首页 > 最新文献

2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services最新文献

英文 中文
GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks GrooveNet:用于车对车网络的混合模拟器
R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, F. Bai
Vehicular networks are being developed for efficient broadcast of safety alerts, real-time traffic congestion probing and for distribution of on-road multimedia content. In order to investigate vehicular networking protocols and evaluate the effects of incremental deployment it is essential to have a topology-aware simulation and test-bed infrastructure. While several traffic simulators have been developed under the intelligent transport system initiative, their primary motivation has been to model and forecast vehicle traffic flow and congestion from a queuing perspective. GrooveNet is a hybrid simulator which enables communication between simulated vehicles, real vehicles and between real and simulated vehicles. By modeling inter-vehicular communication within a real street map-based topography it facilitates protocol design and also in-vehicle deployment. GrooveNet's modular architecture incorporates mobility, trip and message broadcast models over a variety of link and physical layer communication models. It is easy to run simulations of thousands of vehicles in any US city and to add new models for networking, security, applications and vehicle interaction. GrooveNet supports multiple network interfaces, GPS and events triggered from the vehicle's on-board computer. Through simulation, we are able to study the message latency, and coverage under various traffic conditions. On-road tests over 400 miles lend insight to required market penetration
正在开发车辆网络,以便有效地广播安全警报、实时探测交通堵塞和分发道路上的多媒体内容。为了研究车载网络协议并评估增量部署的效果,有必要拥有拓扑感知仿真和测试平台基础设施。虽然在智能交通系统倡议下已经开发了一些交通模拟器,但它们的主要动机是从排队的角度模拟和预测车辆交通流量和拥堵。GrooveNet是一个混合模拟器,可以实现模拟车辆,真实车辆以及真实车辆和模拟车辆之间的通信。通过在真实的基于街道地图的地形中建模车辆间通信,它简化了协议设计和车载部署。GrooveNet的模块化架构结合了各种链路和物理层通信模型上的移动性、行程和消息广播模型。在美国任何一个城市对数千辆汽车进行模拟,并为网络、安全、应用程序和车辆交互添加新模型,都很容易。GrooveNet支持多个网络接口、GPS和车载计算机触发的事件。通过仿真,我们可以研究各种流量条件下的消息延迟和覆盖情况。超过400英里的道路测试有助于了解所需的市场渗透率
{"title":"GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks","authors":"R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, F. Bai","doi":"10.1109/MOBIQW.2006.361773","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361773","url":null,"abstract":"Vehicular networks are being developed for efficient broadcast of safety alerts, real-time traffic congestion probing and for distribution of on-road multimedia content. In order to investigate vehicular networking protocols and evaluate the effects of incremental deployment it is essential to have a topology-aware simulation and test-bed infrastructure. While several traffic simulators have been developed under the intelligent transport system initiative, their primary motivation has been to model and forecast vehicle traffic flow and congestion from a queuing perspective. GrooveNet is a hybrid simulator which enables communication between simulated vehicles, real vehicles and between real and simulated vehicles. By modeling inter-vehicular communication within a real street map-based topography it facilitates protocol design and also in-vehicle deployment. GrooveNet's modular architecture incorporates mobility, trip and message broadcast models over a variety of link and physical layer communication models. It is easy to run simulations of thousands of vehicles in any US city and to add new models for networking, security, applications and vehicle interaction. GrooveNet supports multiple network interfaces, GPS and events triggered from the vehicle's on-board computer. Through simulation, we are able to study the message latency, and coverage under various traffic conditions. On-road tests over 400 miles lend insight to required market penetration","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Learning Sensor Data Characteristics in Unknown Environments 在未知环境中学习传感器数据特性
T. Bokareva, N. Bulusu, S. Jha
Ad hoc wireless sensor networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations. As we begin to deploy sensor networks in real world applications, concerns are being raised about the fidelity and integrity of the sensor network data. In this paper, we motivate and propose an online algorithm that leverages competitive learning neural network for characterization of a dynamic, unknown environment. Based on the proposed characterization sensor networks can autonomously construct multimodal views of their environments and derive the conditions for verifying data integrity over time
自组织无线传感器网络的前景很大程度上来自于其自主监控远程或物理上无法到达的位置的潜力。随着我们开始在现实世界应用中部署传感器网络,人们开始关注传感器网络数据的保真度和完整性。在本文中,我们激励并提出了一种在线算法,该算法利用竞争学习神经网络来表征动态的未知环境。基于所提出的特征,传感器网络可以自主构建其环境的多模态视图,并推导出随时间验证数据完整性的条件
{"title":"Learning Sensor Data Characteristics in Unknown Environments","authors":"T. Bokareva, N. Bulusu, S. Jha","doi":"10.1109/MOBIQ.2006.340384","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340384","url":null,"abstract":"Ad hoc wireless sensor networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations. As we begin to deploy sensor networks in real world applications, concerns are being raised about the fidelity and integrity of the sensor network data. In this paper, we motivate and propose an online algorithm that leverages competitive learning neural network for characterization of a dynamic, unknown environment. Based on the proposed characterization sensor networks can autonomously construct multimodal views of their environments and derive the conditions for verifying data integrity over time","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges on providing services in a Ubiquitous, Mobile Environment 在无所不在的移动环境中提供服务的挑战
F. Anjum
In this paper, some challenges for the providing service in a ubiquitous, mobile environment have been described. The first challenge is to provide the performance, the security is the other important challenge where its associations are formed with particular interfaces and the privacy also needed attention in a world that provides ubiquitous services. The design and development of the services brings their own set of challenges. It has to be designed such that they can function effectively in various resources and similarly it development needs careful thought. The other challenges such as novelty, desirability, testing and evaluation are also described in this paper
本文描述了在无处不在的移动环境中提供服务所面临的一些挑战。第一个挑战是提供性能,安全性是另一个重要的挑战,其中它与特定接口形成关联,并且在提供无处不在的服务的世界中也需要注意隐私。服务的设计和开发带来了它们自己的一组挑战。它的设计必须使它们能够在各种资源中有效地发挥作用,同样,它的开发需要仔细考虑。本文还对新颖性、可取性、测试和评价等方面的挑战进行了阐述
{"title":"Challenges on providing services in a Ubiquitous, Mobile Environment","authors":"F. Anjum","doi":"10.1109/MOBIQ.2006.340453","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340453","url":null,"abstract":"In this paper, some challenges for the providing service in a ubiquitous, mobile environment have been described. The first challenge is to provide the performance, the security is the other important challenge where its associations are formed with particular interfaces and the privacy also needed attention in a world that provides ubiquitous services. The design and development of the services brings their own set of challenges. It has to be designed such that they can function effectively in various resources and similarly it development needs careful thought. The other challenges such as novelty, desirability, testing and evaluation are also described in this paper","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments 移动和普适计算环境的软件即服务模型
Nikos Anerousis, A. Mohindra
An area of unique opportunity for SaaS is the mobile and ubiquitous computing space. The SaaS model has a number of advantages that are uniquely suited to a resource-constrained mobile computing environment. This short paper gives a high level overview of the SaaS which brings significant opportunities in this space and further presents the architectural considerations for SaaS providers and mobile computing environments
SaaS的一个独特机会领域是移动和无处不在的计算空间。SaaS模型具有许多独特的优势,适合于资源受限的移动计算环境。这篇短文对SaaS进行了高层次的概述,它为这个领域带来了重大机遇,并进一步介绍了SaaS提供商和移动计算环境的架构考虑
{"title":"The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments","authors":"Nikos Anerousis, A. Mohindra","doi":"10.1109/MOBIQ.2006.340383","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340383","url":null,"abstract":"An area of unique opportunity for SaaS is the mobile and ubiquitous computing space. The SaaS model has a number of advantages that are uniquely suited to a resource-constrained mobile computing environment. This short paper gives a high level overview of the SaaS which brings significant opportunities in this space and further presents the architectural considerations for SaaS providers and mobile computing environments","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks 个人网络:无线个人区域网络和3G网络的覆盖网络
A. Lo, Weidong Lu, M. Jacobsson, R. V. Prasad, I. Niemegeers
A personal network is an overlay network which builds on different wireless networking technologies. This overlay network is responsible of glueing the different wireless networking technologies. In this paper, we consider the cooperation of two key technologies to realize a personal network, namely, wireless personal area network and universal mobile telecommunications system (UMTS). The co-operation poses a new set of problems as these technologies were not designed to interwork with each other. In this paper, we describe each of these problems and their solutions
个人网络是建立在不同无线网络技术之上的覆盖网络。这种覆盖网络负责粘合不同的无线网络技术。在本文中,我们考虑了无线个人局域网和通用移动通信系统(UMTS)这两种关键技术的合作来实现个人网络。这种合作带来了一系列新的问题,因为这些技术不是为相互协作而设计的。在本文中,我们描述了这些问题及其解决方案
{"title":"Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks","authors":"A. Lo, Weidong Lu, M. Jacobsson, R. V. Prasad, I. Niemegeers","doi":"10.1109/mobiq.2006.340446","DOIUrl":"https://doi.org/10.1109/mobiq.2006.340446","url":null,"abstract":"A personal network is an overlay network which builds on different wireless networking technologies. This overlay network is responsible of glueing the different wireless networking technologies. In this paper, we consider the cooperation of two key technologies to realize a personal network, namely, wireless personal area network and universal mobile telecommunications system (UMTS). The co-operation poses a new set of problems as these technologies were not designed to interwork with each other. In this paper, we describe each of these problems and their solutions","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks 无线传感器网络中跟踪移动目标的自适应数据采集方案
Ling Zhou, Arunabha Sen
Tracking mobile targets is an important application of wireless sensor networks. However, mobility of the target brings new challenges to designing energy-efficient and scalable data collection schemes. A novel dynamic grid-based tracking (DGT) scheme for tracking mobile target is proposed in this paper. This scheme is distributed in nature, and can be adaptive to the mobility of the target. The underlying idea of embedding a virtual grid structure and restricting mobility-related choices to grid nodes can be generally applied to other wireless sensor networks applications, where mobility is an important consideration during protocol design
跟踪移动目标是无线传感器网络的一个重要应用。然而,目标的移动性给设计节能和可扩展的数据收集方案带来了新的挑战。提出了一种新的基于动态网格的移动目标跟踪方案。该方案是自然分布的,能够适应目标的移动性。嵌入虚拟网格结构和限制网格节点的移动性相关选择的基本思想通常可以应用于其他无线传感器网络应用,其中移动性是协议设计期间的重要考虑因素
{"title":"Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks","authors":"Ling Zhou, Arunabha Sen","doi":"10.1109/MOBIQ.2006.340394","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340394","url":null,"abstract":"Tracking mobile targets is an important application of wireless sensor networks. However, mobility of the target brings new challenges to designing energy-efficient and scalable data collection schemes. A novel dynamic grid-based tracking (DGT) scheme for tracking mobile target is proposed in this paper. This scheme is distributed in nature, and can be adaptive to the mobility of the target. The underlying idea of embedding a virtual grid structure and restricting mobility-related choices to grid nodes can be generally applied to other wireless sensor networks applications, where mobility is an important consideration during protocol design","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Actuation Strategies for Sensor/Actuator Networks 传感器/执行器网络的最优驱动策略
F. Thouin, R. Thommes, M. Coates
Wireless sensor-actuator networks (SANETs), in which nodes perform actions (actuation) in response to sensor measurements and shared information, have great potential in medical and agricultural applications. In this paper, we focus on the problem of using distributed sensed data to design actuation strategies in order to elicit a desired response from the environment, whilst attempting to minimize the communication in the network. Our methodology is based on batch Q-learning; we describe a distributed approach for learning dyadic regression trees to estimate the Q-functions from collected data. Analysis and simulation indicate that substantial communication savings that can be achieved through distributed learning without significant performance deterioration. The simulations also reveal that the performance of our technique depends strongly on the amount of training data available
无线传感器-致动器网络(SANETs),其中节点根据传感器测量和共享信息执行动作(致动),在医疗和农业应用中具有巨大潜力。在本文中,我们专注于使用分布式感测数据来设计驱动策略的问题,以便从环境中获得所需的响应,同时尝试最小化网络中的通信。我们的方法是基于批处理q学习;我们描述了一种分布式方法,用于学习二元回归树,以从收集的数据中估计q函数。分析和仿真表明,通过分布式学习可以实现大量的通信节省,而不会显著降低性能。仿真还表明,我们的技术性能在很大程度上取决于可用训练数据的数量
{"title":"Optimal Actuation Strategies for Sensor/Actuator Networks","authors":"F. Thouin, R. Thommes, M. Coates","doi":"10.1109/MOBIQ.2006.340389","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340389","url":null,"abstract":"Wireless sensor-actuator networks (SANETs), in which nodes perform actions (actuation) in response to sensor measurements and shared information, have great potential in medical and agricultural applications. In this paper, we focus on the problem of using distributed sensed data to design actuation strategies in order to elicit a desired response from the environment, whilst attempting to minimize the communication in the network. Our methodology is based on batch Q-learning; we describe a distributed approach for learning dyadic regression trees to estimate the Q-functions from collected data. Analysis and simulation indicate that substantial communication savings that can be achieved through distributed learning without significant performance deterioration. The simulations also reveal that the performance of our technique depends strongly on the amount of training data available","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121831235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks 移动自组织网络的受控流行式传播中间件
Mirco Musolesi, C. Mascolo
Traditional middleware primitives offer very elementary information dissemination mechanisms, which, in the case of a decentralized and dynamic network such as a mobile ad hoc network, do not offer the ability to control the information spreading. Control over information dissemination could instead be very critical especially in terms of lifetime of the network. Gossip-based communication and epidemic-style algorithms, which are based on a store and forward approach, have been proposed to obtain message dissemination with probabilistic guarantees and lower overheads. However, epidemic algorithms have never been used to allow designers to control the spreading of the information depending on the desired reliability and the network structure. In this paper, we present a middleware for ad hoc networking, which uses epidemic-style information dissemination techniques to tune the reliability of the communication in mobile ad hoc networks. The approach is based on recent results of complex networks theory; the novelty of our idea resides in the evaluation and the exploitation of the structure of the underlying network for the automatic tuning of the dissemination process and its use in the design of the API offered by the middleware. We present a detailed analytical model supported by several simulation results
传统的中间件原语提供非常基本的信息传播机制,在分散的动态网络(如移动自组织网络)的情况下,这些机制不提供控制信息传播的能力。相反,对信息传播的控制可能是非常关键的,特别是在网络的生命周期方面。提出了基于流言的通信和基于存储和转发方法的流行病式算法,以获得具有概率保证和较低开销的消息传播。然而,流行算法从来没有被用来让设计者根据期望的可靠性和网络结构来控制信息的传播。本文提出了一种用于移动自组网的中间件,该中间件采用流行式信息传播技术来优化移动自组网通信的可靠性。该方法基于复杂网络理论的最新成果;我们的想法的新颖之处在于评估和利用底层网络的结构来自动调整传播过程,并将其用于中间件提供的API的设计。我们提出了一个详细的分析模型,并得到了几个仿真结果的支持
{"title":"Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks","authors":"Mirco Musolesi, C. Mascolo","doi":"10.1109/mobiqw.2006.361736","DOIUrl":"https://doi.org/10.1109/mobiqw.2006.361736","url":null,"abstract":"Traditional middleware primitives offer very elementary information dissemination mechanisms, which, in the case of a decentralized and dynamic network such as a mobile ad hoc network, do not offer the ability to control the information spreading. Control over information dissemination could instead be very critical especially in terms of lifetime of the network. Gossip-based communication and epidemic-style algorithms, which are based on a store and forward approach, have been proposed to obtain message dissemination with probabilistic guarantees and lower overheads. However, epidemic algorithms have never been used to allow designers to control the spreading of the information depending on the desired reliability and the network structure. In this paper, we present a middleware for ad hoc networking, which uses epidemic-style information dissemination techniques to tune the reliability of the communication in mobile ad hoc networks. The approach is based on recent results of complex networks theory; the novelty of our idea resides in the evaluation and the exploitation of the structure of the underlying network for the automatic tuning of the dissemination process and its use in the design of the API offered by the middleware. We present a detailed analytical model supported by several simulation results","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generalized "Yoking-Proofs" for a Group of RFID Tags 一组RFID标签的广义“横证明”
L. Bolotnyy, G. Robins
Recently Ari Juels suggested a "yoking-proof" where a pair of radio-frequency identification (RFID) tags are both read within a specified time bound, and left open for future research the problem of generating a proof for larger groups of tags. We generalize his protocol by developing a proof which ensures that a group of tags is read within a certain time period. The tags generate such a proof even if the reader is untrusted. The proof is improbable to forge, and is verifiable off-line by a trusted verifier. Juels's problem formulation does not take privacy into account and the resulting protocol offers no privacy to the tags. We modify the problem statement to require the "yoking-proof" to maintain privacy, and we give a protocol for this new anonymous yoking problem, along with suggestions for speed ups
最近Ari Juels提出了一种“yoking-proof”,即一对射频识别(RFID)标签都在指定的时间范围内被读取,并为未来的研究留下了为更大的标签组生成证明的问题。我们通过开发一个证明来推广他的协议,该证明确保在特定时间段内读取一组标签。即使读取器不受信任,标签也会生成这样的证明。该证明是不可能伪造的,并且可以由受信任的验证者离线验证。Juels的问题公式没有考虑隐私,因此生成的协议没有为标签提供隐私。我们修改了问题陈述,要求“轭证明”来维护隐私,并为这个新的匿名轭问题提供了一个协议,以及提速建议
{"title":"Generalized \"Yoking-Proofs\" for a Group of RFID Tags","authors":"L. Bolotnyy, G. Robins","doi":"10.1109/MOBIQ.2006.340395","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340395","url":null,"abstract":"Recently Ari Juels suggested a \"yoking-proof\" where a pair of radio-frequency identification (RFID) tags are both read within a specified time bound, and left open for future research the problem of generating a proof for larger groups of tags. We generalize his protocol by developing a proof which ensures that a group of tags is read within a certain time period. The tags generate such a proof even if the reader is untrusted. The proof is improbable to forge, and is verifiable off-line by a trusted verifier. Juels's problem formulation does not take privacy into account and the resulting protocol offers no privacy to the tags. We modify the problem statement to require the \"yoking-proof\" to maintain privacy, and we give a protocol for this new anonymous yoking problem, along with suggestions for speed ups","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127872853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
TypeCast: Type-Based Routing in Wireless Ad-hoc Networks TypeCast:无线Ad-hoc网络中基于类型的路由
Jinsong Lin, T. Phan, R. Bagrodia
Type-based communication is proposed as an effective paradigm to enable group communication in wireless ad-hoc networks (MANETs). In this paradigm, type is used as the fundamental construct for addressing and routing messages. Type hierarchies are used to dynamically control group size; and object-oriented principles such as subtyping and multiple inheritance are utilized to construct new groups from existing ones. We present the design of TypeCast, a routing protocol that directly supports type-based communication. TypeCast leverages efficiency and mobility management provided by MANET multicast protocols and extends them by adding a Bloom filter-based type encoding and routing mechanism. TypeCast is fully decentralized and supports subtyping and type-composition. We implement TypeCast on top of ODMRP and conduct a detailed performance and scalability study of TypeCast through simulation. The results show that TypeCast demonstrates good resiliency to mobility and group size. When the number of types in the network increases, TypeCast achieves good scalability thanks to type aggregation provided by Bloom filters
基于类型的通信是实现无线自组织网络(manet)中组通信的有效范式。在此范例中,类型被用作寻址和路由消息的基本构造。类型层次结构用于动态控制组大小;利用子类型和多重继承等面向对象的原则,从已有的组中构造新的组。我们介绍了TypeCast的设计,它是一种直接支持基于类型通信的路由协议。TypeCast利用了MANET多播协议提供的效率和移动性管理,并通过添加基于Bloom过滤器的类型编码和路由机制对其进行了扩展。TypeCast是完全去中心化的,支持子类型和类型组合。我们在ODMRP之上实现了TypeCast,并通过仿真对TypeCast的性能和可扩展性进行了详细的研究。结果表明,TypeCast对移动性和组大小具有良好的弹性。当网络中的类型数量增加时,由于Bloom过滤器提供的类型聚合,TypeCast实现了良好的可伸缩性
{"title":"TypeCast: Type-Based Routing in Wireless Ad-hoc Networks","authors":"Jinsong Lin, T. Phan, R. Bagrodia","doi":"10.1109/MOBIQ.2006.340410","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340410","url":null,"abstract":"Type-based communication is proposed as an effective paradigm to enable group communication in wireless ad-hoc networks (MANETs). In this paradigm, type is used as the fundamental construct for addressing and routing messages. Type hierarchies are used to dynamically control group size; and object-oriented principles such as subtyping and multiple inheritance are utilized to construct new groups from existing ones. We present the design of TypeCast, a routing protocol that directly supports type-based communication. TypeCast leverages efficiency and mobility management provided by MANET multicast protocols and extends them by adding a Bloom filter-based type encoding and routing mechanism. TypeCast is fully decentralized and supports subtyping and type-composition. We implement TypeCast on top of ODMRP and conduct a detailed performance and scalability study of TypeCast through simulation. The results show that TypeCast demonstrates good resiliency to mobility and group size. When the number of types in the network increases, TypeCast achieves good scalability thanks to type aggregation provided by Bloom filters","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1