首页 > 最新文献

2008 The Fourth International Conference on Wireless and Mobile Communications最新文献

英文 中文
a-Coverage Scheme for Wireless Sensor Networks a-无线传感器网络覆盖方案
M. Lehsaini, H. Guyennet, M. Feham
The problem of prolonging system lifetime in wireless sensor networks (WSNs) while guaranteeing the entire coverage of the interest zone is very challenging mainly due to constraint-energy of sensors that composed these networks. In most applications, system lifetime is defined as the time elapsed until the last sensor dies. However, this evaluation should not be used in some critical applications such as intrusion detection and surveillance applications, where coverage ratio must be raised enough. Thus, to fulfill successfully the objective of deploying WSNs for these types of applications, it is often required that ratio of alive sensors should be higher than a certain value alpha-coverage. In this paper, we propose an efficient alpha-coverage scheme to maximize the ratio of alive sensors that is necessary to guarantee the entire coverage of the interest region. This scheme is based on substantial performance gains of scheduling and broad casting solutions proposed to prolong system lifetime in WSNs. Simulation results show that our scheme prolongs considerably network lifetime when compared with LEACH [1] and LEACH-C [2].
由于构成无线传感器网络的传感器具有约束能量,因此在保证兴趣区域全覆盖的同时延长系统寿命是一个非常具有挑战性的问题。在大多数应用中,系统生命周期被定义为直到最后一个传感器失效所经过的时间。但是,在一些关键的应用中,如入侵检测和监视应用中,不应使用这种评估方法,这些应用必须提高覆盖率。因此,为了成功实现为这些类型的应用部署wsn的目标,通常要求活动传感器的比率应高于某个值α -覆盖率。在本文中,我们提出了一种有效的α -覆盖方案,以最大化活传感器的比例,这是保证整个感兴趣区域覆盖所必需的。该方案是基于无线传感器网络中为延长系统寿命而提出的调度和播播方案的性能提升。仿真结果表明,与LEACH[1]和LEACH- c[2]相比,我们的方案大大延长了网络寿命。
{"title":"a-Coverage Scheme for Wireless Sensor Networks","authors":"M. Lehsaini, H. Guyennet, M. Feham","doi":"10.1109/ICWMC.2008.67","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.67","url":null,"abstract":"The problem of prolonging system lifetime in wireless sensor networks (WSNs) while guaranteeing the entire coverage of the interest zone is very challenging mainly due to constraint-energy of sensors that composed these networks. In most applications, system lifetime is defined as the time elapsed until the last sensor dies. However, this evaluation should not be used in some critical applications such as intrusion detection and surveillance applications, where coverage ratio must be raised enough. Thus, to fulfill successfully the objective of deploying WSNs for these types of applications, it is often required that ratio of alive sensors should be higher than a certain value alpha-coverage. In this paper, we propose an efficient alpha-coverage scheme to maximize the ratio of alive sensors that is necessary to guarantee the entire coverage of the interest region. This scheme is based on substantial performance gains of scheduling and broad casting solutions proposed to prolong system lifetime in WSNs. Simulation results show that our scheme prolongs considerably network lifetime when compared with LEACH [1] and LEACH-C [2].","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115514198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Procedure for Coupling QoS Control and Handover Decision for Mobility Management 一种移动管理中QoS控制与切换决策耦合的新方法
A. Zouari, L. Suciu, J. Bonnin, K. Guillouard
Providing QoS for nomadic hosts remains a critical issue since new emerging wireless technologies may present different behaviours in terms of QoS, security or cost. Within this heterogeneous environment, especially if a handover occurs, keeping the same QoS level for one application may require some methods to negotiate the QoS provided in each network. In this paper, we propose to adopt a proactive and dynamic negotiation approach coupled with the handover decision algorithm implemented. This method is compared to two existing solutions developed in the Daidalos IST project and in the Ambient Network IST project.
为流浪主机提供QoS仍然是一个关键问题,因为新兴的无线技术可能在QoS、安全性或成本方面表现出不同的行为。在这种异构环境中,特别是在发生切换时,为一个应用程序保持相同的QoS级别可能需要一些方法来协商每个网络中提供的QoS。在本文中,我们提出了一种主动和动态的协商方法,并实现了切换决策算法。该方法与Daidalos IST项目和Ambient Network IST项目中开发的两种现有解决方案进行了比较。
{"title":"A Novel Procedure for Coupling QoS Control and Handover Decision for Mobility Management","authors":"A. Zouari, L. Suciu, J. Bonnin, K. Guillouard","doi":"10.1109/ICWMC.2008.28","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.28","url":null,"abstract":"Providing QoS for nomadic hosts remains a critical issue since new emerging wireless technologies may present different behaviours in terms of QoS, security or cost. Within this heterogeneous environment, especially if a handover occurs, keeping the same QoS level for one application may require some methods to negotiate the QoS provided in each network. In this paper, we propose to adopt a proactive and dynamic negotiation approach coupled with the handover decision algorithm implemented. This method is compared to two existing solutions developed in the Daidalos IST project and in the Ambient Network IST project.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Joint Probability Density Function of the SSC Combiner Output Signal in the Presence of Nakagami-m Fading 存在Nakagami-m衰落时SSC合成器输出信号的联合概率密度函数
D. Krstić, P. Nikolic, M. Matović, A. Matovic, M. Stefanovic
In this paper the probability density function of the SSC combiner output signal at one time instant and the joint probability density function of the SSC combiner output signal at two time instants are determined. Switch and stay combining (SSC) is considered. The presence of the Nakagami-m fading at the input is observed. The results are shown graphically for different variance values and decision threshold values.
本文确定了SSC合成器在一个时刻输出信号的概率密度函数和SSC合成器在两个时刻输出信号的联合概率密度函数。考虑切换和停留组合(SSC)。在输入端观察到中加米衰落的存在。对于不同的方差值和决策阈值,结果以图形方式显示。
{"title":"The Joint Probability Density Function of the SSC Combiner Output Signal in the Presence of Nakagami-m Fading","authors":"D. Krstić, P. Nikolic, M. Matović, A. Matovic, M. Stefanovic","doi":"10.1109/ICWMC.2008.75","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.75","url":null,"abstract":"In this paper the probability density function of the SSC combiner output signal at one time instant and the joint probability density function of the SSC combiner output signal at two time instants are determined. Switch and stay combining (SSC) is considered. The presence of the Nakagami-m fading at the input is observed. The results are shown graphically for different variance values and decision threshold values.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coupling Reduction for Collocated Antennas on MIMO Systems MIMO系统中并置天线的耦合减小
S. Georgakopoulos
Cavity-backed slot (CBS) antennas are commonly used in earth-based and space-borne MIMO systems. Coupling between antennas degrades the performance of MIMO systems. Therefore, it is desirable to minimize the coupling between antennas used on MIMO systems. In this paper, the finite-difference time-domain (FDTD) method is used to analyze antenna coupling with emphasis on different methods to reduce coupling. Specifically, coupling reduction is attempted using lossy material superstrates or ground plane discontinuities, such as slits.
空腔槽(CBS)天线通常用于地基和星载MIMO系统。天线间的耦合会降低MIMO系统的性能。因此,尽量减少MIMO系统中天线间的耦合是可取的。本文采用时域有限差分(FDTD)方法对天线耦合进行了分析,重点介绍了减少天线耦合的不同方法。具体地说,耦合减少是尝试使用损耗材料的上覆层或地平面不连续,如缝隙。
{"title":"Coupling Reduction for Collocated Antennas on MIMO Systems","authors":"S. Georgakopoulos","doi":"10.1109/ICWMC.2008.22","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.22","url":null,"abstract":"Cavity-backed slot (CBS) antennas are commonly used in earth-based and space-borne MIMO systems. Coupling between antennas degrades the performance of MIMO systems. Therefore, it is desirable to minimize the coupling between antennas used on MIMO systems. In this paper, the finite-difference time-domain (FDTD) method is used to analyze antenna coupling with emphasis on different methods to reduce coupling. Specifically, coupling reduction is attempted using lossy material superstrates or ground plane discontinuities, such as slits.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134259885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stochastic Performance Analysis of Multi-radio Multi-channel Wireless Mesh Networks 多无线电多信道无线Mesh网络的随机性能分析
Chengzhi Li, Wei Zhao
In this paper, we investigate wireless communications over multi-radio and multi-channel wireless mesh networks with IEEE 802.11e based ingress access points for local clients. We develop a theoretical model for stochastic performance analysis for real-time applications over such wireless mesh networks with wideband fading channels in various environments.
在本文中,我们研究了基于IEEE 802.11e的本地客户端入口接入点在多无线电和多通道无线网状网络上的无线通信。我们开发了一个理论模型,用于在各种环境下具有宽带衰落信道的无线网状网络上的实时应用的随机性能分析。
{"title":"Stochastic Performance Analysis of Multi-radio Multi-channel Wireless Mesh Networks","authors":"Chengzhi Li, Wei Zhao","doi":"10.1109/ICWMC.2008.39","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.39","url":null,"abstract":"In this paper, we investigate wireless communications over multi-radio and multi-channel wireless mesh networks with IEEE 802.11e based ingress access points for local clients. We develop a theoretical model for stochastic performance analysis for real-time applications over such wireless mesh networks with wideband fading channels in various environments.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Ad Hoc Communication Networks: Capacity Analysis and Design 移动自组织通信网络:容量分析与设计
L. Kant, E. van den Berg, K. Krishnan
Known for their capability of being deployed 'on the fly', and resilience to dynamically 'heal' around failed network elements, wireless mobile ad hoc networks (MANETs) are gaining widespread momentum both in the commercial and military sectors. The success of MANETs is however critically tied to the amount of network capacity available to transport a wide spectrum of applications that the MANETs are expected to transport. While capacity analysis in MANETs is in itself a challenging topic, the constraints imposed by realistic MANETs of the types envisioned in disaster areas and/or military environments complicates the analysis further. Our focus in this paper is to provide insights to the critical and challenging topic: MANET capacity analysis in networks with heterogeneous links and traffic demands. By employing formal analytic techniques, we develop a framework to assess information exchange feasibility with a focus on capacity (bandwidth) requirements. Additionally, we present a mobile ad hoc network capacity analysis tool that can be used to both design MANETs to support a given mission and analyze performance of a MANET for a specified mission.
无线移动自组织网络(manet)以其“在飞行中”部署的能力和动态“修复”故障网络元素的弹性而闻名,在商业和军事领域都获得了广泛的发展势头。然而,manet的成功关键取决于可用于传输广泛应用的网络容量,而manet有望传输这些应用。虽然manet的能力分析本身就是一个具有挑战性的主题,但在灾区和/或军事环境中设想的实际manet类型所施加的限制使分析进一步复杂化。我们在本文中的重点是提供对关键和具有挑战性的主题的见解:具有异构链路和流量需求的网络中的MANET容量分析。通过采用形式化分析技术,我们开发了一个框架来评估信息交换的可行性,重点关注容量(带宽)需求。此外,我们提出了一个移动自组织网络容量分析工具,可用于设计MANET以支持给定任务和分析特定任务的MANET性能。
{"title":"Mobile Ad Hoc Communication Networks: Capacity Analysis and Design","authors":"L. Kant, E. van den Berg, K. Krishnan","doi":"10.1109/ICWMC.2008.48","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.48","url":null,"abstract":"Known for their capability of being deployed 'on the fly', and resilience to dynamically 'heal' around failed network elements, wireless mobile ad hoc networks (MANETs) are gaining widespread momentum both in the commercial and military sectors. The success of MANETs is however critically tied to the amount of network capacity available to transport a wide spectrum of applications that the MANETs are expected to transport. While capacity analysis in MANETs is in itself a challenging topic, the constraints imposed by realistic MANETs of the types envisioned in disaster areas and/or military environments complicates the analysis further. Our focus in this paper is to provide insights to the critical and challenging topic: MANET capacity analysis in networks with heterogeneous links and traffic demands. By employing formal analytic techniques, we develop a framework to assess information exchange feasibility with a focus on capacity (bandwidth) requirements. Additionally, we present a mobile ad hoc network capacity analysis tool that can be used to both design MANETs to support a given mission and analyze performance of a MANET for a specified mission.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"196 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114000864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative Driving Support System in Mobile Pervasive Environments 移动普适环境下的协同驾驶支持系统
Nevin Vunka Jungum, Razvi Doomun, Soulakshmee D. Ghurbhurrun, S. Pudaruth
The Bluetooth protocol can be used for inter-vehicle communication equipped with Bluetooth devices. This work investigates the challenges and feasibility of developing intelligent driving system providing time-sensitive information about traffic conditions and roadside facilities. The architecture for collaborative vehicle communication system is presented using the concepts of wireless networks and Bluetooth protocol. We discuss how vehicles can form mobile ad-hoc networks and exchange data by the on-board Bluetooth sensors. The key design concepts of the intelligent driving service infrastructure are analyzed showing collaborative fusion of multiple positional data could give a better understanding of the surrounding traffic conditions for collaborative driving. The technical feasibility of using Bluetooth for data exchange among moving vehicles is evaluated.
蓝牙协议可用于配备蓝牙设备的车辆间通信。这项工作探讨了开发智能驾驶系统的挑战和可行性,该系统提供有关交通状况和路边设施的时间敏感信息。利用无线网络和蓝牙协议的概念,提出了协同车载通信系统的体系结构。我们讨论了车辆如何通过车载蓝牙传感器形成移动自组织网络并交换数据。分析了智能驾驶服务基础设施的关键设计理念,表明多位置数据的协同融合可以更好地了解周围交通状况,从而实现协同驾驶。评估了在移动车辆之间使用蓝牙进行数据交换的技术可行性。
{"title":"Collaborative Driving Support System in Mobile Pervasive Environments","authors":"Nevin Vunka Jungum, Razvi Doomun, Soulakshmee D. Ghurbhurrun, S. Pudaruth","doi":"10.1109/ICWMC.2008.58","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.58","url":null,"abstract":"The Bluetooth protocol can be used for inter-vehicle communication equipped with Bluetooth devices. This work investigates the challenges and feasibility of developing intelligent driving system providing time-sensitive information about traffic conditions and roadside facilities. The architecture for collaborative vehicle communication system is presented using the concepts of wireless networks and Bluetooth protocol. We discuss how vehicles can form mobile ad-hoc networks and exchange data by the on-board Bluetooth sensors. The key design concepts of the intelligent driving service infrastructure are analyzed showing collaborative fusion of multiple positional data could give a better understanding of the surrounding traffic conditions for collaborative driving. The technical feasibility of using Bluetooth for data exchange among moving vehicles is evaluated.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123946120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Portable Wireless-Based Architecture for Solving Minimum Digital Divide Problems 一种解决最小数字鸿沟问题的便携式无线架构
G. Fenu, L. Piras
In today's society digital services have become the key to the success of anyone. Hence, for being competitive it is important that these services are available, employ the latest technology and are low cost. Unfortunately, it often happens that these good intentions do not correspond to reality. In this paper an information system is proposed, targeted at those small realities affected by the digital divide and at those companies that employ out of date, high cost technologies, that provides data and voice services in a unified manner using heterogeneous devices. The system utilizes innovative technologies, in particular wireless technology, to deliver low cost solutions. The distinctive feature is that it does not depend on the network hardware infrastructure and the underlying platform. Furthermore, it deals with the configuration, accounting, security, management, and monitoring aspects while maintaining its flexibility and simplicity of use both for the administrator and end user.
在当今社会,数字服务已成为任何人成功的关键。因此,为了保持竞争力,重要的是这些服务是可用的,采用最新的技术和低成本。不幸的是,这些良好的意图往往与现实不符。本文提出了一种信息系统,针对那些受数字鸿沟影响的小现实和那些采用过时、高成本技术的公司,使用异构设备以统一的方式提供数据和语音服务。该系统利用创新技术,特别是无线技术,提供低成本的解决方案。它的显著特点是不依赖于网络硬件基础设施和底层平台。此外,它还处理配置、记帐、安全、管理和监视方面的问题,同时为管理员和最终用户保持灵活性和简单性。
{"title":"A Portable Wireless-Based Architecture for Solving Minimum Digital Divide Problems","authors":"G. Fenu, L. Piras","doi":"10.1109/ICWMC.2008.21","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.21","url":null,"abstract":"In today's society digital services have become the key to the success of anyone. Hence, for being competitive it is important that these services are available, employ the latest technology and are low cost. Unfortunately, it often happens that these good intentions do not correspond to reality. In this paper an information system is proposed, targeted at those small realities affected by the digital divide and at those companies that employ out of date, high cost technologies, that provides data and voice services in a unified manner using heterogeneous devices. The system utilizes innovative technologies, in particular wireless technology, to deliver low cost solutions. The distinctive feature is that it does not depend on the network hardware infrastructure and the underlying platform. Furthermore, it deals with the configuration, accounting, security, management, and monitoring aspects while maintaining its flexibility and simplicity of use both for the administrator and end user.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Probabilistic Based Approach to Improve the Performance and Efficiency of AODV Protocol 一种提高AODV协议性能和效率的概率方法
N. Mishra, M. Ansari, S. Tapaswi
In recent years, various routing protocols have been proposed for ad hoc networks. Most of these protocols are based upon simulation and security. These protocols still lack in terms of performance efficiency of routing protocols such as avoidance of route breaking, sensing of breakage in route, security and reliability (basically authentication of mobile hops in the real ad hoc networks. i.e. during data packets transmission, if link is disconnected or lost then in place of retransmission or reestablishment of route, node/router focused on using the best available route which forwards data packets through hops/nodes). The paper presents an approach in which, each node communicates to its' surrounding nodes/routers with calculated probability, and reduces the overhead of the routing protocols. In the proposed approach, the routing tables based upon calculated probability are being maintained. This enables to select the most optimal path for transmitting the data packets by sensing the breaking of route so that it can avoid the broken route and simultaneously authenticate the hops/nodes. Routes are executed in which all nodes' communication depend on the probability and the topology of the network, i.e. it helps to detect the mobility of nodes. By using probabilistic approach, we are adding significant improvement onstandard metrics of AODV protocols. We are using a new recent modeling formalism, called the omega-calculus, which will naturally and succinctly model our proposed protocol, and is able to make the routing tables based upon probabilistic approach, sensing of neighbors, detects and maintains the table due to mobility of nodes, authentication of new nodes, and listing of broadcasts and unicast.
近年来,针对ad hoc网络提出了各种路由协议。这些协议大多是基于仿真和安全性的。这些协议在路由协议的性能效率方面,如避免路由中断、感知路由中断、安全性和可靠性(基本是对真实ad hoc网络中移动跳点的认证)方面还存在不足。例如,在数据包传输过程中,如果链路断开或丢失,那么在重新传输或重新建立路由的地方,节点/路由器专注于使用通过跳/节点转发数据包的最佳可用路由。本文提出了一种每个节点以计算概率与周围节点/路由器通信的方法,减少了路由协议的开销。在该方法中,基于计算概率的路由表被维护。通过感知路由的中断,选择最优的路径传输数据包,从而避免路由中断,同时对跳数/节点进行认证。执行路由时,所有节点的通信依赖于网络的概率和拓扑结构,也就是说,它有助于检测节点的移动性。通过使用概率方法,我们对AODV协议的标准度量进行了显著改进。我们正在使用一种新的建模形式,称为omega-calculus,它将自然而简洁地对我们提出的协议进行建模,并且能够基于概率方法制作路由表,感知邻居,由于节点的移动而检测和维护表,新节点的身份验证,以及广播和单播列表。
{"title":"A Probabilistic Based Approach to Improve the Performance and Efficiency of AODV Protocol","authors":"N. Mishra, M. Ansari, S. Tapaswi","doi":"10.1109/ICWMC.2008.14","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.14","url":null,"abstract":"In recent years, various routing protocols have been proposed for ad hoc networks. Most of these protocols are based upon simulation and security. These protocols still lack in terms of performance efficiency of routing protocols such as avoidance of route breaking, sensing of breakage in route, security and reliability (basically authentication of mobile hops in the real ad hoc networks. i.e. during data packets transmission, if link is disconnected or lost then in place of retransmission or reestablishment of route, node/router focused on using the best available route which forwards data packets through hops/nodes). The paper presents an approach in which, each node communicates to its' surrounding nodes/routers with calculated probability, and reduces the overhead of the routing protocols. In the proposed approach, the routing tables based upon calculated probability are being maintained. This enables to select the most optimal path for transmitting the data packets by sensing the breaking of route so that it can avoid the broken route and simultaneously authenticate the hops/nodes. Routes are executed in which all nodes' communication depend on the probability and the topology of the network, i.e. it helps to detect the mobility of nodes. By using probabilistic approach, we are adding significant improvement onstandard metrics of AODV protocols. We are using a new recent modeling formalism, called the omega-calculus, which will naturally and succinctly model our proposed protocol, and is able to make the routing tables based upon probabilistic approach, sensing of neighbors, detects and maintains the table due to mobility of nodes, authentication of new nodes, and listing of broadcasts and unicast.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks SEEEP:简单有效的端到端协议,以保护Ad Hoc网络免受虫洞攻击
S. Khurana, Neelima Gupta
In this paper, we present a very simple and efficient end to-end algorithm to handle wormhole attacks on ad hoc networks. We provide a lower bound on the minimum number of hops on a good route. Any path showing lesser hop counts is shown to be under attack. Our algorithm requires every node to know its location. With very accurate GPS available, this assumption is not unreasonable. Since our protocol does not require speed or time, we do not need clock synchronization. In the absence of any error in the location, there are no false alarms i.e. no good paths are discarded. We have shown that the effect of error in the location information is negligible. The storage and computation overhead is low. For a path of length l, it takes only O(l) space and time which is less as compared to other end-to-end algorithms like Wang etal [8]. Their algorithm uses O(lm) storage and O(lm2) computation time, where m is the number of packets examined. Since their protocol uses speed to detect wormholes, they assume the clocks to be loosely synchronized.
在本文中,我们提出了一个非常简单和有效的端到端算法来处理自组织网络上的虫洞攻击。我们给出了一条好路由的最小跳数的下界。任何显示较少跳数的路径都被认为受到攻击。我们的算法要求每个节点知道它的位置。有了非常精确的GPS,这种假设并非不合理。由于我们的协议不需要速度或时间,因此我们不需要时钟同步。在位置没有任何错误的情况下,没有假警报,即没有丢弃好的路径。我们已经证明,位置信息中的误差的影响是可以忽略不计的。存储和计算开销低。对于长度为l的路径,只需要O(l)的空间和时间,这比Wang等[8]等其他端到端算法要少。他们的算法使用O(lm)存储和O(lm2)计算时间,其中m是检查的数据包数量。由于他们的协议使用速度来检测虫洞,他们假设时钟是松散同步的。
{"title":"SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks","authors":"S. Khurana, Neelima Gupta","doi":"10.1002/sec.272","DOIUrl":"https://doi.org/10.1002/sec.272","url":null,"abstract":"In this paper, we present a very simple and efficient end to-end algorithm to handle wormhole attacks on ad hoc networks. We provide a lower bound on the minimum number of hops on a good route. Any path showing lesser hop counts is shown to be under attack. Our algorithm requires every node to know its location. With very accurate GPS available, this assumption is not unreasonable. Since our protocol does not require speed or time, we do not need clock synchronization. In the absence of any error in the location, there are no false alarms i.e. no good paths are discarded. We have shown that the effect of error in the location information is negligible. The storage and computation overhead is low. For a path of length l, it takes only O(l) space and time which is less as compared to other end-to-end algorithms like Wang etal [8]. Their algorithm uses O(lm) storage and O(lm2) computation time, where m is the number of packets examined. Since their protocol uses speed to detect wormholes, they assume the clocks to be loosely synchronized.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2008 The Fourth International Conference on Wireless and Mobile Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1