{"title":"Long-lived path routing with received signal strength for ad hoc networks","authors":"R. Chang, Shing-Jiuan Leu","doi":"10.1109/ISWPC.2006.1613588","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613588","url":null,"abstract":"Routing paths in mobile ad hoc networks are easily disrupted due to the mobility of nodes. Therefore, it is desirable to find a routing path such that all edges in the path are long-lived. Based on the ad hoc on-demand distance vector routing (AODV) protocol, we propose an AODV-RSS (AODV with received signal strength) routing protocol such that connectivities of links in the route found can sustain longer. The AODV-RSS algorithm uses the received signal strength, RSS9 and the received signal strength changing rate, ARSS, to predict the link available time, LAT. Using the LAT as a constraint, our method will find out a satisfying routing path. Simulation results show that our routing algorithm can greatly improve the quality of the routing path in route connection time, and route reestablishment frequency.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error Probability of Equal Gain Combining for Wireless Digital Communication Systems in an Interference-limited Non-Gaussian Fading Channel","authors":"C. Chayawan, S. Tantaratana, N. Makloi","doi":"10.1109/ISWPC.2006.1613657","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613657","url":null,"abstract":"The performance evaluation of wireless digital communication systems employing equal gain combining (EGC) diversity technique at the receiver is investigated with the presence of co-channel interference in a non-Gaussian multipath fading environment. The closed-form expression of error probability is then derived in the case of both identical and distinct-powered interferers.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134529386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Angle-of-Arrival Estimation for UWB Signals Clustered in Angle","authors":"Yong Up Lee, Yeoungjun Seo, G. Choi","doi":"10.1109/ISWPC.2006.1613581","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613581","url":null,"abstract":"In this study, the new signal model suitable for ultrawide band (UWB) environments with random angle spread is proposed to estimate the angle-of-arrivals (AOAs) of clusters in a UWB indoor or indoor-to-outdoor wireless communication. The estimation technique based MUSIC algorithm is investigated and the estimates of the AOA and distribution parameter on the received clusters are obtained. The proposed model and estimation technique are verified using computer simulations, and the performance of the estimation error is analyzed.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient source mobility-based multicast scheme for mobile hosts in mobile-IPv6 networks","authors":"ByoungSeob Park, CheolSu Lim","doi":"10.1109/ISWPC.2006.1613641","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613641","url":null,"abstract":"In mobile Internet, the host grouping maintenance or the multicast delivery tree for multicasting algorithm becomes a major issues. In this paper, we explore the issues of mobile multicast scheme using mobile-IPv6. Specifically, we address operation scenarios when a mobile host is a source as well as a recipient of a given multicast operation using MLD (multicast listener discovery) scheme, and the proposed MLD-based multicasting protocol, MIP-MLD uses a smooth handoff technique to reduce the service disruption for the multicast session during the handoff. We compared our scheme to existing approaches by cost analysis model, and gained an improved performance in terms of the multicast delivery path.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic Position Management","authors":"T. Pfeifer","doi":"10.1109/ISWPC.2006.1613613","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613613","url":null,"abstract":"Positioning, as one of the prime components of Con text, has been a driving factor in the development of pervasive computing applications throughout the past two decades. Based on the Redundant Positioning architecture introduced previously, this paper discusses the issues of managing positioning and context data between applications and across different administra tive domains, with a focus on implementing security and privacy concepts, for autonomic devices and com munications.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"44 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Ghosh, R. Patro, M. Raina, C. Thejaswi, V. Ganapathy
{"title":"Secure group communication in wireless sensor networks","authors":"S. K. Ghosh, R. Patro, M. Raina, C. Thejaswi, V. Ganapathy","doi":"10.1109/ISWPC.2006.1613648","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613648","url":null,"abstract":"In this paper we address the issues of forming secure multicast group within wireless sensor networks. We describe a protocol that establishes a secure multicast group, and distributes a group key by mutually authenticating a group of devices over an open insecure wireless channel. We choose a conference keying mechanism and extend it with symmetric authentication protocols and a key hierarchy on which group key could be distributed efficiently. We address two problems in this work. Firstly, the formation of secure groups in sensor network with a low communication complexity, secondly, provides an efficient solution to maintain such multicast group.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QAMNet: Providing Quality of Service to Ad-hoc Multicast Enabled Networks","authors":"H. Tebbe, A. Kassler","doi":"10.1109/ISWPC.2006.1613664","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613664","url":null,"abstract":"Mobile Ad-hoc networking has been considered as one of the most important and essential technologies that support future Pervasive Computing Scenarios and 4G networks. In a mobile Ad-hoc Network (MANET), support for multicast communication is essential in order to minimize overhead for group communication. For group conferencing services, controlling the end-to-end delay is important to provide high quality communication. In this paper, we present QAMNet, an approach to improve the Quality of Service (QoS) for multicast communication in MANETs. We extend existing approaches of mesh based multicasting by introducing traffic prioritization, distributed resource probing and admission control mechanisms, adaptive rate control of non-real-time traffic based on Medium Access Control (MAC) layer feedback so as to maintain low delay and required throughput for real-time multicast flows. Simulation results show that our approach is as scalable as mesh based deliver structures and does not require significantly more states than normal mesh based multicasting protocols. As we reuse signaling packets of mesh based multicast packets, we do not introduce additional signaling overhead.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting heterogeneous traffic in wireless sensor networks","authors":"S. Poonvasin, N. Pathommanit","doi":"10.1109/ISWPC.2006.1613562","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613562","url":null,"abstract":"We consider an energy-aware packet transmission node that supports packets of two types: real-time packets and non real-time packets. Several energy-aware packet scheduling schemes are explored and discussed. Using the average delay of non real-time packets and the rejection rate of real-time packets as performance metrics, a scheduling scheme for this purpose is proposed. It is composed of two scheduling stages. In the early stage, each packet type is scheduled independently on the per type basis. They are then merged using PGPS into the second stage where the transmission speed for each packet is assigned. The packets are then transmitted using dynamic modulation scaling (DMS). The method has been evaluated using simulation and compared against one in which energy savings schemes are not incorporated. The result shows that not only does it provide a fair share of bandwidth (low rejected packets for real-time packets and low delay for non real-time packets) between these streams, but it also saves the overall transmission energy, particularly in the light load case, where as much as 90% savings can be obtained.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133724983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Seamless Handover Scheme for RSVP over 3G Networks","authors":"K. Kwong, P. L. Hiew","doi":"10.1109/ISWPC.2006.1613656","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613656","url":null,"abstract":"This paper proposes a seamless handover scheme for RSVP over 3G networks. An Address Proxy Agent (APA) is proposed to be implemented in the radio network controllers (RNC) to provide a residual address for the mobile host (MH) with RSVP reservation during the handover process. The principle of this approach is to provide a residual address for MH that is valid in radio network sub-system (RNS) and traceable back to MH latest location. W hen MH send a packet upstream the APA will replace the packet source address with the residual address before releasing the packet to the rest of its RSVP path. And when RNC receives a return RSVP packet destined to this residual address the APA will replace this residual address back to the source address and forward this packet to the current location. This approach confines the impacts of a handover to the local RNS yet maintain PSVP path as MH moves from one cell to another.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of EV-t and MUSIC for two-dimensional code acquisition","authors":"R. Wu, T. Ristaniemi","doi":"10.1109/ISWPC.2006.1613573","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613573","url":null,"abstract":"In this paper, an efficient method is proposed for joint time delay and direction-of-arrival (DOA) estimation, called two-dimensional code acquisition here, in direct-sequence code division multiple access (DS-CDMA) systems. Meanwhile, we present a rigorous statistical analysis for this method. Through performance comparison with traditional MUSIC, we see the proposed method is robust in highly correlated and coherent multi-path propagation environment. It is effective against channel interferences, and its performance increases with the length of the space-time response vector.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}