首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
LEARN: localized energy aware restricted neighborhood routing for ad hoc networks 学习:局部能量感知限制邻居路由自组织网络
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288507
Yang Wang, Wenzhan Song, Weizhao Wang, Xiangyang Li, T. Dahlberg
In this paper, we address the problem of energy efficient localized routing in wireless ad hoc networks. Numerous energy aware routing protocols were proposed to seek the power efficiency of routes. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, most of the proposed localized routing methods cannot theoretically guarantee the power efficiency of their routes. In this paper, we give the first localized routing algorithm, called localized energy aware restricted neighborhood routing (LEARN), which can guarantee the power efficiency of its route asymptotically almost sure. Given destination node t, an intermediate node v will only select a certain neighbor v such that < vut les alpha for a parameter alpha < pi/3 in our LEARN method. We theoretically prove that for a network, formed by nodes that are produced by a Poisson distribution with rate n over a compact and convex region O with unit area, when the transmission range rn = radicbetalnl/pin for some beta > pi/alpha, our LEARN routing protocol will find the route for any pair of nodes asymptotically almost sure. When the transmission range rn = radicbetalnl/pin for some beta < pi/alpha, the LEARN routing protocol will not be able to find the route for any pair of nodes asymptotically almost sure. We also conducted simulations to study the performance of LEARN and compare it with a typical localized routing protocol (GPSR) and a global ad hoc routing protocol (DSR)
本文研究了无线自组织网络中节能的局部路由问题。为了寻求路由的能量效率,提出了许多能量感知路由协议。其中,提出了几种地理本地化路由协议,以帮助仅使用本地信息进行更智能的路由决策,减少路由开销。然而,目前提出的大多数局部路由方法在理论上都不能保证路由的功率效率。本文给出了第一种局部能量感知受限邻域路由(LEARN)算法,该算法可以保证其路由的功率效率渐近几乎确定。给定目标节点t,中间节点v只会选择一个特定的邻居v,使得在我们的LEARN方法中,对于参数alpha < pi/3, < vut小于alpha。我们从理论上证明了在单位面积的紧凸区域O上,由速率为n的泊松分布产生的节点组成的网络,当传输范围rn = radicbetalnl/pin时,对于某些β > pi/alpha,我们的LEARN路由协议将找到任意一对节点的渐近几乎确定的路由。当传输范围rn = radicbetalnl/pin对于某些beta < pi/alpha时,LEARN路由协议将无法为任何一对节点找到渐近几乎确定的路由。我们还通过仿真研究了LEARN的性能,并将其与典型的本地化路由协议(GPSR)和全局自组织路由协议(DSR)进行了比较。
{"title":"LEARN: localized energy aware restricted neighborhood routing for ad hoc networks","authors":"Yang Wang, Wenzhan Song, Weizhao Wang, Xiangyang Li, T. Dahlberg","doi":"10.1109/SAHCN.2006.288507","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288507","url":null,"abstract":"In this paper, we address the problem of energy efficient localized routing in wireless ad hoc networks. Numerous energy aware routing protocols were proposed to seek the power efficiency of routes. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, most of the proposed localized routing methods cannot theoretically guarantee the power efficiency of their routes. In this paper, we give the first localized routing algorithm, called localized energy aware restricted neighborhood routing (LEARN), which can guarantee the power efficiency of its route asymptotically almost sure. Given destination node t, an intermediate node v will only select a certain neighbor v such that < vut les alpha for a parameter alpha < pi/3 in our LEARN method. We theoretically prove that for a network, formed by nodes that are produced by a Poisson distribution with rate n over a compact and convex region O with unit area, when the transmission range rn = radicbetalnl/pin for some beta > pi/alpha, our LEARN routing protocol will find the route for any pair of nodes asymptotically almost sure. When the transmission range rn = radicbetalnl/pin for some beta < pi/alpha, the LEARN routing protocol will not be able to find the route for any pair of nodes asymptotically almost sure. We also conducted simulations to study the performance of LEARN and compare it with a typical localized routing protocol (GPSR) and a global ad hoc routing protocol (DSR)","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"70 1","pages":"508-517"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85048775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Sensor Networks with Decentralized Binary Detection: Clustering and Lifetime 具有去中心化二值检测的传感器网络:聚类和寿命
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288525
G. Ferrari, M. Martalò
In this paper, we analyze the lifetime of clustered sensor networks with decentralized binary detection under a physical layer quality of service (QoS) constraint, given by the maximum tolerable probability of decision error at the access point (AP). In order to properly model the network behavior, we consider four different distributions (exponential, uniform, Rayleigh, and lognormal) for the single sensors' lifetime. We show the benefits, in terms of longer network lifetime, of adaptive reclustering. On the other hand, absence of reclustering leads to a shorter network lifetime, and we show the impact of various clustering configurations under different QoS conditions. Our results show that the organization of sensors in a few big clusters is the winning strategy to maximize the network lifetime
本文分析了在物理层服务质量(QoS)约束下,由接入点(AP)的最大可容忍决策错误概率给出的分散二进制检测集群传感器网络的生存期。为了正确地模拟网络行为,我们考虑了单个传感器寿命的四种不同分布(指数分布、均匀分布、瑞利分布和对数正态分布)。从延长网络生命周期的角度来看,我们展示了自适应重新聚类的好处。另一方面,没有重新聚类会导致更短的网络生命周期,我们展示了在不同QoS条件下各种聚类配置的影响。我们的研究结果表明,将传感器组织在几个大集群中是最大化网络生存期的制胜策略
{"title":"Sensor Networks with Decentralized Binary Detection: Clustering and Lifetime","authors":"G. Ferrari, M. Martalò","doi":"10.1109/SAHCN.2006.288525","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288525","url":null,"abstract":"In this paper, we analyze the lifetime of clustered sensor networks with decentralized binary detection under a physical layer quality of service (QoS) constraint, given by the maximum tolerable probability of decision error at the access point (AP). In order to properly model the network behavior, we consider four different distributions (exponential, uniform, Rayleigh, and lognormal) for the single sensors' lifetime. We show the benefits, in terms of longer network lifetime, of adaptive reclustering. On the other hand, absence of reclustering leads to a shorter network lifetime, and we show the impact of various clustering configurations under different QoS conditions. Our results show that the organization of sensors in a few big clusters is the winning strategy to maximize the network lifetime","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"27 1","pages":"645-650"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88160426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Discovering Mechanism for Power Saving in Ad-hoc Wireless Networks 自组织无线网络节能的拓扑发现机制
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288581
A. Zabian
Power saving is an important issue in ad-hoc wireless networks, where no centralized communication is issued. Each node works as router to the others to allow the network connectivity. So, each node consumes parts of its energy in a forwarding others packets. In this paper we propose a self adjustment power saving mechanism for routing in ad-hoc wireless networks that results in significant power saving for all the network. Our mechanism is based on TDA (topology discovering algorithm) in which each node knows who are the active nodes in a fraction of the network. By determined simulation experiments, our simulation results show that in a topology like that constructed by TDA, the power consumption in routing is independent on the network size and is related only to the height of the tree built by the algorithm and to the packet size
在没有集中通信的ad-hoc无线网络中,节能是一个重要问题。每个节点都充当其他节点的路由器,以实现网络连接。因此,每个节点在转发其他数据包时都会消耗一部分能量。在本文中,我们提出了一种自适应的无线自组织网络路由节能机制,该机制在整个网络中具有显著的节能效果。我们的机制是基于TDA(拓扑发现算法),其中每个节点都知道谁是网络一小部分中的活动节点。通过确定的仿真实验,我们的仿真结果表明,在TDA构造的拓扑结构中,路由功耗与网络大小无关,仅与算法构建的树的高度和数据包大小有关
{"title":"Topology Discovering Mechanism for Power Saving in Ad-hoc Wireless Networks","authors":"A. Zabian","doi":"10.1109/SAHCN.2006.288581","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288581","url":null,"abstract":"Power saving is an important issue in ad-hoc wireless networks, where no centralized communication is issued. Each node works as router to the others to allow the network connectivity. So, each node consumes parts of its energy in a forwarding others packets. In this paper we propose a self adjustment power saving mechanism for routing in ad-hoc wireless networks that results in significant power saving for all the network. Our mechanism is based on TDA (topology discovering algorithm) in which each node knows who are the active nodes in a fraction of the network. By determined simulation experiments, our simulation results show that in a topology like that constructed by TDA, the power consumption in routing is independent on the network size and is related only to the height of the tree built by the algorithm and to the packet size","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"33 1","pages":"910-915"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78809290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Topology Control to Simultaneously Achieve Near-Optimal Node Degree and Low Path Stretch in Ad hoc Networks 在Ad hoc网络中同时实现近最优节点度和低路径拉伸的拓扑控制
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288499
Ece Gelal, G. Jakllari, S. Krishnamurthy, N. Young
Our objective in this paper is to design topology control algorithms such that (i) nodes have low degree and (ii) paths in the network have few hops. Low node degree is desirable in networks equipped with smart antennas and to reduce access contention. Short paths are desirable for minimizing communication delays and for better robustness to channel impairments and to mobility. Given any arbitrary unit-disc graph G representing all feasible links, our algorithms find a sparse subgraph G' having a maximum node degree of six and, for each pair of vertices u, v, having hopsG'(u, v) = O(hopsG(u,v) + logDelta), where Delta is the maximum node degree in G and hops G(u, v) denotes the shortest path length from u to v in G. This result is near-optimal: (i) there is a connected UDG G in which no connected subgraph has degree less than five, and (ii) for any graph G, any bounded-degree subgraph G' must have hopsG'(u, v) = Omega(hopsG(u, v) + logDelta) for some u, v. Our distributed algorithm scales, preserves link symmetry, does not need node synchronization, and requires only O(n) messages. We perform extensive simulations that quantify the performance of our algorithm in realistic scenarios
我们在本文中的目标是设计拓扑控制算法,使(i)节点具有低度,(ii)网络中的路径具有很少的跳数。在配备智能天线的网络中,低节点度是减少接入争用的理想选择。短路径对于最小化通信延迟以及对信道损坏和移动性具有更好的鲁棒性是理想的。给定任意表示所有可行链路的单位盘图G,我们的算法找到一个最大节点度为6的稀疏子图G',并且对于每一对顶点u,v,具有hopsG'(u, v) = O(hopsG(u,v) + logDelta),其中Delta是G中的最大节点度,而跳数G(u,v)表示G中从u到v的最短路径长度。这个结果是近最优的:(i)存在一个连通的UDG G,其中没有连通的子图的度数小于5,(ii)对于任何图G,任何有限度的子图G'必须具有hopsG'(u, v) = Omega(hopsG(u, v) + logDelta)对于某些u, v。我们的分布式算法可伸缩,保持链路对称,不需要节点同步,只需要O(n)个消息。我们进行了大量的模拟,量化了我们的算法在现实场景中的性能
{"title":"Topology Control to Simultaneously Achieve Near-Optimal Node Degree and Low Path Stretch in Ad hoc Networks","authors":"Ece Gelal, G. Jakllari, S. Krishnamurthy, N. Young","doi":"10.1109/SAHCN.2006.288499","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288499","url":null,"abstract":"Our objective in this paper is to design topology control algorithms such that (i) nodes have low degree and (ii) paths in the network have few hops. Low node degree is desirable in networks equipped with smart antennas and to reduce access contention. Short paths are desirable for minimizing communication delays and for better robustness to channel impairments and to mobility. Given any arbitrary unit-disc graph G representing all feasible links, our algorithms find a sparse subgraph G' having a maximum node degree of six and, for each pair of vertices u, v, having hopsG'(u, v) = O(hopsG(u,v) + logDelta), where Delta is the maximum node degree in G and hops G(u, v) denotes the shortest path length from u to v in G. This result is near-optimal: (i) there is a connected UDG G in which no connected subgraph has degree less than five, and (ii) for any graph G, any bounded-degree subgraph G' must have hopsG'(u, v) = Omega(hopsG(u, v) + logDelta) for some u, v. Our distributed algorithm scales, preserves link symmetry, does not need node synchronization, and requires only O(n) messages. We perform extensive simulations that quantify the performance of our algorithm in realistic scenarios","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"30 1","pages":"431-439"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82811246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dynamic Hybrid Multi Routing Protocol For Ad Hoc Wireless Network Ad Hoc无线网络的动态混合多路由协议
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288565
Chaorong Peng, Chang Wen Chen
Dynamic hybrid multi routing protocol (DHMRP) is proposed to overcome re-discovered route path to be reply path in traditional routing protocol. The protocol utilizes the reply path based on the hybrid clustering hierarchical establishment of multi routing path to gain an automatic monitoring and repairing broken links in ad hoc networks. And due to reply path and multi routing path shall exist separately in network to gain mitigation traffic "bottlenecks" of ClusterHeads so that improving clusters stability. Performance comparison of DHMRP with AOMDV using Glomosim simulation shows that DHMRP is able to achieve a lower data delay and route discovery ratio and higher packets deliver ratio
动态混合多路由协议(DHMRP)是为了克服传统路由协议中重新发现的路由路径作为应答路径的缺点而提出的。该协议利用基于多路由路径混合聚类分层建立的应答路径,实现自组网中链路断裂的自动监控和修复。并且由于应答路径和多路由路径在网络中应该分开存在,以缓解clusterhead的流量“瓶颈”,从而提高集群的稳定性。通过Glomosim仿真比较DHMRP与AOMDV的性能,结果表明DHMRP能够实现更低的数据延迟和路由发现率,以及更高的数据包发送率
{"title":"Dynamic Hybrid Multi Routing Protocol For Ad Hoc Wireless Network","authors":"Chaorong Peng, Chang Wen Chen","doi":"10.1109/SAHCN.2006.288565","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288565","url":null,"abstract":"Dynamic hybrid multi routing protocol (DHMRP) is proposed to overcome re-discovered route path to be reply path in traditional routing protocol. The protocol utilizes the reply path based on the hybrid clustering hierarchical establishment of multi routing path to gain an automatic monitoring and repairing broken links in ad hoc networks. And due to reply path and multi routing path shall exist separately in network to gain mitigation traffic \"bottlenecks\" of ClusterHeads so that improving clusters stability. Performance comparison of DHMRP with AOMDV using Glomosim simulation shows that DHMRP is able to achieve a lower data delay and route discovery ratio and higher packets deliver ratio","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"580 1","pages":"809-816"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85316234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bandwidth Consumption for Providing Fair Internet Access in Wireless Mesh Networks 在无线网状网络中提供公平互联网接入的带宽消耗
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288555
T. Scherer, T. Engel
The contribution of this work is to examine the performance of WMNs concerning bandwidth. Here, we provide a lower bound for bandwidth utilization in mesh networks. We analyze how much bandwidth may be provided to all mesh nodes if they communicate over one wireless communication channel and use the same gateway to the Internet. Even in such a scenario where devices compete on the access to the wireless channel it is possible to operate without bandwidth loss and share this bandwidth uniformly over the set of mesh nodes. This is achievable by optimizing spatial reuse. Here, this is achieved by scheduling channel access using time slots. Of course, this is not possible for every network topology. We measure the fraction of topologies that may operate with a uniformly shared maximum bandwidth
这项工作的贡献在于研究了WMNs在带宽方面的性能。在这里,我们为网状网络的带宽利用率提供了一个下限。我们分析了如果所有网格节点通过一个无线通信信道通信并使用相同的互联网网关,那么它们可以提供多少带宽。即使在这样的场景中,设备在无线通道的访问上竞争,也可以在没有带宽损失的情况下运行,并在一组网格节点上均匀地共享该带宽。这可以通过优化空间再利用来实现。在这里,这是通过使用时隙调度通道访问来实现的。当然,这并不适用于所有网络拓扑结构。我们测量了可能以统一共享最大带宽运行的拓扑的比例
{"title":"Bandwidth Consumption for Providing Fair Internet Access in Wireless Mesh Networks","authors":"T. Scherer, T. Engel","doi":"10.1109/SAHCN.2006.288555","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288555","url":null,"abstract":"The contribution of this work is to examine the performance of WMNs concerning bandwidth. Here, we provide a lower bound for bandwidth utilization in mesh networks. We analyze how much bandwidth may be provided to all mesh nodes if they communicate over one wireless communication channel and use the same gateway to the Internet. Even in such a scenario where devices compete on the access to the wireless channel it is possible to operate without bandwidth loss and share this bandwidth uniformly over the set of mesh nodes. This is achievable by optimizing spatial reuse. Here, this is achieved by scheduling channel access using time slots. Of course, this is not possible for every network topology. We measure the fraction of topologies that may operate with a uniformly shared maximum bandwidth","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"75 1","pages":"746-750"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81351335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks Ad-Hoc无线网络中消息转发的渐进式网络编码
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288425
Xingkai Bao, Jing Li
We consider multi-hop transmission from the source to the destination in ad-hoc wireless networks. Cooperative forwarding approaches in the framework of progressive network coding are proposed which generalize coded cooperation in a multi-hop context. In this framework, the source node and each succeeding relay node progressively decode what they receive from the previous stages and re-encode the messages to different parts of the parity bits from a single (network) codeword hop by hop. The maximal achievable rates for the multi-hop wireless networks using traditional repetition-forward and progressive network coding are analyzed with respect to different transmit power constraint and packet length allocation. The optimal number of relays are derived in each scheme. It is found that progressive network coding with adaptive packet length significantly increases the system throughput and improves the energy efficiency
研究了自组织无线网络中从源到目的的多跳传输。提出了渐进式网络编码框架下的协作转发方法,将编码协作推广到多跳环境。在这个框架中,源节点和每个后续中继节点逐步解码它们从前一阶段接收到的信息,并逐跳地将来自单个(网络)码字的信息重新编码为奇偶校验位的不同部分。在不同的传输功率约束和分组长度分配条件下,分析了采用传统重复前向和渐进式网络编码的多跳无线网络的最大可达速率。推导出了每种方案中继电器的最优个数。研究发现,自适应分组长度的渐进式网络编码显著提高了系统的吞吐量和能源效率
{"title":"Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks","authors":"Xingkai Bao, Jing Li","doi":"10.1109/SAHCN.2006.288425","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288425","url":null,"abstract":"We consider multi-hop transmission from the source to the destination in ad-hoc wireless networks. Cooperative forwarding approaches in the framework of progressive network coding are proposed which generalize coded cooperation in a multi-hop context. In this framework, the source node and each succeeding relay node progressively decode what they receive from the previous stages and re-encode the messages to different parts of the parity bits from a single (network) codeword hop by hop. The maximal achievable rates for the multi-hop wireless networks using traditional repetition-forward and progressive network coding are analyzed with respect to different transmit power constraint and packet length allocation. The optimal number of relays are derived in each scheme. It is found that progressive network coding with adaptive packet length significantly increases the system throughput and improves the energy efficiency","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"462 1","pages":"207-215"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88386854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MERIT: MEsh of RF sensors for Indoor Tracking 优点:用于室内跟踪的射频传感器网格
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288511
Yui-Wah Lee, E. P. Stuntebeck, Scott C. Miller
A traditional approach to indoor tracking utilizes non-RF ranging techniques, such as infrared or ultrasound. The problem with these non-RF ranging techniques is that they do not work well when the tracking devices are buried in users' wallets or bags. As a result, there has been considerable interest in using only RF techniques for indoor tracking. Existing RF-only techniques, however, typically require a costly site survey and a floor-plan. In this paper, we present the MERIT system that we designed, implemented, and evaluated. MERIT is significantly different from existing systems in that it is pure RF-based yet it does not require a site survey nor a floor-plan. MERIT tracks users to a room granularity, and it can disambiguate neighboring rooms. This disambiguation is challenging because RF signals can traverse through walls. Also, because of indoor multipath interference, it is difficult to correlate signal strength with distance. In this work, we proposed two techniques for accurate disambiguation: spatial diversity and RF reflector. In our evaluation MERIT achieved an accuracy of 98.9%. MERIT was first conceived for a telecommunication application - intelligent telephone call routing, but it can also be used for other location-aware services
传统的室内跟踪方法利用非射频测距技术,如红外或超声波。这些非射频测距技术的问题是,当跟踪设备埋在用户的钱包或包里时,它们就不能很好地工作。因此,人们对仅使用射频技术进行室内跟踪非常感兴趣。然而,现有的纯射频技术通常需要昂贵的现场调查和平面图。在本文中,我们介绍了我们设计、实施和评估的MERIT系统。MERIT与现有系统有很大不同,因为它完全基于射频,但不需要现场调查或平面图。MERIT跟踪用户到房间粒度,并且可以消除相邻房间的歧义。这种消除歧义是具有挑战性的,因为射频信号可以穿过墙壁。此外,由于室内多径干扰,很难将信号强度与距离关联起来。在这项工作中,我们提出了两种精确消歧技术:空间分集和射频反射器。在我们的评估中,MERIT的准确率达到了98.9%。MERIT最初被设想用于电信应用——智能电话呼叫路由,但它也可以用于其他位置感知服务
{"title":"MERIT: MEsh of RF sensors for Indoor Tracking","authors":"Yui-Wah Lee, E. P. Stuntebeck, Scott C. Miller","doi":"10.1109/SAHCN.2006.288511","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288511","url":null,"abstract":"A traditional approach to indoor tracking utilizes non-RF ranging techniques, such as infrared or ultrasound. The problem with these non-RF ranging techniques is that they do not work well when the tracking devices are buried in users' wallets or bags. As a result, there has been considerable interest in using only RF techniques for indoor tracking. Existing RF-only techniques, however, typically require a costly site survey and a floor-plan. In this paper, we present the MERIT system that we designed, implemented, and evaluated. MERIT is significantly different from existing systems in that it is pure RF-based yet it does not require a site survey nor a floor-plan. MERIT tracks users to a room granularity, and it can disambiguate neighboring rooms. This disambiguation is challenging because RF signals can traverse through walls. Also, because of indoor multipath interference, it is difficult to correlate signal strength with distance. In this work, we proposed two techniques for accurate disambiguation: spatial diversity and RF reflector. In our evaluation MERIT achieved an accuracy of 98.9%. MERIT was first conceived for a telecommunication application - intelligent telephone call routing, but it can also be used for other location-aware services","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"14 1","pages":"545-554"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82203893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Circular-Layer Algorithm for Ad Hoc Sensor Networks to Balance Power Consumption 基于循环层算法的Ad Hoc传感器网络功耗平衡
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288587
D. Wei, A. Chan, Kevin V. N. Kameri
In senor networks, the data traffic from the sensors are directional towards a data sink and are therefore uneven. The areas nearer the data sink experience higher data traffic and will run out of energy sooner. Circular-layer geometry takes into account the radial data traffic towards the data sink. We may construct an algorithm to divide the network into equal-area circular-layers, which are analogous to the square design in geographical adaptive fidelity (GAF). However, the circular-layer geometry alone has not taken into account the uneven data traffic. This paper proposes a circular-layer algorithm that schedules the sensors into active and sleep states in such a way as to evenly distribute the power consumption throughout the sensor networks. We divide the network into circular layers with the data sink at the center. The algorithm equalizes the lifetime time of all layers so that the nodes near the data sink will not run out of energy sooner. Energy is also wasted in reactive routing where the sensors flood the network with omni-directional route discovery messages to find a suitable route towards the data sink. This algorithm reduces such flooding by directing the route request messages towards the data sink, resulting in more energy saving. The circular-layer geometry alone is serving to save energy. In addition, balancing the power consumption throughout the network yields an additional lifetime extension of 21% in our simulation results of a four-layer scenario
在传感器网络中,来自传感器的数据流量是定向的,因此是不均匀的。靠近数据接收器的区域会经历更高的数据流量,并且会更快地耗尽能量。圆层几何考虑了朝向数据接收器的径向数据流量。我们可以构造一种算法将网络划分为等面积的圆形层,这类似于地理自适应保真度(GAF)中的方形设计。然而,圆形层的几何结构本身并没有考虑到数据流量的不均匀性。本文提出了一种循环层算法,该算法将传感器调度到活动和睡眠状态,从而均匀地分配整个传感器网络的功耗。我们将网络划分为圆形层,数据接收器位于中心。该算法均衡了所有层的生存时间,这样靠近数据接收器的节点就不会很快耗尽能量。在被动路由中,传感器向网络发送全方位路由发现消息,以找到通往数据接收器的合适路由,这也浪费了能量。该算法通过将路由请求消息定向到数据接收器来减少这种泛洪,从而节省更多的能量。单是圆形层的几何结构就可以节省能源。此外,在我们的四层场景的模拟结果中,平衡整个网络的功耗可以额外延长21%的生命周期
{"title":"Circular-Layer Algorithm for Ad Hoc Sensor Networks to Balance Power Consumption","authors":"D. Wei, A. Chan, Kevin V. N. Kameri","doi":"10.1109/SAHCN.2006.288587","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288587","url":null,"abstract":"In senor networks, the data traffic from the sensors are directional towards a data sink and are therefore uneven. The areas nearer the data sink experience higher data traffic and will run out of energy sooner. Circular-layer geometry takes into account the radial data traffic towards the data sink. We may construct an algorithm to divide the network into equal-area circular-layers, which are analogous to the square design in geographical adaptive fidelity (GAF). However, the circular-layer geometry alone has not taken into account the uneven data traffic. This paper proposes a circular-layer algorithm that schedules the sensors into active and sleep states in such a way as to evenly distribute the power consumption throughout the sensor networks. We divide the network into circular layers with the data sink at the center. The algorithm equalizes the lifetime time of all layers so that the nodes near the data sink will not run out of energy sooner. Energy is also wasted in reactive routing where the sensors flood the network with omni-directional route discovery messages to find a suitable route towards the data sink. This algorithm reduces such flooding by directing the route request messages towards the data sink, resulting in more energy saving. The circular-layer geometry alone is serving to save energy. In addition, balancing the power consumption throughout the network yields an additional lifetime extension of 21% in our simulation results of a four-layer scenario","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"65 1","pages":"945-950"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77801300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks 一种基于信任的无线传感器网络数据安全聚合框架
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288409
W. Zhang, Sajal K. Das, Yonghe Liu
In unattended and hostile environments, node compromise can become a disastrous threat to wireless sensor networks and introduce uncertainty in the aggregation results. A compromised node often tends to completely reveal its secrets to the adversary which in turn renders purely cryptography-based approaches vulnerable. How to secure the information aggregation process against compromised-node attacks and quantify the uncertainty existing in the aggregation results has become an important research issue. In this paper, we address this problem by proposing a trust based framework, which is rooted in sound statistics and some other distinct and yet closely coupled techniques. The trustworthiness (reputation) of each individual sensor node is evaluated by using an information theoretic concept, Kullback-Leibler (KL) distance, to identify the compromised nodes through an unsupervised learning algorithm. Upon aggregating, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As the result is being disseminated and assembled through the routes to the sink, this opinion will be propagated and regulated by Josang's belief model. Following this model, the uncertainty within the data and aggregation results can be effectively quantified throughout the network. Simulation results demonstrate that our trust based framework provides a powerful mechanism for detecting compromised nodes and reasoning about the uncertainty in the network. It further can purge false data to accomplish robust aggregation in the presence of multiple compromised nodes
在无人值守和敌对环境中,节点妥协会对无线传感器网络造成灾难性的威胁,并给聚合结果带来不确定性。一个被攻破的节点往往倾向于将其秘密完全泄露给对手,这反过来又使纯粹基于密码学的方法变得脆弱。如何保证信息聚合过程不受妥协节点攻击的影响,并量化聚合结果中存在的不确定性已成为一个重要的研究课题。在本文中,我们通过提出基于信任的框架来解决这个问题,该框架植根于可靠的统计和其他一些不同但紧密耦合的技术。利用信息论概念Kullback-Leibler (KL)距离来评估每个传感器节点的可信度(声誉),通过无监督学习算法来识别受损节点。在聚合时,生成一个意见,即一个可信度度量,以表示聚合结果中的不确定性。由于结果正在通过通往水槽的路线传播和组装,这种观点将通过Josang的信念模型进行传播和调节。根据该模型,可以在整个网络中有效地量化数据和聚合结果中的不确定性。仿真结果表明,基于信任的框架提供了一种强大的机制来检测受损节点并对网络中的不确定性进行推理。它还可以清除虚假数据,在存在多个受损节点的情况下实现健壮的聚合
{"title":"A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks","authors":"W. Zhang, Sajal K. Das, Yonghe Liu","doi":"10.1109/SAHCN.2006.288409","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288409","url":null,"abstract":"In unattended and hostile environments, node compromise can become a disastrous threat to wireless sensor networks and introduce uncertainty in the aggregation results. A compromised node often tends to completely reveal its secrets to the adversary which in turn renders purely cryptography-based approaches vulnerable. How to secure the information aggregation process against compromised-node attacks and quantify the uncertainty existing in the aggregation results has become an important research issue. In this paper, we address this problem by proposing a trust based framework, which is rooted in sound statistics and some other distinct and yet closely coupled techniques. The trustworthiness (reputation) of each individual sensor node is evaluated by using an information theoretic concept, Kullback-Leibler (KL) distance, to identify the compromised nodes through an unsupervised learning algorithm. Upon aggregating, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As the result is being disseminated and assembled through the routes to the sink, this opinion will be propagated and regulated by Josang's belief model. Following this model, the uncertainty within the data and aggregation results can be effectively quantified throughout the network. Simulation results demonstrate that our trust based framework provides a powerful mechanism for detecting compromised nodes and reasoning about the uncertainty in the network. It further can purge false data to accomplish robust aggregation in the presence of multiple compromised nodes","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"19 1","pages":"60-69"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73366011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1