首页 > 最新文献

International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)最新文献

英文 中文
Performance Analysis of Energy Detection for Cognitive RadioWireless Networks 认知无线网络能量检测性能分析
Qingchun Ren, Q. Liang
In this paper, considering hidden terminal and exposed node problems, we make a theoretical analysis on the performance of commonly used energy detection methods, such as ideal method, transmitter-independent method and transmitter/receiver-cooperated method, in terms of detection probability. Corresponding analytical models are provided. Performance theoretical curves are acquired to compare the characteristics for individual energy detection methods under various scenarios. Moreover the upper bound for detection probability is achieved and is compared under various system traffic intensity and sensing capability.
本文考虑隐藏终端和暴露节点问题,从探测概率的角度对理想法、发射机无关法和发射机/接收机合作法等常用能量检测方法的性能进行了理论分析。给出了相应的分析模型。获得了性能理论曲线,比较了各种能量检测方法在不同场景下的特性。并对不同系统流量强度和感知能力下的检测概率上界进行了比较。
{"title":"Performance Analysis of Energy Detection for Cognitive RadioWireless Networks","authors":"Qingchun Ren, Q. Liang","doi":"10.1109/WASA.2007.80","DOIUrl":"https://doi.org/10.1109/WASA.2007.80","url":null,"abstract":"In this paper, considering hidden terminal and exposed node problems, we make a theoretical analysis on the performance of commonly used energy detection methods, such as ideal method, transmitter-independent method and transmitter/receiver-cooperated method, in terms of detection probability. Corresponding analytical models are provided. Performance theoretical curves are acquired to compare the characteristics for individual energy detection methods under various scenarios. Moreover the upper bound for detection probability is achieved and is compared under various system traffic intensity and sensing capability.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Lessons Learned Building TeamTrak: An Urban/Outdoor Mobile Testbed 构建TeamTrak的经验教训:城市/室外移动测试平台
J. Hemmes, D. Thain, C. Poellabauer, C. Moretti, P. Snowberger, B. McNutt
Much research in mobile networks relies on the use of simulations for evaluation purposes. While a number of powerful simulation tools have been developed for this purpose, only recently has the need for physical implementations of mobile systems and applications been widely accepted in the literature. In recognition of this need, and to further our research objectives in the area of wireless sensor networks and mobile cooperative systems, we have built the TeamTrak mobile testbed, which gives us real-world experience with research concepts as we develop them. Additionally, results from outdoor field tests are used to further enhance the capabilities of the testbed itself.
移动网络的许多研究都依赖于模拟来进行评估。虽然为此目的开发了许多强大的仿真工具,但直到最近才在文献中广泛接受了对移动系统和应用程序的物理实现的需求。认识到这一需求,并进一步推进我们在无线传感器网络和移动协作系统领域的研究目标,我们建立了TeamTrak移动测试平台,这为我们在开发研究概念时提供了现实世界的经验。此外,还利用室外现场试验的结果进一步提高了试验台本身的性能。
{"title":"Lessons Learned Building TeamTrak: An Urban/Outdoor Mobile Testbed","authors":"J. Hemmes, D. Thain, C. Poellabauer, C. Moretti, P. Snowberger, B. McNutt","doi":"10.1109/WASA.2007.117","DOIUrl":"https://doi.org/10.1109/WASA.2007.117","url":null,"abstract":"Much research in mobile networks relies on the use of simulations for evaluation purposes. While a number of powerful simulation tools have been developed for this purpose, only recently has the need for physical implementations of mobile systems and applications been widely accepted in the literature. In recognition of this need, and to further our research objectives in the area of wireless sensor networks and mobile cooperative systems, we have built the TeamTrak mobile testbed, which gives us real-world experience with research concepts as we develop them. Additionally, results from outdoor field tests are used to further enhance the capabilities of the testbed itself.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126913518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SVD-QR-T FCM Approach for Virtual MIMO Channel Selection in Wireless Sensor Networks 无线传感器网络中虚拟MIMO信道选择的SVD-QR-T FCM方法
Jinghan Liang, Q. Liang
In this paper, we present singular-value decomposition- QR with threshold (SVD-QR-T) algorithm to select a subset of channels in virtual MIMO wireless sensor networks (WSN) in order to reduce its complexity and cost. SVD- QR-T selects best subset of transmitters while keeping all receivers active. The threshold is adaptive by means of fuzzy c-mean (FCM). Under the constraint of the same total transmission power, this approach is compared against the case without channel selection in terms of capacity, bit error rate (BER) and multiplexing gain in the presence of water-filling as well without. It is shown that in spite of less multiplexing gain, when water-filling is applied, SVD- QR-T FCM provides lower BER at moderate to high SNR; in case of equal transmission power allocation, SVD-QR-T FCM achieves higher capacity at low SNR and lower BER. In general, it provides satisfying performances compared to the case without channel selection but reduced cost and resource.
为了降低虚拟MIMO无线传感器网络(WSN)的复杂度和成本,提出了奇异值分解QR带阈值(SVD-QR-T)算法来选择信道子集。SVD- QR-T选择发射机的最佳子集,同时保持所有接收机的活动。采用模糊c均值(FCM)自适应阈值。在总传输功率相同的约束下,将该方法与无信道选择的情况进行了容量、误码率(BER)和多路增益方面的比较。结果表明,尽管多路增益较低,但充水后,SVD- QR-T FCM在中高信噪比下具有较低的误码率;在传输功率分配均等的情况下,SVD-QR-T FCM在低信噪比和低误码率下实现了更高的容量。总的来说,与没有信道选择的情况相比,它提供了令人满意的性能,但降低了成本和资源。
{"title":"SVD-QR-T FCM Approach for Virtual MIMO Channel Selection in Wireless Sensor Networks","authors":"Jinghan Liang, Q. Liang","doi":"10.1109/WASA.2007.131","DOIUrl":"https://doi.org/10.1109/WASA.2007.131","url":null,"abstract":"In this paper, we present singular-value decomposition- QR with threshold (SVD-QR-T) algorithm to select a subset of channels in virtual MIMO wireless sensor networks (WSN) in order to reduce its complexity and cost. SVD- QR-T selects best subset of transmitters while keeping all receivers active. The threshold is adaptive by means of fuzzy c-mean (FCM). Under the constraint of the same total transmission power, this approach is compared against the case without channel selection in terms of capacity, bit error rate (BER) and multiplexing gain in the presence of water-filling as well without. It is shown that in spite of less multiplexing gain, when water-filling is applied, SVD- QR-T FCM provides lower BER at moderate to high SNR; in case of equal transmission power allocation, SVD-QR-T FCM achieves higher capacity at low SNR and lower BER. In general, it provides satisfying performances compared to the case without channel selection but reduced cost and resource.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Cross-Layer Design for End-to-End On-Demand Bandwidth Allocation in Infrastructure Wireless Mesh Network 基础无线网状网络端到端按需带宽分配的跨层设计
Hong Lu, S. Liu, Anxiao Jiang
Wireless mesh networks have gained significant academic and industry attentions in the recent years. Supporting quality of service in wireless mesh networks is an important and challenging task which involves both medium access control and network layer design. In this paper, we investigate the problem of end-to-end on-demand bandwidth allocation in infrastructure wireless mesh networks. We formulate it as a combinatorial optimization problem, and prove that it is NP- hard. We present a polynomial time 2-approximation algorithm, MCRS (minimum consumption routing and scheduling), based on the concepts of consumption level for routing and bottom set for scheduling. Comprehensive simulation results show that MCRS achieves better performance than traditional methods based on minimum hop routing.
近年来,无线网状网络得到了学术界和工业界的广泛关注。支持无线网状网络的服务质量是一项重要而富有挑战性的任务,它涉及到介质访问控制和网络层设计。本文研究了基础无线网状网络中端到端按需带宽分配问题。我们将其表述为一个组合优化问题,并证明了它是NP困难的。基于路由的消耗水平和调度的底集概念,提出了一种多项式时间2逼近算法——最小消耗路由和调度(MCRS)。综合仿真结果表明,MCRS比基于最小跳路由的传统方法具有更好的性能。
{"title":"A Cross-Layer Design for End-to-End On-Demand Bandwidth Allocation in Infrastructure Wireless Mesh Network","authors":"Hong Lu, S. Liu, Anxiao Jiang","doi":"10.1109/WASA.2007.133","DOIUrl":"https://doi.org/10.1109/WASA.2007.133","url":null,"abstract":"Wireless mesh networks have gained significant academic and industry attentions in the recent years. Supporting quality of service in wireless mesh networks is an important and challenging task which involves both medium access control and network layer design. In this paper, we investigate the problem of end-to-end on-demand bandwidth allocation in infrastructure wireless mesh networks. We formulate it as a combinatorial optimization problem, and prove that it is NP- hard. We present a polynomial time 2-approximation algorithm, MCRS (minimum consumption routing and scheduling), based on the concepts of consumption level for routing and bottom set for scheduling. Comprehensive simulation results show that MCRS achieves better performance than traditional methods based on minimum hop routing.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lower Bounds on Lifetime of Three Dimensional UWB Sensor Networks 三维超宽带传感器网络寿命下界研究
Juan Xu, Yongfa Hong, Changjun Jiang
Considering three dimensional time hopping ultra wide band (TH-UWB) sensor networks with n sensor nodes uniformly and independently distributed in a cube of unit volume, the asymptotic lower bounds on the lifetime of non-cluster-based and cluster-based three dimensional TH-UWB sensor networks are derived irrespectively. For static three dimensional TH-UWB sensor networks, our finding is that the lower bound on the lifetime of cluster-based network is Omega((n/log n)alpha/3) and that the lower bound on the lifetime of non-cluster-based network is Omega((n/log n)(alpha-3)/3), thus clustering can significantly improve the lower bound on network lifetime. The results also indicate that for non-cluster-based three dimensional TH-UWB sensor network the lower bound on the lifetime in idea case is longer than that of static network by a factor of (n/log n)2/3, thus sensor nodes or sink moving randomly in the sensor field can improve the lower bound on lifetime of network.
考虑具有n个传感器节点均匀独立分布在单位体积立方体中的三维时跳超宽带(TH-UWB)传感器网络,分别推导了非基于簇和基于簇的三维TH-UWB传感器网络寿命的渐近下界。对于静态三维TH-UWB传感器网络,我们发现基于簇的网络的寿命下界为Omega((n/log n)alpha/3),而非基于簇的网络的寿命下界为Omega((n/log n)(alpha-3)/3),因此聚类可以显著提高网络的寿命下界。结果还表明,对于非基于簇的三维TH-UWB传感器网络,理想情况下的生存期下界比静态网络的生存期下界长(n/log n)2/3倍,因此在传感器场中随机移动的传感器节点或sink可以提高网络的生存期下界。
{"title":"Lower Bounds on Lifetime of Three Dimensional UWB Sensor Networks","authors":"Juan Xu, Yongfa Hong, Changjun Jiang","doi":"10.1109/WASA.2007.30","DOIUrl":"https://doi.org/10.1109/WASA.2007.30","url":null,"abstract":"Considering three dimensional time hopping ultra wide band (TH-UWB) sensor networks with n sensor nodes uniformly and independently distributed in a cube of unit volume, the asymptotic lower bounds on the lifetime of non-cluster-based and cluster-based three dimensional TH-UWB sensor networks are derived irrespectively. For static three dimensional TH-UWB sensor networks, our finding is that the lower bound on the lifetime of cluster-based network is Omega((n/log n)alpha/3) and that the lower bound on the lifetime of non-cluster-based network is Omega((n/log n)(alpha-3)/3), thus clustering can significantly improve the lower bound on network lifetime. The results also indicate that for non-cluster-based three dimensional TH-UWB sensor network the lower bound on the lifetime in idea case is longer than that of static network by a factor of (n/log n)2/3, thus sensor nodes or sink moving randomly in the sensor field can improve the lower bound on lifetime of network.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Stochastic Security in Wireless Mesh Networks via Saddle Routing Policy 基于鞍形路由策略的无线Mesh网络随机安全性研究
Xiangyang Li, Yanwei Wu, Weizhao Wang
The security problem in multihop wireless networks is more severe than that in wired networks since its transmission media is the unprotected air. In this paper, we show how to increase the effective throughput via carefully choosing the multi-path routing for given source and destination nodes, where we call the total packets from the mesh routers to the gateway nodes that are not attacked by an attacker as effective throughput. We assume that the attacker has limited resources for attacking while attacking a node or a link will incur some certain cost. We show that it is NP-hard to find an optimum routing policy even if the attacking strategy is given. We model the problem as a two-player game between the routing policy designer and the attacker and propose a multi-path routing protocol for several possible attacks. We propose several routing protocols that can approximately maximize the total throughput achieved by the gateway nodes. Moreover, we theoretically prove that our routing protocols can achieve an effective network throughput (with packets which are not attacked) within a constant factor of the optimum in the worst case. Our theoretic results are confirmed by extensive simulations studies.
无线多跳网络的安全问题比有线网络更为严重,因为它的传输介质是不受保护的空气。在本文中,我们展示了如何通过仔细选择给定源节点和目标节点的多路径路由来增加有效吞吐量,其中我们将从网状路由器到网关节点的总数据包称为有效吞吐量,这些数据包未受到攻击者的攻击。我们假设攻击者的攻击资源是有限的,攻击一个节点或一条链路会产生一定的代价。研究表明,即使给定了攻击策略,也很难找到最优路由策略。我们将该问题建模为路由策略设计者和攻击者之间的二人博弈,并针对几种可能的攻击提出了多路径路由协议。我们提出了几种路由协议,可以近似地最大化网关节点的总吞吐量。此外,我们从理论上证明了我们的路由协议可以在最坏情况下的恒定因子内实现有效的网络吞吐量(数据包不受攻击)。我们的理论结果得到了大量模拟研究的证实。
{"title":"Stochastic Security in Wireless Mesh Networks via Saddle Routing Policy","authors":"Xiangyang Li, Yanwei Wu, Weizhao Wang","doi":"10.1109/WASA.2007.86","DOIUrl":"https://doi.org/10.1109/WASA.2007.86","url":null,"abstract":"The security problem in multihop wireless networks is more severe than that in wired networks since its transmission media is the unprotected air. In this paper, we show how to increase the effective throughput via carefully choosing the multi-path routing for given source and destination nodes, where we call the total packets from the mesh routers to the gateway nodes that are not attacked by an attacker as effective throughput. We assume that the attacker has limited resources for attacking while attacking a node or a link will incur some certain cost. We show that it is NP-hard to find an optimum routing policy even if the attacking strategy is given. We model the problem as a two-player game between the routing policy designer and the attacker and propose a multi-path routing protocol for several possible attacks. We propose several routing protocols that can approximately maximize the total throughput achieved by the gateway nodes. Moreover, we theoretically prove that our routing protocols can achieve an effective network throughput (with packets which are not attacked) within a constant factor of the optimum in the worst case. Our theoretic results are confirmed by extensive simulations studies.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Relaying Packets in a Two-tiered Wireless Network Using Binary Integer Programming 用二进制整数规划在两层无线网络中中继数据包
Wenxuan Guo, Xinming Huang
Relay transmissions improve performance and save communication energy in wireless network. We present an optimal relay nodes assignment algorithm to maximize the number of information packets received at the sink for a two-tiered wireless network, in which the relay nodes are temporarily placed and have energy constraint. We first derive the optimal transmit power theory from relay node to sink node. Provided the limited energy at the relay nodes, we prove that the total transmission periods or the relay network lifetime is fixed. Subsequently, we determine the optimal dynamic association between edge nodes and relay nodes (multiple-to-one mapping) using binary integer programming (BIP). Experimental results show that the proposed method has significantly better performance than two other schemes in terms of the total number of information packets received at the sink. Combined with the optimal relay transmit power technique, the two-tiered wireless network can achieve the highest capacity considering the energy constraint of relay nodes.
在无线网络中,中继传输提高了通信性能,节约了通信能源。针对临时放置中继节点并具有能量约束的两层无线网络,提出了一种中继节点分配算法,以使接收到的信息包数量最大化。首先推导了中继节点到汇聚节点的最优发射功率理论。在中继节点能量有限的情况下,证明了中继网络的总传输周期或生存期是固定的。随后,我们使用二进制整数规划(BIP)确定边缘节点和中继节点之间的最优动态关联(多对一映射)。实验结果表明,该方法在接收信息包总数方面明显优于其他两种方案。结合最优中继发射功率技术,在考虑中继节点能量约束的情况下,实现了两层无线网络的最高容量。
{"title":"Relaying Packets in a Two-tiered Wireless Network Using Binary Integer Programming","authors":"Wenxuan Guo, Xinming Huang","doi":"10.1109/WASA.2007.39","DOIUrl":"https://doi.org/10.1109/WASA.2007.39","url":null,"abstract":"Relay transmissions improve performance and save communication energy in wireless network. We present an optimal relay nodes assignment algorithm to maximize the number of information packets received at the sink for a two-tiered wireless network, in which the relay nodes are temporarily placed and have energy constraint. We first derive the optimal transmit power theory from relay node to sink node. Provided the limited energy at the relay nodes, we prove that the total transmission periods or the relay network lifetime is fixed. Subsequently, we determine the optimal dynamic association between edge nodes and relay nodes (multiple-to-one mapping) using binary integer programming (BIP). Experimental results show that the proposed method has significantly better performance than two other schemes in terms of the total number of information packets received at the sink. Combined with the optimal relay transmit power technique, the two-tiered wireless network can achieve the highest capacity considering the energy constraint of relay nodes.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PDF: A Public-key based False Data Filtering Scheme in Sensor Networks 传感器网络中基于公钥的假数据过滤方案
Haodong Wang, Qun A. Li
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary denial-of-service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting node battery power. Prior work on false packet filtering in sensor networks are mostly based on symmetric key schemes, with the concern that the public key operations are too expensive for the resource constrained sensors. Recent progress in public key implementations on sensors, however, has shown that public key is already feasible for sensors. In this paper, we present PDF, a Public-key based false data filtering scheme that leverages Shamir's threshold cryptography and elliptic curve cryptography (ECC), and effectively rejects 100% of false data packets. We evaluate PDF by real world implementation on MICAz motes. Our experiment results support the conclusion that PDF is practical for real world sensor deployment.
由于传感器节点硬件资源极其有限,且部署环境恶劣,攻击者的拒绝服务攻击成为无线传感器网络面临的严重安全威胁。如果没有足够的防御机制,攻击者可以简单地通过大量伪造数据包淹没网络,并通过耗尽节点电池电量使部分或整个传感器网络瘫痪。先前在传感器网络中假包过滤的研究大多基于对称密钥方案,担心公钥操作对于资源受限的传感器来说过于昂贵。然而,最近在传感器上实现公钥的进展表明,公钥在传感器上已经是可行的。在本文中,我们提出了PDF,一种基于公钥的假数据过滤方案,利用Shamir的阈值加密和椭圆曲线加密(ECC),有效地拒绝100%的假数据包。我们通过在MICAz motes上的实际实现来评估PDF。我们的实验结果支持PDF在现实世界传感器部署中是实用的结论。
{"title":"PDF: A Public-key based False Data Filtering Scheme in Sensor Networks","authors":"Haodong Wang, Qun A. Li","doi":"10.1109/WASA.2007.35","DOIUrl":"https://doi.org/10.1109/WASA.2007.35","url":null,"abstract":"Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary denial-of-service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting node battery power. Prior work on false packet filtering in sensor networks are mostly based on symmetric key schemes, with the concern that the public key operations are too expensive for the resource constrained sensors. Recent progress in public key implementations on sensors, however, has shown that public key is already feasible for sensors. In this paper, we present PDF, a Public-key based false data filtering scheme that leverages Shamir's threshold cryptography and elliptic curve cryptography (ECC), and effectively rejects 100% of false data packets. We evaluate PDF by real world implementation on MICAz motes. Our experiment results support the conclusion that PDF is practical for real world sensor deployment.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Case for Multi-Tag RFID Systems 多标签RFID系统的案例
L. Bolotnyy, G. Robins
Radio frequency identification (RFID) is a promising technology for automated non-line-of-sight object identification. However, factors such as object occlusions, metal/liquid opaqueness, environmental conditions, and radio noise degrade the overall availability, reliability, and dependability of RFID systems. We show that simply increasing the number of readers does not adequately address these issues. Instead, we propose tagging each object with multiple tags, and provide definitive experimental data showing that this strategy dramatically improves the effectiveness of RFID systems in the face of radio noise and other interfering factors. We solidify the case for multi-tag RFID systems by addressing obstacles to reliable object detection, and analyzing how multi-tags improve tag detection, even in the presence of (radio-opaque) metals and liquids. We discuss applications that will benefit considerably from multi-tags, and propose careful RFID system design through the deployment of appropriate types of multi-tags and anti-collision algorithms. We also analyze the economics of multi-tag RFID systems and argue that the benefits of multi-tags can substantially outweigh the costs in many current applications, and that this trend will become even more pronounced in the future.
射频识别(RFID)是一种很有前途的非视距物体自动识别技术。然而,物体遮挡、金属/液体不透明、环境条件和无线电噪声等因素会降低RFID系统的整体可用性、可靠性和可靠性。我们表明,仅仅增加读者的数量并不能充分解决这些问题。相反,我们建议用多个标签标记每个对象,并提供明确的实验数据,表明该策略显着提高了RFID系统在面对无线电噪声和其他干扰因素时的有效性。我们通过解决可靠对象检测的障碍,并分析多标签如何改进标签检测,甚至在(无线电不透明的)金属和液体存在的情况下,巩固了多标签RFID系统的情况。我们讨论了将从多标签中获益的应用,并通过部署适当类型的多标签和防碰撞算法,提出了仔细的RFID系统设计。我们还分析了多标签RFID系统的经济效益,并认为在许多当前应用中,多标签的好处可以大大超过成本,并且这种趋势在未来将变得更加明显。
{"title":"The Case for Multi-Tag RFID Systems","authors":"L. Bolotnyy, G. Robins","doi":"10.1109/WASA.2007.44","DOIUrl":"https://doi.org/10.1109/WASA.2007.44","url":null,"abstract":"Radio frequency identification (RFID) is a promising technology for automated non-line-of-sight object identification. However, factors such as object occlusions, metal/liquid opaqueness, environmental conditions, and radio noise degrade the overall availability, reliability, and dependability of RFID systems. We show that simply increasing the number of readers does not adequately address these issues. Instead, we propose tagging each object with multiple tags, and provide definitive experimental data showing that this strategy dramatically improves the effectiveness of RFID systems in the face of radio noise and other interfering factors. We solidify the case for multi-tag RFID systems by addressing obstacles to reliable object detection, and analyzing how multi-tags improve tag detection, even in the presence of (radio-opaque) metals and liquids. We discuss applications that will benefit considerably from multi-tags, and propose careful RFID system design through the deployment of appropriate types of multi-tags and anti-collision algorithms. We also analyze the economics of multi-tag RFID systems and argue that the benefits of multi-tags can substantially outweigh the costs in many current applications, and that this trend will become even more pronounced in the future.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Defending Against Barrier Intrusions with Mobile Sensors 利用移动传感器防御屏障入侵
Guanqun Yang, W. Zhou, D. Qiao
Deploying wireless sensor networks has been recognized as one of the effective and cost-efficient ways to defend remote barrier regions such as international territorial borders. It has also been demonstrated recently that, by introducing sensor mobility into the wireless sensor network, the network coverage performance can be greatly improved. In this paper, we employ a game theoretic approach to study the problem of defending against barrier intrusions with mobile sensors, and demonstrate the equilibriums between barrier intrusions and sensor movement strategies in both non-obstructed and obstructed barriers. In particular, we derive the optimal sensor movement strategy to defend non-obstructed barriers, and propose a Dijkstra-like algorithm to generate a sensor movement strategy that performs well in defending obstructed barriers. We verify the correctness of our theoretic analysis by conducting in-depth simulations under various barrier intrusion and sensor movement scenarios.
部署无线传感器网络已被认为是防御远程障碍区域(如国际领土边界)的有效和经济有效的方法之一。最近也有研究表明,通过在无线传感器网络中引入传感器移动性,可以大大提高网络覆盖性能。本文采用博弈论的方法研究了移动传感器对障碍物入侵的防御问题,并论证了障碍物入侵与传感器在无障碍物和有障碍物情况下的运动策略之间的平衡点。特别地,我们推导了防御非障碍物的最优传感器运动策略,并提出了一种类dijkstra算法来生成防御障碍物的传感器运动策略。通过对各种障碍物入侵和传感器移动场景的深入仿真,验证了理论分析的正确性。
{"title":"Defending Against Barrier Intrusions with Mobile Sensors","authors":"Guanqun Yang, W. Zhou, D. Qiao","doi":"10.1109/WASA.2007.149","DOIUrl":"https://doi.org/10.1109/WASA.2007.149","url":null,"abstract":"Deploying wireless sensor networks has been recognized as one of the effective and cost-efficient ways to defend remote barrier regions such as international territorial borders. It has also been demonstrated recently that, by introducing sensor mobility into the wireless sensor network, the network coverage performance can be greatly improved. In this paper, we employ a game theoretic approach to study the problem of defending against barrier intrusions with mobile sensors, and demonstrate the equilibriums between barrier intrusions and sensor movement strategies in both non-obstructed and obstructed barriers. In particular, we derive the optimal sensor movement strategy to defend non-obstructed barriers, and propose a Dijkstra-like algorithm to generate a sensor movement strategy that performs well in defending obstructed barriers. We verify the correctness of our theoretic analysis by conducting in-depth simulations under various barrier intrusion and sensor movement scenarios.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1