首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks 水声传感器网络自适应能量保留MAC协议
H. Nguyen, S. Shin, Soo-Hyun Park
Distinguishing with the radio frequency (RF) communication for the terrestrial wireless sensor net-works, the peculiarity of acoustic communication in underwater environment causes many issues of energy consumption, propagation delay, time synchronization and other factors when designing the sensor network. The MAC protocol, which plays an important role of managing and controlling the channels, should overcome these requirements in the underwater acoustic sensor networks (UWASNs). In this paper, we proposed a new MAC protocol called adaptive energy reservation MAC (AER-MAC) protocol which exploits the transmission signal strength related to a distance concept in order to make the network transmission schedule. Since, the underwater acoustic communication channels are characterized by a path loss and absorption loss that depend on the distance between the transmitter and receiver. Therefore, a sensor node can send a reservation packet with a power value in which other nodes in the calculation range can receipt this packet.
与地面无线传感器网络的射频通信不同,水下环境中声学通信的特殊性导致了传感器网络设计中的能耗、传播延迟、时间同步等诸多问题。在水声传感器网络(UWASNs)中,MAC协议在信道管理和控制中起着重要的作用,必须克服这些要求。本文提出了一种新的MAC协议,称为自适应能量保留MAC (AER-MAC)协议,该协议利用与距离概念相关的传输信号强度来制定网络传输调度。因为,水声通信信道的特点是路径损耗和吸收损耗取决于发射器和接收器之间的距离。因此,传感器节点可以发送具有功率值的保留报文,该功率值在计算范围内的其他节点可以接收到该报文。
{"title":"Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks","authors":"H. Nguyen, S. Shin, Soo-Hyun Park","doi":"10.1109/EUC.2008.186","DOIUrl":"https://doi.org/10.1109/EUC.2008.186","url":null,"abstract":"Distinguishing with the radio frequency (RF) communication for the terrestrial wireless sensor net-works, the peculiarity of acoustic communication in underwater environment causes many issues of energy consumption, propagation delay, time synchronization and other factors when designing the sensor network. The MAC protocol, which plays an important role of managing and controlling the channels, should overcome these requirements in the underwater acoustic sensor networks (UWASNs). In this paper, we proposed a new MAC protocol called adaptive energy reservation MAC (AER-MAC) protocol which exploits the transmission signal strength related to a distance concept in order to make the network transmission schedule. Since, the underwater acoustic communication channels are characterized by a path loss and absorption loss that depend on the distance between the transmitter and receiver. Therefore, a sensor node can send a reservation packet with a power value in which other nodes in the calculation range can receipt this packet.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication 基于自适应邮箱的移动代理通信协议AMBP
L. Zhang, Beihong Jin, Jiannong Cao
One of the fundamental properties of any mobile agent system is to allow efficient message delivery among mobile agents. However, the agent mobility introduces complexity in the design of a mobile agent communication protocol. To deal with this problem, we adopt the well-known mailbox based framework and propose an Adaptive Mailbox Based Protocol (AMBP) in order to best suit the network environment and the communication requirements. The experimental results show that our AMBP does behave adaptively and can achieve high performance.
任何移动代理系统的基本属性之一是允许在移动代理之间有效地传递消息。然而,代理的移动性给移动代理通信协议的设计带来了复杂性。为了解决这一问题,我们采用了众所周知的基于邮箱的框架,并提出了一种最适合网络环境和通信需求的自适应基于邮箱的协议(AMBP)。实验结果表明,该算法具有良好的自适应性能,能够达到较高的性能。
{"title":"AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication","authors":"L. Zhang, Beihong Jin, Jiannong Cao","doi":"10.1109/EUC.2008.26","DOIUrl":"https://doi.org/10.1109/EUC.2008.26","url":null,"abstract":"One of the fundamental properties of any mobile agent system is to allow efficient message delivery among mobile agents. However, the agent mobility introduces complexity in the design of a mobile agent communication protocol. To deal with this problem, we adopt the well-known mailbox based framework and propose an Adaptive Mailbox Based Protocol (AMBP) in order to best suit the network environment and the communication requirements. The experimental results show that our AMBP does behave adaptively and can achieve high performance.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks 无线传感器网络中一种节能的等待缓存算法
Junfeng Xu, Keqiu Li, Yanming Shen, Jian Liu
In a wide range of applications, such as detecting environmental hazards, monitoring remote terrain and even monitoring customer behavior, wireless sensor networks (WSNs) are playing an important role. Due to the limited energy in each node, a lot of attention has been paid on improving energy efficiency. In this paper, we first propose an energy-efficient waiting caching (EEWC) algorithm to improve the data-centric (DC) transport control protocol by cutting down traffic flow. Second, we deploy networked predictive controller (NPC) to shorten network delay. Thus, the energy consumption can be reduced accordingly. We also analyze the proposed algorithm. Finally, we conduct extensive simulation experiments to evaluate the performance of the proposed algorithm.
在环境危害检测、远程地形监测甚至客户行为监测等广泛应用中,无线传感器网络(wsn)发挥着重要作用。由于每个节点的能量是有限的,因此如何提高能量效率成为人们关注的焦点。在本文中,我们首先提出了一种节能的等待缓存(EEWC)算法,通过减少流量来改进数据中心(DC)传输控制协议。其次,我们采用网络预测控制器(NPC)来缩短网络延迟。因此,能源消耗可以相应减少。我们还对所提出的算法进行了分析。最后,我们进行了大量的仿真实验来评估所提出算法的性能。
{"title":"An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks","authors":"Junfeng Xu, Keqiu Li, Yanming Shen, Jian Liu","doi":"10.1109/EUC.2008.39","DOIUrl":"https://doi.org/10.1109/EUC.2008.39","url":null,"abstract":"In a wide range of applications, such as detecting environmental hazards, monitoring remote terrain and even monitoring customer behavior, wireless sensor networks (WSNs) are playing an important role. Due to the limited energy in each node, a lot of attention has been paid on improving energy efficiency. In this paper, we first propose an energy-efficient waiting caching (EEWC) algorithm to improve the data-centric (DC) transport control protocol by cutting down traffic flow. Second, we deploy networked predictive controller (NPC) to shorten network delay. Thus, the energy consumption can be reduced accordingly. We also analyze the proposed algorithm. Finally, we conduct extensive simulation experiments to evaluate the performance of the proposed algorithm.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126644975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Probabilistic Trust Management in Pervasive Computing 普适计算中的概率信任管理
M. Denko, Tao Sun
In this paper, we propose a probabilistic trust management approach for pervasive computing environment. The approach considers trust value as a probability that a device provides satisfactory interactions with its neighbors. A distributed trust management using recommendation was constructed. An iterative filtering method is employed to eliminate the effect of false recommendations while the weighting method is employed to capture the effect of time on the current behavior of devices. We have carried out performance evaluations using simulation experiments. The comparison made with a deterministic trust management scheme demonstrated that the probabilistic trust management approach performs better, than the deterministic approach while also ensuring the security of interactions, and quickly adapting to changes in the environment.
本文提出了一种普适计算环境下的概率信任管理方法。该方法将信任值视为设备与其邻居提供满意交互的概率。构造了一个基于推荐的分布式信任管理。采用迭代滤波法消除假推荐的影响,采用加权法捕捉时间对设备当前行为的影响。我们利用模拟实验进行了性能评估。与确定性信任管理方案的比较表明,概率信任管理方法在保证交互安全性的同时,性能优于确定性信任管理方案,并能快速适应环境的变化。
{"title":"Probabilistic Trust Management in Pervasive Computing","authors":"M. Denko, Tao Sun","doi":"10.1109/EUC.2008.149","DOIUrl":"https://doi.org/10.1109/EUC.2008.149","url":null,"abstract":"In this paper, we propose a probabilistic trust management approach for pervasive computing environment. The approach considers trust value as a probability that a device provides satisfactory interactions with its neighbors. A distributed trust management using recommendation was constructed. An iterative filtering method is employed to eliminate the effect of false recommendations while the weighting method is employed to capture the effect of time on the current behavior of devices. We have carried out performance evaluations using simulation experiments. The comparison made with a deterministic trust management scheme demonstrated that the probabilistic trust management approach performs better, than the deterministic approach while also ensuring the security of interactions, and quickly adapting to changes in the environment.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Mean-Variance Model for International Portfolio Selection 国际投资组合选择的均值-方差模型
Qiming Pan, Xiaoxia Huang
With the accelerated process of economic globalization, financial globalization is becoming an inevitable trend. More and more investors have diverted their attention to international stock markets. Consequently, international portfolio selection is becoming a hot research topic for scholars. In this paper, following Markowitz's classical mean-variance portfolio selection idea, one new mean-variance model for international portfolio selection is proposed. Using the real data from U.S., U.K., Hong Kong, Indonesia, Singapore and Malaysia Stock Markets, one example is given to illustrate the modeling idea.
随着经济全球化进程的加快,金融全球化正成为一种必然趋势。越来越多的投资者把注意力转向了国际股票市场。因此,国际投资组合选择正成为学者们研究的热点。本文在继承马科维茨经典的均值-方差投资组合思想的基础上,提出了一种新的国际投资组合均值-方差模型。利用美国、英国、香港、印度尼西亚、新加坡和马来西亚股市的真实数据,给出了一个例子来说明建模思想。
{"title":"Mean-Variance Model for International Portfolio Selection","authors":"Qiming Pan, Xiaoxia Huang","doi":"10.1109/EUC.2008.16","DOIUrl":"https://doi.org/10.1109/EUC.2008.16","url":null,"abstract":"With the accelerated process of economic globalization, financial globalization is becoming an inevitable trend. More and more investors have diverted their attention to international stock markets. Consequently, international portfolio selection is becoming a hot research topic for scholars. In this paper, following Markowitz's classical mean-variance portfolio selection idea, one new mean-variance model for international portfolio selection is proposed. Using the real data from U.S., U.K., Hong Kong, Indonesia, Singapore and Malaysia Stock Markets, one example is given to illustrate the modeling idea.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115102442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications 一种新的硬件架构设计方法和时间关键应用的先进优化技术
A. Kalyansundar, R. Chattopadhyay
Ubiquitous and pervasive computing systems are characterized by intelligent sensing and computing. These systems seamlessly understand and respond to the environment with little human intervention. Since such systems are required to be small and inobtrusive, embedded systems play an important role in their design. Furthermore, these systems need to run sophisticated applications in a resource constrained environment. In this paper we focus on computer vision applications in such systems. As these applications require larger memory and are computationally intensive, optimization of these algorithms is imperative. This paper discusses some optimization techniques and their impact on execution time in a complex real-world face tracking example. In certain scenarios, the requirement may be to suggest a hardware architecture for achieving a specific response time. This is especially important for mission critical applications in the fields of automotive, medical or defence. However, the estimation of hardware architecture parameters such as core-clock frequency, memory requirement, optimal number of parallel execution paths for a given application is not straight forward. In this paper, we also present a structured approach to determine the hardware architecture for a driver assistance and safety application with stringent performance constraints.
普适计算系统的特点是智能感知和计算。这些系统无缝地理解和响应环境,几乎没有人为干预。由于这类系统要求小而不显眼,因此嵌入式系统在其设计中起着重要作用。此外,这些系统需要在资源受限的环境中运行复杂的应用程序。本文主要研究计算机视觉在此类系统中的应用。由于这些应用程序需要更大的内存和计算密集型,因此必须对这些算法进行优化。在一个复杂的人脸跟踪实例中,讨论了一些优化技术及其对执行时间的影响。在某些场景中,需求可能是建议实现特定响应时间的硬件体系结构。这对于汽车、医疗或国防领域的关键任务应用尤其重要。然而,硬件架构参数(如核心时钟频率、内存需求、给定应用程序并行执行路径的最佳数量)的估计并不是直截了当的。在本文中,我们还提出了一种结构化的方法来确定具有严格性能约束的驾驶员辅助和安全应用程序的硬件架构。
{"title":"A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications","authors":"A. Kalyansundar, R. Chattopadhyay","doi":"10.1109/EUC.2008.113","DOIUrl":"https://doi.org/10.1109/EUC.2008.113","url":null,"abstract":"Ubiquitous and pervasive computing systems are characterized by intelligent sensing and computing. These systems seamlessly understand and respond to the environment with little human intervention. Since such systems are required to be small and inobtrusive, embedded systems play an important role in their design. Furthermore, these systems need to run sophisticated applications in a resource constrained environment. In this paper we focus on computer vision applications in such systems. As these applications require larger memory and are computationally intensive, optimization of these algorithms is imperative. This paper discusses some optimization techniques and their impact on execution time in a complex real-world face tracking example. In certain scenarios, the requirement may be to suggest a hardware architecture for achieving a specific response time. This is especially important for mission critical applications in the fields of automotive, medical or defence. However, the estimation of hardware architecture parameters such as core-clock frequency, memory requirement, optimal number of parallel execution paths for a given application is not straight forward. In this paper, we also present a structured approach to determine the hardware architecture for a driver assistance and safety application with stringent performance constraints.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"90 8-9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116559759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol ELM-MAC:基于MAC协议中最优传输功率的节能链路管理
Phil-Jung Yun, Changhwa Kim, Sangkyung Kim
Many studies on sensor network have focused on energy efficiency in several layers on communication protocol. In order to increase energy efficiency in sensor network communication, MAC-layer energy efficiency needs to be considered. Even though MAC layer protocols for increasing energy efficiency at MAC layer have been proposed in several papers, there have been few of researches that focused on energy efficiency methods in which transmission power is considered. In this paper we propose a new mechanism named as ELM-MAC that creates, uses, and manages the optimized transmission power level for energy efficiency in MAC layer.
许多关于传感器网络的研究都集中在通信协议层的能效问题上。为了提高传感器网络通信的能效,需要考虑mac层的能效问题。尽管已有多篇论文提出了提高MAC层能效的MAC层协议,但考虑传输功率的能效方法研究较少。在本文中,我们提出了一个新的机制,称为ELM-MAC,创建,使用和管理优化的传输功率水平,以提高MAC层的能源效率。
{"title":"ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol","authors":"Phil-Jung Yun, Changhwa Kim, Sangkyung Kim","doi":"10.1109/EUC.2008.112","DOIUrl":"https://doi.org/10.1109/EUC.2008.112","url":null,"abstract":"Many studies on sensor network have focused on energy efficiency in several layers on communication protocol. In order to increase energy efficiency in sensor network communication, MAC-layer energy efficiency needs to be considered. Even though MAC layer protocols for increasing energy efficiency at MAC layer have been proposed in several papers, there have been few of researches that focused on energy efficiency methods in which transmission power is considered. In this paper we propose a new mechanism named as ELM-MAC that creates, uses, and manages the optimized transmission power level for energy efficiency in MAC layer.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient RFID Authentication Protocol for Low-Cost Tags 一种低成本标签的高效RFID认证协议
Yanfei Liu
With the increased popularity of RFID applications, various authentication protocols have been proposed to provide security and privacy for RFID tags. However, most protocols require a high computational cost in verifying the tagpsilas reply in the authentication server. This paper presents an efficient mutual authentication protocol using one-way functions only. In the proposed protocol, the authentication sever just needs to compute very limited times to find out the identifier of the RFID tag irrespective of the total number of the tags. Also, the response of the tag is changed in every authentication to avoid tag tracing. In addition, a challenge-response approach is performed to overcome tag cloning and replay attack. Furthermore, the proposed protocol is secure against eavesdropping, compromising attack, denial of service attack and other common attacks.
随着RFID应用的日益普及,各种身份验证协议被提出,以保证RFID标签的安全性和保密性。然而,大多数协议在验证服务器中的应答时需要很高的计算成本。本文提出了一种仅使用单向函数的高效互认证协议。在该协议中,无论标签的总数如何,认证服务器只需计算非常有限的时间即可找到RFID标签的标识符。此外,每次身份验证都会更改标签的响应,以避免标签跟踪。此外,采用挑战-响应方法克服了标签克隆和重放攻击。此外,该协议具有抗窃听、妥协攻击、拒绝服务攻击和其他常见攻击的安全性。
{"title":"An Efficient RFID Authentication Protocol for Low-Cost Tags","authors":"Yanfei Liu","doi":"10.1109/EUC.2008.135","DOIUrl":"https://doi.org/10.1109/EUC.2008.135","url":null,"abstract":"With the increased popularity of RFID applications, various authentication protocols have been proposed to provide security and privacy for RFID tags. However, most protocols require a high computational cost in verifying the tagpsilas reply in the authentication server. This paper presents an efficient mutual authentication protocol using one-way functions only. In the proposed protocol, the authentication sever just needs to compute very limited times to find out the identifier of the RFID tag irrespective of the total number of the tags. Also, the response of the tag is changed in every authentication to avoid tag tracing. In addition, a challenge-response approach is performed to overcome tag cloning and replay attack. Furthermore, the proposed protocol is secure against eavesdropping, compromising attack, denial of service attack and other common attacks.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Distance Bounding Protocol for Multiple RFID Tag Authentication 多RFID标签认证的距离边界协议
G. Kapoor, Wei Zhou, S. Piramuthu
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple tags are authenticated for their simultaneous presence in the field of the reader.
中继攻击发生时,攻击者只是在诚实的阅读器和标签之间中继信号,而不以任何方式修改它。由于攻击者无法修改信号内容,因此现存的任何加密协议都无法免受此类攻击。已经有几个提议的协议旨在减轻单个标签的这个问题。我们提出了一种考虑中继攻击的协议,当多个标签同时存在于阅读器领域时进行身份验证。
{"title":"Distance Bounding Protocol for Multiple RFID Tag Authentication","authors":"G. Kapoor, Wei Zhou, S. Piramuthu","doi":"10.1109/EUC.2008.48","DOIUrl":"https://doi.org/10.1109/EUC.2008.48","url":null,"abstract":"Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks when multiple tags are authenticated for their simultaneous presence in the field of the reader.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks 多应用无线传感器网络中高效代码分发的自适应缓冲管理
Weijia Li, Yu Du, Youtao Zhang, B. Childers, Ping Zhou, Jun Yang
Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically more efficient and adapt better to the changing environments than traditional single-application WSNs, they usually require frequent code redistribution on wireless sensors, making it critical to design energy efficient post-deployment code dissemination protocols in MA-WSNs. Different applications in MA-WSNs often share some common code segments. Therefore when there is a need to disseminate a new application from the sink node, it is possible to disseminate its shared code segments from peer sensors instead of disseminating everything from the sink node. While dissemination protocols have been proposed to handle code of each single type, it is challenging to achieve energy efficiency when the code contains both types and needs simultaneous dissemination. In this paper we utilize an adaptive buffer management approach to achieve efficient code dissemination in MA-WSNs. Our experimental results show that adaptive buffer management can reduce the completion time and the message overhead up to 10% and 20% respectively.
未来的无线传感器网络(wsn)预计将在同一网络基础设施中运行多个应用程序。虽然这种多应用WSNs (MA-WSNs)比传统的单应用WSNs具有更高的经济效率和更好的适应环境变化的能力,但它们通常需要在无线传感器上频繁地重新分配代码,因此在MA-WSNs中设计节能的部署后代码分发协议至关重要。在MA-WSNs中,不同的应用程序经常共享一些共同的代码段。因此,当需要从汇聚节点传播新应用程序时,可以从对等传感器传播其共享代码段,而不是从汇聚节点传播所有内容。虽然已经提出了处理每种类型代码的传播协议,但当代码包含两种类型并且需要同时传播时,实现能源效率是具有挑战性的。在本文中,我们利用自适应缓冲区管理方法来实现MA-WSNs中有效的代码分发。实验结果表明,自适应缓冲区管理可以将完成时间和消息开销分别减少10%和20%。
{"title":"Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks","authors":"Weijia Li, Yu Du, Youtao Zhang, B. Childers, Ping Zhou, Jun Yang","doi":"10.1109/EUC.2008.160","DOIUrl":"https://doi.org/10.1109/EUC.2008.160","url":null,"abstract":"Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically more efficient and adapt better to the changing environments than traditional single-application WSNs, they usually require frequent code redistribution on wireless sensors, making it critical to design energy efficient post-deployment code dissemination protocols in MA-WSNs. Different applications in MA-WSNs often share some common code segments. Therefore when there is a need to disseminate a new application from the sink node, it is possible to disseminate its shared code segments from peer sensors instead of disseminating everything from the sink node. While dissemination protocols have been proposed to handle code of each single type, it is challenging to achieve energy efficiency when the code contains both types and needs simultaneous dissemination. In this paper we utilize an adaptive buffer management approach to achieve efficient code dissemination in MA-WSNs. Our experimental results show that adaptive buffer management can reduce the completion time and the message overhead up to 10% and 20% respectively.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1