The need for efficient design of wireless LANs coverage and quality becomes an important issue due to their increasing deployments. Planning problems of WLAN require computation of a coverage map that satisfies signal level constraints and it is based on an accurate propagation model. Many indoor propagation models have been proposed in literature and can be classified into empirical and deterministic propagation ones. Radiosity has been introduced a couple of years ago as a new model for indoor propagation prediction. This method requires a huge computer memory and CPU processing. In this paper, we present two-dimension radiosity which helps save time and memory space. An implementation of this method is done to evaluate its performance, and then compared to results derived from real measurement processing.
{"title":"2D-Hierarchical Radiosity Model for Indoor Propagation Prediction","authors":"N. Torjemen, M. Ayadi, S. Tabbane","doi":"10.1109/ICWMC.2008.29","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.29","url":null,"abstract":"The need for efficient design of wireless LANs coverage and quality becomes an important issue due to their increasing deployments. Planning problems of WLAN require computation of a coverage map that satisfies signal level constraints and it is based on an accurate propagation model. Many indoor propagation models have been proposed in literature and can be classified into empirical and deterministic propagation ones. Radiosity has been introduced a couple of years ago as a new model for indoor propagation prediction. This method requires a huge computer memory and CPU processing. In this paper, we present two-dimension radiosity which helps save time and memory space. An implementation of this method is done to evaluate its performance, and then compared to results derived from real measurement processing.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The basic DiffServ model lacks the mechanism to prevent itself from being overload; it does not have any capability to inform the edge nodes about the internal traffic load in the network. Thus, injecting more QoS sensitive traffic into the network will not only degrade the performance of the current flow but it will also degrade the performance of already established flows. In this research paper we present an admission control mechanism that establishes QoS enabled Label Switched Paths in-order to provide rigorous QoS provisioning within the DiffServ enabled mobile ad-hoc network. We have presented a scheme that works by merging the signaling overhead with routing. We have performed extensive simulations to measure the effectiveness of our presented idea and we have observed that our scheme meets stringent QoS requirements of real time flows compared to some existent QoS models. Each admitted flow gets low delay, low jitter and almost guaranteed bandwidth. We have also observed that in most of the cases our scheme provides load balancing if multiple path exists to the destination.
{"title":"Stateless and Controlled Reservation Based DiffServ Model for Mobile Ad Hoc Networks","authors":"M.O. Farooq, S. Aziz","doi":"10.1109/ICWMC.2008.72","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.72","url":null,"abstract":"The basic DiffServ model lacks the mechanism to prevent itself from being overload; it does not have any capability to inform the edge nodes about the internal traffic load in the network. Thus, injecting more QoS sensitive traffic into the network will not only degrade the performance of the current flow but it will also degrade the performance of already established flows. In this research paper we present an admission control mechanism that establishes QoS enabled Label Switched Paths in-order to provide rigorous QoS provisioning within the DiffServ enabled mobile ad-hoc network. We have presented a scheme that works by merging the signaling overhead with routing. We have performed extensive simulations to measure the effectiveness of our presented idea and we have observed that our scheme meets stringent QoS requirements of real time flows compared to some existent QoS models. Each admitted flow gets low delay, low jitter and almost guaranteed bandwidth. We have also observed that in most of the cases our scheme provides load balancing if multiple path exists to the destination.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shinsuke Kajioka, N. Wakamiya, Masayuki Murata, Hiroki Satoh, K. Monden, Masato Hayashi, S. Matsui
Without any control mechanism, a wireless ad-hoc network is easily congested and the perceived quality of applications considerably deteriorates. Therefore, we need QoS control mechanisms to accommodate real-time multimedia application such as video conferencing, VoIP (voice over IP), and remote monitoring while satisfying application QoS requirements. In this paper, we propose a new routing mechanism to support real-time multimedia communication by efficiently utilize the limited wireless network capacity. Our mechanism considers a wireless ad-hoc network composed of nodes equipped with multiple network interfaces to each of which a different wireless channel can be assigned. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Then, a source node determines a logical path on which application QoS requirements are satisfied. Through experiments on a simulator, our mechanism could achieve the packet delivery ratio of about 95 % at the end-to-end delay of about 10 ms. In addition, real-time traffic was more evenly distributed over the whole network.
如果没有任何控制机制,无线自组织网络很容易拥塞,应用程序的感知质量也会大大降低。因此,我们需要QoS控制机制来适应实时多媒体应用,如视频会议、VoIP (voice over IP)和远程监控,同时满足应用的QoS要求。本文提出了一种新的路由机制,通过有效地利用有限的无线网络容量来支持实时多媒体通信。我们的机制考虑了一个由节点组成的无线自组织网络,这些节点配备了多个网络接口,每个接口都可以分配不同的无线信道。通过在OLSRv2的控制消息中嵌入有关信道使用情况的信息,每个节点可以获得全网的拓扑视图和带宽信息。然后,源节点确定满足应用程序QoS要求的逻辑路径。通过仿真实验,我们的机制在端到端延迟约10 ms的情况下,可以实现95%左右的数据包传输率。此外,实时流量在整个网络中的分布更加均匀。
{"title":"Proposal, Implementation, and Evaluation of a QoS-Aware Routing Mechanism for Multi-channel Multi-interface Ad-Hoc Networks","authors":"Shinsuke Kajioka, N. Wakamiya, Masayuki Murata, Hiroki Satoh, K. Monden, Masato Hayashi, S. Matsui","doi":"10.1109/ICWMC.2008.37","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.37","url":null,"abstract":"Without any control mechanism, a wireless ad-hoc network is easily congested and the perceived quality of applications considerably deteriorates. Therefore, we need QoS control mechanisms to accommodate real-time multimedia application such as video conferencing, VoIP (voice over IP), and remote monitoring while satisfying application QoS requirements. In this paper, we propose a new routing mechanism to support real-time multimedia communication by efficiently utilize the limited wireless network capacity. Our mechanism considers a wireless ad-hoc network composed of nodes equipped with multiple network interfaces to each of which a different wireless channel can be assigned. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Then, a source node determines a logical path on which application QoS requirements are satisfied. Through experiments on a simulator, our mechanism could achieve the packet delivery ratio of about 95 % at the end-to-end delay of about 10 ms. In addition, real-time traffic was more evenly distributed over the whole network.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A twofold multilevel concatenated coding scheme is proposed. The multilevel coding structure is based on set partitioning of an expanded set of interlevel-correlated multilevel coset codes. We can design a variety of binary linear block codes with high coding gain and low decoding complexity.
{"title":"Twofold Constructions of Multilevel Coset Codes","authors":"Shang-Chih Ma","doi":"10.1109/ICWMC.2008.13","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.13","url":null,"abstract":"A twofold multilevel concatenated coding scheme is proposed. The multilevel coding structure is based on set partitioning of an expanded set of interlevel-correlated multilevel coset codes. We can design a variety of binary linear block codes with high coding gain and low decoding complexity.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Okubo et al. proposed a hash-chain based authentication protocol which protects users' location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular automata chaining technique is adopted composed only of logical bitwise operations, in order to maintain both security guarantees and a low-cost construction.
{"title":"CA Based RFID Authentication Protocol for Privacy and Anonymity","authors":"Kang-Joong Seo, J. Jeon, Sang-Ho Shin, K. Yoo","doi":"10.1109/ICWMC.2008.32","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.32","url":null,"abstract":"Okubo et al. proposed a hash-chain based authentication protocol which protects users' location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular automata chaining technique is adopted composed only of logical bitwise operations, in order to maintain both security guarantees and a low-cost construction.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the last few years the number of services for mobile devices that are connected to the internet via UMTS or wireless 802.11 hotspots has grown tremendously. However, only a small proportion of these applications or services, has been successfully adopted and none has yet turned out to be the hoped-for killer application. We believe that context-sensitive service discovery is the key success factor for mobile applications and could have the same impact and level of success as search engines on desktop computers. Keyword-based searches using typical search engines or portals for browsing services with a mobile device often do not provide satisfying results within a reasonable period of time and they are cumbersome to use because of the restricted and limited input capabilities of mobile devices. In this paper we present a hybrid service discovery approach that uses context information to reduce human device interaction and delivers precise, personalized search results for service requests in a changing environment.
{"title":"Context-Sensitive Service Discovery for Mobile Commerce Applications","authors":"C. Atkinson, P. Bostan, T. Butter","doi":"10.1109/ICWMC.2008.33","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.33","url":null,"abstract":"Over the last few years the number of services for mobile devices that are connected to the internet via UMTS or wireless 802.11 hotspots has grown tremendously. However, only a small proportion of these applications or services, has been successfully adopted and none has yet turned out to be the hoped-for killer application. We believe that context-sensitive service discovery is the key success factor for mobile applications and could have the same impact and level of success as search engines on desktop computers. Keyword-based searches using typical search engines or portals for browsing services with a mobile device often do not provide satisfying results within a reasonable period of time and they are cumbersome to use because of the restricted and limited input capabilities of mobile devices. In this paper we present a hybrid service discovery approach that uses context information to reduce human device interaction and delivers precise, personalized search results for service requests in a changing environment.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper addresses mobile service provisioning in a mobile supported sensor network. The challenges of secure service provisioning in such a network is tackled through a two-layer approach, using the encryption on the radio layer and policies for device capabilities and service access. This paper suggests the mobile phone acting as control centre for the sensors. The implementation is based on a distributed semantic service repository, allowing the mobile services to become part of a semantic service composition. The semantic policy server connects the device capabilities, the user preferences and the service functionality. The papers provides the functional architecture and implementations of key elements of this architecture.
{"title":"Integrating Mobile Devices into Semantic Services Environments","authors":"Josef Noll, Sarfraz Alam, M. Chowdhury","doi":"10.1109/ICWMC.2008.77","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.77","url":null,"abstract":"This paper addresses mobile service provisioning in a mobile supported sensor network. The challenges of secure service provisioning in such a network is tackled through a two-layer approach, using the encryption on the radio layer and policies for device capabilities and service access. This paper suggests the mobile phone acting as control centre for the sensors. The implementation is based on a distributed semantic service repository, allowing the mobile services to become part of a semantic service composition. The semantic policy server connects the device capabilities, the user preferences and the service functionality. The papers provides the functional architecture and implementations of key elements of this architecture.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor nodes are made up of small electronic devices which are capable of sensing, computing and transmitting data from harsh physical environments. These sensor nodes depend on batteries for energy, which get depleted at a fast rate because of the computation and communication operations these nodes have to perform. A well designed MAC (Medium Access Control) protocol can prolong the network life. A set of previously reported MAC layer protocols has abilities to achieve some energy efficiency. In this paper, we first describe some assumptions made for the specific application area of surveillance applications. Then, we compare a set of MAC protocols in terms of their suitability to be used in wireless sensor networks for this type of applications. In addition to energy efficiency, keeping the delays reasonably low is a crucial factor when sensing and reporting an event.
{"title":"Wireless Sensor Networks for Surveillance Applications – A Comparative Survey of MAC Protocols","authors":"Mahmood Ali, Annette Böhm, Magnus Jonsson","doi":"10.1109/ICWMC.2008.53","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.53","url":null,"abstract":"Wireless sensor nodes are made up of small electronic devices which are capable of sensing, computing and transmitting data from harsh physical environments. These sensor nodes depend on batteries for energy, which get depleted at a fast rate because of the computation and communication operations these nodes have to perform. A well designed MAC (Medium Access Control) protocol can prolong the network life. A set of previously reported MAC layer protocols has abilities to achieve some energy efficiency. In this paper, we first describe some assumptions made for the specific application area of surveillance applications. Then, we compare a set of MAC protocols in terms of their suitability to be used in wireless sensor networks for this type of applications. In addition to energy efficiency, keeping the delays reasonably low is a crucial factor when sensing and reporting an event.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132645983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clemens Holzmann, A. Ferscha, M. Hechinger, Johannes Kepler, Andreas Zeidler, M. D. S. Rocha
The invisible integration of technology in literally everything, which is the fundamental of research on pervasive and ubiquitous computing, leads to huge quantities of smart objects which are distributed in physical space. They should operate autonomously, namely with as little human intervention as possible, and interact with humans in a more implicit way. Spatial properties and relations are important context information in this regard, as they allow them to automatically adapt to spatial changes in their environment in a semantically meaningful way. We propose novel concepts and a framework for exploiting qualitative abstractions of relationships between smart objects, which are specific to an application domain and facilitate the development of spatially-aware applications, and demonstrate their use with four industrial application scenarios.
{"title":"Using Spatial Abstractions in Industrial Environments","authors":"Clemens Holzmann, A. Ferscha, M. Hechinger, Johannes Kepler, Andreas Zeidler, M. D. S. Rocha","doi":"10.1109/ICWMC.2008.30","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.30","url":null,"abstract":"The invisible integration of technology in literally everything, which is the fundamental of research on pervasive and ubiquitous computing, leads to huge quantities of smart objects which are distributed in physical space. They should operate autonomously, namely with as little human intervention as possible, and interact with humans in a more implicit way. Spatial properties and relations are important context information in this regard, as they allow them to automatically adapt to spatial changes in their environment in a semantically meaningful way. We propose novel concepts and a framework for exploiting qualitative abstractions of relationships between smart objects, which are specific to an application domain and facilitate the development of spatially-aware applications, and demonstrate their use with four industrial application scenarios.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The unplanned and random deployment of a Wireless Sensor Network (WSN) may impose a high node density on a specific region. This concentration can be exploited by density control mechanisms to increase network lifetime, by deactivating temporarily redundant sensor nodes. Previous approaches for density control in WSN focus in guaranteeing full sensing coverage of monitoring area. This work presents a new data-centric approach where density control is performed to increase network lifetime preserving precision of sampled data. Using statistical techniques, density is determined according to sampling. The results show that this approach achieved an improvement of 3 times of network lifetime, while it guarantees a data precision defined by a user.
{"title":"Data-Centric Density Control for Wireless Sensor Networks","authors":"J.C. Melo, L. B. Ruiz","doi":"10.1109/ICWMC.2008.56","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.56","url":null,"abstract":"The unplanned and random deployment of a Wireless Sensor Network (WSN) may impose a high node density on a specific region. This concentration can be exploited by density control mechanisms to increase network lifetime, by deactivating temporarily redundant sensor nodes. Previous approaches for density control in WSN focus in guaranteeing full sensing coverage of monitoring area. This work presents a new data-centric approach where density control is performed to increase network lifetime preserving precision of sampled data. Using statistical techniques, density is determined according to sampling. The results show that this approach achieved an improvement of 3 times of network lifetime, while it guarantees a data precision defined by a user.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}