首页 > 最新文献

2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems最新文献

英文 中文
Efficient Privacy-Preserving Fingerprint-Based Indoor Localization Using Crowdsourcing 基于众包的高效隐私保护指纹室内定位
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.76
Patrick Armengol, Rachelle Tobkes, K. Akkaya, Bekir Sait Ciftler, Ismail Güvenç
Indoor localization has been widely studied due to the inability of GPS to function indoors. Numerous approaches have been proposed in the past and a number of these approaches are currently being used commercially. However, little attention was paid to the privacy of the users especially in the commercial products. Malicious individuals can determine a client's daily habits and activities by simply analyzing their WiFi signals and tracking information. In this paper, we implemented a privacy-preserving indoor localization scheme that is based on a fingerprinting approach to analyze the performance issues in terms of accuracy, complexity, scalability and privacy. We developed an Android app and collected a large number of data on the third floor of the FIU Engineering Center. The analysis of data provided excellent opportunities for performance improvement which have been incorporated to the privacy-preserving localization scheme.
由于GPS无法在室内发挥作用,室内定位受到了广泛的研究。过去已经提出了许多方法,其中一些方法目前正在商业上使用。然而,在商业产品中,对用户隐私的关注却很少。恶意的人可以通过简单地分析客户的WiFi信号和跟踪信息来确定客户的日常习惯和活动。在本文中,我们实现了一种基于指纹方法的隐私保护室内定位方案,从准确性、复杂性、可扩展性和隐私性方面分析了性能问题。我们在FIU工程中心的三楼开发了一个Android应用程序,并收集了大量的数据。数据分析为性能改进提供了极好的机会,这些改进已被纳入保护隐私的本地化方案。
{"title":"Efficient Privacy-Preserving Fingerprint-Based Indoor Localization Using Crowdsourcing","authors":"Patrick Armengol, Rachelle Tobkes, K. Akkaya, Bekir Sait Ciftler, Ismail Güvenç","doi":"10.1109/MASS.2015.76","DOIUrl":"https://doi.org/10.1109/MASS.2015.76","url":null,"abstract":"Indoor localization has been widely studied due to the inability of GPS to function indoors. Numerous approaches have been proposed in the past and a number of these approaches are currently being used commercially. However, little attention was paid to the privacy of the users especially in the commercial products. Malicious individuals can determine a client's daily habits and activities by simply analyzing their WiFi signals and tracking information. In this paper, we implemented a privacy-preserving indoor localization scheme that is based on a fingerprinting approach to analyze the performance issues in terms of accuracy, complexity, scalability and privacy. We developed an Android app and collected a large number of data on the third floor of the FIU Engineering Center. The analysis of data provided excellent opportunities for performance improvement which have been incorporated to the privacy-preserving localization scheme.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable Broadcast with Joint Forward Error Correction and Erasure Codes in Wireless Communication Networks 无线通信网络中联合前向纠错和Erasure码的可靠广播
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.68
P. Ostovari, Jie Wu
One of the main challenges in wireless networks is addressing the unreliability of the wireless links, and providing reliable transmissions. Two important sources of errors in wireless transmissions are noise and interference. In order to address the errors due to noise, forward error correction methods can be used, in which redundancy is added to the packets to detect and correct the bit errors. However, when the environment is too noisy, or there is interference among the transmissions, the forward error correction codes might not be able to correct the bit errors, resulting in packet erasures. In this case, application layer erasure codes, such as network coding, are useful. In this paper, we consider a wireless network which faces both random bit errors and packet erasures. In order to provide reliable transmissions, we benefit from joint forward error correction and erasure codes, and formulate the successful transmission probability. We also propose a low-complexity method to find the optimal redundancy that should be assign to the forward error correction and erasure code. Our method consists of two phases: offline and online phases. In the offline phase, we generate a reference table, which shows the successful delivery of the packets for each possible transmission strategy. The source node uses this reference table in the second phase to find the optimal strategy depending on the noise and interference level. We show the effectiveness of our proposed method through extensive simulations.
无线网络的主要挑战之一是解决无线链路的不可靠性,并提供可靠的传输。在无线传输中产生误差的两个重要来源是噪声和干扰。为了解决由噪声引起的错误,可以使用前向纠错方法,在数据包中添加冗余来检测和纠正比特错误。但是,当环境过于嘈杂,或者传输之间存在干扰时,前向纠错码可能无法纠正比特错误,导致数据包擦除。在这种情况下,应用层的擦除码,如网络编码,是有用的。在本文中,我们考虑了一个同时面临随机比特错误和数据包擦除的无线网络。为了提供可靠的传输,我们采用联合前向纠错和擦除码,并制定了成功传输的概率。我们还提出了一种低复杂度的方法来寻找分配给前向纠错和纠删码的最优冗余。我们的方法包括两个阶段:离线和在线阶段。在脱机阶段,我们生成一个参考表,其中显示了每个可能的传输策略的数据包的成功交付。源节点在第二阶段使用该参考表,根据噪声和干扰水平找到最优策略。通过大量的仿真,证明了所提方法的有效性。
{"title":"Reliable Broadcast with Joint Forward Error Correction and Erasure Codes in Wireless Communication Networks","authors":"P. Ostovari, Jie Wu","doi":"10.1109/MASS.2015.68","DOIUrl":"https://doi.org/10.1109/MASS.2015.68","url":null,"abstract":"One of the main challenges in wireless networks is addressing the unreliability of the wireless links, and providing reliable transmissions. Two important sources of errors in wireless transmissions are noise and interference. In order to address the errors due to noise, forward error correction methods can be used, in which redundancy is added to the packets to detect and correct the bit errors. However, when the environment is too noisy, or there is interference among the transmissions, the forward error correction codes might not be able to correct the bit errors, resulting in packet erasures. In this case, application layer erasure codes, such as network coding, are useful. In this paper, we consider a wireless network which faces both random bit errors and packet erasures. In order to provide reliable transmissions, we benefit from joint forward error correction and erasure codes, and formulate the successful transmission probability. We also propose a low-complexity method to find the optimal redundancy that should be assign to the forward error correction and erasure code. Our method consists of two phases: offline and online phases. In the offline phase, we generate a reference table, which shows the successful delivery of the packets for each possible transmission strategy. The source node uses this reference table in the second phase to find the optimal strategy depending on the noise and interference level. We show the effectiveness of our proposed method through extensive simulations.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks with Node Buffers 具有节点缓冲的大型无线网络的稀疏认知多址方案
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.23
A. Shafie, N. Al-Dhahir, R. Hamila
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. In this case, for a given frame, the transmitters send their buffer states to the destination which assigns the available time duration in the frame for data transmission among the transmitters based on their buffer state information. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes. Our numerical results demonstrate that the proposed schemes achieve higher average bits per unit power than the fixed-assignment scheme where each node is assigned a predetermined fraction of the frame duration.
基于发射机的缓冲状态信息和收发机的双工传输能力,提出了大型无线网络的高效多址接入方案。首先,我们研究了半双工节点的情况,其中一个节点可以在给定的时间瞬间发送或接收。在这种情况下,对于给定的帧,发送器将其缓冲状态发送到目的地,目的地根据其缓冲状态信息在发送器之间分配该帧中用于数据传输的可用时间持续时间。如果给定帧中的非空队列发送器的数量远远小于用户数量,则网络被称为自然稀疏,这种情况发生在到达队列的速率非常小而用户数量很大的情况下。如果网络不是自然稀疏的,我们将用户请求设计为稀疏的,这样只有很少的请求被发送到目的地。我们将给定帧中检测到的非空队列发送器称为帧所有者。我们的设计目标是最小化节点在给定帧内的总发射功率。在非开槽时间数据传输的情况下,优化问题表现为一个凸优化程序。我们提出了一个近似公式来简化问题,并获得了节点分配时间的封闭形式表达式。近似优化问题的解表明,在帧所有者集合中,分配给节点的时间长度为该节点的缓冲区占用平方根与所有帧所有者每次占用平方根之和的比值。然后,我们研究了时隙数据传输场景,其中为数据传输分配的持续时间是时隙的。此外,我们还表明,节点的全双工能力增加了帧的数据传输部分,并使所提出的方案能够分布式实现。我们的数值结果表明,所提出的方案比固定分配方案获得更高的单位功率平均比特数,其中每个节点被分配一个预定的帧持续时间的分数。
{"title":"Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks with Node Buffers","authors":"A. Shafie, N. Al-Dhahir, R. Hamila","doi":"10.1109/MASS.2015.23","DOIUrl":"https://doi.org/10.1109/MASS.2015.23","url":null,"abstract":"This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. In this case, for a given frame, the transmitters send their buffer states to the destination which assigns the available time duration in the frame for data transmission among the transmitters based on their buffer state information. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes. Our numerical results demonstrate that the proposed schemes achieve higher average bits per unit power than the fixed-assignment scheme where each node is assigned a predetermined fraction of the frame duration.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Analysis of Complex Physical Systems on Networked Mobile Devices 网络移动设备上复杂物理系统的数值分析
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.12
Christoph Dibak, Frank Dürr, K. Rothermel
Recently, a new class of mobile applications has appeared that takes into account the behavior of physical phenomenon. Prominent examples of such applications include augmented reality applications visualizing physical processes on a mobile device or mobile cyber-physical systems like autonomous vehicles or robots. Typically, these applications need to solve partial differential equations (PDE) to simulate the behavior of a physical system. There are two basic strategies to numerically solve these PDEs: (1) offload all computations to a remote server, (2) solve the PDE on the resource-constrained mobile device. However, both strategies have severe drawbacks. Offloading will fail if the mobile device is disconnected, and resource constraints require to reduce the quality of the solution. Therefore, we propose a new approach for mobile simulations using a hybrid strategy that is robust to communication failures and can still benefit from powerful server resources. The basic idea of this approach is to dynamically decide on the placement of the PDE solver based on a prediction of the wireless link availability using Markov Chains. Our tests based on measurement in real cellular networks and real mobile devices show that this approach is able to keep deadline constraints in more than 61 % of the cases compared to a pure offloading approach, while saving up to 74 % of energy compared to a simplified approach.
最近,一类新的移动应用程序出现了,它考虑了物理现象的行为。这类应用的突出例子包括增强现实应用,在移动设备或移动网络物理系统(如自动驾驶汽车或机器人)上可视化物理过程。通常,这些应用程序需要求解偏微分方程(PDE)来模拟物理系统的行为。数值求解这些PDE有两种基本策略:(1)将所有计算卸载到远程服务器上;(2)在资源受限的移动设备上求解PDE。然而,这两种策略都有严重的缺点。如果移动设备断开连接,卸载将失败,并且资源限制要求降低解决方案的质量。因此,我们提出了一种使用混合策略的移动模拟新方法,该策略对通信故障具有鲁棒性,并且仍然可以从强大的服务器资源中受益。该方法的基本思想是基于使用马尔可夫链对无线链路可用性的预测,动态地决定PDE求解器的位置。我们基于真实蜂窝网络和真实移动设备的测量测试表明,与纯卸载方法相比,该方法能够在超过61%的情况下保持最后期限限制,同时与简化方法相比节省高达74%的能源。
{"title":"Numerical Analysis of Complex Physical Systems on Networked Mobile Devices","authors":"Christoph Dibak, Frank Dürr, K. Rothermel","doi":"10.1109/MASS.2015.12","DOIUrl":"https://doi.org/10.1109/MASS.2015.12","url":null,"abstract":"Recently, a new class of mobile applications has appeared that takes into account the behavior of physical phenomenon. Prominent examples of such applications include augmented reality applications visualizing physical processes on a mobile device or mobile cyber-physical systems like autonomous vehicles or robots. Typically, these applications need to solve partial differential equations (PDE) to simulate the behavior of a physical system. There are two basic strategies to numerically solve these PDEs: (1) offload all computations to a remote server, (2) solve the PDE on the resource-constrained mobile device. However, both strategies have severe drawbacks. Offloading will fail if the mobile device is disconnected, and resource constraints require to reduce the quality of the solution. Therefore, we propose a new approach for mobile simulations using a hybrid strategy that is robust to communication failures and can still benefit from powerful server resources. The basic idea of this approach is to dynamically decide on the placement of the PDE solver based on a prediction of the wireless link availability using Markov Chains. Our tests based on measurement in real cellular networks and real mobile devices show that this approach is able to keep deadline constraints in more than 61 % of the cases compared to a pure offloading approach, while saving up to 74 % of energy compared to a simplified approach.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CLIP: Continuous Location Integrity and Provenance for Mobile Phones CLIP:移动电话的连续位置完整性和来源
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.33
Chen Lyu, A. Pande, Xinlei Wang, Jindan Zhu, Dawu Gu, P. Mohapatra
Many location-based services require a mobile user to continuously prove his location. In absence of a secure mechanism, malicious users may lie about their locations to get these services. Mobility trace, a sequence of past mobility points, provides evidence for the user's locations. In this paper, we propose a Continuous Location Integrity and Provenance (CLIP) Scheme to provide authentication for mobility trace, and protect users' privacy. CLIP uses low-power inertial accelerometer sensor with a light-weight entropy-based commitment mechanism and is able to authenticate the user's mobility trace without any cost of trusted hardware. CLIP maintains the user's privacy, allowing the user to submit a portion of his mobility trace with which the commitment can be also verified. Wireless Access Points (APs) or colocated mobile devices are used to generate the location proofs. We also propose a light-weight spatial-temporal trust model to detect fake location proofs from collusion attacks. The prototype implementation on Android demonstrates that CLIP requires low computational and storage resources. Our extensive simulations show that the spatial-temporal trust model can achieve high (> 0.9) detection accuracy against collusion attacks.
许多基于位置的服务要求移动用户不断证明自己的位置。在缺乏安全机制的情况下,恶意用户可能会谎报自己的位置以获得这些服务。移动轨迹,一系列过去的移动点,为用户的位置提供了证据。本文提出了一种连续位置完整性和来源(CLIP)方案,为移动跟踪提供认证,并保护用户隐私。CLIP采用低功耗惯性加速度传感器和轻量级的基于熵的承诺机制,能够在不需要任何可信硬件成本的情况下验证用户的移动轨迹。CLIP维护用户的隐私,允许用户提交他的移动跟踪的一部分,也可以用它来验证承诺。使用无线接入点(ap)或并置的移动设备生成位置证明。我们还提出了一个轻量级的时空信任模型来检测共谋攻击中的虚假位置证明。在Android上的原型实现表明CLIP需要较少的计算和存储资源。大量的仿真结果表明,时空信任模型对合谋攻击的检测精度较高(> 0.9)。
{"title":"CLIP: Continuous Location Integrity and Provenance for Mobile Phones","authors":"Chen Lyu, A. Pande, Xinlei Wang, Jindan Zhu, Dawu Gu, P. Mohapatra","doi":"10.1109/MASS.2015.33","DOIUrl":"https://doi.org/10.1109/MASS.2015.33","url":null,"abstract":"Many location-based services require a mobile user to continuously prove his location. In absence of a secure mechanism, malicious users may lie about their locations to get these services. Mobility trace, a sequence of past mobility points, provides evidence for the user's locations. In this paper, we propose a Continuous Location Integrity and Provenance (CLIP) Scheme to provide authentication for mobility trace, and protect users' privacy. CLIP uses low-power inertial accelerometer sensor with a light-weight entropy-based commitment mechanism and is able to authenticate the user's mobility trace without any cost of trusted hardware. CLIP maintains the user's privacy, allowing the user to submit a portion of his mobility trace with which the commitment can be also verified. Wireless Access Points (APs) or colocated mobile devices are used to generate the location proofs. We also propose a light-weight spatial-temporal trust model to detect fake location proofs from collusion attacks. The prototype implementation on Android demonstrates that CLIP requires low computational and storage resources. Our extensive simulations show that the spatial-temporal trust model can achieve high (> 0.9) detection accuracy against collusion attacks.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
MBDMAC: A MAC Protocol for Multi-beam Directional Antennas in Wireless Networks MBDMAC:无线网络中多波束定向天线的MAC协议
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.94
G. Wang, Wenming Li, Xingyu Cai
In this paper, we propose a new MAC protocol for multi-beam directional antenna. In the protocol, each beam-sector has its own control channel, thus the communications among different beam-sectors are independent. It uses the Directional Network Allocation Vector (DNAV) to record the establishment processes. After sensing all the sectors of multi-beam antenna, it uses the global assignment strategy to assign the directional communication channels. Extensive simulation results show that our protocol can significantly improve the throughput of entire wireless network at the expense of the slightly increased RTS/DRTS requests during establishment process.
本文提出了一种新的多波束定向天线MAC协议。在该协议中,每个波束扇区都有自己的控制信道,因此不同波束扇区之间的通信是独立的。它使用定向网络分配向量(Directional Network Allocation Vector, DNAV)来记录建立过程。在对多波束天线的所有扇区进行感知后,采用全局分配策略对定向通信信道进行分配。大量的仿真结果表明,我们的协议可以显著提高整个无线网络的吞吐量,代价是在建立过程中稍微增加RTS/DRTS请求。
{"title":"MBDMAC: A MAC Protocol for Multi-beam Directional Antennas in Wireless Networks","authors":"G. Wang, Wenming Li, Xingyu Cai","doi":"10.1109/MASS.2015.94","DOIUrl":"https://doi.org/10.1109/MASS.2015.94","url":null,"abstract":"In this paper, we propose a new MAC protocol for multi-beam directional antenna. In the protocol, each beam-sector has its own control channel, thus the communications among different beam-sectors are independent. It uses the Directional Network Allocation Vector (DNAV) to record the establishment processes. After sensing all the sectors of multi-beam antenna, it uses the global assignment strategy to assign the directional communication channels. Extensive simulation results show that our protocol can significantly improve the throughput of entire wireless network at the expense of the slightly increased RTS/DRTS requests during establishment process.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs GreedyFlow:分布式贪婪分组路由在ddn的地标之间
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.67
Kang-Peng Chen, Haiying Shen
Delay Tolerant Networks (DTNs) have attracted significant interests due to the adaptability in areas without infrastructures. In such scenarios, moving data from one place (landmark) to another place (landmark) is essential for data communication between different areas. However, current DTN routing algorithms either fail to fully utilize node mobility or have additional requirements that cannot be satisfied easily (i.e., Require base stations or the global traffic distribution). Therefore, in this paper, we propose a distributed greedy routing algorithm, namely Greedy Flow, for efficient packet routing between landmarks. Greedy Flow builds a local traffic map and a global landmark map on each node. The local traffic map indicates the node's knowledge about the amount of traffic (node transition) between landmarks in the area where it primarily visits. It is constructed by collecting encountered nodes' transit frequencies between these landmarks. The global landmark map shows the distribution of landmarks in the system and is built offline. In packet routing, the global landmark map shows the general packet forwarding direction, while the local traffic map helps determine the next-hop landmark on the fastest path in the forwarding direction. As a result, packets are greedily forwarded toward their destination landmarks. Extensive real trace driven experiments demonstrate the high efficiency of Greedy Flow.
延迟容忍网络(DTNs)由于在没有基础设施的地区具有适应性而引起了人们的广泛关注。在这种情况下,将数据从一个地方(地标)移动到另一个地方(地标)对于不同区域之间的数据通信至关重要。然而,目前的DTN路由算法要么不能充分利用节点的移动性,要么有难以满足的附加要求(即需要基站或全局流量分配)。因此,在本文中,我们提出了一种分布式贪婪路由算法,即贪婪流,用于在地标之间进行有效的分组路由。Greedy Flow在每个节点上构建一个本地交通地图和一个全局地标地图。本地交通地图表明节点对其主要访问区域内地标之间的交通量(节点转换)的了解。它是通过收集这些地标之间遇到的节点的传输频率来构建的。全局地标地图显示了系统中地标的分布,是离线构建的。在报文路由中,全局路标图表示报文的一般转发方向,本地流量图用于确定转发方向上最快路径上的下一跳路标。因此,数据包被贪婪地转发到它们的目的地地标。大量的真实轨迹驱动实验证明了贪婪流的高效率。
{"title":"GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs","authors":"Kang-Peng Chen, Haiying Shen","doi":"10.1109/MASS.2015.67","DOIUrl":"https://doi.org/10.1109/MASS.2015.67","url":null,"abstract":"Delay Tolerant Networks (DTNs) have attracted significant interests due to the adaptability in areas without infrastructures. In such scenarios, moving data from one place (landmark) to another place (landmark) is essential for data communication between different areas. However, current DTN routing algorithms either fail to fully utilize node mobility or have additional requirements that cannot be satisfied easily (i.e., Require base stations or the global traffic distribution). Therefore, in this paper, we propose a distributed greedy routing algorithm, namely Greedy Flow, for efficient packet routing between landmarks. Greedy Flow builds a local traffic map and a global landmark map on each node. The local traffic map indicates the node's knowledge about the amount of traffic (node transition) between landmarks in the area where it primarily visits. It is constructed by collecting encountered nodes' transit frequencies between these landmarks. The global landmark map shows the distribution of landmarks in the system and is built offline. In packet routing, the global landmark map shows the general packet forwarding direction, while the local traffic map helps determine the next-hop landmark on the fastest path in the forwarding direction. As a result, packets are greedily forwarded toward their destination landmarks. Extensive real trace driven experiments demonstrate the high efficiency of Greedy Flow.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126154029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Neighbor Discovery with Slot Index Synchronization 利用槽索引同步改进邻居发现
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.14
Shuai-zhao Jin, Zixiao Wang, W. Leong, B. Leong, Yabo Dong, Dongming Lu
Neighbor discovery is essential for docking applications, where mobile nodes communicate with static nodes situated at various rendezvous points. In existing neighbor discovery protocols, the probabilistic protocols perform well in the average-case but have a periodic, unpredictable and unbounded discovery latency. While the deterministic protocols can provide a bounded worst-case discovery latency, they achieve this by sacrificing the average-case performance. In this paper, we propose a new synchronization technique, called Mobility-Assisted Slot index Synchronization (MASS). MASS improves the average-case performance of deterministic neighbor discovery protocols via slot index synchronization, without incurring additional energy consumption. We evaluate MASS through both theoretical analysis and simulations of the real traces from a tourist tracking system deployed at Mogao Grottoes, a famous cultural heritage site in China. We show that MASS can reduce the average discovery latency of state-of-the-art deterministic neighbor discovery protocols by up to 2 orders of magnitude.
邻居发现对于对接应用是必不可少的,其中移动节点与位于不同会合点的静态节点通信。在现有的邻居发现协议中,概率协议在平均情况下表现良好,但存在周期性、不可预测和无界的发现延迟。虽然确定性协议可以提供有限的最坏情况发现延迟,但它们通过牺牲平均情况性能来实现这一点。本文提出了一种新的同步技术,称为移动辅助槽索引同步(MASS)。MASS通过槽索引同步提高了确定性邻居发现协议的平均性能,而不会产生额外的能量消耗。我们通过理论分析和在中国著名文化遗产莫高窟部署的游客跟踪系统的真实痕迹模拟来评估MASS。我们表明MASS可以将最先进的确定性邻居发现协议的平均发现延迟减少多达2个数量级。
{"title":"Improving Neighbor Discovery with Slot Index Synchronization","authors":"Shuai-zhao Jin, Zixiao Wang, W. Leong, B. Leong, Yabo Dong, Dongming Lu","doi":"10.1109/MASS.2015.14","DOIUrl":"https://doi.org/10.1109/MASS.2015.14","url":null,"abstract":"Neighbor discovery is essential for docking applications, where mobile nodes communicate with static nodes situated at various rendezvous points. In existing neighbor discovery protocols, the probabilistic protocols perform well in the average-case but have a periodic, unpredictable and unbounded discovery latency. While the deterministic protocols can provide a bounded worst-case discovery latency, they achieve this by sacrificing the average-case performance. In this paper, we propose a new synchronization technique, called Mobility-Assisted Slot index Synchronization (MASS). MASS improves the average-case performance of deterministic neighbor discovery protocols via slot index synchronization, without incurring additional energy consumption. We evaluate MASS through both theoretical analysis and simulations of the real traces from a tourist tracking system deployed at Mogao Grottoes, a famous cultural heritage site in China. We show that MASS can reduce the average discovery latency of state-of-the-art deterministic neighbor discovery protocols by up to 2 orders of magnitude.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Story of ChronoShare, or How NDN Brought Distributed Secure File Sharing Back ChronoShare的故事,或者NDN如何重新带来分布式安全文件共享
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.59
A. Afanasyev, Zhenkai Zhu, Yingdi Yu, Lijing Wang, Lixia Zhang
Information sharing among a group of friends or colleagues in real life is usually a distributed process: we tell each other interesting or important news without any mandatory assistance or approval from a third party. Surprisingly, this is not what happens when sharing files among a group of friends over the Internet. While the goal of file sharing is to disseminate files among multiple parties, due to the constraints imposed by IP's point-to-point communication model, most of today's file sharing applications, such as Drop box, Google Drive, etc., resort to a centralized design paradigm: a user first uploads files to the server (cloud), and the server (cloud) re-distributes these files to other users, resulting in unnecessary tussles and inefficient data distribution paths. To bring the truly distributed file sharing back into the cyberspace, this paper presents Chrono Share, a distributed file sharing application built on top of the Named Data Networking (NDN) architecture. By walking through Chrono Share design details, we show how file sharing, as well as many other similar applications, can be effectively implemented over NDN in a truly distributed and secure manner.
在现实生活中,一群朋友或同事之间的信息共享通常是一个分布式的过程:我们告诉彼此有趣或重要的新闻,没有任何强制性的帮助或第三方的批准。令人惊讶的是,在一群朋友之间通过互联网共享文件时不会发生这种情况。虽然文件共享的目标是在多方之间传播文件,但由于IP点对点通信模式的限制,目前大多数文件共享应用,如Drop box、Google Drive等,都采用了集中式的设计范式:用户先将文件上传到服务器(云),服务器(云)再将这些文件分发给其他用户,导致了不必要的纠纷和低效的数据分发路径。为了将真正的分布式文件共享带回网络空间,本文提出了基于命名数据网络(NDN)架构的分布式文件共享应用程序Chrono Share。通过介绍Chrono Share的设计细节,我们将展示如何在NDN上以真正分布式和安全的方式有效地实现文件共享以及许多其他类似的应用程序。
{"title":"The Story of ChronoShare, or How NDN Brought Distributed Secure File Sharing Back","authors":"A. Afanasyev, Zhenkai Zhu, Yingdi Yu, Lijing Wang, Lixia Zhang","doi":"10.1109/MASS.2015.59","DOIUrl":"https://doi.org/10.1109/MASS.2015.59","url":null,"abstract":"Information sharing among a group of friends or colleagues in real life is usually a distributed process: we tell each other interesting or important news without any mandatory assistance or approval from a third party. Surprisingly, this is not what happens when sharing files among a group of friends over the Internet. While the goal of file sharing is to disseminate files among multiple parties, due to the constraints imposed by IP's point-to-point communication model, most of today's file sharing applications, such as Drop box, Google Drive, etc., resort to a centralized design paradigm: a user first uploads files to the server (cloud), and the server (cloud) re-distributes these files to other users, resulting in unnecessary tussles and inefficient data distribution paths. To bring the truly distributed file sharing back into the cyberspace, this paper presents Chrono Share, a distributed file sharing application built on top of the Named Data Networking (NDN) architecture. By walking through Chrono Share design details, we show how file sharing, as well as many other similar applications, can be effectively implemented over NDN in a truly distributed and secure manner.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125499541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Localization in a Rayleigh Fading Environment Using RSS Based Methodologies 基于RSS方法的瑞利衰落环境定位
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.54
Rojina Adhikary, J. Daigle
We investigate the quality of sensor localization achievable in a slow Rayleigh fading environment using three different localizations approaches.
我们研究了使用三种不同的定位方法在缓慢瑞利衰落环境中实现的传感器定位质量。
{"title":"Localization in a Rayleigh Fading Environment Using RSS Based Methodologies","authors":"Rojina Adhikary, J. Daigle","doi":"10.1109/MASS.2015.54","DOIUrl":"https://doi.org/10.1109/MASS.2015.54","url":null,"abstract":"We investigate the quality of sensor localization achievable in a slow Rayleigh fading environment using three different localizations approaches.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1