首页 > 最新文献

2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)最新文献

英文 中文
On the effect of combining cooperative communication with sleep mode 合作沟通与睡眠模式结合的效果研究
Thomas Demoor, S. Andreev, K. D. Turck, H. Bruneel, D. Fiems
Cooperation is crucial in (next-generation) wireless networks as it can greatly attribute to ensuring connectivity, reliability, performance, ... Relaying looks promising in a wide variety of network types (cellular, ad-hoc on-demand), each using a certain protocol. Energy efficiency constitutes another key aspect of such networks, as battery power is often limited, and is typically achieved by sleep mode operation. As the range of applications is very broad, rather than modelling one of the protocols in detail, we construct a high-level model capturing the two essential characteristics of cooperation and energy efficiency: relaying and sleep mode, and study their interaction. The used analytical approach allows for accurate performance evaluation and enables us to unveil less trivial trade-offs and to formulate rules-of-thumb applicable across all potential scenarios.
合作在(下一代)无线网络中至关重要,因为它可以在很大程度上归功于确保连接性、可靠性、性能……中继在各种各样的网络类型(蜂窝网络、按需自组织网络)中看起来很有前途,每种类型都使用某种协议。能源效率是此类网络的另一个关键方面,因为电池电量通常有限,通常通过睡眠模式操作来实现。由于应用范围非常广泛,我们不是对其中一个协议进行详细建模,而是构建一个捕获合作和能源效率的两个基本特征:中继和睡眠模式的高级模型,并研究它们之间的相互作用。所使用的分析方法允许进行准确的性能评估,并使我们能够揭示不那么琐碎的权衡,并制定适用于所有潜在场景的经验法则。
{"title":"On the effect of combining cooperative communication with sleep mode","authors":"Thomas Demoor, S. Andreev, K. D. Turck, H. Bruneel, D. Fiems","doi":"10.1109/WONS.2012.6152238","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152238","url":null,"abstract":"Cooperation is crucial in (next-generation) wireless networks as it can greatly attribute to ensuring connectivity, reliability, performance, ... Relaying looks promising in a wide variety of network types (cellular, ad-hoc on-demand), each using a certain protocol. Energy efficiency constitutes another key aspect of such networks, as battery power is often limited, and is typically achieved by sleep mode operation. As the range of applications is very broad, rather than modelling one of the protocols in detail, we construct a high-level model capturing the two essential characteristics of cooperation and energy efficiency: relaying and sleep mode, and study their interaction. The used analytical approach allows for accurate performance evaluation and enables us to unveil less trivial trade-offs and to formulate rules-of-thumb applicable across all potential scenarios.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obfuscating IEEE 802.15.4 communication using secret spreading codes 使用秘密传播码混淆IEEE 802.15.4通信
Bjorn Muntwyler, Vincent Lenders, F. Legendre, B. Plattner
The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading sequences to obfuscate communications. Through theory and experiments with a prototype IEEE 802.15.4 transmitter and receiver that have been adapted to use random and dynamic codes, we quantify the benefits and performance implications of our approach. We first give a theoretical approximation of the performance loss when secret random codes are used instead of the IEEE 802.15.4 codes. We identify then three transitional regions for IEEE 802.15.4 communication above thermal noise i.e., when the incoming power level at the attacker is above thermal noise. We derive the obfuscation gain for signal detection and signal interception attacks respectively in these regions. Our implementation shows the feasibility of our approach. It is also used to evaluate the performance loss and time requirements to perform attacks on the system under realistic wireless conditions.
IEEE 802.15.4标准规定了一个具有公共和固定扩展序列的m级扩展频谱系统。我们建议使用秘密的、动态的、随机传播的序列来混淆通信。通过一个原型IEEE 802.15.4发射器和接收器的理论和实验,我们已经适应使用随机和动态代码,我们量化了我们的方法的好处和性能影响。我们首先给出了当使用秘密随机码代替IEEE 802.15.4码时性能损失的理论近似。然后,我们确定了IEEE 802.15.4通信高于热噪声的三个过渡区域,即攻击者的输入功率高于热噪声时。在这些区域分别推导了信号检测和信号拦截攻击的混淆增益。我们的实现表明了我们的方法的可行性。它还用于评估在实际无线条件下对系统进行攻击的性能损失和时间要求。
{"title":"Obfuscating IEEE 802.15.4 communication using secret spreading codes","authors":"Bjorn Muntwyler, Vincent Lenders, F. Legendre, B. Plattner","doi":"10.1109/WONS.2012.6152228","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152228","url":null,"abstract":"The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading sequences to obfuscate communications. Through theory and experiments with a prototype IEEE 802.15.4 transmitter and receiver that have been adapted to use random and dynamic codes, we quantify the benefits and performance implications of our approach. We first give a theoretical approximation of the performance loss when secret random codes are used instead of the IEEE 802.15.4 codes. We identify then three transitional regions for IEEE 802.15.4 communication above thermal noise i.e., when the incoming power level at the attacker is above thermal noise. We derive the obfuscation gain for signal detection and signal interception attacks respectively in these regions. Our implementation shows the feasibility of our approach. It is also used to evaluate the performance loss and time requirements to perform attacks on the system under realistic wireless conditions.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"919 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer? P2P群加载能否提高6LoWPAN数据传输的鲁棒性?
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias Weingärtner, Klaus Wehrle
The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IP-based applications for low-power wireless networks like sensor networks. As these networks often suffer from unreliable radio channels or frequent node failure, the question arises how 6LoWPAN-based applications can be hardened against such issues. In this paper, we examine if well-known concepts from the research domain of P2P networks can be applied for increasing the robustness of 6LoWPAN networks. For this purpose, we design and implement a straightforward P2P system for data sharing that is adapted to the low system capabilities of a typical 6LoWPAN device. Our preliminary evaluation shows that P2P mechanisms like swarm loading are able to improve the robustness of a 6LoWPAN application.
最近出现的6LoWPAN是一种低功耗无线设备的IPv6变体,它允许为传感器网络等低功耗无线网络开发基于ip的应用程序。由于这些网络经常遭受不可靠的无线电通道或频繁的节点故障,因此出现了如何加强基于6lowpan的应用程序以应对此类问题的问题。在本文中,我们研究了P2P网络研究领域的知名概念是否可以应用于提高6LoWPAN网络的鲁棒性。为此,我们设计并实现了一个用于数据共享的直接P2P系统,该系统适应典型6LoWPAN设备的低系统功能。我们的初步评估表明,像群加载这样的P2P机制能够提高6LoWPAN应用程序的鲁棒性。
{"title":"Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?","authors":"Marcel Bosling, Torsten Redmann, Jean Tekam, Elias Weingärtner, Klaus Wehrle","doi":"10.1109/WONS.2012.6152218","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152218","url":null,"abstract":"The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IP-based applications for low-power wireless networks like sensor networks. As these networks often suffer from unreliable radio channels or frequent node failure, the question arises how 6LoWPAN-based applications can be hardened against such issues. In this paper, we examine if well-known concepts from the research domain of P2P networks can be applied for increasing the robustness of 6LoWPAN networks. For this purpose, we design and implement a straightforward P2P system for data sharing that is adapted to the low system capabilities of a typical 6LoWPAN device. Our preliminary evaluation shows that P2P mechanisms like swarm loading are able to improve the robustness of a 6LoWPAN application.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-parametric maximum likelihood estimation of pulsed interference on wireless links 无线链路上脉冲干扰的非参数极大似然估计
D. Leith, B. Zarikoff
In this paper we consider a wireless link subject to on-off interference. We show that by using different size packets and by measuring the packet error rate as a function of packet transmit duration on the air, the distribution of the off times between interference bursts can be accurately estimated. In the context of white space usage, this directly corresponds to estimation of the time duration of the spectrum hole usable by a secondary station. By being able to carry out sensing without requiring the transmitter to remain silent, this creates the potential for significant throughput gains.
在本文中,我们考虑一个受开关干扰的无线链路。我们表明,通过使用不同大小的数据包,并通过测量数据包误差率作为数据包在空中传输时间的函数,可以准确地估计干扰爆发之间的中断时间分布。在空白空间使用的情况下,这直接对应于对二级站可用频谱孔的时间持续时间的估计。通过能够在不要求发射机保持沉默的情况下进行传感,这创造了显着吞吐量增益的潜力。
{"title":"Non-parametric maximum likelihood estimation of pulsed interference on wireless links","authors":"D. Leith, B. Zarikoff","doi":"10.1109/WONS.2012.6152237","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152237","url":null,"abstract":"In this paper we consider a wireless link subject to on-off interference. We show that by using different size packets and by measuring the packet error rate as a function of packet transmit duration on the air, the distribution of the off times between interference bursts can be accurately estimated. In the context of white space usage, this directly corresponds to estimation of the time duration of the spectrum hole usable by a secondary station. By being able to carry out sensing without requiring the transmitter to remain silent, this creates the potential for significant throughput gains.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards energy consumption evaluation of the SSL handshake protocol in mobile communications 移动通信中SSL握手协议的能耗评估
S. Petridou, Stylianos Basagiannis
Secure Sockets Layer (SSL) protocol is the most popular security protocol, which provides confidentiality, authentication and integrity protection in Internet transactions. Nowadays, a large portion of them are executed by battery-powered handheld devices, such as personal digital assistants (PDAs), which are severely constrained by their resources, e.g. battery. This work launches an energy-aware study of the SSL Handshake protocol, the most complex part of SSL, considering a number of mobile SSL clients trying to simultaneously establish a secure connection with an SSL server. The proposed analysis is based upon the development of a Continuous Time Markov Chain (CTMC) model augmented with energy rewards, derived by the SSL execution on an iPAQ PDA. The novelty of our approach is that it constructs a model, tunable to communication-related parameters, such as the Bit Error Rate (BER), and verification errors, which overhead client-side energy consumption. In turn, both probabilistic and quantitative verification results are derived. The first ones validate the successful completion of handshakes and the later exhibit the impact of various parameters, such as cipher suites and verification error, on the energy requirements of SSL handshake in mobile communications.
安全套接字层(Secure Sockets Layer, SSL)协议是最流行的安全协议,它为Internet交易提供机密性、身份验证和完整性保护。如今,其中很大一部分是由电池供电的手持设备执行的,例如个人数字助理(pda),这些设备受到其资源(例如电池)的严重限制。这项工作启动了对SSL握手协议(SSL中最复杂的部分)的能量感知研究,考虑到许多移动SSL客户端试图同时与SSL服务器建立安全连接。所提出的分析是基于一个带有能量奖励的连续时间马尔可夫链(CTMC)模型的发展,该模型是由iPAQ PDA上的SSL执行导出的。我们的方法的新颖之处在于它构建了一个模型,该模型可根据通信相关参数进行调整,例如误码率(BER)和验证错误,这些参数会增加客户端能耗。进而推导出概率和定量验证结果。前者验证了握手的成功完成,后者展示了各种参数(如密码套件和验证错误)对移动通信中SSL握手能量需求的影响。
{"title":"Towards energy consumption evaluation of the SSL handshake protocol in mobile communications","authors":"S. Petridou, Stylianos Basagiannis","doi":"10.1109/WONS.2012.6152219","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152219","url":null,"abstract":"Secure Sockets Layer (SSL) protocol is the most popular security protocol, which provides confidentiality, authentication and integrity protection in Internet transactions. Nowadays, a large portion of them are executed by battery-powered handheld devices, such as personal digital assistants (PDAs), which are severely constrained by their resources, e.g. battery. This work launches an energy-aware study of the SSL Handshake protocol, the most complex part of SSL, considering a number of mobile SSL clients trying to simultaneously establish a secure connection with an SSL server. The proposed analysis is based upon the development of a Continuous Time Markov Chain (CTMC) model augmented with energy rewards, derived by the SSL execution on an iPAQ PDA. The novelty of our approach is that it constructs a model, tunable to communication-related parameters, such as the Bit Error Rate (BER), and verification errors, which overhead client-side energy consumption. In turn, both probabilistic and quantitative verification results are derived. The first ones validate the successful completion of handshakes and the later exhibit the impact of various parameters, such as cipher suites and verification error, on the energy requirements of SSL handshake in mobile communications.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Collaborative data retrieval using opportunistic networking 使用机会网络的协作数据检索
Giuseppe Corrente, R. Gaeta, Marco Grangetto, M. Sereno
In this paper we consider mobile nodes (pedestrian and vehicles) and fixed terminals in a urban area that are interested in collecting the information originated from several sources. In particular, each terminal aims at retrieving the data items in a limited region of interest centered around the node position. Furthermore, for mobile terminals the region of interest is a time varying concept due to the dynamic behavior of nodes. The goal of the paper is to evaluate the amount of information each node is able to gather resorting to simple distributed data collection and sharing through local broadcast communications among neighboring nodes.
在本文中,我们考虑了城市地区的移动节点(行人和车辆)和固定终端,它们有兴趣收集来自多个来源的信息。特别是,每个终端都旨在检索以节点位置为中心的有限感兴趣区域中的数据项。此外,对于移动终端,由于节点的动态行为,感兴趣区域是一个时变的概念。本文的目标是评估每个节点能够通过简单的分布式数据收集和相邻节点之间的本地广播通信共享来收集的信息量。
{"title":"Collaborative data retrieval using opportunistic networking","authors":"Giuseppe Corrente, R. Gaeta, Marco Grangetto, M. Sereno","doi":"10.1109/WONS.2012.6152220","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152220","url":null,"abstract":"In this paper we consider mobile nodes (pedestrian and vehicles) and fixed terminals in a urban area that are interested in collecting the information originated from several sources. In particular, each terminal aims at retrieving the data items in a limited region of interest centered around the node position. Furthermore, for mobile terminals the region of interest is a time varying concept due to the dynamic behavior of nodes. The goal of the paper is to evaluate the amount of information each node is able to gather resorting to simple distributed data collection and sharing through local broadcast communications among neighboring nodes.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WiFi network residual bandwidth estimation: A prototype implementation WiFi网络剩余带宽估计:一个原型实现
A. Ghittino, N. D. Maio, D. D. Tommaso
Evaluating the available bandwidth in a wireless LAN is a challenging task because the throughput depends on several factors such as RSSI (Received Signal Strength Indication), interferers and packet size. Moreover, in a real scenario it is not sufficient to evaluate periodically the throughput of the network, but a continuous monitoring is required in order to detect as soon as possible network problems and saturation phenomena. When wireless LAN is used to transmit high priority traffic (e.g. voice and video flows), an admission control procedure based on residual bandwidth evaluation is necessary to verify that required resources are available. We propose a mechanism based on active traffic probing with low priority packets: this approach enables us to simulate a real data flow and, on the other hand, does not interfere with existing flows. Our method relies on IEEE 802.11e (WMM - Wireless MultiMedia) support and does not require any customization of network devices. Through this approach the residual bandwidth can be continuously monitored. This measurement accounts for both the characteristics of active flows (different packet sizes and rates) and external interferences, offering accurate bandwidth estimation.
评估无线局域网的可用带宽是一项具有挑战性的任务,因为吞吐量取决于几个因素,如RSSI(接收信号强度指示)、干扰和数据包大小。此外,在实际场景中,定期评估网络的吞吐量是不够的,为了尽快发现网络问题和饱和现象,需要进行持续的监控。当无线局域网用于传输高优先级流量(如语音和视频流)时,需要基于剩余带宽评估的准入控制程序来验证所需资源是否可用。我们提出了一种基于低优先级数据包的主动流量探测的机制:这种方法使我们能够模拟真实的数据流,另一方面,不会干扰现有的流。我们的方法依赖于IEEE 802.11e (WMM -无线多媒体)支持,不需要任何网络设备的定制。通过这种方法可以连续监测剩余带宽。这种测量既考虑了活动流的特征(不同的数据包大小和速率),也考虑了外部干扰,从而提供了准确的带宽估计。
{"title":"WiFi network residual bandwidth estimation: A prototype implementation","authors":"A. Ghittino, N. D. Maio, D. D. Tommaso","doi":"10.1109/WONS.2012.6152234","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152234","url":null,"abstract":"Evaluating the available bandwidth in a wireless LAN is a challenging task because the throughput depends on several factors such as RSSI (Received Signal Strength Indication), interferers and packet size. Moreover, in a real scenario it is not sufficient to evaluate periodically the throughput of the network, but a continuous monitoring is required in order to detect as soon as possible network problems and saturation phenomena. When wireless LAN is used to transmit high priority traffic (e.g. voice and video flows), an admission control procedure based on residual bandwidth evaluation is necessary to verify that required resources are available. We propose a mechanism based on active traffic probing with low priority packets: this approach enables us to simulate a real data flow and, on the other hand, does not interfere with existing flows. Our method relies on IEEE 802.11e (WMM - Wireless MultiMedia) support and does not require any customization of network devices. Through this approach the residual bandwidth can be continuously monitored. This measurement accounts for both the characteristics of active flows (different packet sizes and rates) and external interferences, offering accurate bandwidth estimation.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"33 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120987018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DKM: Distributed k-connectivity maintenance in Wireless Sensor Networks DKM:无线传感器网络中的分布式k-连接维护
P. Szczytowski, Abdelmajid Khelil, N. Suri
The reliability of Wireless Sensor Networks (WSN) is detrimentally impacted by unreliable wireless communication and the finite energy of sensor nodes. An advocated approach for assuring fault tolerant WSN is providing global k-connectivity. This property guarantees that the failure of up to k - 1 sensor nodes does not cause network partitioning. k-connectivity is a well studied property of WSN including the aspects of topology control, k-connected dominating set construction, controlled deployment, relay nodes placement, and detection of level of k-connectivity. In this work, we target the repair/maintenance aspect of k-connectivity. Our goal is to allow the network to provide localized, sustainable maintenance, which is capable of efficiently restoring/main-taining the WSN desired k-connect-ivity. We present a fully distributed technique that is competitively resource efficient to state-of-the-art approaches. Unlike existing techniques, our approach also provides the necessary efficient mechanisms to avoid network partitioning and the longer routing paths caused by node failures. We present both analysis and simulations to show the effectiveness and efficiency of our solution to maintain high responsiveness.
无线传感器网络的可靠性受到无线通信不可靠和传感器节点能量有限的不利影响。一种保证WSN容错的方法是提供全局k-连通性。此属性保证了多达k - 1个传感器节点的故障不会导致网络分区。k-连通性是WSN研究的一个很好的特性,包括拓扑控制、k-连通支配集的构建、受控部署、中继节点的放置和k-连通性水平的检测。在这项工作中,我们的目标是k-连通性的修复/维护方面。我们的目标是允许网络提供本地化,可持续的维护,这能够有效地恢复/维护WSN所需的k-连接。我们提出了一种完全分布式的技术,与最先进的方法相比,它具有竞争力的资源效率。与现有技术不同,我们的方法还提供了必要的有效机制,以避免网络分区和由节点故障引起的更长的路由路径。我们提供了分析和模拟,以显示我们的解决方案的有效性和效率,以保持高响应性。
{"title":"DKM: Distributed k-connectivity maintenance in Wireless Sensor Networks","authors":"P. Szczytowski, Abdelmajid Khelil, N. Suri","doi":"10.1109/WONS.2012.6152244","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152244","url":null,"abstract":"The reliability of Wireless Sensor Networks (WSN) is detrimentally impacted by unreliable wireless communication and the finite energy of sensor nodes. An advocated approach for assuring fault tolerant WSN is providing global k-connectivity. This property guarantees that the failure of up to k - 1 sensor nodes does not cause network partitioning. k-connectivity is a well studied property of WSN including the aspects of topology control, k-connected dominating set construction, controlled deployment, relay nodes placement, and detection of level of k-connectivity. In this work, we target the repair/maintenance aspect of k-connectivity. Our goal is to allow the network to provide localized, sustainable maintenance, which is capable of efficiently restoring/main-taining the WSN desired k-connect-ivity. We present a fully distributed technique that is competitively resource efficient to state-of-the-art approaches. Unlike existing techniques, our approach also provides the necessary efficient mechanisms to avoid network partitioning and the longer routing paths caused by node failures. We present both analysis and simulations to show the effectiveness and efficiency of our solution to maintain high responsiveness.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Privacy in the pervasive era: A distributed firewall approach 普及时代的隐私:分布式防火墙方法
L. Maccari, R. Cigno
Pervasive computing and communications are (slowly) enabling local ad-hoc services. Preserving privacy in a pervasive environment is one of the key challenges ahead: How can users define their “communication boundaries”? how can the network avoid wasting resources and eventually collapse under the burden of undesired traffic that will be discarded at the receiver machine? In this paper we propose the adoption of distributed filtering techniques implementing a network-wide firewall whose goal is defining precisely, and under the user control, the boundaries in space, time, information content, and logical addressing of a user communication scope. Initial results based on an implementation integrated with OLSR are presented.
普适计算和通信正在(缓慢地)启用本地自组织服务。在无处不在的环境中保护隐私是未来的主要挑战之一:用户如何定义他们的“通信边界”?网络如何避免浪费资源,最终在接收端机器丢弃的不希望的流量负担下崩溃?在本文中,我们提出采用分布式过滤技术实现一个全网防火墙,其目标是在用户控制下精确定义用户通信范围的空间、时间、信息内容和逻辑寻址边界。给出了基于集成OLSR的实现的初步结果。
{"title":"Privacy in the pervasive era: A distributed firewall approach","authors":"L. Maccari, R. Cigno","doi":"10.1109/WONS.2012.6152229","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152229","url":null,"abstract":"Pervasive computing and communications are (slowly) enabling local ad-hoc services. Preserving privacy in a pervasive environment is one of the key challenges ahead: How can users define their “communication boundaries”? how can the network avoid wasting resources and eventually collapse under the burden of undesired traffic that will be discarded at the receiver machine? In this paper we propose the adoption of distributed filtering techniques implementing a network-wide firewall whose goal is defining precisely, and under the user control, the boundaries in space, time, information content, and logical addressing of a user communication scope. Initial results based on an implementation integrated with OLSR are presented.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SNOMC: An overlay multicast protocol for Wireless Sensor Networks 无线传感器网络的覆盖组播协议
G. Wagenknecht, M. Anwander, T. Braun
Using multicast communication in Wireless Sensor Networks (WSNs) is an efficient way to disseminate the same data (from one sender) to multiple receivers, e.g., transmitting code updates to a group of sensor nodes. Due to the nature of code update traffic a multicast protocol has to support bulky traffic and end-to-end reliability. We are interested in an energy-efficient multicast protocol due to the limited resources of wireless sensor nodes. Current data dissemination schemes do not fulfill the above requirements. In order to close the gap, we designed and implemented the SNOMC (Sensor Node Overlay Multicast) protocol. It is an overlay multicast protocol, which supports reliable, time-efficient, and energy-efficient data dissemination of bulky data from one sender to many receivers. To ensure end-to-end reliability, SNOMC uses a NACK-based reliability mechanism with different caching strategies.
在无线传感器网络(WSNs)中使用组播通信是一种将相同数据(从一个发送方)传播到多个接收方的有效方法,例如,将代码更新发送到一组传感器节点。由于代码更新流量的性质,多播协议必须支持庞大的流量和端到端可靠性。由于无线传感器节点资源有限,我们对节能组播协议感兴趣。目前的数据发布方案不符合上述要求。为了缩小这一差距,我们设计并实现了snoc (Sensor Node Overlay Multicast)协议。它是一种覆盖多播协议,支持从一个发送方到多个接收方的大量数据的可靠、高效和节能的数据传播。为了确保端到端可靠性,snoc使用基于nack的可靠性机制和不同的缓存策略。
{"title":"SNOMC: An overlay multicast protocol for Wireless Sensor Networks","authors":"G. Wagenknecht, M. Anwander, T. Braun","doi":"10.1109/WONS.2012.6152242","DOIUrl":"https://doi.org/10.1109/WONS.2012.6152242","url":null,"abstract":"Using multicast communication in Wireless Sensor Networks (WSNs) is an efficient way to disseminate the same data (from one sender) to multiple receivers, e.g., transmitting code updates to a group of sensor nodes. Due to the nature of code update traffic a multicast protocol has to support bulky traffic and end-to-end reliability. We are interested in an energy-efficient multicast protocol due to the limited resources of wireless sensor nodes. Current data dissemination schemes do not fulfill the above requirements. In order to close the gap, we designed and implemented the SNOMC (Sensor Node Overlay Multicast) protocol. It is an overlay multicast protocol, which supports reliable, time-efficient, and energy-efficient data dissemination of bulky data from one sender to many receivers. To ensure end-to-end reliability, SNOMC uses a NACK-based reliability mechanism with different caching strategies.","PeriodicalId":309036,"journal":{"name":"2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1