首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems 分布式嵌入式实时系统的鲁棒反馈控制调度
B. Du, Chun Ruan
A key challenge in developing distributed real-time embedded (DRE) systems is to meeting critical performance constraints when DRE systems become more difficult to predict in terms of the needs of the application, particularly those needs that are likely to change dynamically during execution of the application. The system design must combine temporal requirements and considerable uncertainty, together with the ability to swiftly adapt to changing environmental conditions. This paper proposes a robust DRE model that does not require precise system parameters. A multivariable Hinfin controller is developed and provides utilisation and deadline guarantees in an unpredictable environment.
开发分布式实时嵌入式(DRE)系统的一个关键挑战是,当DRE系统在应用程序的需求方面变得更加难以预测时,特别是那些在应用程序执行期间可能动态变化的需求时,如何满足关键的性能约束。系统设计必须结合时间需求和相当大的不确定性,以及快速适应不断变化的环境条件的能力。本文提出了一种不需要精确系统参数的鲁棒DRE模型。开发了多变量Hinfin控制器,并在不可预测的环境中提供利用率和截止日期保证。
{"title":"Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems","authors":"B. Du, Chun Ruan","doi":"10.1109/EUC.2008.107","DOIUrl":"https://doi.org/10.1109/EUC.2008.107","url":null,"abstract":"A key challenge in developing distributed real-time embedded (DRE) systems is to meeting critical performance constraints when DRE systems become more difficult to predict in terms of the needs of the application, particularly those needs that are likely to change dynamically during execution of the application. The system design must combine temporal requirements and considerable uncertainty, together with the ability to swiftly adapt to changing environmental conditions. This paper proposes a robust DRE model that does not require precise system parameters. A multivariable Hinfin controller is developed and provides utilisation and deadline guarantees in an unpredictable environment.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Key Management for Wireless Sensor Networks Using Trusted Neighbors 基于可信邻居的无线传感器网络密钥管理
Yuan Xue, H. Jürgensen, R. Azarderakhsh, A. Reyhani-Masoleh
Establishing and maintaining secure communication paths in a wireless sensor network poses mathematical and technical challenges. We suggest to use random nonces to set up secure communication links after the network deployment phase. This idea exploits some of the inherent features of sensor networks, e.g.: nodes are densely deployed; the wireless communication areas of neighbouring nodes have a large overlap. We outline the analytical properties of such a scheme and show simulation results which corroborate them for practical purposes.
在无线传感器网络中建立和维护安全的通信路径提出了数学和技术挑战。我们建议在网络部署阶段之后使用随机随机数建立安全的通信链路。这个想法利用了传感器网络的一些固有特征,例如:节点密集部署;相邻节点的无线通信区域有很大的重叠。我们概述了这种方案的分析性质,并给出了实际应用的仿真结果。
{"title":"Key Management for Wireless Sensor Networks Using Trusted Neighbors","authors":"Yuan Xue, H. Jürgensen, R. Azarderakhsh, A. Reyhani-Masoleh","doi":"10.1109/EUC.2008.125","DOIUrl":"https://doi.org/10.1109/EUC.2008.125","url":null,"abstract":"Establishing and maintaining secure communication paths in a wireless sensor network poses mathematical and technical challenges. We suggest to use random nonces to set up secure communication links after the network deployment phase. This idea exploits some of the inherent features of sensor networks, e.g.: nodes are densely deployed; the wireless communication areas of neighbouring nodes have a large overlap. We outline the analytical properties of such a scheme and show simulation results which corroborate them for practical purposes.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database 无需中央数据库的RFID标签安全搜索强认证协议
Tae-Youn Won, J. Chun, Dong Hoon Lee
RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols donpsilat perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.
RFID标签搜索是利用便携式阅读器在一组标签中查找特定的标签。由于便携式阅读器具有与每个标签相关联的自己的标识符和秘密值,因此便携式阅读器可以在没有中央数据库的帮助下与标签进行无线通信。RFID标签搜索可以在图书馆所有带有RFID标签的图书中找到丢失的图书。然而,RFID标签搜索的基本操作存在安全和隐私问题。解决这些问题的安全搜索协议首先由Tan等人讨论。尽管如此,他们的协议不能通过搜索查询的重用攻击完美地解决非法标签跟踪问题,也有通过不安全通道暴露便携式阅读器ID的非法阅读器跟踪问题。在本文中,我们提出了一种强认证协议,用于安全的RFID标签搜索,而不需要中央数据库的帮助,该协议使用分组密码(AES-128)和时间戳。我们的协议可以有效地搜索特定的标签,并保护用户隐私免受所有主要攻击。
{"title":"Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database","authors":"Tae-Youn Won, J. Chun, Dong Hoon Lee","doi":"10.1109/EUC.2008.54","DOIUrl":"https://doi.org/10.1109/EUC.2008.54","url":null,"abstract":"RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols donpsilat perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134557611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks 大规模传感器网络中基于片上系统集群的通信
Sharon Fan, Jeffrey Fan, K. Makki, N. Pissinou
In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication issues in distributed and large-scaled sensor nodes in wireless sensor network application. There are two communication categories under consideration, i.e. intra-nodes and inter-nodes. Due to the potentially higher frequency in the signal propagation within the sensor node, the characteristics of the interconnect among various systems-on-chips cannot be described in the traditionally lumped R, L, C components. We adapt a distributed transmission line model to address such issues and possibly improve the reliability in the intra-nodes communication. Furthermore, based on the bandwidth requirements of each sensor node, the large-scaled senor network is proposed to be transformed into a maze diagram by a user defined threshold bandwidth, so that many existing approaches may be applied to determine the routing paths in the inter-nodes communication to improve the efficiency of the overall network.
本文提出了一种应用于复杂传感器网络的片上系统聚类框架。该框架可用于解决无线传感器网络应用中分布式、大规模传感器节点的通信问题。目前正在考虑两种通信类别,即节点内通信和节点间通信。由于传感器节点内的信号传播可能具有更高的频率,因此不能用传统的集总R、L、C分量来描述各种片上系统之间互连的特性。我们采用分布式传输线模型来解决这些问题,并可能提高节点内通信的可靠性。在此基础上,根据每个传感器节点的带宽需求,提出将大型传感器网络通过用户自定义阈值带宽转换为迷宫图,从而可以应用许多现有的方法来确定节点间通信的路由路径,从而提高整个网络的效率。
{"title":"Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks","authors":"Sharon Fan, Jeffrey Fan, K. Makki, N. Pissinou","doi":"10.1109/EUC.2008.184","DOIUrl":"https://doi.org/10.1109/EUC.2008.184","url":null,"abstract":"In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication issues in distributed and large-scaled sensor nodes in wireless sensor network application. There are two communication categories under consideration, i.e. intra-nodes and inter-nodes. Due to the potentially higher frequency in the signal propagation within the sensor node, the characteristics of the interconnect among various systems-on-chips cannot be described in the traditionally lumped R, L, C components. We adapt a distributed transmission line model to address such issues and possibly improve the reliability in the intra-nodes communication. Furthermore, based on the bandwidth requirements of each sensor node, the large-scaled senor network is proposed to be transformed into a maze diagram by a user defined threshold bandwidth, so that many existing approaches may be applied to determine the routing paths in the inter-nodes communication to improve the efficiency of the overall network.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks 用于泛在水下无线传感器网络的点对多点超声通信调制解调器
Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park
Recently, researches on underwater sensor networks (USN) for ocean development and disaster prevention have been emerged as one of interesting topics. Since low-power, high-speed and inexpensive communication modem is a prerequisite for deployment of USN, we design and implement an underwater modem by utilizing general-purpose waterproof ultrasonic sensors in this paper. Also, we make an experiment in a water tank containing sensor nodes and a sink node, a gateway, and show that point-to-multipoint communication is possible at a data rate of 1 kbps.
近年来,用于海洋开发和防灾的水下传感器网络的研究已成为一个有趣的话题。由于低功耗、高速和廉价的通信调制解调器是部署USN的先决条件,因此本文利用通用防水超声波传感器设计并实现了一种水下调制解调器。同时,我们在一个包含传感器节点和一个汇聚节点、一个网关的水箱中进行了实验,证明了以1kbps的数据速率实现点对多点通信是可能的。
{"title":"Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks","authors":"Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park","doi":"10.1109/EUC.2008.180","DOIUrl":"https://doi.org/10.1109/EUC.2008.180","url":null,"abstract":"Recently, researches on underwater sensor networks (USN) for ocean development and disaster prevention have been emerged as one of interesting topics. Since low-power, high-speed and inexpensive communication modem is a prerequisite for deployment of USN, we design and implement an underwater modem by utilizing general-purpose waterproof ultrasonic sensors in this paper. Also, we make an experiment in a water tank containing sensor nodes and a sink node, a gateway, and show that point-to-multipoint communication is possible at a data rate of 1 kbps.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132387163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks 基于zigbee的无线传感器网络集成部署工具
Yu-Kai Huang, P. Hsiu, Wei-Ni Chu, Kuan-Chang Hung, Ai-Chun Pang, Tei-Wei Kuo, Min Di, Hua-Wei Fang
Wireless sensor networks have been extensively adopted in numerous application scenarios. However, increasing environmental constraints and performance requirements has spurred the development of tools to expedite deployment and minimize human intervention. This study extends previous work by the authors in network development and aims at the performance evaluation of applications operating in to-be-deployed networks. We prove that the determination of a ZigBee cluster tree over an underlying network is NP - hard and propose an algorithm for generating tree topology. Based on the proposed algorithm/technologies, an integrated development tool is developed. The capability of the tool is demonstrated by a case study of the system deployed in an office building.
无线传感器网络已被广泛应用于众多应用场景中。然而,越来越多的环境限制和性能要求促使了工具的开发,以加快部署和减少人为干预。本研究扩展了作者先前在网络开发方面的工作,旨在对在待部署网络中运行的应用程序进行性能评估。我们证明了在底层网络上ZigBee集群树的确定是NP困难的,并提出了一种生成树拓扑的算法。基于所提出的算法/技术,开发了一个集成开发工具。该工具的功能通过部署在办公楼中的系统的案例研究进行了演示。
{"title":"An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks","authors":"Yu-Kai Huang, P. Hsiu, Wei-Ni Chu, Kuan-Chang Hung, Ai-Chun Pang, Tei-Wei Kuo, Min Di, Hua-Wei Fang","doi":"10.1109/EUC.2008.87","DOIUrl":"https://doi.org/10.1109/EUC.2008.87","url":null,"abstract":"Wireless sensor networks have been extensively adopted in numerous application scenarios. However, increasing environmental constraints and performance requirements has spurred the development of tools to expedite deployment and minimize human intervention. This study extends previous work by the authors in network development and aims at the performance evaluation of applications operating in to-be-deployed networks. We prove that the determination of a ZigBee cluster tree over an underlying network is NP - hard and propose an algorithm for generating tree topology. Based on the proposed algorithm/technologies, an integrated development tool is developed. The capability of the tool is demonstrated by a case study of the system deployed in an office building.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133263234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test 带弱验收测试的恢复块混合容错方法
Ashraf Armoush, F. Salewski, S. Kowalewski
Software reliability represents a major requirement for safety critical applications. Several fault tolerance methods have been proposed to improve software reliability. These methods are based on either fault masking such as N-version programming or on fault detection such as in the recovery block method. The success of the recovery block method depends on a high quality of the effective acceptance test, which is sometimes very difficult to achieve. In this paper, we propose a hybrid fault tolerance method called recovery block with backup voting to improve the reliability of the normal recovery block in the case of a weak acceptance test. In the proposed method, a copy of the outcome of each version is stored in a cache memory as backup, and when the recovery block method fails to produce a correct output due to a weak acceptance test, the stored values are used as inputs to a voting method to produce the correct output. A Monte Carlo based simulation method is used to show the reliability improvement in the new proposed hybrid method as well as to show the decreased dependency of the new method on the quality of the acceptance test, which makes the new method more suitable for critical applications where the construction of an effective acceptance test is difficult.
软件可靠性是安全关键应用程序的主要需求。为了提高软件的可靠性,提出了几种容错方法。这些方法要么基于故障屏蔽(如n版本编程),要么基于故障检测(如恢复块方法)。回收区块方法的成功取决于高质量的有效验收测试,而这有时很难实现。为了提高正常恢复块在弱验收测试情况下的可靠性,提出了一种恢复块与备份投票的混合容错方法。在建议的方法中,每个版本的结果副本作为备份存储在缓存中,当恢复块方法由于弱接受测试而无法产生正确的输出时,存储的值被用作投票方法的输入以产生正确的输出。基于蒙特卡罗的仿真方法显示了新方法的可靠性提高以及新方法对验收测试质量的依赖性降低,使新方法更适合于难以构建有效验收测试的关键应用。
{"title":"A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test","authors":"Ashraf Armoush, F. Salewski, S. Kowalewski","doi":"10.1109/EUC.2008.102","DOIUrl":"https://doi.org/10.1109/EUC.2008.102","url":null,"abstract":"Software reliability represents a major requirement for safety critical applications. Several fault tolerance methods have been proposed to improve software reliability. These methods are based on either fault masking such as N-version programming or on fault detection such as in the recovery block method. The success of the recovery block method depends on a high quality of the effective acceptance test, which is sometimes very difficult to achieve. In this paper, we propose a hybrid fault tolerance method called recovery block with backup voting to improve the reliability of the normal recovery block in the case of a weak acceptance test. In the proposed method, a copy of the outcome of each version is stored in a cache memory as backup, and when the recovery block method fails to produce a correct output due to a weak acceptance test, the stored values are used as inputs to a voting method to produce the correct output. A Monte Carlo based simulation method is used to show the reliability improvement in the new proposed hybrid method as well as to show the decreased dependency of the new method on the quality of the acceptance test, which makes the new method more suitable for critical applications where the construction of an effective acceptance test is difficult.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip 基于分层簇的片上网络不规则拓扑定制
Shijun Lin, L. Su, Haibo Su, Depeng Jin, Lieguang Zeng
In this paper, a hierarchical cluster-based irregular topology customization method is proposed for Networks-on-Chip (NoC). This method contains three steps: (1) partitioning IPs into many hierarchical clusters; (2) generating a core network; (3) deleting redundant edge routers. Results show that the irregular topologies generated by our hierarchical cluster-based method consume less power when satisfying the bandwidth and port number constraints. Compared with the previous method, our method can save about 15.41% of power averagely for all benchmark applications. Particularly, for MPEG 4 decoder, our method can save 31.62% of power.
提出了一种基于分层聚类的片上网络(NoC)不规则拓扑自定义方法。该方法分为三个步骤:(1)将ip划分为多个分层簇;(2)生成核心网络;(3)删除冗余的边缘路由器。结果表明,在满足带宽和端口号约束的情况下,基于分层聚类的方法生成的不规则拓扑消耗较少的功耗。与之前的方法相比,我们的方法在所有基准应用中平均可节省约15.41%的功耗。特别是对于mpeg4解码器,我们的方法可以节省31.62%的功耗。
{"title":"Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip","authors":"Shijun Lin, L. Su, Haibo Su, Depeng Jin, Lieguang Zeng","doi":"10.1109/EUC.2008.9","DOIUrl":"https://doi.org/10.1109/EUC.2008.9","url":null,"abstract":"In this paper, a hierarchical cluster-based irregular topology customization method is proposed for Networks-on-Chip (NoC). This method contains three steps: (1) partitioning IPs into many hierarchical clusters; (2) generating a core network; (3) deleting redundant edge routers. Results show that the irregular topologies generated by our hierarchical cluster-based method consume less power when satisfying the bandwidth and port number constraints. Compared with the previous method, our method can save about 15.41% of power averagely for all benchmark applications. Particularly, for MPEG 4 decoder, our method can save 31.62% of power.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks 时断时续连接移动网络中基于方向的地理路由方案
Pub Date : 2008-12-17 DOI: 10.1080/17445760.2012.731057
Ze Li, Haiying Shen
In delay tolerant network, a complete routing path from a source to a destination can not be guaranteed at most of the time. Therefore, traditional routing method for ad hoc network is not applicable in these situations. Current approaches for such networks are primarily based on redundant transmissions and single copy direct routing. However, they incur either high overhead due to excessive transmissions or long delays due to the incorrect path choices during forwarding. In this paper, we propose a direction based geographic routing scheme (DIG) for the intermittently connected network. Relying on the geographic location information, the packets are routed in a approximate ideal path to the destination, which significantly reduces the resource required in flooding-based algorithm and lead to decreased delay compared to the direct routing. Theoretical analyzes and simulations show that compared to the epidemic routing and direct routing, DIG provides nearly optimal delay with very low overhead.
在容忍延迟网络中,大多数情况下不能保证从源到目的路由路径的完整。因此,传统的ad hoc网络路由方法在这种情况下是不适用的。目前这种网络的方法主要是基于冗余传输和单副本直接路由。但是,它们要么由于传输过多而导致高开销,要么由于转发过程中路径选择错误而导致长时间延迟。本文提出了一种基于方向的间歇连接网络地理路由方案(DIG)。根据地理位置信息,将数据包以近似的理想路径路由到目的地,这大大减少了基于洪水的算法所需的资源,并且与直接路由相比,减少了延迟。理论分析和仿真结果表明,与流行病路由和直接路由相比,DIG提供了几乎最优的延迟和非常低的开销。
{"title":"A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks","authors":"Ze Li, Haiying Shen","doi":"10.1080/17445760.2012.731057","DOIUrl":"https://doi.org/10.1080/17445760.2012.731057","url":null,"abstract":"In delay tolerant network, a complete routing path from a source to a destination can not be guaranteed at most of the time. Therefore, traditional routing method for ad hoc network is not applicable in these situations. Current approaches for such networks are primarily based on redundant transmissions and single copy direct routing. However, they incur either high overhead due to excessive transmissions or long delays due to the incorrect path choices during forwarding. In this paper, we propose a direction based geographic routing scheme (DIG) for the intermittently connected network. Relying on the geographic location information, the packets are routed in a approximate ideal path to the destination, which significantly reduces the resource required in flooding-based algorithm and lead to decreased delay compared to the direct routing. Theoretical analyzes and simulations show that compared to the epidemic routing and direct routing, DIG provides nearly optimal delay with very low overhead.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124301848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Implementation and Evaluation of SIP-Based Secure VoIP Communication System 基于sip协议的VoIP安全通信系统的实现与评价
Joongman Kim, Seokung Yoon, Hyuncheol Jeong, Yoojae Won
VoIP provides multimedia (audio and video, etc) services through Internet Network. Due to the characteristic of Internet, there are many attacks and threats in Internet, so are VoIP. Therefore, user authentication, confidentiality, and integrity of signaling message, media stream are required for secure communication. TLS and S/MIME are proposed for SIP signaling message protection and SRTP for media protection. MIKEY is also a standard protocol for key management. In this paper, we analyzed and implemented security protocols for VoIP. And then, we accomplished performance test of them by applying implemented security protocols to hardware VoIP phone and SIP proxy.
VoIP通过Internet网络提供多媒体(音频、视频等)业务。由于互联网的特点,网络中存在着许多攻击和威胁,VoIP也是如此。因此,对用户认证、信令消息、媒体流的保密性、完整性等都是安全通信的要求。提出了用于SIP信令消息保护的TLS和S/MIME协议,以及用于媒体保护的SRTP协议。MIKEY也是密钥管理的标准协议。本文对VoIP的安全协议进行了分析和实现。然后,通过将实现的安全协议应用于硬件VoIP电话和SIP代理,完成了它们的性能测试。
{"title":"Implementation and Evaluation of SIP-Based Secure VoIP Communication System","authors":"Joongman Kim, Seokung Yoon, Hyuncheol Jeong, Yoojae Won","doi":"10.1109/EUC.2008.79","DOIUrl":"https://doi.org/10.1109/EUC.2008.79","url":null,"abstract":"VoIP provides multimedia (audio and video, etc) services through Internet Network. Due to the characteristic of Internet, there are many attacks and threats in Internet, so are VoIP. Therefore, user authentication, confidentiality, and integrity of signaling message, media stream are required for secure communication. TLS and S/MIME are proposed for SIP signaling message protection and SRTP for media protection. MIKEY is also a standard protocol for key management. In this paper, we analyzed and implemented security protocols for VoIP. And then, we accomplished performance test of them by applying implemented security protocols to hardware VoIP phone and SIP proxy.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1