首页 > 最新文献

2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop最新文献

英文 中文
VANET mobility modeling challenged by feedback loops 反馈回路对VANET机动性建模的挑战
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970499
Martin Meyer, Ó. Trullols-Cruces, A. Hess, K. Hummel, J. Barceló-Ordinas, C. Casetti, G. Karlsson
VANET applications are often providing street traffic information to vehicles and drivers, regarding, for instance, traffic conditions and parking space availability. This information influences in turn the driving behavior in real-world settings. Mobility models used in current VANET simulations are mostly ignoring this feedback entirely. In cases the feedback is included, it is mainly based on ad-hoc approaches with lack of generality.
VANET应用程序通常向车辆和驾驶员提供街道交通信息,例如交通状况和停车位可用性。这些信息反过来影响现实环境中的驾驶行为。目前VANET模拟中使用的机动性模型大多完全忽略了这种反馈。在包括反馈的情况下,它主要是基于缺乏通用性的临时方法。
{"title":"VANET mobility modeling challenged by feedback loops","authors":"Martin Meyer, Ó. Trullols-Cruces, A. Hess, K. Hummel, J. Barceló-Ordinas, C. Casetti, G. Karlsson","doi":"10.1109/Med-Hoc-Net.2011.5970499","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970499","url":null,"abstract":"VANET applications are often providing street traffic information to vehicles and drivers, regarding, for instance, traffic conditions and parking space availability. This information influences in turn the driving behavior in real-world settings. Mobility models used in current VANET simulations are mostly ignoring this feedback entirely. In cases the feedback is included, it is mainly based on ad-hoc approaches with lack of generality.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A centralized inter-network resource sharing (CIRS) scheme in IEEE 802.22 cognitive networks IEEE 802.22认知网络中的集中式网络间资源共享(CIRS)方案
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970487
C. Passiatore, P. Camarda
IEEE 802.22 is a standard for Wireless Regional Area Network (WRAN) based on cognitive radio techniques. It allows sharing of geographically unused spectrum allocated to the Television Broadcast Service, without causing harmful interference to the licensed users. An open issue in cognitive 802.22 networks is represented by the resource distribution among WRANs. The contribution of this paper is a resource sharing algorithm which assigns resources to overlapped WRANs in such a way to avoid harmful interference among them. Specifically, we propose a collision free resource sharing method which, working in a multichannel environment, aims to assign band to the coexisting WRANs, satisfying their spectrum demand and determining a fair spectrum scheduling. The novel method adapts to the continuous changes of the spectrum availability due to necessity of vacating a channel in case of the incumbent primary users or otherwise due to the addition of unused band. Moreover, the introduced allocation scheme takes into account the issue of spatial diversity, i.e. the case where some channels do not spatially cover all the WRANs. The effectiveness of the proposed multichannel resource sharing scheme is proved through simulations, and the results, compared with other methods already known in literature, show that the algorithm makes a resource assignment which satisfies the requests and improve the use of the available channels, increasing the spectral efficiency.
IEEE 802.22是基于认知无线电技术的无线区域网络(WRAN)标准。它允许共享分配给电视广播服务的地理上未使用的频谱,而不会对持牌用户造成有害干扰。认知802.22网络中的一个开放性问题是wran之间的资源分配问题。本文的贡献在于提出了一种资源共享算法,将资源分配给重叠的WRANs,从而避免WRANs之间的有害干扰。具体来说,我们提出了一种在多信道环境下无冲突的资源共享方法,旨在为共存的WRANs分配频带,满足它们的频谱需求并确定公平的频谱调度。该方法适应了现有主要用户需要腾出信道或增加未使用频段而导致频谱可用性不断变化的情况。此外,引入的分配方案考虑了空间多样性的问题,即某些信道在空间上不能覆盖所有wran的情况。通过仿真验证了所提出的多信道资源共享方案的有效性,并与文献中已知的其他方法进行了比较,结果表明,该算法进行了满足请求的资源分配,提高了可用信道的利用率,提高了频谱效率。
{"title":"A centralized inter-network resource sharing (CIRS) scheme in IEEE 802.22 cognitive networks","authors":"C. Passiatore, P. Camarda","doi":"10.1109/Med-Hoc-Net.2011.5970487","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970487","url":null,"abstract":"IEEE 802.22 is a standard for Wireless Regional Area Network (WRAN) based on cognitive radio techniques. It allows sharing of geographically unused spectrum allocated to the Television Broadcast Service, without causing harmful interference to the licensed users. An open issue in cognitive 802.22 networks is represented by the resource distribution among WRANs. The contribution of this paper is a resource sharing algorithm which assigns resources to overlapped WRANs in such a way to avoid harmful interference among them. Specifically, we propose a collision free resource sharing method which, working in a multichannel environment, aims to assign band to the coexisting WRANs, satisfying their spectrum demand and determining a fair spectrum scheduling. The novel method adapts to the continuous changes of the spectrum availability due to necessity of vacating a channel in case of the incumbent primary users or otherwise due to the addition of unused band. Moreover, the introduced allocation scheme takes into account the issue of spatial diversity, i.e. the case where some channels do not spatially cover all the WRANs. The effectiveness of the proposed multichannel resource sharing scheme is proved through simulations, and the results, compared with other methods already known in literature, show that the algorithm makes a resource assignment which satisfies the requests and improve the use of the available channels, increasing the spectral efficiency.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Green wireless networking: Three questions 绿色无线网络:三个问题
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970491
M. Marsan, M. Meo
In this short note we briefly discuss three issues related to the relevance and the possible impact of research in the field of green networking, with special attention to the wireless case, since this is the context where energy efficiency is needed most.
在这篇短文中,我们简要讨论了与绿色网络领域研究的相关性和可能的影响相关的三个问题,特别关注无线情况,因为这是最需要能源效率的环境。
{"title":"Green wireless networking: Three questions","authors":"M. Marsan, M. Meo","doi":"10.1109/Med-Hoc-Net.2011.5970491","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970491","url":null,"abstract":"In this short note we briefly discuss three issues related to the relevance and the possible impact of research in the field of green networking, with special attention to the wireless case, since this is the context where energy efficiency is needed most.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A compiler assisted approach for component based reconfigurable MAC design 一种编译器辅助的基于组件的可重构MAC设计方法
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970480
J. Ansari, Xi Zhang, P. Mähönen
Cognitive radio networks require reconfiguration and adaptivity in order to efficiently meet the changing application demands and network conditions. We have developed a framework which allows composition of MAC protocols using a library of MAC components [1]. These components are implemented with a hardware-software co-design approach so as to satisfy the timeliness requirements as well as to provide the desired degree of flexibility. A domain specific MAC language and corresponding MAC-meta compiler toolchain is developed to realize highly dynamic and reconfigurable MAC solutions using the MAC components. The prototype implementation on WARP [2] SDR boards indicates that our approach eases the MAC development without compromising on the performance characteristics as compared to the monolithic way of implementing MAC protocols.
认知无线网络需要重构和自适应才能有效地满足不断变化的应用需求和网络条件。我们已经开发了一个框架,允许使用MAC组件库组合MAC协议[1]。这些组件采用硬件软件协同设计方法实现,以满足时效性要求并提供所需的灵活性。开发了一种特定领域的MAC语言和相应的MAC元编译器工具链,利用MAC组件实现高度动态和可重构的MAC解决方案。WARP [2] SDR板上的原型实现表明,与实现MAC协议的单片方式相比,我们的方法简化了MAC开发,而不会影响性能特征。
{"title":"A compiler assisted approach for component based reconfigurable MAC design","authors":"J. Ansari, Xi Zhang, P. Mähönen","doi":"10.1109/Med-Hoc-Net.2011.5970480","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970480","url":null,"abstract":"Cognitive radio networks require reconfiguration and adaptivity in order to efficiently meet the changing application demands and network conditions. We have developed a framework which allows composition of MAC protocols using a library of MAC components [1]. These components are implemented with a hardware-software co-design approach so as to satisfy the timeliness requirements as well as to provide the desired degree of flexibility. A domain specific MAC language and corresponding MAC-meta compiler toolchain is developed to realize highly dynamic and reconfigurable MAC solutions using the MAC components. The prototype implementation on WARP [2] SDR boards indicates that our approach eases the MAC development without compromising on the performance characteristics as compared to the monolithic way of implementing MAC protocols.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uisce: Characteristic-based routing in mobile ad hoc networks 移动自组织网络中基于特征的路由
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970476
Guoxian Yang, S. Weber
The goal of communication in computer networks is the delivery of information to endpoints with certain properties. In wired networks, identities such as IP addresses are used to guide information through a network and the properties of network nodes are mapped to these identities by service discovery mechanisms. In mobile ad hoc networks (MANETs), identities lose their guiding ability because of the dynamism of the topology.
计算机网络通信的目标是将信息传递到具有特定属性的端点。在有线网络中,IP地址等身份用于引导信息通过网络,并且通过服务发现机制将网络节点的属性映射到这些身份。在移动自组织网络(manet)中,由于拓扑结构的动态性,身份失去了引导能力。
{"title":"Uisce: Characteristic-based routing in mobile ad hoc networks","authors":"Guoxian Yang, S. Weber","doi":"10.1109/Med-Hoc-Net.2011.5970476","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970476","url":null,"abstract":"The goal of communication in computer networks is the delivery of information to endpoints with certain properties. In wired networks, identities such as IP addresses are used to guide information through a network and the properties of network nodes are mapped to these identities by service discovery mechanisms. In mobile ad hoc networks (MANETs), identities lose their guiding ability because of the dynamism of the topology.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulative performance evaluation of the simTD Self Organizing Traffic Information System simTD自组织交通信息系统仿真性能评价
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970497
D. Eckhoff, Tobias Gansen, R. Mänz, Daniel Thum, Oliver Klages, C. Sommer
The simTD (Safe and Intelligent Mobility: Test Field Germany) research project is another step towards bringing Car-to-X technology to marketability. One of its envisioned applications is a Traffic Information System (TIS) based on self-generated maps for vehicles not equipped with digital maps. To assure reliable operation, the function itself, its performance and the effect of its input parameters was simulatively evaluated before it was validated on real vehicles. In this paper we demonstrate how to adequately parameterize and evaluate such a TIS. We find feasible values for the input parameters for the creation of self-generated maps to ensure solid operation of the function. We further contribute to the community and other projects using similar TIS deployments by introducing applicable metrics for TIS evaluation in general and show our findings for the simTD research project.
simTD(安全和智能移动:德国试验场)研究项目是将Car-to-X技术推向市场的又一步。其设想的应用之一是交通信息系统(TIS),该系统基于自动生成的地图,适用于没有配备数字地图的车辆。为了保证系统的可靠运行,在对其进行实车验证之前,先对其功能本身、性能以及输入参数的影响进行了仿真评估。在本文中,我们演示了如何充分地参数化和评估这种TIS。我们为创建自生成映射的输入参数找到可行的值,以确保函数的可靠运行。我们进一步为社区和其他使用类似TIS部署的项目做出贡献,通过引入适用于TIS评估的标准,并展示我们对simTD研究项目的发现。
{"title":"Simulative performance evaluation of the simTD Self Organizing Traffic Information System","authors":"D. Eckhoff, Tobias Gansen, R. Mänz, Daniel Thum, Oliver Klages, C. Sommer","doi":"10.1109/Med-Hoc-Net.2011.5970497","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970497","url":null,"abstract":"The simTD (Safe and Intelligent Mobility: Test Field Germany) research project is another step towards bringing Car-to-X technology to marketability. One of its envisioned applications is a Traffic Information System (TIS) based on self-generated maps for vehicles not equipped with digital maps. To assure reliable operation, the function itself, its performance and the effect of its input parameters was simulatively evaluated before it was validated on real vehicles. In this paper we demonstrate how to adequately parameterize and evaluate such a TIS. We find feasible values for the input parameters for the creation of self-generated maps to ensure solid operation of the function. We further contribute to the community and other projects using similar TIS deployments by introducing applicable metrics for TIS evaluation in general and show our findings for the simTD research project.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient distributed privacy-preserving recommendation system 一个高效的分布式隐私保护推荐系统
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970495
Frederik Armknecht, T. Strufe
Implementing a recommendation system on the data of mobile social networks exploits knowledge about behavior and preferences of its users and hence raises serious privacy concerns. Leveraging the wealth of aggregated information in these services promises an immense benefit by allowing suggestions for presumably appreciated, yet previously unseen restaurants, sights, and further types of locations. Privacy preserving recommenders based on homomorphic encryption have been proposed, which have a systematic draw-back: while recommender systems often store their information as real values, all homomorphic encryption schemes used today process only data from other algebraic structures, e.g., the ring of integers modulo some integer n. Therefore, we present a novel distributed recommender and a homomorphic encryption scheme, which works directly on real numbers and which possesses some remarkable properties: it is conceptually simple, efficient, and provably secure.
基于移动社交网络数据的推荐系统利用了用户行为和偏好的知识,因此引发了严重的隐私问题。利用这些服务中丰富的聚合信息,可以为可能受到赞赏但以前未见过的餐馆、景点和其他类型的位置提供建议,从而带来巨大的好处。提出了基于同态加密的隐私保护推荐,但存在系统性缺陷:虽然推荐系统通常将其信息存储为实数,但目前使用的所有同态加密方案都只处理来自其他代数结构的数据,例如整数模取整数n的环。因此,我们提出了一种新的分布式推荐和同态加密方案,它直接作用于实数,并且具有一些显著的特性:概念简单,高效,并且可证明安全。
{"title":"An efficient distributed privacy-preserving recommendation system","authors":"Frederik Armknecht, T. Strufe","doi":"10.1109/Med-Hoc-Net.2011.5970495","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970495","url":null,"abstract":"Implementing a recommendation system on the data of mobile social networks exploits knowledge about behavior and preferences of its users and hence raises serious privacy concerns. Leveraging the wealth of aggregated information in these services promises an immense benefit by allowing suggestions for presumably appreciated, yet previously unseen restaurants, sights, and further types of locations. Privacy preserving recommenders based on homomorphic encryption have been proposed, which have a systematic draw-back: while recommender systems often store their information as real values, all homomorphic encryption schemes used today process only data from other algebraic structures, e.g., the ring of integers modulo some integer n. Therefore, we present a novel distributed recommender and a homomorphic encryption scheme, which works directly on real numbers and which possesses some remarkable properties: it is conceptually simple, efficient, and provably secure.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115829980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols 动态帧aloha协议的性能:缩小与树协议的差距
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970500
L. Barletta, F. Borgonovo, M. Cesana
The Dynamic-Frame-Aloha protocol, largely studied in the 60s in the field of random access satellite systems, is nowadays commonly applied also to Radio Frequency Identification systems to orchestrate the transmissions from the tags to the reader. In a nutshell, tags respond to reader's interrogation in slots randomly chosen in a frame whose size is dynamically set by the reader according to the current backlog (remaining tags to be resolved). In this paper, we explore the performance of the DFA protocol under Poisson-distributed population of tags when different strategies are adopted in setting the frame length and estimating the traffic backlog. We further analytically characterize the best strategy in the two cases where the frame is entirely explored or a new frame can be restarted at any slot.
动态帧- aloha协议,在60年代在随机接入卫星系统领域进行了大量研究,现在也普遍应用于射频识别系统,以协调从标签到读取器的传输。简而言之,标签在一个框架中随机选择的插槽中响应阅读器的询问,该框架的大小由阅读器根据当前积压(剩余的标签有待解决)动态设置。本文探讨了在泊松分布标签种群下,采用不同策略设置帧长度和估计流量积压时DFA协议的性能。我们进一步分析了两种情况下的最佳策略,即框架完全探索或新框架可以在任何时隙重新启动。
{"title":"Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols","authors":"L. Barletta, F. Borgonovo, M. Cesana","doi":"10.1109/Med-Hoc-Net.2011.5970500","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970500","url":null,"abstract":"The Dynamic-Frame-Aloha protocol, largely studied in the 60s in the field of random access satellite systems, is nowadays commonly applied also to Radio Frequency Identification systems to orchestrate the transmissions from the tags to the reader. In a nutshell, tags respond to reader's interrogation in slots randomly chosen in a frame whose size is dynamically set by the reader according to the current backlog (remaining tags to be resolved). In this paper, we explore the performance of the DFA protocol under Poisson-distributed population of tags when different strategies are adopted in setting the frame length and estimating the traffic backlog. We further analytically characterize the best strategy in the two cases where the frame is entirely explored or a new frame can be restarted at any slot.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
HRAN: Heat routing protocol for Ad-Hoc Networks HRAN: Ad-Hoc网络的热路由协议
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970479
J. Trindade, T. Vazão
In this paper we propose a new routing protocol for large scale Mobile Adhoc Networks, named HRAN. The protocol supports large networks, requires few resources from devices and lowers the control message overhead associated with discovering new routes. It works by simulating the paradigm of heat trails in a physical environment through the use of bloom filters. In our protocol each node emits a certain quantity of heat and as the node moves a heat trail is formed. After a node leaves a location the heat from surrounding nodes slowly dissipates. This heat information is then used to guide routing queries from the source to the destination.
本文提出了一种新的大规模移动自组网路由协议——HRAN。该协议支持大型网络,需要很少的设备资源,并且降低了与发现新路由相关的控制消息开销。它的工作原理是通过使用bloom过滤器来模拟物理环境中的热迹范式。在我们的协议中,每个节点发出一定数量的热量,随着节点的移动,形成热迹。当一个节点离开某个位置后,周围节点的热量会慢慢散失。然后使用此热信息来指导从源到目的地的路由查询。
{"title":"HRAN: Heat routing protocol for Ad-Hoc Networks","authors":"J. Trindade, T. Vazão","doi":"10.1109/Med-Hoc-Net.2011.5970479","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970479","url":null,"abstract":"In this paper we propose a new routing protocol for large scale Mobile Adhoc Networks, named HRAN. The protocol supports large networks, requires few resources from devices and lowers the control message overhead associated with discovering new routes. It works by simulating the paradigm of heat trails in a physical environment through the use of bloom filters. In our protocol each node emits a certain quantity of heat and as the node moves a heat trail is formed. After a node leaves a location the heat from surrounding nodes slowly dissipates. This heat information is then used to guide routing queries from the source to the destination.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128697274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers 基于移动读写器的限能RFID系统中人在和路由分流攻击
Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970494
L. Galluccio, G. Morabito, Marco Catania
Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.
本文的重点是一个大型RFID系统,其中移动读取器检测周围是否存在RFID标签,并定期将此类操作的结果报告给对定位所有RFID标签感兴趣的控制中心。为了将上述报告传递到控制中心,移动阅读器建立了一个移动自组网。在这种情况下,攻击者可能的目标是使系统相信某个RFID标签的位置与实际位置不同。为了实现这一点,攻击者执行中间人攻击和路由转移攻击。可以设计出对抗此类攻击的解决方案,但它们会增加能源消耗。本文阐述了这一问题,并讨论了安全与能源效率之间的权衡。此外,还给出了一些初步结果并进行了分析。
{"title":"Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers","authors":"L. Galluccio, G. Morabito, Marco Catania","doi":"10.1109/Med-Hoc-Net.2011.5970494","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970494","url":null,"abstract":"Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1