.2003.1258775","url":null,"abstract":"The severe power, time and processing constraints on ad hoc wireless sensor networks for area surveillance require in-situ adaptations to conserve resources and optimize performance. In particular, it may be necessary to make dynamic tradeoffs between centralized processing algorithms, like beamforming, and knowledge based distributed processing algorithms like dynamic space-time clustering (DSTC) that rely on local processing of raw sensor data. Beamforming methods can achieve high levels of accuracy in estimating direction of arrival with a sound wave even when the source is in the far field. Hence accurate localization can be achieved with a relatively sparse sensor network. However, beamforming has severe limitations when the number of nodes increases. It requires orders of magnitude higher energy for transporting the entire time series over the network. DSTC methods, on the other hand, work well when the number of nodes is large because clusters can be formed within a smaller space-time window. This work examines the operational domains of the two centralized and distributed algorithms by analyzing sources of error, dependence on sensor density, sensor geometries, energy usage, control logic for data processing and the effects of network topology on the two algorithms. Based on this analysis, we develop hybrid algorithms that take advantage of the operational characteristics of each one in designing a high performance sensor network.","PeriodicalId":301154,"journal":{"name":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1