首页 > 最新文献

Principles of Mobile Computing最新文献

英文 中文
Efficient and secure keys management for wireless mobile communications 高效、安全的无线移动通信密钥管理
Pub Date : 2002-10-30 DOI: 10.1145/584490.584504
R. D. Pietro, L. Mancini, S. Jajodia
This paper presents an efficient algorithm for the secure group key management of mobile users. The most promising protocols to deal with group key management are those based on logical key hierarchy (LKH). The LKH model reduces to logarithmic size the resources needed: computation time, message exchanged, and memory space. In the framework of the LKH model, we present a new protocol LKH++ that outperforms the other proposed solutions in the literature. Such performance improvements are obtained exploiting both the properties of one-way hash functions and the information that the users already share in the LKH model. In particular, when a user eviction occurs in LKH++, each remaining user autonomously constructs a new key along the path from the evicted user to the root as a function of a specific logical child key. Therefore, the center can carry on the re-keying phase by distributing only a subset of the new keys and by reducing the number of communications to the users. When a join occurs, a minimal information is broadcast, while most of the communications are unicast toward just the joining user. The proposed LKH++ protocol establishes a group communication of n users requiring to unicast ((n-1)logn)/2 keys, while standard algorithms require to deliver nlogn keys. Such a solution allows the users to form promptly a new group if the wireless ad hoc network should be reconfigured. Moreover, the proposed extension to deal with mass leave and mass join allows a considerable savings in the messages sent by the center, as well as in the computations required by both the center and the users. Finally, the LKH++ protocol enhances the reliability of the key management due to the reduced number of communications needed in the re-keying phase.
提出了一种高效的移动用户安全组密钥管理算法。处理组密钥管理的最有前途的协议是基于逻辑密钥层次结构(LKH)的协议。LKH模型将所需的资源减少到对数大小:计算时间、消息交换和内存空间。在LKH模型的框架中,我们提出了一个新的协议LKH++,它优于文献中提出的其他解决方案。这种性能改进是利用单向散列函数的属性和用户已经在LKH模型中共享的信息获得的。特别是,当在lkh++中发生用户驱逐时,每个剩余的用户将按照特定逻辑子键的函数,沿着从被驱逐的用户到根的路径自主地构造一个新键。因此,中心可以通过只分发新密钥的一个子集和减少与用户的通信次数来进行重键阶段。当连接发生时,将广播最少的信息,而大多数通信仅对连接用户进行单播。提出的lkh++协议建立了n个用户的组通信,需要单播((n-1)logn)/2个密钥,而标准算法需要传递nlogn个密钥。这种解决方案允许用户在需要重新配置无线自组织网络时迅速组成一个新组。此外,提议的处理大量离开和大量加入的扩展允许在中心发送的消息以及中心和用户所需的计算中节省大量的时间。最后,由于减少了重键阶段所需的通信数量,lkh++协议增强了密钥管理的可靠性。
{"title":"Efficient and secure keys management for wireless mobile communications","authors":"R. D. Pietro, L. Mancini, S. Jajodia","doi":"10.1145/584490.584504","DOIUrl":"https://doi.org/10.1145/584490.584504","url":null,"abstract":"This paper presents an efficient algorithm for the secure group key management of mobile users. The most promising protocols to deal with group key management are those based on logical key hierarchy (LKH). The LKH model reduces to logarithmic size the resources needed: computation time, message exchanged, and memory space. In the framework of the LKH model, we present a new protocol LKH++ that outperforms the other proposed solutions in the literature. Such performance improvements are obtained exploiting both the properties of one-way hash functions and the information that the users already share in the LKH model. In particular, when a user eviction occurs in LKH++, each remaining user autonomously constructs a new key along the path from the evicted user to the root as a function of a specific logical child key. Therefore, the center can carry on the re-keying phase by distributing only a subset of the new keys and by reducing the number of communications to the users. When a join occurs, a minimal information is broadcast, while most of the communications are unicast toward just the joining user. The proposed LKH++ protocol establishes a group communication of n users requiring to unicast ((n-1)logn)/2 keys, while standard algorithms require to deliver nlogn keys. Such a solution allows the users to form promptly a new group if the wireless ad hoc network should be reconfigured. Moreover, the proposed extension to deal with mass leave and mass join allows a considerable savings in the messages sent by the center, as well as in the computations required by both the center and the users. Finally, the LKH++ protocol enhances the reliability of the key management due to the reduced number of communications needed in the re-keying phase.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Publish/subscribe scheme for mobile networks 移动网络的发布/订阅方案
Pub Date : 2002-10-30 DOI: 10.1145/584490.584505
E. Anceaume, A. Datta, M. Potop-Butucaru, G. Simon
The information dissemination in mobile networks is an important but complex and challenging problem. Designing suitable communication primitives for these systems is critical. One of these primitives is the publish/subscribe paradigm. The publish/subscribe is a strategy to establish communication between the information providers (publishers) and information consumers (subscribers) in a distributed system. Our work focuses on an appropriate distributed infrastructure suitable for a scalable implementation of a publish/subscribe system. We present a formal model which is adapted for the peer-based particular subscription criteria of publish/subscribe systems. Moreover, we propose a general deterministic information diffusion scheme for mobile systems. The three main features of our communication scheme are the following: First, our scheme is well-adapted to scalable systems without compromising any subscription criteria or network reorganization. Second, we maintain the anonymity of the distributed system --- in order to maintain the network structure, we need only local information. Third, our solution is fully decentralized and modular, thus making it appropriate for practical implementations.
移动网络中的信息传播是一个重要而又复杂而富有挑战性的问题。为这些系统设计合适的通信原语至关重要。其中一个原语是发布/订阅范式。发布/订阅是一种在分布式系统中建立信息提供者(发布者)和信息消费者(订阅者)之间通信的策略。我们的工作重点是为发布/订阅系统的可伸缩实现提供合适的分布式基础设施。我们提出了一个正式的模型,该模型适用于基于对等的发布/订阅系统的特定订阅标准。此外,我们还提出了一种通用的移动系统确定性信息扩散方案。我们的通信方案的三个主要特征如下:首先,我们的方案很好地适应于可扩展的系统,而不会损害任何订阅标准或网络重组。其次,我们保持分布式系统的匿名性——为了保持网络结构,我们只需要本地信息。第三,我们的解决方案是完全去中心化和模块化的,因此适合于实际实现。
{"title":"Publish/subscribe scheme for mobile networks","authors":"E. Anceaume, A. Datta, M. Potop-Butucaru, G. Simon","doi":"10.1145/584490.584505","DOIUrl":"https://doi.org/10.1145/584490.584505","url":null,"abstract":"The information dissemination in mobile networks is an important but complex and challenging problem. Designing suitable communication primitives for these systems is critical. One of these primitives is the publish/subscribe paradigm. The publish/subscribe is a strategy to establish communication between the information providers (publishers) and information consumers (subscribers) in a distributed system. Our work focuses on an appropriate distributed infrastructure suitable for a scalable implementation of a publish/subscribe system. We present a formal model which is adapted for the peer-based particular subscription criteria of publish/subscribe systems. Moreover, we propose a general deterministic information diffusion scheme for mobile systems. The three main features of our communication scheme are the following: First, our scheme is well-adapted to scalable systems without compromising any subscription criteria or network reorganization. Second, we maintain the anonymity of the distributed system --- in order to maintain the network structure, we need only local information. Third, our solution is fully decentralized and modular, thus making it appropriate for practical implementations.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Circle formation for oblivious anonymous mobile robots with no common sense of orientation 无方向感的无意识匿名移动机器人的圆圈形成
Pub Date : 2002-10-30 DOI: 10.1145/584490.584509
X. Défago, A. Konagaya
This paper proposes a distributed algorithm by which a collection of mobile robots roaming on a plane move to form a circle. The algorithm operates under the premises that robots (1) are unable to recall past actions and observations (i.e., oblivious), (2) cannot be distinguished from each others (i.e., anonymous), (3) share no common sense of direction, and (4) are unable to communicate in any other ways than by observing each others position.
本文提出了一种分布式算法,通过该算法,在平面上漫游的移动机器人集合形成一个圆。该算法在以下前提下运行:(1)机器人无法回忆过去的行为和观察(即遗忘),(2)无法彼此区分(即匿名),(3)没有共同的方向感,(4)除了观察彼此的位置外,无法以任何其他方式进行交流。
{"title":"Circle formation for oblivious anonymous mobile robots with no common sense of orientation","authors":"X. Défago, A. Konagaya","doi":"10.1145/584490.584509","DOIUrl":"https://doi.org/10.1145/584490.584509","url":null,"abstract":"This paper proposes a distributed algorithm by which a collection of mobile robots roaming on a plane move to form a circle. The algorithm operates under the premises that robots (1) are unable to recall past actions and observations (i.e., oblivious), (2) cannot be distinguished from each others (i.e., anonymous), (3) share no common sense of direction, and (4) are unable to communicate in any other ways than by observing each others position.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Time bounded medium access control for ad hoc networks 自组织网络的限时介质访问控制
Pub Date : 2002-10-30 DOI: 10.1145/584490.584492
R. Cunningham, V. Cahill
Most previous work on medium access control (MAC) protocols for wireless ad hoc networks has focused on the twin goals of maximising throughput and minimising average packet delay as required for general-purpose applications.In this paper we describe a new MAC protocol for use in multi-hop ad hoc networks whose goal is to provide, with high probability, time-bounded access to the wireless medium for applications with guaranteed response time requirements.The Time-Bounded Medium Access Control (TBMAC) protocol is based on time-division multiple access with dynamic but predictable slot allocation. TBMAC uses a light-weight atomic multicast protocol to achieve distributed agreement on slot allocation and employs location information to minimise contention for slots.TBMAC is the first time-bounded MAC protocol for multi-hop wireless ad hoc networks. In this paper we describe the protocol and provide a number of time bounds for the transmission of messages.
以前关于无线自组织网络的介质访问控制(MAC)协议的大多数工作都集中在通用应用程序所需的最大吞吐量和最小平均数据包延迟的双重目标上。在本文中,我们描述了一种用于多跳自组织网络的新MAC协议,其目标是为具有保证响应时间要求的应用程序提供高概率的有时间限制的无线介质访问。TBMAC (Time-Bounded Medium Access Control)协议是一种基于分时多址的协议,具有动态但可预测的时隙分配。TBMAC采用轻量级原子多播协议实现槽位分配的分布式协议,并利用位置信息最小化槽位争用。TBMAC是第一个针对多跳无线自组织网络的有时间限制的MAC协议。在本文中,我们描述了该协议,并为消息的传输提供了一些时间限制。
{"title":"Time bounded medium access control for ad hoc networks","authors":"R. Cunningham, V. Cahill","doi":"10.1145/584490.584492","DOIUrl":"https://doi.org/10.1145/584490.584492","url":null,"abstract":"Most previous work on medium access control (MAC) protocols for wireless ad hoc networks has focused on the twin goals of maximising throughput and minimising average packet delay as required for general-purpose applications.In this paper we describe a new MAC protocol for use in multi-hop ad hoc networks whose goal is to provide, with high probability, time-bounded access to the wireless medium for applications with guaranteed response time requirements.The Time-Bounded Medium Access Control (TBMAC) protocol is based on time-division multiple access with dynamic but predictable slot allocation. TBMAC uses a light-weight atomic multicast protocol to achieve distributed agreement on slot allocation and employs location information to minimise contention for slots.TBMAC is the first time-bounded MAC protocol for multi-hop wireless ad hoc networks. In this paper we describe the protocol and provide a number of time bounds for the transmission of messages.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125056416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
K-clustering in wireless ad hoc networks 无线自组织网络中的k -聚类
Pub Date : 2002-10-30 DOI: 10.1145/584490.584497
Yaacov Fernandess, D. Malkhi
Ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Clustering is commonly used in order to limit the amount of routing information stored and maintained at individual hosts. A k-clustering is a framework in which the wireless network is divided into non-overlapping sub networks, also referred to as clusters, and where every two wireless hosts in a sub network are at most k hops from each other. The algorithmic complexity of k-clustering is known to be NP-Complete for simple undirected graphs. For the special family of graphs that represent ad hoc wireless networks, modeled as unit disk graphs, we introduce a two phase distributed polynomial time and message complexity approximation solution with O(k) worst case ratio over the optimal solution. The first phase constructs a spanning tree of the network and the second phase then partitions the spanning tree into subtrees with bounded diameters.
自组织网络由无线主机组成,它们在没有固定基础设施的情况下相互通信。集群通常用于限制在单个主机上存储和维护的路由信息的数量。k-clustering是一种将无线网络划分为不重叠的子网络(也称为集群)的框架,其中子网络中的每两个无线主机彼此之间的跳数最多为k。对于简单无向图,k-聚类的算法复杂度是np完全的。对于表示自组织无线网络的特殊图族,建模为单元磁盘图,我们引入了一个两阶段分布多项式时间和消息复杂性近似解,最坏情况比为最优解O(k)。第一阶段构建网络的生成树,第二阶段将生成树划分为直径有界的子树。
{"title":"K-clustering in wireless ad hoc networks","authors":"Yaacov Fernandess, D. Malkhi","doi":"10.1145/584490.584497","DOIUrl":"https://doi.org/10.1145/584490.584497","url":null,"abstract":"Ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Clustering is commonly used in order to limit the amount of routing information stored and maintained at individual hosts. A k-clustering is a framework in which the wireless network is divided into non-overlapping sub networks, also referred to as clusters, and where every two wireless hosts in a sub network are at most k hops from each other. The algorithmic complexity of k-clustering is known to be NP-Complete for simple undirected graphs. For the special family of graphs that represent ad hoc wireless networks, modeled as unit disk graphs, we introduce a two phase distributed polynomial time and message complexity approximation solution with O(k) worst case ratio over the optimal solution. The first phase constructs a spanning tree of the network and the second phase then partitions the spanning tree into subtrees with bounded diameters.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 166
Towards flexible credential verification in mobile ad-hoc networks 面向移动自组织网络的灵活凭证验证
Pub Date : 2002-10-30 DOI: 10.1145/584490.584503
S. Keoh, Emil C. Lupu
Ad-hoc networks facilitate interconnectivity between mobile devices without the support of a network infrastructure. In this paper we propose a flexible credential verification mechanism, which improves the likelihood that participants in an ad-hoc network can verify each other's credentials despite the lack of access to certification and attribute authorities. Users maintain Credential Assertion Statements (CASs), which are formed through extraction of X.509 and attribute certificates into an interoperable XML form. Trusted entities that can verify the credentials listed in the CAS can then issue signed Assertion Signature Statements (ASSs) to other participants in the ad-hoc network. In addition, each user maintains a key ring, which comprises the list of public-keys trusted to sign credential assertion statements. All public-keys in the ring are assigned a trustworthiness level. When a user presents his/her CAS together with matching ASSs to a verifier, the verifier checks the signatures in the ASSs against its key ring to determine whether credentials in the CAS are authentic and acceptable. Transitivity of trust is generally not allowed, but there are exceptional cases in which it is permitted.
Ad-hoc网络在没有网络基础设施支持的情况下促进了移动设备之间的互连。在本文中,我们提出了一种灵活的凭证验证机制,该机制提高了ad-hoc网络中参与者在缺乏认证和属性权威访问的情况下验证彼此凭证的可能性。用户维护凭据断言语句(Credential Assertion Statements, CASs),这些语句是通过将X.509和属性证书提取为可互操作的XML格式而形成的。可以验证CAS中列出的凭据的受信任实体然后可以向自组织网络中的其他参与者发出已签名的断言签名声明(ASSs)。此外,每个用户维护一个密匙环,其中包含受信任的公钥列表,用于签署凭据断言语句。环中的所有公钥都被分配了一个可信级别。当用户将他/她的CAS连同匹配的ASSs提交给验证者时,验证者根据其密钥环检查ASSs中的签名,以确定CAS中的凭据是否真实且可接受。信任的传递性通常是不允许的,但也有例外情况是允许的。
{"title":"Towards flexible credential verification in mobile ad-hoc networks","authors":"S. Keoh, Emil C. Lupu","doi":"10.1145/584490.584503","DOIUrl":"https://doi.org/10.1145/584490.584503","url":null,"abstract":"Ad-hoc networks facilitate interconnectivity between mobile devices without the support of a network infrastructure. In this paper we propose a flexible credential verification mechanism, which improves the likelihood that participants in an ad-hoc network can verify each other's credentials despite the lack of access to certification and attribute authorities. Users maintain Credential Assertion Statements (CASs), which are formed through extraction of X.509 and attribute certificates into an interoperable XML form. Trusted entities that can verify the credentials listed in the CAS can then issue signed Assertion Signature Statements (ASSs) to other participants in the ad-hoc network. In addition, each user maintains a key ring, which comprises the list of public-keys trusted to sign credential assertion statements. All public-keys in the ring are assigned a trustworthiness level. When a user presents his/her CAS together with matching ASSs to a verifier, the verifier checks the signatures in the ASSs against its key ring to determine whether credentials in the CAS are authentic and acceptable. Transitivity of trust is generally not allowed, but there are exceptional cases in which it is permitted.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the consistency problem in mobile distributed computing 移动分布式计算中的一致性问题
Pub Date : 2002-10-30 DOI: 10.1145/584490.584501
R. Guerraoui, C. Hari
This paper describes some preliminary steps towards defining a consistency criteria for mobile replicated systems using operational transformations. Our criterion lies between traditional strong criteria, preventing divergence, and traditional weak criteria, not enforcing any eventual form of convergence. We give a precise definition of our criterion and discuss its use to state the correctness and incorrectness of some existing practical algorithms.
本文描述了为使用操作转换的移动复制系统定义一致性标准的一些初步步骤。我们的标准介于传统的强标准(防止分歧)和传统的弱标准(不强制任何最终形式的收敛)之间。我们给出了准则的精确定义,并讨论了如何用它来说明一些现有的实用算法的正确性和不正确性。
{"title":"On the consistency problem in mobile distributed computing","authors":"R. Guerraoui, C. Hari","doi":"10.1145/584490.584501","DOIUrl":"https://doi.org/10.1145/584490.584501","url":null,"abstract":"This paper describes some preliminary steps towards defining a consistency criteria for mobile replicated systems using operational transformations. Our criterion lies between traditional strong criteria, preventing divergence, and traditional weak criteria, not enforcing any eventual form of convergence. We give a precise definition of our criterion and discuss its use to state the correctness and incorrectness of some existing practical algorithms.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Smart dust protocols for local detection and propagation 用于本地检测和传播的智能尘埃协议
Pub Date : 2002-10-30 DOI: 10.1145/584490.584493
I. Chatzigiannakis, S. Nikoletseas, P. Spirakis
Smart Dust is a set of a ast number of ultra-small fully autonomous computing and communication devices, with very restricted energy and computing capabilities, that cooperate to quickly and efficiently accomplish a large sensing task. Smart Dust can be very useful in practice i.e. in the local detection of a remote crucial event and the propagation of data reporting its realization. In this work we make an effort towards the research on smart dust from a basic algorithmic point of view. We first provide a simple but realistic model for smart dust and present an interesting problem, which is how to propagate efficiently information on an event detected locally. Then we present smart dust protocols for local detection and propagation that are simple enough to be implemented on real smart dust systems, and perform, under some simplifying assumptions, a rigorous average case analysis of their efficiency and energy consumption (and their interplay). This analysis leads to concrete results showing that our protocols are very efficient.
智能尘埃是一组数量众多的超小型完全自主计算和通信设备,具有非常有限的能量和计算能力,它们相互协作以快速有效地完成大型传感任务。智能尘埃在实践中非常有用,即在本地检测远程关键事件并传播报告其实现的数据。本文从基本算法的角度对智能粉尘进行了研究。我们首先提供了一个简单但现实的智能尘埃模型,并提出了一个有趣的问题,即如何有效地传播本地检测到的事件信息。然后,我们提出了用于本地检测和传播的智能粉尘协议,这些协议足够简单,可以在真实的智能粉尘系统上实现,并在一些简化的假设下,对其效率和能耗(及其相互作用)进行了严格的平均案例分析。这一分析得出了具体的结果,表明我们的协议是非常有效的。
{"title":"Smart dust protocols for local detection and propagation","authors":"I. Chatzigiannakis, S. Nikoletseas, P. Spirakis","doi":"10.1145/584490.584493","DOIUrl":"https://doi.org/10.1145/584490.584493","url":null,"abstract":"Smart Dust is a set of a ast number of ultra-small fully autonomous computing and communication devices, with very restricted energy and computing capabilities, that cooperate to quickly and efficiently accomplish a large sensing task. Smart Dust can be very useful in practice i.e. in the local detection of a remote crucial event and the propagation of data reporting its realization. In this work we make an effort towards the research on smart dust from a basic algorithmic point of view. We first provide a simple but realistic model for smart dust and present an interesting problem, which is how to propagate efficiently information on an event detected locally. Then we present smart dust protocols for local detection and propagation that are simple enough to be implemented on real smart dust systems, and perform, under some simplifying assumptions, a rigorous average case analysis of their efficiency and energy consumption (and their interplay). This analysis leads to concrete results showing that our protocols are very efficient.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
On name resolution in peer-to-peer networks 点对点网络中的名称解析
Pub Date : 2002-10-30 DOI: 10.1145/584490.584507
Xiaozhou Li, C. Plaxton
An efficient name resolution scheme is the cornerstone of any peer-to-peer network. The name resolution scheme proposed by Plaxton, Rajaraman, and Richa, which we hereafter refer to as the PRR scheme, is a scalable name resolution scheme that also provides provable locality properties. However, since PRR goes to extra lengths to provide these locality properties, it is somewhat complicated. In this paper, we propose a scalable, locality-aware, and fault-tolerant name resolution scheme which can be considered a simplified version of PRR. Although this new scheme does not provide as strong locality guarantees as PRR, it exploits locality heuristically yet effectively.
有效的名称解析方案是任何点对点网络的基石。由Plaxton、Rajaraman和Richa提出的名称解析方案(以下简称PRR方案)是一种可扩展的名称解析方案,它还提供了可证明的局域性属性。然而,由于PRR花费了额外的时间来提供这些局部性属性,因此它有点复杂。在本文中,我们提出了一种可扩展的、位置感知的、容错的名称解析方案,它可以被认为是PRR的简化版本。虽然该方案不像PRR方案那样提供强大的局部性保证,但它有效地利用了局部性。
{"title":"On name resolution in peer-to-peer networks","authors":"Xiaozhou Li, C. Plaxton","doi":"10.1145/584490.584507","DOIUrl":"https://doi.org/10.1145/584490.584507","url":null,"abstract":"An efficient name resolution scheme is the cornerstone of any peer-to-peer network. The name resolution scheme proposed by Plaxton, Rajaraman, and Richa, which we hereafter refer to as the PRR scheme, is a scalable name resolution scheme that also provides provable locality properties. However, since PRR goes to extra lengths to provide these locality properties, it is somewhat complicated. In this paper, we propose a scalable, locality-aware, and fault-tolerant name resolution scheme which can be considered a simplified version of PRR. Although this new scheme does not provide as strong locality guarantees as PRR, it exploits locality heuristically yet effectively.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129329157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
On the accuracy of MANET simulators 关于MANET仿真器的精度
Pub Date : 2002-10-30 DOI: 10.1145/584490.584499
D. Cavin, Y. Sasson, A. Schiper
The deployment of wireless applications or protocols in the context of Mobile Ad-hoc NETworks (MANETs), often requires to step through a simulation phase. For the results of the simulation to be meaningful, it is important that the model on which is based the simulator matches as closely as possible the reality. In this paper we present the simulation results of a straightforward algorithm using several popular simulators (OPNET Modeler, NS-2, GloMoSim). The results tend to show that significant divergences exist between the simulators. This can be explained partly by the mismatching of the modelisation of each simulator and also by the different levels of detail provided to implement and configure the simulated scenarios.
在移动自组织网络(manet)环境中部署无线应用程序或协议,通常需要经过一个模拟阶段。为了使仿真结果有意义,重要的是模拟器所基于的模型尽可能地与现实相匹配。在本文中,我们介绍了使用几种流行的模拟器(OPNET Modeler, NS-2, GloMoSim)的简单算法的仿真结果。结果表明,仿真器之间存在显著的差异。这可以部分解释为每个模拟器的建模不匹配,也可以解释为实现和配置模拟场景所提供的不同级别的细节。
{"title":"On the accuracy of MANET simulators","authors":"D. Cavin, Y. Sasson, A. Schiper","doi":"10.1145/584490.584499","DOIUrl":"https://doi.org/10.1145/584490.584499","url":null,"abstract":"The deployment of wireless applications or protocols in the context of Mobile Ad-hoc NETworks (MANETs), often requires to step through a simulation phase. For the results of the simulation to be meaningful, it is important that the model on which is based the simulator matches as closely as possible the reality. In this paper we present the simulation results of a straightforward algorithm using several popular simulators (OPNET Modeler, NS-2, GloMoSim). The results tend to show that significant divergences exist between the simulators. This can be explained partly by the mismatching of the modelisation of each simulator and also by the different levels of detail provided to implement and configure the simulated scenarios.","PeriodicalId":344182,"journal":{"name":"Principles of Mobile Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126789345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 446
期刊
Principles of Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1