The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services最新文献

筛选
英文 中文
An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification 一种用于RFID标签识别的增强动态框架开槽ALOHA算法
Su-Ryun Lee, Sung-Don Joo, Chaewoo Lee
{"title":"An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification","authors":"Su-Ryun Lee, Sung-Don Joo, Chaewoo Lee","doi":"10.1109/MOBIQUITOUS.2005.13","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.13","url":null,"abstract":"In RFID system, one of the problems that we must solve is the collision between tags which lowers the efficiency of the RFID system. One of the popular anti-collision algorithms is ALOHA-type algorithms, which are simple and shows good performance when the number of tags to read is small. However, they generally require exponentially increasing number of slots to identify the tags as the number of tag increases. In the paper, we propose a new anti-collision algorithm called enhanced dynamic framed slotted ALOHA (EDFSA) which estimates the number of unread tags first and adjusts the number of responding tags or the frame size to give the optimal system efficiency. As a result, in the proposed method, the number of slots to read the tags increases linearly as the the number of tags does. Simulation results show that the proposed algorithm improves the slot efficiency by 85/spl sim/100% compared to the conventional algorithms when the number of tags is 1000.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 510
On upper bound and heuristics for multicast lifetime maximization using dynamic routing in energy-limited wireless ad hoc networks 有限能量无线自组网中动态路由最大化组播生存期的上界和启发式算法
Song Guo, O. Yang
{"title":"On upper bound and heuristics for multicast lifetime maximization using dynamic routing in energy-limited wireless ad hoc networks","authors":"Song Guo, O. Yang","doi":"10.1109/MOBIQUITOUS.2005.43","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.43","url":null,"abstract":"We consider the problem of maximizing the lifetime of a given multicast connection in wireless networks that use omni-directional antennas and have limited energy resources. In this paper, we first explore the upper bound of the multicast lifetime using dynamic routing. We then provide a set of heuristic algorithms. Experimental results show that minimum total power consumption does not guarantee maximum lifetime for either broadcasting or multicasting, and our algorithms outperform other energy-aware multicast algorithms significantly in terms of multicast lifetime.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115537654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An assessment of the audio codec performance in voice over WLAN (VoWLAN) systems 语音无线局域网(VoWLAN)系统中音频编解码器性能的评估
M. Narbutt, M. Davis
{"title":"An assessment of the audio codec performance in voice over WLAN (VoWLAN) systems","authors":"M. Narbutt, M. Davis","doi":"10.1109/MOBIQUITOUS.2005.66","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.66","url":null,"abstract":"In this paper we present results of experimental investigation into the performance of three audio codecs (ITU-T G.711, G.723.1, and G.729A) under varying load conditions on a voice over WLAN system utilizing the IEEE 802.11b wireless LAN standard. The analysis is based upon a new technique for estimating user satisfaction of speech quality calculated from packet delay and packet loss/late measurements. We also demonstrate the importance of the de-jitter buffer playout scheme for insuring speech quality. From our results we conclude that the use of the G.711 audio codec in conjunction with the new adaptive playout scheme gives the highest user satisfaction of the voice over WLAN schemes considered.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Content-based routing in mobile ad hoc networks 移动自组织网络中基于内容的路由
M. Petrovic, Vinod Muthusamy, H. Jacobsen
{"title":"Content-based routing in mobile ad hoc networks","authors":"M. Petrovic, Vinod Muthusamy, H. Jacobsen","doi":"10.1109/MOBIQUITOUS.2005.18","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.18","url":null,"abstract":"The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized by scarce resources and a lack of fixed infrastructure. We propose and evaluate three content-based routing protocols: CBR is an adaptation of existing distributed publish/subscribe protocols for wired networks, FT-CBR extends CBR to provide fault-tolerance, and RAFT-CBR provides both fault-tolerance and reliability. Using network simulations we analyze the applicability and test the tradeoffs of these algorithms. We show that RAFT-CBR can guarantee 100% delivery to small groups, at the expense of transmission delay. CBR, with a low message overhead and low delay, is more suitable for larger groups at the expense of reliability. FT-CBR provides comparable delivery rates to RAFT-CBR, as well as low delay, at the expense of increased message cost.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
PPP migration: a technique for low-latency handoff in CDMA2000 networks PPP迁移:在CDMA2000网络中实现低延迟切换的技术
Anand Kagalkar, S. Mukherjee, S. Rangarajan, Katherine Guo
{"title":"PPP migration: a technique for low-latency handoff in CDMA2000 networks","authors":"Anand Kagalkar, S. Mukherjee, S. Rangarajan, Katherine Guo","doi":"10.1109/MOBIQUITOUS.2005.48","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.48","url":null,"abstract":"In current CDMA2000 standard, a packet data serving node (PDSN) acts as an IP gateway to the Internet. Mobile nodes (MN) connect to a PDSN using a point-to-point (PPP) session and IP packets are tunneled over the PPP session from the client to the PDSN which then routes the packets onto a packet network. A CDMA2000 network is a hierarchical network where packets from an MN to the PDSN are transported over a radio-access network (RAN). An MN could move from one RAN to another and still be anchored under the same PDSN; it is also possible that when an MN moves from one RAN to another, the anchor PDSN itself becomes different. In the latter case, there are two ways to handle mobility: (i) tear down the PPP session from the MN to the old PDSN and establish a new PPP session from the MN to the new PDSN, and (ii) use the fast-handoff mechanism as specified in the CDMA2000 standard where a P-P (PDSN to PDSN) tunnel is established to tunnel PPP frames from the old PDSN to the new PDSN and then to the MN. In this paper, we present a better approach to handling mobility than either of the above two techniques. The method is to migrate the PPP state from the old PDSN to the new PDSN transparent to the MN; once the PPP state migration is completed, the new PDSN will serve as the IP gateway to the MN. We have implemented the PPP migration technique and through experimental measurements show its benefits.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129617263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient continuous mapping in sensor networks using isolines 基于等值线的传感器网络高效连续映射
I. Solis, K. Obraczka
{"title":"Efficient continuous mapping in sensor networks using isolines","authors":"I. Solis, K. Obraczka","doi":"10.1109/MOBIQUITOUS.2005.26","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.26","url":null,"abstract":"This paper introduces an energy-efficient data collection technique that takes advantage of spatial/temporal data correlation to generate maps for continuous monitoring (e.g., of environmental conditions such as temperature, humidity, etc.). In its essence, the proposed technique, isoline aggregation, works by detecting isolines which are the lines that make up a contour map. Energy efficiency through spatial aggregation is achieved by having only nodes that detect the isoline report to the sink. Simulation results show that isoline aggregation can reduce the amount of bytes transmitted by a factor of 11 compared to when no data aggregation is used and by up to 4 times when compared to an existing spatial-correlation based aggregation mechanism. At the same time, we are able to keep high data accuracy.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128248007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Building a ubiquitous platform for remote sensing using smartphones 构建无处不在的智能手机遥感平台
D. Trossen, D. Pavel
{"title":"Building a ubiquitous platform for remote sensing using smartphones","authors":"D. Trossen, D. Pavel","doi":"10.1109/MOBIQUITOUS.2005.16","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.16","url":null,"abstract":"The proliferation of smartphones throughout the past few years has provided an increasingly ubiquitous platform for intelligent services at the edge of the network. This paper presents an approach to use this intelligence for implementing an architecture that enables remote sensing scenarios in which we rely on intelligence residing in \"sensing gateways\" that perform the actual sensing but also required aggregation functionality of sensed information. For that, we will introduce a scenario for such remote sensing to motivate our approach. Further, the architecture and current prototype is presented.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"1128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
SWAT: small world-based attacker traceback in ad-hoc networks SWAT: ad-hoc网络中基于小世界的攻击者追溯
Yongjin Kim, A. Helmy
{"title":"SWAT: small world-based attacker traceback in ad-hoc networks","authors":"Yongjin Kim, A. Helmy","doi":"10.1109/MOBIQUITOUS.2005.56","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.56","url":null,"abstract":"Mobile ad hoc networks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/DDoS attacker traceback is especially challenging in MANETs for the lack of infrastructure. In this paper, we propose an efficient on-the-fly search technique, SWAT, to trace back DoS and DDoS attackers in MANETs. Our scheme borrows from small worlds, utilizes the concept of contacts, and use traffic pattern matching (TPM) and traffic volume matching (TVM) techniques. We also propose multi-directional search, in-network processing and query suppression to reduce communication overhead in energy-constrained MANETs and increase traceback robustness against spoofing and collusion. Simulation results show that SWAT successfully traces back DoS and DDoS attacker under reasonable background traffic. In addition, SWAT incurs low communication overhead (22% compared to flooding-based search).","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132543971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Defend against cache consistency attacks in wireless ad hoc networks 防范无线自组网中的缓存一致性攻击
Wensheng Zhang, G. Cao
{"title":"Defend against cache consistency attacks in wireless ad hoc networks","authors":"Wensheng Zhang, G. Cao","doi":"10.1109/MOBIQUITOUS.2005.23","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.23","url":null,"abstract":"Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. To maintain strong cache consistency in some strategic scenarios (e.g., battle fields), the invalidation-based approach is preferred due to its low overhead. However, this approach may suffer from some security attacks. For example, a malicious node (intruder) may drop, insert or modify invalidation messages to mislead the receivers to use stale data or unnecessarily invalidate the data that is still valid. In this paper, we propose a solution based on the IR-based cache invalidation strategy to prevent intruders from dropping or modifying the invalidation messages. Although digital signatures can be used to protect IRs, it has significantly high overhead in terms of computation and bandwidth consumption. To address this problem, we propose a family of randomized grouping based schemes for intrusion detection and damage recovery. Extensive analysis and simulations are used to evaluate the proposed schemes. The results show that our solution can achieve a good level of security with low overhead.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126223477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Orion: P2P-based inter-space context discovery platform Orion:基于p2p的跨空间上下文发现平台
Chung-Yau Chin, Daqing Zhang, G. Mohan
{"title":"Orion: P2P-based inter-space context discovery platform","authors":"Chung-Yau Chin, Daqing Zhang, G. Mohan","doi":"10.1109/MOBIQUITOUS.2005.45","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.45","url":null,"abstract":"Context information produced by various interconnected sensors and software sources needs to be efficiently identified and located by a context-aware application. In this paper, we propose an inter-space context discovery platform, called Orion, which allows context to be discovered and retrieved from multiple smart spaces. Orion employs semantic overlay network peer-to-peer architecture to provide connectivity between the smart spaces, allowing lookup query to be forwarded to the destined spaces. On the other hand, to overcome data heterogeneity, semantic Web ontology-driven approach is used for the context modeling and matchmaking.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115489533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信