首页 > 最新文献

2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording 通过分组交换记录检测容错网络中的黑洞攻击
Yanzhi Ren, M. Chuah, J. Yang, Yingying Chen
The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.
容忍中断网络(dtn)在提供关键任务服务(如应急网络或战场场景)方面特别有用。然而,ddn很容易受到内部攻击,在这种攻击中,合法节点被破坏,对手节点通过在网络中丢弃数据包发起黑洞攻击。传统的保护路由协议的方法无法解决DTNs中的这种内部攻击。在本文中,我们提出了一种方法来保护每个节点的数据包传递信息的历史记录,以便其他节点可以通过分析这些数据包传递记录来检测内部攻击。我们通过使用随机路径点和Zebranet移动模型进行广泛的模拟来评估我们的方法。结果表明,该方法能够有效地检测出内部攻击,检测率高,误报率低。
{"title":"Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording","authors":"Yanzhi Ren, M. Chuah, J. Yang, Yingying Chen","doi":"10.1109/WOWMOM.2010.5534944","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534944","url":null,"abstract":"The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Utility-based channel assignment and topology control in wireless mesh networks 无线网状网络中基于效用的信道分配和拓扑控制
Theodoros Dionysiou, V. Siris, G. Stamatakis
We define a utility-based framework for joint channel assignment and topology control in multi-rate multi-radio wireless mesh networks, and present a greedy algorithm for solving the corresponding optimization problem. Key features of the proposed approach are the support for different target objectives, which are expressed as utility functions of the MAC layer throughput, and the efficient utilization of wired network gateways, while guaranteeing that for every mesh node there exists a path to a gateway. Investigations show the influence of different target objectives on the channel assignment and network topology, demonstrate the proposed approach's load balancing properties in mesh networks containing multiple gateways, show the effect of 802.11a adjacent channel interference on the channel assignment, and compare the performance of the proposed procedure with a rate-based channel assignment scheme.
定义了一种基于效用的多速率多无线电无线网状网络联合信道分配和拓扑控制框架,并提出了一种贪心算法来求解相应的优化问题。该方法的主要特点是支持不同的目标目标(表示为MAC层吞吐量的效用函数)和有效利用有线网络网关,同时保证每个网格节点都有通往网关的路径。研究显示了不同目标目标对信道分配和网络拓扑的影响,展示了所提出方法在包含多个网关的网状网络中的负载均衡特性,展示了802.11a相邻信道干扰对信道分配的影响,并将所提出过程的性能与基于速率的信道分配方案进行了比较。
{"title":"Utility-based channel assignment and topology control in wireless mesh networks","authors":"Theodoros Dionysiou, V. Siris, G. Stamatakis","doi":"10.1109/WOWMOM.2010.5534902","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534902","url":null,"abstract":"We define a utility-based framework for joint channel assignment and topology control in multi-rate multi-radio wireless mesh networks, and present a greedy algorithm for solving the corresponding optimization problem. Key features of the proposed approach are the support for different target objectives, which are expressed as utility functions of the MAC layer throughput, and the efficient utilization of wired network gateways, while guaranteeing that for every mesh node there exists a path to a gateway. Investigations show the influence of different target objectives on the channel assignment and network topology, demonstrate the proposed approach's load balancing properties in mesh networks containing multiple gateways, show the effect of 802.11a adjacent channel interference on the channel assignment, and compare the performance of the proposed procedure with a rate-based channel assignment scheme.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Connectivity guarantee during wireless sensor networks deployment 无线传感器网络部署过程中的连通性保证
Tahiry Razafindralambo, D. Simplot-Ryl
In this paper, we consider the self-deployment of wireless sensor networks. We present a mechanism which allows to preserve network connectivity during the deployment of mobile wireless sensors. Our algorithm is distributed and is based on a subset of neighbours for motion decision. Our algorithm maintains a connected topology regardless of the direction chosen by each sensor. To preserve connectivity, the distance covered by the mobile nodes is constrained by the connectivity of the node to its neighbours in a connected subgraph like the relative neighbourhood graph (RNG). We show the connectivity preservation property of our algorithm through analysis and present some simulation results for the full coverage problem.
在本文中,我们考虑无线传感器网络的自部署。我们提出了一种允许在移动无线传感器部署期间保持网络连接的机制。我们的算法是分布式的,并且基于邻居的子集来进行运动决策。无论每个传感器选择的方向如何,我们的算法都保持一个连接的拓扑结构。为了保持连通性,移动节点所覆盖的距离受到连接子图(如相对邻居图(RNG))中节点与其邻居的连通性的约束。通过分析证明了该算法的连通性保持特性,并给出了全覆盖问题的仿真结果。
{"title":"Connectivity guarantee during wireless sensor networks deployment","authors":"Tahiry Razafindralambo, D. Simplot-Ryl","doi":"10.1109/WOWMOM.2010.5534951","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534951","url":null,"abstract":"In this paper, we consider the self-deployment of wireless sensor networks. We present a mechanism which allows to preserve network connectivity during the deployment of mobile wireless sensors. Our algorithm is distributed and is based on a subset of neighbours for motion decision. Our algorithm maintains a connected topology regardless of the direction chosen by each sensor. To preserve connectivity, the distance covered by the mobile nodes is constrained by the connectivity of the node to its neighbours in a connected subgraph like the relative neighbourhood graph (RNG). We show the connectivity preservation property of our algorithm through analysis and present some simulation results for the full coverage problem.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116158441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A feedback-based adaptive online algorithm for Multi-Gateway load-balancing in wireless mesh networks 一种基于反馈的无线网状网络多网关负载均衡自适应在线算法
J. J. Galvez, P. M. Ruiz, A. Gómez-Skarmeta
We propose an adaptive online load-balancing protocol for Multi-Gateway Wireless Mesh Networks (WMNs) which, based on the current network conditions, balances load between gateways. Our protocol (GWLB) achieves two goals: (i) alleviating congestion in affected domains and (ii) balancing load to improve flow fairness across domains. As a result of applying GWLB the throughput and fairness of flows improves. The proposed scheme effectively takes into account the elastic nature of TCP traffic, and intra-flow and inter-flow interference when switching flows between domains. Through simulations, we analyze performance and compare with a number of proposed strategies, showing that GWLB outperforms them. In particular, we have observed average flow throughput gains of 104% over the nearest gateway strategy.
针对多网关无线Mesh网络(WMNs),提出了一种基于当前网络状况的自适应在线负载均衡协议,实现网关间负载均衡。我们的协议(GWLB)实现了两个目标:(i)缓解受影响域的拥塞;(ii)平衡负载以提高跨域的流量公平性。由于应用了GWLB,流的吞吐量和公平性得到了提高。该方案有效地考虑了TCP流量的弹性特性,以及在域间切换流时的流内和流间干扰。通过仿真,我们分析了性能并与许多提出的策略进行了比较,结果表明GWLB优于它们。特别是,我们观察到,与最近网关策略相比,平均流量吞吐量增加了104%。
{"title":"A feedback-based adaptive online algorithm for Multi-Gateway load-balancing in wireless mesh networks","authors":"J. J. Galvez, P. M. Ruiz, A. Gómez-Skarmeta","doi":"10.1109/WOWMOM.2010.5534914","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534914","url":null,"abstract":"We propose an adaptive online load-balancing protocol for Multi-Gateway Wireless Mesh Networks (WMNs) which, based on the current network conditions, balances load between gateways. Our protocol (GWLB) achieves two goals: (i) alleviating congestion in affected domains and (ii) balancing load to improve flow fairness across domains. As a result of applying GWLB the throughput and fairness of flows improves. The proposed scheme effectively takes into account the elastic nature of TCP traffic, and intra-flow and inter-flow interference when switching flows between domains. Through simulations, we analyze performance and compare with a number of proposed strategies, showing that GWLB outperforms them. In particular, we have observed average flow throughput gains of 104% over the nearest gateway strategy.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
DEHAR: A distributed energy harvesting aware routing algorithm for ad-hoc multi-hop wireless sensor networks 一种用于自组织多跳无线传感器网络的分布式能量收集感知路由算法
Mikkel Koefoed Jakobsen, J. Madsen, M. R. Hansen
One of the key design goals in Wireless Sensor Networks is long lasting or even continuous operation. Continuous operation is made possible through energy harvesting. Keeping the network operational imposes a demand to prevent network segmentation and power loss in nodes. It is therefore important that the best energy-wise route is found for each data transfer from a source node to the sink node. We present a new adaptive and distributed routing algorithm for finding energy optimised routes in a wireless sensor network with energy harvesting. The algorithm finds an energy efficient route from each source node to a single sink node, taking into account the current energy status of the network. By simulation, the algorithm is shown to be able to adapt to changes in harvested and stored energy. Simulations show that continuous operation is possible.
无线传感器网络的关键设计目标之一是长时间甚至连续运行。通过能量收集使连续运行成为可能。保持网络运行要求防止网络分段和节点断电。因此,为从源节点到汇聚节点的每次数据传输找到最佳能量路由是很重要的。提出了一种新的自适应分布式路由算法,用于在具有能量收集的无线传感器网络中寻找能量优化路由。该算法在考虑网络当前能量状态的情况下,找到一条从每个源节点到单个汇聚节点的节能路由。仿真结果表明,该算法能够适应蓄能和采收能量的变化。仿真结果表明,连续运行是可行的。
{"title":"DEHAR: A distributed energy harvesting aware routing algorithm for ad-hoc multi-hop wireless sensor networks","authors":"Mikkel Koefoed Jakobsen, J. Madsen, M. R. Hansen","doi":"10.1109/WOWMOM.2010.5534899","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534899","url":null,"abstract":"One of the key design goals in Wireless Sensor Networks is long lasting or even continuous operation. Continuous operation is made possible through energy harvesting. Keeping the network operational imposes a demand to prevent network segmentation and power loss in nodes. It is therefore important that the best energy-wise route is found for each data transfer from a source node to the sink node. We present a new adaptive and distributed routing algorithm for finding energy optimised routes in a wireless sensor network with energy harvesting. The algorithm finds an energy efficient route from each source node to a single sink node, taking into account the current energy status of the network. By simulation, the algorithm is shown to be able to adapt to changes in harvested and stored energy. Simulations show that continuous operation is possible.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"44 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Crowd-sourced sensing and collaboration using twitter 使用twitter的众包感知和协作
M. Demirbas, Murat Ali Bayir, C. Akcora, Y. Yilmaz, H. Ferhatosmanoğlu
Despite the availability of the sensor and smart-phone devices to fulfill the ubiquitous computing vision, the-state-of-the-art falls short of this vision. We argue that the reason for this gap is the lack of an infrastructure to task/utilize these devices for collaboration. We propose that microblogging services like Twitter can provide an "open" publish-subscribe infrastructure for sensors and smartphones, and pave the way for ubiquitous crowd-sourced sensing and collaboration applications. We design and implement a crowd-sourced sensing and collaboration system over Twitter, and showcase our system in the context of two applications: a crowd-sourced weather radar, and a participatory noise-mapping application. Our results from real-world Twitter experiments give insights into the feasibility of this approach and outline the research challenges in sensor/smartphone integration to Twitter.
尽管传感器和智能手机设备可以实现无处不在的计算愿景,但最先进的技术仍无法实现这一愿景。我们认为,造成这种差距的原因是缺乏基础设施来执行任务/利用这些设备进行协作。我们建议像Twitter这样的微博服务可以为传感器和智能手机提供“开放”的发布-订阅基础设施,并为无处不在的众包传感和协作应用铺平道路。我们在Twitter上设计并实现了一个众包传感和协作系统,并在两个应用程序的背景下展示了我们的系统:众包天气雷达和参与式噪声测绘应用程序。我们的真实Twitter实验结果为这种方法的可行性提供了见解,并概述了传感器/智能手机与Twitter集成的研究挑战。
{"title":"Crowd-sourced sensing and collaboration using twitter","authors":"M. Demirbas, Murat Ali Bayir, C. Akcora, Y. Yilmaz, H. Ferhatosmanoğlu","doi":"10.1109/WOWMOM.2010.5534910","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534910","url":null,"abstract":"Despite the availability of the sensor and smart-phone devices to fulfill the ubiquitous computing vision, the-state-of-the-art falls short of this vision. We argue that the reason for this gap is the lack of an infrastructure to task/utilize these devices for collaboration. We propose that microblogging services like Twitter can provide an \"open\" publish-subscribe infrastructure for sensors and smartphones, and pave the way for ubiquitous crowd-sourced sensing and collaboration applications. We design and implement a crowd-sourced sensing and collaboration system over Twitter, and showcase our system in the context of two applications: a crowd-sourced weather radar, and a participatory noise-mapping application. Our results from real-world Twitter experiments give insights into the feasibility of this approach and outline the research challenges in sensor/smartphone integration to Twitter.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 189
SAMSON: Secure access for medical smart cards over networks 医疗智能卡在网络上的安全访问
G. Hembroff, S. Muftic
This paper presents several smart card security extensions to the FIPS 201 PIV standard of security and authentication of mobile health. Our contributions are designed to better protect the patient's data and to increase the functionality and interoperability of smart cards in health care. Our solution, called SAMSON, consists of two types of smart cards. The first, a security card, is issued to all personnel within any medical organization, while the second, the medical card, is issued to patients and used to securely store and retrieve health care information. These smart cards are being tested within a 14 hospital federated consortium in Michigan's Upper Peninsula.
针对FIPS 201 PIV移动医疗安全认证标准,提出了智能卡安全扩展方案。我们的贡献旨在更好地保护患者的数据,并增加医疗保健中智能卡的功能和互操作性。我们的解决方案叫做SAMSON,由两种类型的智能卡组成。第一种是安全卡,发给任何医疗机构内的所有人员;第二种是医疗卡,发给患者,用于安全地存储和检索医疗保健信息。这些智能卡正在密歇根州上半岛的14家联合医院进行测试。
{"title":"SAMSON: Secure access for medical smart cards over networks","authors":"G. Hembroff, S. Muftic","doi":"10.1109/WOWMOM.2010.5534982","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534982","url":null,"abstract":"This paper presents several smart card security extensions to the FIPS 201 PIV standard of security and authentication of mobile health. Our contributions are designed to better protect the patient's data and to increase the functionality and interoperability of smart cards in health care. Our solution, called SAMSON, consists of two types of smart cards. The first, a security card, is issued to all personnel within any medical organization, while the second, the medical card, is issued to patients and used to securely store and retrieve health care information. These smart cards are being tested within a 14 hospital federated consortium in Michigan's Upper Peninsula.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Polar coordinate routing for multiple paths in wireless networks 无线网络中多路径的极坐标路由
Maulik Desai, N. Maxemchuk
We propose Polar Coordinate Routing (PCR) to create multiple paths between a source and a destination in wireless networks. Our scheme creates paths that are circular segments of different radii connecting a source and a destination. We propose a non-euclidean distance metric that allows messages to travel along these paths. Using PCR it is possible to maintain a known separation among the paths, which reduces the interference between the nodes belonging to two separate routes. Our extensive simulations show that while PCR achieves a known separation between the routes, it does so with a small increase in overall hop count. Moreover, we demonstrate that the variances of average separation and hop count are lower for the paths created using PCR compared to existing schemes, indicating a more reliable system. Existing multi-path routing schemes in wireless networks do not perform well in areas with obstacles or low node density. To overcome adverse areas in a network, we integrate PCR with simple robotic routing, which lets a message circumnavigate an obstacle and follow the trajectory to the destination as soon as the obstacle is passed.l
我们提出了极坐标路由(PCR)来创建无线网络中源和目标之间的多条路径。我们的方案创建的路径是连接源和目的地的不同半径的圆形段。我们提出了一个非欧几里得距离度量,允许消息沿着这些路径传播。使用PCR可以在路径之间保持已知的分离,这减少了属于两个独立路径的节点之间的干扰。我们广泛的模拟表明,虽然PCR在路线之间实现了已知的分离,但它只增加了总跳数。此外,我们证明了与现有方案相比,使用PCR创建的路径的平均分离和跳数的方差更低,表明系统更可靠。无线网络中现有的多路径路由方案在存在障碍物或节点密度较低的区域表现不佳。为了克服网络中的不利区域,我们将PCR与简单的机器人路由结合起来,使信息绕过障碍物,并在障碍物通过后立即沿着轨迹到达目的地
{"title":"Polar coordinate routing for multiple paths in wireless networks","authors":"Maulik Desai, N. Maxemchuk","doi":"10.1109/WOWMOM.2010.5534894","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534894","url":null,"abstract":"We propose Polar Coordinate Routing (PCR) to create multiple paths between a source and a destination in wireless networks. Our scheme creates paths that are circular segments of different radii connecting a source and a destination. We propose a non-euclidean distance metric that allows messages to travel along these paths. Using PCR it is possible to maintain a known separation among the paths, which reduces the interference between the nodes belonging to two separate routes. Our extensive simulations show that while PCR achieves a known separation between the routes, it does so with a small increase in overall hop count. Moreover, we demonstrate that the variances of average separation and hop count are lower for the paths created using PCR compared to existing schemes, indicating a more reliable system. Existing multi-path routing schemes in wireless networks do not perform well in areas with obstacles or low node density. To overcome adverse areas in a network, we integrate PCR with simple robotic routing, which lets a message circumnavigate an obstacle and follow the trajectory to the destination as soon as the obstacle is passed.l","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129037529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of the Evil ring attack in wireless sensor networks using cross verification 基于交叉验证的无线传感器网络邪恶环攻击检测
W. Shi, M. Barbeau, J. Corriveau
In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn't have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node can run to determine its geographic position using position reports from neighbors. In this paper, we first present the evil ring attack, an attack on the geographic location algorithms of Alfaro et al. that misleads nodes about the true position of their neighbors. An attacker sends false reports with a position that sits on a circle centered at the victim's location and of a radius equal to the distance between the victim and attacker. The attack succeeds because the calculation of the distance between the victim and attacker is not affected despite this fake position. We then present and analyze an evil ring attack detection algorithm in which a position-unaware sensor node crosschecks the consistency of the information it collects from its neighbors with the information collected by other trusted neighbors. This algorithm detects the existence of neighbors running the evil ring attack. We propose a general distributed algorithm for a) localizing sensors in a wireless sensor network in the presence of some malfunctioning ones, and b) detecting such malfunctioning sensors.
在自组织网络和无线传感器网络中,一些路由算法依赖于网络节点对自己和其他节点的地理位置的了解。对于节点没有自己的定位设备(例如GPS)的情况,Alfaro等人提出了几种算法,节点可以使用邻居的位置报告来确定自己的地理位置。在本文中,我们首先提出了邪恶环攻击,这是一种针对Alfaro等人的地理位置算法的攻击,它误导节点关于其邻居的真实位置。攻击者发送虚假报告,其位置位于以受害者位置为中心的圆圈上,半径等于受害者与攻击者的距离。攻击成功是因为计算受害者和攻击者之间的距离不受影响,尽管这个假的位置。然后,我们提出并分析了一种邪恶环攻击检测算法,其中位置不感知传感器节点交叉检查它从其邻居收集的信息与其他可信邻居收集的信息的一致性。该算法检测是否存在进行邪恶环攻击的邻居。我们提出了一种通用的分布式算法,用于a)定位存在故障的无线传感器网络中的传感器,以及b)检测这些故障传感器。
{"title":"Detection of the Evil ring attack in wireless sensor networks using cross verification","authors":"W. Shi, M. Barbeau, J. Corriveau","doi":"10.1109/WOWMOM.2010.5534952","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534952","url":null,"abstract":"In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn't have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node can run to determine its geographic position using position reports from neighbors. In this paper, we first present the evil ring attack, an attack on the geographic location algorithms of Alfaro et al. that misleads nodes about the true position of their neighbors. An attacker sends false reports with a position that sits on a circle centered at the victim's location and of a radius equal to the distance between the victim and attacker. The attack succeeds because the calculation of the distance between the victim and attacker is not affected despite this fake position. We then present and analyze an evil ring attack detection algorithm in which a position-unaware sensor node crosschecks the consistency of the information it collects from its neighbors with the information collected by other trusted neighbors. This algorithm detects the existence of neighbors running the evil ring attack. We propose a general distributed algorithm for a) localizing sensors in a wireless sensor network in the presence of some malfunctioning ones, and b) detecting such malfunctioning sensors.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of the OBAMP overlay protocol for multicast delivery in OLSR wireless community networks OLSR无线社区网络中多播传输的OBAMP覆盖协议的实现
F. Proto, Claudio Pisa
The Optimized Link State Routing (OLSR) protocol is widely employed in Wireless Community Networks (WCNs), where users are connected to a wireless backbone with high bandwidth links. In these networks users can access both the Internet and internal network services. However the routers lack multicast support and users cannot exploit the high capacity of wireless links to stream and receive multimedia services. We implemented an extension to the OLSR protocol to support the delivery of multicast traffic using the Overlay Borovka-based Ad-hoc Multicast Protocol (OBAMP). We present a demo of our implementation that is devised for the GNU/Linux operating system. The implementation has been tested both on standard PCs and on embedded devices running OpenWRT and it is distributed as a plugin within the olsr.org OLSR implementation. This protocol enhancement makes possible to create a multicast distribution tree among a subset of nodes, providing the mesh users with multicast community services.
优化链路状态路由(OLSR)协议广泛应用于无线社区网络(Wireless Community network, wcn)中,用户需要连接到具有高带宽链路的无线骨干网。在这些网络中,用户可以访问Internet和内部网络服务。然而,路由器缺乏组播支持,用户无法利用无线链路的高容量进行流传输和接收多媒体业务。我们实现了对OLSR协议的扩展,以支持使用基于Overlay borovka的Ad-hoc多播协议(OBAMP)传输多播流量。我们展示了为GNU/Linux操作系统设计的实现的演示。该实现已经在标准pc和运行OpenWRT的嵌入式设备上进行了测试,并且它作为olsr.org OLSR实现中的插件发布。该协议增强使得在节点子集之间创建组播分布树成为可能,从而为网格用户提供组播社区服务。
{"title":"Implementation of the OBAMP overlay protocol for multicast delivery in OLSR wireless community networks","authors":"F. Proto, Claudio Pisa","doi":"10.1109/WOWMOM.2010.5534941","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534941","url":null,"abstract":"The Optimized Link State Routing (OLSR) protocol is widely employed in Wireless Community Networks (WCNs), where users are connected to a wireless backbone with high bandwidth links. In these networks users can access both the Internet and internal network services. However the routers lack multicast support and users cannot exploit the high capacity of wireless links to stream and receive multimedia services. We implemented an extension to the OLSR protocol to support the delivery of multicast traffic using the Overlay Borovka-based Ad-hoc Multicast Protocol (OBAMP). We present a demo of our implementation that is devised for the GNU/Linux operating system. The implementation has been tested both on standard PCs and on embedded devices running OpenWRT and it is distributed as a plugin within the olsr.org OLSR implementation. This protocol enhancement makes possible to create a multicast distribution tree among a subset of nodes, providing the mesh users with multicast community services.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1