首页 > 最新文献

International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)最新文献

英文 中文
A Novel Topology Discovery Service for Self-Organized WSNs 一种新的自组织wsn拓扑发现服务
S. Al-Omari, Weisong Shi
We propose a topology discovery service, which is a network service that promotes the concept of cross-layer design. The topology service, which is the fundamental of any self-organized and self-healing WSN, maintains several topology parameters that describe the sensor field and how the nodes are distributed in the field. To demonstrate the benefits of our service, we design a density-aware GPSR routing protocol (DA-GPSR) to take advantage of the parameters provided by our service and improve the performance of the original GPSR protocol. DA-GPSR uses node density to route around areas with high node density (i.e., crowded areas) and improves end-to-end performance of GPSR. We use TinyOS and TOSSIM for the implementation and simulation, respectively.
我们提出了一种拓扑发现服务,它是一种促进跨层设计概念的网络服务。拓扑服务是任何自组织和自修复WSN的基础,它维护几个拓扑参数,这些参数描述传感器字段以及节点在该字段中的分布方式。为了证明我们的服务的优势,我们设计了一个密度感知的GPSR路由协议(DA-GPSR),利用我们的服务提供的参数,提高原始GPSR协议的性能。DA-GPSR利用节点密度绕过节点密度高的区域(即拥挤区域),提高了GPSR的端到端性能。我们分别使用TinyOS和TOSSIM进行实现和仿真。
{"title":"A Novel Topology Discovery Service for Self-Organized WSNs","authors":"S. Al-Omari, Weisong Shi","doi":"10.1109/WASA.2007.138","DOIUrl":"https://doi.org/10.1109/WASA.2007.138","url":null,"abstract":"We propose a topology discovery service, which is a network service that promotes the concept of cross-layer design. The topology service, which is the fundamental of any self-organized and self-healing WSN, maintains several topology parameters that describe the sensor field and how the nodes are distributed in the field. To demonstrate the benefits of our service, we design a density-aware GPSR routing protocol (DA-GPSR) to take advantage of the parameters provided by our service and improve the performance of the original GPSR protocol. DA-GPSR uses node density to route around areas with high node density (i.e., crowded areas) and improves end-to-end performance of GPSR. We use TinyOS and TOSSIM for the implementation and simulation, respectively.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spectrally Efficient Frequency Hopping System Design forWireless Networks 无线网络频谱高效跳频系统设计
Tongtong Li, Qi Ling, Jian Ren
Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems, the transmitter hops in a pseudo-random manner among available frequencies according to a pre- specified algorithm, and the receiver operates accordingly in exact synchronization with the transmitter's hopping pattern. In multiple access systems, a collision may happen when more than one users transmit in the same frequency band simultaneously. Two major limitations with the conventional frequency hopping systems are: strict requirement on frequency acquisition/synchronization, and very low spectral efficiency due to inefficient utilization of the available bandwidth. In this paper, we introduce a new concept collision-free frequency hopping (CFFH). Based on the OFDM framework and the secure subcarrier assignment algorithm, the proposed CFFH system can achieve high information capacity through collision-free multiple access, and can successfully resolve the strict synchronization limitation. At the same time, as each user still transmits through a pseudo-random frequency hopping scheme, CFFH can maintain the inherent anti-jamming, anti-interception security features of the conventional FH system. The proposed CFFH scheme can be used for both civilian and military applications where secure high speed information transmission is needed.
跳频系统已广泛应用于军事通信中,以防止敌方干扰、拦截和探测。在传统的跳频系统中,发射机按照预先设定的算法在可用的频率中以伪随机的方式跳频,接收机按照与发射机跳频模式精确同步的方式工作。在多址系统中,当多个用户同时在同一频段传输时,可能会发生碰撞。传统跳频系统的两个主要限制是:对频率采集/同步要求严格,频谱效率很低,对可用带宽的利用率很低。本文提出了一种新的无碰撞跳频(CFFH)概念。基于OFDM框架和安全子载波分配算法,所提出的CFFH系统可以通过无冲突多址实现高信息容量,并成功地解决了严格的同步限制。同时,由于每个用户仍然通过伪随机跳频方案进行传输,CFFH可以保持传统跳频系统固有的抗干扰、抗拦截的安全特性。所提出的CFFH方案可用于需要安全高速信息传输的民用和军用应用。
{"title":"Spectrally Efficient Frequency Hopping System Design forWireless Networks","authors":"Tongtong Li, Qi Ling, Jian Ren","doi":"10.1109/WASA.2007.85","DOIUrl":"https://doi.org/10.1109/WASA.2007.85","url":null,"abstract":"Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems, the transmitter hops in a pseudo-random manner among available frequencies according to a pre- specified algorithm, and the receiver operates accordingly in exact synchronization with the transmitter's hopping pattern. In multiple access systems, a collision may happen when more than one users transmit in the same frequency band simultaneously. Two major limitations with the conventional frequency hopping systems are: strict requirement on frequency acquisition/synchronization, and very low spectral efficiency due to inefficient utilization of the available bandwidth. In this paper, we introduce a new concept collision-free frequency hopping (CFFH). Based on the OFDM framework and the secure subcarrier assignment algorithm, the proposed CFFH system can achieve high information capacity through collision-free multiple access, and can successfully resolve the strict synchronization limitation. At the same time, as each user still transmits through a pseudo-random frequency hopping scheme, CFFH can maintain the inherent anti-jamming, anti-interception security features of the conventional FH system. The proposed CFFH scheme can be used for both civilian and military applications where secure high speed information transmission is needed.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks 基于聚类的无线传感器网络安全弹性定位最小均方估计
Cliff X. Wang, An Liu, P. Ning
To support a wide variety of applications ranging from military surveillance to health care clinic monitoring, a wireless sensor network must obtain accurate location for each sensor. A number of localization schemes have been developed to allow each sensor node to acquire its location. However, most of these techniques assume benign environments, and thus cannot survive malicious attacks in hostile environments where external and/or compromised nodes may launch attacks. This paper proposes a new computationally efficient and resilient localization scheme based on the clustering of benign location reference anchors. Moreover, this paper reports both simulation and field experiments using a test-bed of MICAz motes performed to compare the proposed approach with several recent secure localization schemes. The experimental results demonstrate that the proposed scheme has the fastest execution time among all resilient localization schemes that can be used for the current generation of sensor platforms (e.g., MICA series of motes).
为了支持从军事监视到医疗保健诊所监测的各种应用,无线传感器网络必须获得每个传感器的准确位置。已经开发了许多定位方案,以允许每个传感器节点获取其位置。然而,大多数这些技术都假定环境是良性的,因此无法在外部和/或受损节点可能发起攻击的敌对环境中经受住恶意攻击。本文提出了一种新的基于良性位置参考锚点聚类的计算效率高且具有弹性的定位方案。此外,本文还报道了使用MICAz motes试验台进行的模拟和现场实验,以将所提出的方法与最近几种安全定位方案进行比较。实验结果表明,在当前传感器平台(如MICA系列motes)的所有弹性定位方案中,该方案的执行速度最快。
{"title":"Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks","authors":"Cliff X. Wang, An Liu, P. Ning","doi":"10.1109/WASA.2007.146","DOIUrl":"https://doi.org/10.1109/WASA.2007.146","url":null,"abstract":"To support a wide variety of applications ranging from military surveillance to health care clinic monitoring, a wireless sensor network must obtain accurate location for each sensor. A number of localization schemes have been developed to allow each sensor node to acquire its location. However, most of these techniques assume benign environments, and thus cannot survive malicious attacks in hostile environments where external and/or compromised nodes may launch attacks. This paper proposes a new computationally efficient and resilient localization scheme based on the clustering of benign location reference anchors. Moreover, this paper reports both simulation and field experiments using a test-bed of MICAz motes performed to compare the proposed approach with several recent secure localization schemes. The experimental results demonstrate that the proposed scheme has the fastest execution time among all resilient localization schemes that can be used for the current generation of sensor platforms (e.g., MICA series of motes).","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114637150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Data Fusion Algorithm for Large Heterogeneous Sensor Networks 大型异构传感器网络的数据融合算法
Hong Lin, J. Rushing, S. Graves, E. Criswell
A distributed search based data fusion algorithm is presented for target detections in large heterogeneous sensor networks. A score function is introduced as the objection function during the optimal search. The network state is determined when the score is the highest. A close to optimal solution can be obtained before the arrival of the next sensor data thus enabling real time target tracking. The algorithm is evaluated with a series of real-time simulations on networks of variable sensor compositions with a commodity Linux cluster.
针对大型异构传感器网络中的目标检测问题,提出了一种基于分布式搜索的数据融合算法。在最优搜索过程中引入分数函数作为目标函数。得分最高时确定网络状态。在下一个传感器数据到达之前,可以得到接近最优的解,从而实现目标的实时跟踪。在商用Linux集群上对可变传感器组成网络进行了一系列实时仿真,对算法进行了评估。
{"title":"A Data Fusion Algorithm for Large Heterogeneous Sensor Networks","authors":"Hong Lin, J. Rushing, S. Graves, E. Criswell","doi":"10.1109/WASA.2007.134","DOIUrl":"https://doi.org/10.1109/WASA.2007.134","url":null,"abstract":"A distributed search based data fusion algorithm is presented for target detections in large heterogeneous sensor networks. A score function is introduced as the objection function during the optimal search. The network state is determined when the score is the highest. A close to optimal solution can be obtained before the arrival of the next sensor data thus enabling real time target tracking. The algorithm is evaluated with a series of real-time simulations on networks of variable sensor compositions with a commodity Linux cluster.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"705 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123833314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Performance of Location-Centric Storage in Sensor Networks 传感器网络中位置中心存储的性能研究
Kai Xing, Xiuzhen Cheng, Jiang Li
In this paper, we study the performance of location-centric storage (LCS) theoretically. Our results indicate that LCS utilizes network resource efficiently. In particular, the storage load of sensors is independent of the network size, and is evenly distributed across the network. Moreover, the communication distance for getting event information is small. Therefore, the protocol has great scalability. In addition, we also propose algorithms for data retrieval in LCS. Our analysis shows that both the number of queries and the response cost involved in the algorithms could approach to the theoretical lower bound.
本文从理论上研究了位置中心存储(LCS)的性能。结果表明,LCS有效地利用了网络资源。特别是,传感器的存储负载与网络大小无关,并且在整个网络中均匀分布。此外,获取事件信息的通信距离小。因此,该协议具有很大的可扩展性。此外,我们还提出了LCS中的数据检索算法。我们的分析表明,查询数和算法所涉及的响应成本都可以接近理论下界。
{"title":"On the Performance of Location-Centric Storage in Sensor Networks","authors":"Kai Xing, Xiuzhen Cheng, Jiang Li","doi":"10.1109/WASA.2007.34","DOIUrl":"https://doi.org/10.1109/WASA.2007.34","url":null,"abstract":"In this paper, we study the performance of location-centric storage (LCS) theoretically. Our results indicate that LCS utilizes network resource efficiently. In particular, the storage load of sensors is independent of the network size, and is evenly distributed across the network. Moreover, the communication distance for getting event information is small. Therefore, the protocol has great scalability. In addition, we also propose algorithms for data retrieval in LCS. Our analysis shows that both the number of queries and the response cost involved in the algorithms could approach to the theoretical lower bound.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
An Efficient Traffic Adaptive Backoff Protocol for Wireless MAC Layer 一种高效的无线MAC层流量自适应后退协议
Jun Wang, Min Song
To avoid collisions in wireless networks, medium access control (MAC) protocols, such as distributed coordination function (DCF), have been developed to assist each node to decide when and how to access the communication channel. Although DCF is widely used in 802.11 based wireless local area networks, its performance is limited because DCF does not take into account the traffic intensity and node density. In other word, DCF only knows collision occurs but does not know how severe of the collision. In this paper, we develop a novel traffic adaptive backoff (TAB) protocol. We use network allocation vector count to approximate the intensity of surrounding traffic and the density of the nodes. TAB protocol then chooses a random backoff time uniformly between a lower threshold and an upper threshold. Simulations results suggest that the TAB protocol improves network performance by achieving a better channel utilization and reducing the number of dropped packets.
为了避免无线网络中的冲突,媒介访问控制(MAC)协议,如分布式协调函数(DCF)被开发出来,以帮助每个节点决定何时以及如何访问通信信道。虽然DCF在基于802.11的无线局域网中得到了广泛的应用,但由于DCF没有考虑到流量强度和节点密度,其性能受到了限制。换句话说,DCF只知道发生了碰撞,但不知道碰撞的严重程度。在本文中,我们开发了一种新的流量自适应后退(TAB)协议。我们使用网络分配向量计数来近似周围流量的强度和节点的密度。然后,TAB协议在下限阈值和上限阈值之间均匀地选择一个随机回退时间。仿真结果表明,TAB协议通过实现更好的信道利用率和减少丢包数量来提高网络性能。
{"title":"An Efficient Traffic Adaptive Backoff Protocol for Wireless MAC Layer","authors":"Jun Wang, Min Song","doi":"10.1109/WASA.2007.142","DOIUrl":"https://doi.org/10.1109/WASA.2007.142","url":null,"abstract":"To avoid collisions in wireless networks, medium access control (MAC) protocols, such as distributed coordination function (DCF), have been developed to assist each node to decide when and how to access the communication channel. Although DCF is widely used in 802.11 based wireless local area networks, its performance is limited because DCF does not take into account the traffic intensity and node density. In other word, DCF only knows collision occurs but does not know how severe of the collision. In this paper, we develop a novel traffic adaptive backoff (TAB) protocol. We use network allocation vector count to approximate the intensity of surrounding traffic and the density of the nodes. TAB protocol then chooses a random backoff time uniformly between a lower threshold and an upper threshold. Simulations results suggest that the TAB protocol improves network performance by achieving a better channel utilization and reducing the number of dropped packets.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"1932 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128845809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Novel Provably Secure Anonymous Communication (PSAC) Scheme 一种新的可证明安全匿名通信(PSAC)方案
Jian Ren, L. Harn, Tongtong Li
Anonymity is increasingly important for network communications concerning about censorship and privacy. Early research on source anonymous communication protocols generally stems from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. To solve this problem, a k-anonymous protocol based on hierarchical ring structure and mix technique was proposed. This proposed protocol is collision free and provides provable k-anonymity for both the sender and the recipient. However, this protocol requires the trustworthiness of k honest nodes, therefore, anonymity is only conditional. Alternatively, in this paper, we propose a provably secure anonymous communication (PSAC) scheme without relying on any trusted third parties. While ensuring the message sender anonymity, it can also provide message content authenticity. The proposed PSAC scheme can prevent tracing the senders of messages and limits the disruption that can be caused by participants.
匿名在网络通信中越来越重要,因为它涉及到审查和隐私。早期对源匿名通信协议的研究一般源于mixnet和DC-net。它们要么不能提供可证明的匿名性,要么遭受传输冲突。为了解决这一问题,提出了一种基于分层环结构和混合技术的k-匿名协议。该协议无冲突,并为发送方和接收方提供可证明的k-匿名性。但是,该协议需要k个诚实节点的可信度,因此匿名性是有条件的。或者,在本文中,我们提出了一个可证明的安全匿名通信(PSAC)方案,不依赖于任何可信的第三方。在保证消息发送方匿名的同时,还可以提供消息内容的真实性。所提出的PSAC方案可以防止跟踪消息的发送者,并限制可能由参与者引起的中断。
{"title":"A Novel Provably Secure Anonymous Communication (PSAC) Scheme","authors":"Jian Ren, L. Harn, Tongtong Li","doi":"10.1109/WASA.2007.137","DOIUrl":"https://doi.org/10.1109/WASA.2007.137","url":null,"abstract":"Anonymity is increasingly important for network communications concerning about censorship and privacy. Early research on source anonymous communication protocols generally stems from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. To solve this problem, a k-anonymous protocol based on hierarchical ring structure and mix technique was proposed. This proposed protocol is collision free and provides provable k-anonymity for both the sender and the recipient. However, this protocol requires the trustworthiness of k honest nodes, therefore, anonymity is only conditional. Alternatively, in this paper, we propose a provably secure anonymous communication (PSAC) scheme without relying on any trusted third parties. While ensuring the message sender anonymity, it can also provide message content authenticity. The proposed PSAC scheme can prevent tracing the senders of messages and limits the disruption that can be caused by participants.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC:一种高效节能的水下传感器网络MAC协议
P. Xie, Jun-hong Cui
Underwater sensor networks are significantly different from terrestrial sensor networks in that sound is mainly used as the communication medium. The long propagation delay and limited bandwidth of acoustic channels make the existing MAC protocols designed for radio networks either unpractical or not energy efficient for underwater sensor networks. In this paper, we propose a reservation-based MAC protocol, called R-MAC. The major design goals of R-MAC are energy efficiency and fairness. R-MAC schedules the transmissions of control packets and data packets to avoid data packet collision completely. The scheduling algorithms not only save energy but also solve the exposed terminal problem inherited in RTS/CTS-based protocols. Furthermore, the scheduling algorithms allow nodes in the network to select their own schedules, thus loosening the synchronization requirement the protocol. Additionally, R-MAC supports fairness. By simulations, we show that R-MAC is an energy efficient and fair MAC solution for underwater sensor networks.
水下传感器网络与地面传感器网络有很大的不同,水下传感器网络主要使用声音作为通信媒介。现有的无线网络MAC协议由于声学信道传输延迟长、带宽有限等缺点,在水下传感器网络中不适用或不节能。本文提出了一种基于预约的MAC协议,称为R-MAC。R-MAC的主要设计目标是节能和公平。R-MAC对控制报文和数据报文的传输进行调度,完全避免了数据报文的冲突。调度算法不仅节省了能源,而且解决了基于RTS/ cts协议的暴露终端问题。此外,调度算法允许网络中的节点选择自己的调度,从而放松了协议的同步要求。此外,R-MAC支持公平性。通过仿真,我们证明了R-MAC是一种节能且公平的水下传感器网络MAC解决方案。
{"title":"R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks","authors":"P. Xie, Jun-hong Cui","doi":"10.1109/WASA.2007.82","DOIUrl":"https://doi.org/10.1109/WASA.2007.82","url":null,"abstract":"Underwater sensor networks are significantly different from terrestrial sensor networks in that sound is mainly used as the communication medium. The long propagation delay and limited bandwidth of acoustic channels make the existing MAC protocols designed for radio networks either unpractical or not energy efficient for underwater sensor networks. In this paper, we propose a reservation-based MAC protocol, called R-MAC. The major design goals of R-MAC are energy efficiency and fairness. R-MAC schedules the transmissions of control packets and data packets to avoid data packet collision completely. The scheduling algorithms not only save energy but also solve the exposed terminal problem inherited in RTS/CTS-based protocols. Furthermore, the scheduling algorithms allow nodes in the network to select their own schedules, thus loosening the synchronization requirement the protocol. Additionally, R-MAC supports fairness. By simulations, we show that R-MAC is an energy efficient and fair MAC solution for underwater sensor networks.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 174
A Range-Difference Based Self-Positioning Scheme for Underwater Acoustic Sensor Networks 一种基于距离差的水声传感器网络自定位方案
Xiuzhen Cheng, Haining Shu, Q. Liang
In this paper, we present a silent positioning scheme termed as UPS for underwater acoustic sensor networks. UPS relies on the time-difference of arrivals measured locally at a sensor to detect range differences from the sensor to four anchor nodes. These range differences are averaged over multiple beacon intervals before they are combined to estimate the 3D sensor location through trilateration. UPS requires no time-synchronization and provides location privacy at underwater vehicles/sensors whose locations need to be determined. Simulation study on the position error of UPS under acoustic fading channels indicates that UPS is an effective scheme for underwater vehicle/sensor self- positioning.
在本文中,我们提出了一种称为UPS的水声传感器网络静音定位方案。UPS依靠传感器本地测量的到达时间差来检测传感器到四个锚节点的距离差。这些距离差在多个信标间隔上平均,然后通过三边测量来组合估计3D传感器的位置。UPS不需要时间同步,并为需要确定位置的水下航行器/传感器提供位置隐私。对声衰落信道下UPS定位误差的仿真研究表明,UPS是一种有效的水下航行器/传感器自定位方案。
{"title":"A Range-Difference Based Self-Positioning Scheme for Underwater Acoustic Sensor Networks","authors":"Xiuzhen Cheng, Haining Shu, Q. Liang","doi":"10.1109/WASA.2007.139","DOIUrl":"https://doi.org/10.1109/WASA.2007.139","url":null,"abstract":"In this paper, we present a silent positioning scheme termed as UPS for underwater acoustic sensor networks. UPS relies on the time-difference of arrivals measured locally at a sensor to detect range differences from the sensor to four anchor nodes. These range differences are averaged over multiple beacon intervals before they are combined to estimate the 3D sensor location through trilateration. UPS requires no time-synchronization and provides location privacy at underwater vehicles/sensors whose locations need to be determined. Simulation study on the position error of UPS under acoustic fading channels indicates that UPS is an effective scheme for underwater vehicle/sensor self- positioning.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
AUV-Aided Localization for Underwater Sensor Networks 水下传感器网络的auv辅助定位
M. Erol, L. Vieira, M. Gerla
We propose a localization scheme for underwater acoustic sensor networks (UWSN) that does not require a priori infra-structure or synchronization between nodes. An autonomous underwater vehicle (AUV) aids in localizing the sensor nodes while roaming across the underwater sensor field. The objectives of this paper are to describe how to localize nodes using AUV and to describe the tradeoffs involved, i.e. ratio of localized nodes and localization accuracy. We show that localization success improves as the duration of the AUV localization process increases. In addition, we investigated localization using two methods, bounding-box and triangulation. The former achieves a higher localization ratio but with a higher error. In certain scenarios, we achieved 100% nodes localized with 3% error.
我们提出了一种不需要先验基础设施或节点间同步的水声传感器网络(UWSN)定位方案。自主水下航行器(AUV)在水下传感器区域漫游时有助于定位传感器节点。本文的目标是描述如何使用AUV进行节点定位,并描述所涉及的权衡,即定位节点的比例和定位精度。我们表明,随着AUV定位过程持续时间的增加,定位成功率会提高。此外,我们还研究了边界盒法和三角法两种定位方法。前者具有较高的定位比,但误差较大。在某些场景中,我们实现了100%的节点本地化,误差为3%。
{"title":"AUV-Aided Localization for Underwater Sensor Networks","authors":"M. Erol, L. Vieira, M. Gerla","doi":"10.1109/WASA.2007.143","DOIUrl":"https://doi.org/10.1109/WASA.2007.143","url":null,"abstract":"We propose a localization scheme for underwater acoustic sensor networks (UWSN) that does not require a priori infra-structure or synchronization between nodes. An autonomous underwater vehicle (AUV) aids in localizing the sensor nodes while roaming across the underwater sensor field. The objectives of this paper are to describe how to localize nodes using AUV and to describe the tradeoffs involved, i.e. ratio of localized nodes and localization accuracy. We show that localization success improves as the duration of the AUV localization process increases. In addition, we investigated localization using two methods, bounding-box and triangulation. The former achieves a higher localization ratio but with a higher error. In certain scenarios, we achieved 100% nodes localized with 3% error.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 223
期刊
International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1