首页 > 最新文献

2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

英文 中文
Semi-Markov process based model for performance analysis of wireless LANs 基于半马尔可夫过程的无线局域网性能分析模型
M. Kadiyala, Dipti Shikha, R. Pendse, Neeraj Jaggi
In this paper, we propose a new semi-Markov process based model to compute the network parameters such as saturation throughput, for the IEEE 802.11 Distributed Coordination Function (DCF) employing the Binary Exponential Backoff (BEB). The backoff stages of BEB and their backoff intervals are modeled as the states of semi-Markov process and their state holding-times, respectively. The proposed model is simpler than Bianchi's two-dimensional Markov chain based model, with the number of states in the proposed model being of the order O(m), where m is the number of backoff stages in the BEB, compared with the Bianchi's model where number of states is of the order O(2m). Using the proposed semi-Markov process model, we compute the parameters of interest in wireless LANs, such as conditional collision probability, packet transmission probability, and saturation throughput. We show that the proposed model is quite accurate in computing these parameters of interest. Moreover, we show that the computation time with the proposed model is approximately one-tenth of that with Bianchi's model, using Matlab simulations. Thus, the proposed model achieves accurate results with less complexity and computation time, and is suitable to be used for performance evaluation of complex protocols such as IEEE 802.11e.
针对ieee802.11分布式协调函数(DCF),我们提出了一种基于半马尔可夫过程的网络参数计算模型,该模型采用二进制指数回退(BEB)来计算饱和吞吐量等网络参数。将BEB的退避阶段及其退避区间分别建模为半马尔可夫过程的状态及其状态保持时间。该模型比Bianchi的基于二维马尔可夫链的模型更简单,与Bianchi的模型相比,该模型的状态数为O(m)阶,其中m为BEB中的后退阶段数,而Bianchi的模型的状态数为O(2m)阶。利用所提出的半马尔可夫过程模型,我们计算了无线局域网中相关的参数,如条件碰撞概率、分组传输概率和饱和吞吐量。我们表明,所提出的模型在计算这些感兴趣的参数时是相当准确的。此外,我们使用Matlab仿真表明,所提出模型的计算时间大约是Bianchi模型的十分之一。因此,该模型以较低的复杂度和计算时间获得了准确的结果,适合用于IEEE 802.11e等复杂协议的性能评估。
{"title":"Semi-Markov process based model for performance analysis of wireless LANs","authors":"M. Kadiyala, Dipti Shikha, R. Pendse, Neeraj Jaggi","doi":"10.1109/PERCOMW.2011.5766962","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766962","url":null,"abstract":"In this paper, we propose a new semi-Markov process based model to compute the network parameters such as saturation throughput, for the IEEE 802.11 Distributed Coordination Function (DCF) employing the Binary Exponential Backoff (BEB). The backoff stages of BEB and their backoff intervals are modeled as the states of semi-Markov process and their state holding-times, respectively. The proposed model is simpler than Bianchi's two-dimensional Markov chain based model, with the number of states in the proposed model being of the order O(m), where m is the number of backoff stages in the BEB, compared with the Bianchi's model where number of states is of the order O(2m). Using the proposed semi-Markov process model, we compute the parameters of interest in wireless LANs, such as conditional collision probability, packet transmission probability, and saturation throughput. We show that the proposed model is quite accurate in computing these parameters of interest. Moreover, we show that the computation time with the proposed model is approximately one-tenth of that with Bianchi's model, using Matlab simulations. Thus, the proposed model achieves accurate results with less complexity and computation time, and is suitable to be used for performance evaluation of complex protocols such as IEEE 802.11e.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Intelligent information dissemination in collaborative, context-aware environments 协作、上下文感知环境中的智能信息传播
K. Frank, Matthias Röckl, T. Pfeifer
Today's mobile computing environments aggregate many entities, all of them with a number of internal sensors, processing applications and other, user given information that can be shared with others over the available networks. Tomorrow's ubiquitous computing environments, where the number of sensors is assumed to be even significantly higher, face the challenge that information exchange between entities has to be controlled, not only to protect privacy and to unburden the wireless networks - but also to reduce load on the receiving entities that have to process all incoming information. The approach we propose in this work measures the importance of some information and the interest of the receiver in it, before it is transferred. We apply it in two scenarios with limited resources. In vehicle-to-vehicle communications the transmission time while cars meet and bandwidth availability of the wireless channel is the critical resource, forcing to reduce information exchange. In context inference on mobile devices processing power and battery life are limited and responsiveness to user actions is most important. Hence only the most important information should be processed.
今天的移动计算环境聚集了许多实体,它们都有许多内部传感器、处理应用程序和其他用户提供的信息,这些信息可以通过可用的网络与他人共享。未来的无处不在的计算环境中,传感器的数量被认为会显著增加,面临着实体之间的信息交换必须受到控制的挑战,这不仅是为了保护隐私和减轻无线网络的负担,也是为了减少接收实体必须处理所有传入信息的负荷。我们在这项工作中提出的方法是在信息传递之前测量一些信息的重要性和接收者对它的兴趣。我们将其应用于两种资源有限的场景。在车对车通信中,车与车之间的传输时间和无线信道的带宽可用性是关键资源,迫使信息交换减少。在移动设备上的上下文推理处理能力和电池寿命是有限的,对用户操作的响应是最重要的。因此,只处理最重要的信息。
{"title":"Intelligent information dissemination in collaborative, context-aware environments","authors":"K. Frank, Matthias Röckl, T. Pfeifer","doi":"10.1109/PERCOMW.2011.5766954","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766954","url":null,"abstract":"Today's mobile computing environments aggregate many entities, all of them with a number of internal sensors, processing applications and other, user given information that can be shared with others over the available networks. Tomorrow's ubiquitous computing environments, where the number of sensors is assumed to be even significantly higher, face the challenge that information exchange between entities has to be controlled, not only to protect privacy and to unburden the wireless networks - but also to reduce load on the receiving entities that have to process all incoming information. The approach we propose in this work measures the importance of some information and the interest of the receiver in it, before it is transferred. We apply it in two scenarios with limited resources. In vehicle-to-vehicle communications the transmission time while cars meet and bandwidth availability of the wireless channel is the critical resource, forcing to reduce information exchange. In context inference on mobile devices processing power and battery life are limited and responsiveness to user actions is most important. Hence only the most important information should be processed.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using context-profiling to aid access control decisions in mobile devices 使用上下文分析来帮助移动设备中的访问控制决策
Aditi Gupta, Markus Miettinen, N. Asokan
In this paper, we demonstrate the use of context-profiling for making access control decisions in mobile devices. In particular, we discuss the device locking use case, where the device locking timeout and unlocking method are dynamically decided based on the perceived safety of current context.
在本文中,我们演示了在移动设备中使用上下文分析来做出访问控制决策。我们特别讨论了设备锁定用例,其中设备锁定超时和解锁方法是根据当前上下文的感知安全性动态决定的。
{"title":"Using context-profiling to aid access control decisions in mobile devices","authors":"Aditi Gupta, Markus Miettinen, N. Asokan","doi":"10.1109/PERCOMW.2011.5766891","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766891","url":null,"abstract":"In this paper, we demonstrate the use of context-profiling for making access control decisions in mobile devices. In particular, we discuss the device locking use case, where the device locking timeout and unlocking method are dynamically decided based on the perceived safety of current context.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129625472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Radio-based trail usage monitoring with low-end motes 基于无线电的跟踪使用监测与低端motes
D. Puccinelli, Anna Förster, A. Puiatti, S. Giordano
Outdoor automated people counting is essential to the proper management of recreational and protected areas. We present a solution for radio-based people counting that employs low-end motes to detect the signature of shadowing events left by humans on the RF signal as they interrupt the line-of-sight path between a radio transmitter and a receiver. Our solution can be implemented with devices with a reduced form factor, requires little computing power, and provides a satisfactory performance at a low energy cost. We illustrate our implementation on TelosB nodes and present an extensive set of results from a real-world deployment.
户外自动计数对于娱乐和保护区的适当管理至关重要。我们提出了一种基于无线电的人员计数解决方案,该解决方案采用低端motes来检测人类在射频信号上留下的阴影事件的特征,因为它们中断了无线电发射器和接收器之间的视线路径。我们的解决方案可以在外形尺寸更小的设备上实现,需要很少的计算能力,并以低能耗提供令人满意的性能。我们演示了我们在TelosB节点上的实现,并展示了一组来自实际部署的广泛结果。
{"title":"Radio-based trail usage monitoring with low-end motes","authors":"D. Puccinelli, Anna Förster, A. Puiatti, S. Giordano","doi":"10.1109/PERCOMW.2011.5766867","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766867","url":null,"abstract":"Outdoor automated people counting is essential to the proper management of recreational and protected areas. We present a solution for radio-based people counting that employs low-end motes to detect the signature of shadowing events left by humans on the RF signal as they interrupt the line-of-sight path between a radio transmitter and a receiver. Our solution can be implemented with devices with a reduced form factor, requires little computing power, and provides a satisfactory performance at a low energy cost. We illustrate our implementation on TelosB nodes and present an extensive set of results from a real-world deployment.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Defining Situated Social Context for pervasive social computing 为普及社会计算定义情境社会背景
M. Endler, Alexandre Skyrme, Daniel Schuster, T. Springer
There is a multitude of systems in the area of mobile and pervasive social computing providing and using social context for pervasive interaction between persons. Currently, it is hard to distinguish the different approaches as there is no appropriate taxonomy available yet. In this paper we introduce the STIP taxonomy to define social context in the area of social computing and further propose to use the term Situated Social Context for a more focused subset of social context for pervasive social computing. We elaborate the taxonomy with a small survey of mobile social networking systems and discuss future research challenges.
在移动和普适社会计算领域有许多系统为人们之间的普适交互提供和使用社会上下文。目前,由于没有合适的分类法,很难区分不同的方法。在本文中,我们介绍了STIP分类法来定义社会计算领域的社会上下文,并进一步建议将“情境社会上下文”一词用于普适社会计算的社会上下文的一个更集中的子集。我们通过对移动社交网络系统的小型调查详细阐述了分类,并讨论了未来的研究挑战。
{"title":"Defining Situated Social Context for pervasive social computing","authors":"M. Endler, Alexandre Skyrme, Daniel Schuster, T. Springer","doi":"10.1109/PERCOMW.2011.5766945","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766945","url":null,"abstract":"There is a multitude of systems in the area of mobile and pervasive social computing providing and using social context for pervasive interaction between persons. Currently, it is hard to distinguish the different approaches as there is no appropriate taxonomy available yet. In this paper we introduce the STIP taxonomy to define social context in the area of social computing and further propose to use the term Situated Social Context for a more focused subset of social context for pervasive social computing. We elaborate the taxonomy with a small survey of mobile social networking systems and discuss future research challenges.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Analyzing the incentives in Community-based Security Systems 基于社区的安全系统激励分析
Pern Hui Chia
Apart from mechanisms to make crowd-sourcing secure, the reliability of a collaborative system is dependent on the economic incentives of its potential contributors. We study several factors related to the incentives in a community-based security system, including the expectation on the social influence and the contagion effect of generosity. We also investigate the effects of organizing community members differently in a complete, random and scale-free structure. Our simulation results show that, without considering any specific incentive schemes, it is not easy to encourage user contribution in a complete-graph community structure (global systems). On the other hand, a moderate level of cooperative behavior can be cultivated when the community members are organized in the random or scale-free structure (social networks).
除了确保众包安全的机制外,协作系统的可靠性还取决于其潜在贡献者的经济激励。本文研究了基于社区的安全保障系统激励的几个相关因素,包括对社会影响的期望和慷慨的传染效应。我们还研究了在完全、随机和无标度结构下不同组织方式对社区成员的影响。我们的模拟结果表明,在不考虑任何特定激励方案的情况下,在完全图社区结构(全局系统)中鼓励用户贡献是不容易的。另一方面,当社区成员在随机或无标度结构(社会网络)中组织时,可以培养适度的合作行为。
{"title":"Analyzing the incentives in Community-based Security Systems","authors":"Pern Hui Chia","doi":"10.1109/PERCOMW.2011.5766882","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766882","url":null,"abstract":"Apart from mechanisms to make crowd-sourcing secure, the reliability of a collaborative system is dependent on the economic incentives of its potential contributors. We study several factors related to the incentives in a community-based security system, including the expectation on the social influence and the contagion effect of generosity. We also investigate the effects of organizing community members differently in a complete, random and scale-free structure. Our simulation results show that, without considering any specific incentive schemes, it is not easy to encourage user contribution in a complete-graph community structure (global systems). On the other hand, a moderate level of cooperative behavior can be cultivated when the community members are organized in the random or scale-free structure (social networks).","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Channel assignment and routing in multiradio wireless mesh networks using smart ants 基于智能蚂蚁的多无线网状网络信道分配与路由
Fawaz S. Bokhari
We present our initial work on the design and implementation of an efficient channel assignment and routing architecture for multi-radio and multichannel wireless mesh networks (WMNs). Our proposed scheme is derived from the principle of Ant Colony Optimization (ACO) in which smart ants (agents) perform the routing and channel assignment to stochastically solve a dynamic network optimization problem. We extend the ACO framework by implementing two modules namely a channel assignment module and a routing module with the objective of minimizing the overall network inference in multi-radio mesh networks. The main focus in our work is to take advantage of the particular characteristics of ACO framework and exploit them in designing a joint channel assignment and routing scheme for WMNs keeping in view the unique characteristics and requirements of these networks.
我们介绍了我们在多无线电和多信道无线网状网络(WMNs)的有效信道分配和路由架构的设计和实现方面的初步工作。我们提出的方案源自蚁群优化(蚁群优化)的原理,其中智能蚂蚁(代理)执行路由和通道分配来随机解决动态网络优化问题。我们通过实现两个模块来扩展蚁群算法框架,即信道分配模块和路由模块,目的是在多无线电网状网络中最小化整体网络推理。我们的工作重点是利用蚁群算法框架的特点,并在考虑到这些网络的独特特点和需求的情况下,设计一种联合信道分配和路由方案。
{"title":"Channel assignment and routing in multiradio wireless mesh networks using smart ants","authors":"Fawaz S. Bokhari","doi":"10.1109/PERCOMW.2011.5766921","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766921","url":null,"abstract":"We present our initial work on the design and implementation of an efficient channel assignment and routing architecture for multi-radio and multichannel wireless mesh networks (WMNs). Our proposed scheme is derived from the principle of Ant Colony Optimization (ACO) in which smart ants (agents) perform the routing and channel assignment to stochastically solve a dynamic network optimization problem. We extend the ACO framework by implementing two modules namely a channel assignment module and a routing module with the objective of minimizing the overall network inference in multi-radio mesh networks. The main focus in our work is to take advantage of the particular characteristics of ACO framework and exploit them in designing a joint channel assignment and routing scheme for WMNs keeping in view the unique characteristics and requirements of these networks.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121592596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Principles of genomic robustness inspire fault-tolerant WSN topologies: A network science based case study 基因组鲁棒性原理激发WSN容错拓扑:基于网络科学的案例研究
P. Ghosh, Michael L. Mayo, Vijender Chaitankar, T. Habib, E. Perkins, Sajal K. Das
Wireless sensor networks (WSNs) are frameworks for modern pervasive computing infrastructures, and are often subject to operational difficulties, such as the inability to effectively mitigate signal noise or sensor failure. Natural systems, such as gene regulatory networks (GRNs), participate in similar information transport and are often subject to similar operational disruptions (noise, damage, etc.). Moreover, they self-adapt to maintain system function under adverse conditions. Using a PBN-type model valid in the operational and functional overlap between GRNs and WSNs, we study how attractors in the GRN-the target state of an evolving network-behave under selective gene or sensor failure. For “larger” networks, attractors are “robust”, in the sense that gene failures (or selective sensor failures in the WSN) conditionally increase their total number; the “distance” between initial states and their attractors (interpreted as the end-to-end packet delay) simultaneously decreases. Moreover, the number of attractors is conserved if the receiving sensor returns packets to the transmitting node; however, the distance to the attractors increases under similar conditions and sensor failures. Interpreting network state-transitions as packet transmission scenarios may allow for trade-offs between network topology and attractor robustness to be exploited to design novel fault-tolerant routing protocols, or other damage-mitigation strategies.
无线传感器网络(wsn)是现代普适计算基础设施的框架,经常受到操作困难的影响,例如无法有效减轻信号噪声或传感器故障。自然系统,如基因调控网络(grn),参与类似的信息传输,并经常受到类似的操作中断(噪音,损伤等)。此外,它们还能自适应,在不利条件下维持系统功能。我们使用在grn和wsn之间的操作和功能重叠中有效的pbn型模型,研究了grn(进化网络的目标状态)中的吸引子在选择性基因或传感器故障下的行为。对于“较大”的网络,吸引子是“鲁棒的”,因为基因失效(或WSN中的选择性传感器失效)会有条件地增加它们的总数;初始状态和它们的吸引子之间的“距离”(解释为端到端数据包延迟)同时减小。此外,如果接收传感器向发送节点返回数据包,则吸引子的数量是守恒的;然而,在相同的条件和传感器故障下,到吸引子的距离增加。将网络状态转换解释为分组传输场景可能允许在网络拓扑和吸引器鲁棒性之间进行权衡,以设计新的容错路由协议或其他损害缓解策略。
{"title":"Principles of genomic robustness inspire fault-tolerant WSN topologies: A network science based case study","authors":"P. Ghosh, Michael L. Mayo, Vijender Chaitankar, T. Habib, E. Perkins, Sajal K. Das","doi":"10.1109/PERCOMW.2011.5766861","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766861","url":null,"abstract":"Wireless sensor networks (WSNs) are frameworks for modern pervasive computing infrastructures, and are often subject to operational difficulties, such as the inability to effectively mitigate signal noise or sensor failure. Natural systems, such as gene regulatory networks (GRNs), participate in similar information transport and are often subject to similar operational disruptions (noise, damage, etc.). Moreover, they self-adapt to maintain system function under adverse conditions. Using a PBN-type model valid in the operational and functional overlap between GRNs and WSNs, we study how attractors in the GRN-the target state of an evolving network-behave under selective gene or sensor failure. For “larger” networks, attractors are “robust”, in the sense that gene failures (or selective sensor failures in the WSN) conditionally increase their total number; the “distance” between initial states and their attractors (interpreted as the end-to-end packet delay) simultaneously decreases. Moreover, the number of attractors is conserved if the receiving sensor returns packets to the transmitting node; however, the distance to the attractors increases under similar conditions and sensor failures. Interpreting network state-transitions as packet transmission scenarios may allow for trade-offs between network topology and attractor robustness to be exploited to design novel fault-tolerant routing protocols, or other damage-mitigation strategies.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Secure cooperative MIMO communications under active compromised nodes 主动受损节点下的安全协同MIMO通信
Liang Hong, McKenzie McNeal, Wei Chen
Emerging cooperative MIMO communication is a promising technology in improving communication quality for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper we investigate the situation where some of the cooperative nodes are compromised and try to corrupt the communications by sending garbled signals. To combat the compromised nodes, we extended our previous work and proposed compromised nodes detection algorithms for three more general scenarios. These scenarios include having different numbers of nodes in the transmitting and receiving clusters, having multiple compromised nodes in the transmitting cluster, and having multiple compromised nodes in both the transmitting and receiving clusters. These algorithms are then integrated into a cross-layer security scheme for secure cooperative MIMO network. This scheme combines cryptographic technique implemented in higher layers with proposed data assurance analysis at the physical layer to provide better security. Simulations show that the proposed algorithms for compromised nodes detection are effective and efficient. Simulations also show that the accuracy of received information is significantly improved.
新兴的协同MIMO通信技术是提高无线传感器网络通信质量的一种很有前途的技术。然而,协作通信所固有的安全问题也随之产生。在本文中,我们研究了一些合作节点被破坏的情况,并试图通过发送乱码信号来破坏通信。为了对抗受损节点,我们扩展了之前的工作,并针对三种更一般的场景提出了受损节点检测算法。这些场景包括在发送和接收集群中具有不同数量的节点,在发送集群中具有多个受损节点,以及在发送和接收集群中都具有多个受损节点。然后将这些算法集成到安全协作MIMO网络的跨层安全方案中。该方案将在更高层实现的加密技术与在物理层提出的数据保证分析相结合,以提供更好的安全性。仿真结果表明,所提出的算法是有效的、高效的。仿真结果表明,该方法大大提高了接收信息的精度。
{"title":"Secure cooperative MIMO communications under active compromised nodes","authors":"Liang Hong, McKenzie McNeal, Wei Chen","doi":"10.1109/PERCOMW.2011.5766865","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766865","url":null,"abstract":"Emerging cooperative MIMO communication is a promising technology in improving communication quality for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper we investigate the situation where some of the cooperative nodes are compromised and try to corrupt the communications by sending garbled signals. To combat the compromised nodes, we extended our previous work and proposed compromised nodes detection algorithms for three more general scenarios. These scenarios include having different numbers of nodes in the transmitting and receiving clusters, having multiple compromised nodes in the transmitting cluster, and having multiple compromised nodes in both the transmitting and receiving clusters. These algorithms are then integrated into a cross-layer security scheme for secure cooperative MIMO network. This scheme combines cryptographic technique implemented in higher layers with proposed data assurance analysis at the physical layer to provide better security. Simulations show that the proposed algorithms for compromised nodes detection are effective and efficient. Simulations also show that the accuracy of received information is significantly improved.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Silhouette classification using pixel and voxel features for improved elder monitoring in dynamic environments 利用像素和体素特征进行剪影分类,以改善动态环境中老年人的监测
Erik E. Stone, M. Skubic
We present a method for improving human segmentation results in calibrated, multi-view environments using features derived from both pixel (image) and voxel (volume) space. The main focus of this work is to develop a low-cost, vision-based system for passive activity monitoring of older adults in the home, to capture early signs of illness and functional decline and allow seniors to live independently. Silhouettes are extracted to address privacy concerns. Specific embedded assessment goals include daily gait, fall risk, and overall activity, as well as fall detection. To achieve these goals, accurate, robust segmentation of human subjects (silhouette extraction) from captured video data is required. We present a simple technique that makes use of features acquired from background subtraction results (silhouettes) of multiple calibrated cameras, along with the 3D voxel object formed from the intersection of those multiple silhouettes in a volume space to improve human segmentation results in dynamic environments; moving objects, non-human objects, and lighting changes often complicate this task. The technique is qualitatively evaluated on three data sequences, two of which were captured in an independent living facility for older adults.
我们提出了一种在校准的多视图环境中使用来自像素(图像)和体素(体积)空间的特征来改进人体分割结果的方法。这项工作的主要重点是开发一种低成本,基于视觉的系统,用于家中老年人的被动活动监测,以捕捉疾病和功能衰退的早期迹象,并使老年人能够独立生活。剪影被提取出来以解决隐私问题。具体的嵌入式评估目标包括日常步态、跌倒风险、整体活动以及跌倒检测。为了实现这些目标,需要从捕获的视频数据中准确,稳健地分割人类受试者(剪影提取)。我们提出了一种简单的技术,利用从多个校准相机的背景减去结果(剪影)中获得的特征,以及由这些多个剪影在体空间中相交形成的3D体素对象,以改善动态环境中的人体分割结果;移动的物体、非人类的物体和光线的变化常常使这项任务复杂化。该技术在三个数据序列上进行了定性评估,其中两个数据序列是在老年人独立生活设施中捕获的。
{"title":"Silhouette classification using pixel and voxel features for improved elder monitoring in dynamic environments","authors":"Erik E. Stone, M. Skubic","doi":"10.1109/PERCOMW.2011.5766970","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766970","url":null,"abstract":"We present a method for improving human segmentation results in calibrated, multi-view environments using features derived from both pixel (image) and voxel (volume) space. The main focus of this work is to develop a low-cost, vision-based system for passive activity monitoring of older adults in the home, to capture early signs of illness and functional decline and allow seniors to live independently. Silhouettes are extracted to address privacy concerns. Specific embedded assessment goals include daily gait, fall risk, and overall activity, as well as fall detection. To achieve these goals, accurate, robust segmentation of human subjects (silhouette extraction) from captured video data is required. We present a simple technique that makes use of features acquired from background subtraction results (silhouettes) of multiple calibrated cameras, along with the 3D voxel object formed from the intersection of those multiple silhouettes in a volume space to improve human segmentation results in dynamic environments; moving objects, non-human objects, and lighting changes often complicate this task. The technique is qualitatively evaluated on three data sequences, two of which were captured in an independent living facility for older adults.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1