The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services最新文献

筛选
英文 中文
Geographically bound mobile agent in MANET 地域绑定移动代理在MANET
K. Tei, Y. Fukazawa, S. Honiden, Nobukazu Yoshioka
{"title":"Geographically bound mobile agent in MANET","authors":"K. Tei, Y. Fukazawa, S. Honiden, Nobukazu Yoshioka","doi":"10.1109/MOBIQUITOUS.2005.31","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.31","url":null,"abstract":"A location-specific data retrieval, which is data retrieval from nodes in a designated region at the time, is an attractive application in a mobile ad-hoc network (MANET). However, almost all nodes in a MANET are powered by batteries, the location-specific data retrieval should involve a small number of messages. In this paper, we use a mobile agent to retrieve the location-specific data. A mobile agent migrates to a node in a designated region, and retrieves data from nodes in this region. Since, after migration, the agent can communicate with nodes in the designated region through low overhead short length hops, the mobile agent can retrieve data at low message cost for long periods, even if the owner of this agent moves around. However, even after migrating to node in the designated region, in order to stay near this region, a mobile agent should migrate to other nodes in response to the movement of the node hosting this agent. In this paper, we propose the geographically bound mobile agent (GBMA) which is a mobile agent that periodically migrates in order to always be located in a designated region. In order to clarify where the GBMA should be located and when the GBMA starts to migrate, two geographic zones are set to the GBMA: required zone and expected zone. The required zone ease tracking of the GBMA, and the expected zone ease adjustment of the GBMA migration timing.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122476513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Embedded SW design issues for distributed applications on mobile terminals 移动终端分布式应用的嵌入式软件设计问题
F. Fummi, S. Martini, G. Perbellini, F. Ricciato, M. Turolla
{"title":"Embedded SW design issues for distributed applications on mobile terminals","authors":"F. Fummi, S. Martini, G. Perbellini, F. Ricciato, M. Turolla","doi":"10.1109/MOBIQUITOUS.2005.27","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.27","url":null,"abstract":"Mobile terminals are embedded systems with growing elaboration capacity, even still limited, which are continuously connected to a worldwide communication network. Thus, the idea of embedding in mobile terminals remote computing services seems attractive and it is more and more exploited. This paper evaluates a middleware platform based on the simple object access protocol (SOAP) to develop distributed applications on mobile terminals.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralizing query processing in sensor networks 传感器网络中的分散查询处理
R. Rosemark, Wang-Chien Lee
{"title":"Decentralizing query processing in sensor networks","authors":"R. Rosemark, Wang-Chien Lee","doi":"10.1109/MOBIQUITOUS.2005.22","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.22","url":null,"abstract":"Recent research has led to the advent of software systems capable of performing query processing in sensor networks. They perform query processing in a sensor network by constructing a routing tree rooted at an access point (i.e., a base station), where the queries are submitted, parsed, and optimized. This approach to query processing is centralized in nature. Performing query optimization at a single node (base station) does not generate efficient query plans, and requires each node to report metadata to the access point. In addition, the routing tree infrastructure inefficiently aggregates data packets. To address these issues, this paper proposes several decentralized query processing systems that utilize sensor node's innate spatial and semantic characteristics. Experimental results conclude that decentralizing query processing significantly reduces energy costs. In addition, experimental results show that the spatial and semantic properties of nodes are influential in designing a decentralized query processing system.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
WebProfiles: a negotiation model for user awareness in personal area networks WebProfiles:个人区域网络中用户意识的协商模型
Juan Ignacio Vázquez, D. López-de-Ipiña
{"title":"WebProfiles: a negotiation model for user awareness in personal area networks","authors":"Juan Ignacio Vázquez, D. López-de-Ipiña","doi":"10.1109/MOBIQUITOUS.2005.64","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.64","url":null,"abstract":"Automatic adaptation of the environment to user preferences results in personalized ambient that fulfil user interaction requirements in a more suitable way. However, the problem of environment adaptation has been traditionally solved via ad-hoc context-specific solutions. In this paper we present the WebProfiles model, a negotiation mechanism for ubiquitous computing, based on Web technology extensions, that enables user preferences awareness capability in surrounding devices and services, so that the environment meets the user and knows him as if specifically designed for that purpose.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient peer-to-peer lookup protocol for location-aware mobile ad hoc networks 一个有效的对等查找协议,用于位置感知移动自组织网络
D. Kim, Chan-Ik Park
{"title":"An efficient peer-to-peer lookup protocol for location-aware mobile ad hoc networks","authors":"D. Kim, Chan-Ik Park","doi":"10.1109/MOBIQUITOUS.2005.12","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.12","url":null,"abstract":"The rapid increase in the usage of mobile devices and the development of wireless technology bring to the needs of service lookup (i.e. discovery) methods in mobile networks. If a geographical distributed hash table (DHT) is directly applied to a location-aware mobile ad hoc network, the key redistribution overhead could be severe. To reduce the key redistribution overhead, we propose a novel peer-to-peer lookup protocol, two-phase geographical distributed hash table. The proposed protocol causes the home consistency problem because it uses two DHTs in tandem: we also provide a solution to the problem so that a query for a key can be routed correctly to the node which is currently responsible for the key.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure reporting of traffic forwarding activity in mobile ad hoc networks 移动自组织网络中流量转发活动的安全报告
Heesook Choi, W. Enck, Jaesheung Shin, P. Mcdaniel, T. L. Porta
{"title":"Secure reporting of traffic forwarding activity in mobile ad hoc networks","authors":"Heesook Choi, W. Enck, Jaesheung Shin, P. Mcdaniel, T. L. Porta","doi":"10.1109/MOBIQUITOUS.2005.53","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.53","url":null,"abstract":"Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamically re-configurable communication protocols using key identifiers 使用密钥标识符动态地重新配置通信协议
Kaushalya Premadasa, B. Landfeldt
{"title":"Dynamically re-configurable communication protocols using key identifiers","authors":"Kaushalya Premadasa, B. Landfeldt","doi":"10.1007/11557654_7","DOIUrl":"https://doi.org/10.1007/11557654_7","url":null,"abstract":"","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On incremental processing of continual range queries for location-aware services and applications 关于位置感知服务和应用程序的连续范围查询的增量处理
Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu
{"title":"On incremental processing of continual range queries for location-aware services and applications","authors":"Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu","doi":"10.1109/MOBIQUITOUS.2005.42","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.42","url":null,"abstract":"A set of continual range queries, each defining the geographical region of interest, can be periodically re-evaluated to locate moving objects. Processing these continual queries efficiently and incrementally hence becomes important for location-aware services and applications. In this paper, we study a new query indexing method, called CES-based indexing, for incremental processing of continual range queries over moving objects. A set of containment-encoded squares (CES) are predefined, each with a unique ID. CES's are virtual constructs (VC) used to decompose query regions and to store indirectly pre-computed search results. Compared with a prior VC-based approach, the number of VC's visited in an index search in CES-based indexing is reduced from (4L/sup 2/-1)/3 to log(L)+1, where L is the maximal side length of a VC. Search time is hence significantly lowered. Moreover, containment encoding among the CES's makes it easy to identify all those VC's that need not be visited during an incremental query reevaluation. We study the performance of CES-based indexing and compare it with a prior VC-based approach.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Routing in MANETs with address conflicts 地址冲突的manet路由
Kwan-Wu Chin, D. Lowe, W. H. Lau
{"title":"Routing in MANETs with address conflicts","authors":"Kwan-Wu Chin, D. Lowe, W. H. Lau","doi":"10.1109/MOBIQUITOUS.2005.51","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.51","url":null,"abstract":"Mobile ad-hoc networks (MANETs) are dynamic and multi-hop in nature. As nodes continually join and leave the MANET, managing the problem of address conflicts is particularly challenging. In the past, researchers have gone to great lengths to ensure that nodes are assigned unique addresses and various protocols and policies have been designed to resolve address conflicts. In this paper, we argue that current solutions, originally designed for static wired networks, put unnecessary stress on the dynamic operation of a MANET. To solve, this problem, we present a MANET that can continue to operate even when there are conflicting addresses. Unlike previous solutions, our technique does not break applications by requiring nodes to renumber. Further, the overheads introduced by traditional address allocation and maintenance protocols are removed. All these improvements are effected by introducing of a new routing sub-layer that enables a reactive routing protocol to route packets through a MANET that is experiencing address conflicts. This routing sub-layer provides features such as conflict avoidance forwarding, conflict notification, and enhanced address resolution.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient aggregation of encrypted data in wireless sensor networks 无线传感器网络中加密数据的高效聚合
C. Castelluccia, Einar Mykletun, G. Tsudik
{"title":"Efficient aggregation of encrypted data in wireless sensor networks","authors":"C. Castelluccia, Einar Mykletun, G. Tsudik","doi":"10.1109/MOBIQUITOUS.2005.25","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.25","url":null,"abstract":"Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. One well-known approach is to aggregate sensor data (e.g., by adding) along the path from sensors to the sink. Aggregation becomes especially challenging if end-to-end privacy between sensors and the sink is required. In this paper, we propose a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data. The new cipher only uses modular additions (with very small moduli) and is therefore very well suited for CPU-constrained devices. We show that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122715235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 614
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信