2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services最新文献

筛选
英文 中文
Enabling Rapid and Cost-Effective Creation of Massive Pervasive Games in Very Unstable Environments 在非常不稳定的环境中快速且有效地创造大规模普及游戏
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340493
B. Wietrzyk, M. Radenkovic
{"title":"Enabling Rapid and Cost-Effective Creation of Massive Pervasive Games in Very Unstable Environments","authors":"B. Wietrzyk, M. Radenkovic","doi":"10.1109/WONS.2007.340493","DOIUrl":"https://doi.org/10.1109/WONS.2007.340493","url":null,"abstract":"Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless networking, a pervasive game can respond to player’s movements and context and enable them to communicate with a game engine and other players. We review our recent deployment examples of pervasive games in order to explain their distinctive characteristics as wireless ad-hoc networking applications. We then identify the network support challenges of scaling pervasive games to include potentially mass numbers of players across extremely heterogeneous and unreliable networks. We propose a P2P overlay capable of storing large amount of game related data, which is the key to combating the loss of coverage and potential dishonesty of players. The proposed protocol decreases the deployment costs of the gaming infrastructure by self organization and utilizing storage space of users’ devices. We demonstrate scalability and increased availability of data offered by the proposed protocol in simulation based evaluation. Keywords-DHT; MANET; Peer-to-Peer; Pervasive Gaming","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Canning spam in wireless gossip networks 在无线八卦网络中罐装垃圾邮件
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340469
D. Gavidia, G. P. Jesi, C. Gamage, M. van Steen
{"title":"Canning spam in wireless gossip networks","authors":"D. Gavidia, G. P. Jesi, C. Gamage, M. van Steen","doi":"10.1109/WONS.2007.340469","DOIUrl":"https://doi.org/10.1109/WONS.2007.340469","url":null,"abstract":"Once a problem associated only with email, spam is now affecting other media, such as instant messaging, blogs, newsgroups and mobile phone messaging. As wireless networks become more commonplace, we can expect that spam will find its way into upcoming wireless communication services. This paper studies the threat posed by malicious nodes inserting spam in a wireless network using gossiping as a method for information dissemination. We identify the security mechanisms needed to protect our gossip network against the proliferation of spam, reducing the problem to a matter of finding and removing corrupted messages. Finally, we propose a probabilistic method of integrity checking to contain the spread of spam which we evaluate through extensive simulations","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Neighborhood changing rate: a unifying parameter to characterize and evaluate data dissemination scenarios 邻域变化率:表征和评价数据传播场景的统一参数
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340460
J. Harri, B. Zhou, M. Gerla, F. Filali, C. Bonnet
{"title":"Neighborhood changing rate: a unifying parameter to characterize and evaluate data dissemination scenarios","authors":"J. Harri, B. Zhou, M. Gerla, F. Filali, C. Bonnet","doi":"10.1109/WONS.2007.340460","DOIUrl":"https://doi.org/10.1109/WONS.2007.340460","url":null,"abstract":"Vehicular sensor networks are emerging as a new network paradigm particularly relevant to proactive monitoring of urban environment. In this mobile environment, each sensor can generate a large amount of data which must be reliably reported to actuator agents. Data dissemination in conjunction with efficient harvesting has proven to be very effective in this type of applications. One major property in data dissemination/harvesting is the ability of a node to discover new neighbors as it moves. The performance depends on many different parameters including speed, motion pattern, node density, data rate, transmission range. This multitude makes it difficult to accurately evaluate and compare data gathering protocols implemented, for example, on different simulation or testbed scenarios. In this paper, we introduce neighborhood changing rate (NCR)-a parameter that cumulatively captures the essence of several other parameters relevant to data dissemination. By its intrinsic property, the NCR measure can well characterize a dissemination/harvesting scenario and allow to predict the performance of such scenario. We illustrate our approach by applying the NCR concept to Mobeyes, a lightweight data gathering protocol","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124724262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security requirements and solution concepts in vehicular ad hoc networks 车载自组织网络的安全需求和解决方案概念
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340489
T. Leinmüller, E. Schoch, Christian Maihöfer, Christian. Maihoefer
{"title":"Security requirements and solution concepts in vehicular ad hoc networks","authors":"T. Leinmüller, E. Schoch, Christian Maihöfer, Christian. Maihoefer","doi":"10.1109/WONS.2007.340489","DOIUrl":"https://doi.org/10.1109/WONS.2007.340489","url":null,"abstract":"Inter-vehicle communication is one of the most challenging research areas for communication in wireless ad hoc and sensor networks. The main benefit of this kind of communication is seen in active safety systems, which aim at increasing passengers' safety by exchanging warning messages between vehicles. In the past few years, considerable effort has been spent in research on networking protocols and applications, however research on security threats and solutions only started recently. In this paper, we elaborate on security issues in vehicular ad-hoc networks (VANETs) regarding active safety applications. We provide an overview on solution concepts and evaluate requirements of corresponding mechanisms. One conclusion is that although some concepts can be viewed as strong solutions from a network point of view, they do not fit into the design constraints of VANETs. Therefore, less secure mechanisms will probably have to suffice","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Directional broadcast forwarding of alarm messages in VANETs VANETs中报警信息的定向广播转发
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340488
L. Campelli, Matteo Cesana, Roberta Fracchia
{"title":"Directional broadcast forwarding of alarm messages in VANETs","authors":"L. Campelli, Matteo Cesana, Roberta Fracchia","doi":"10.1109/WONS.2007.340488","DOIUrl":"https://doi.org/10.1109/WONS.2007.340488","url":null,"abstract":"The performance of general routing schemes for vehicular ad hoc networks (VANETs) is highly affected by the features of the specific medium access control scheme the routing relies upon and by the mobility scenario. In this work, we address the design of position based routing solutions for the support of safety oriented applications in VANETs by focusing on the impact of the MAC layer on the performances of the routing strategies. Namely, we propose a simulation analysis in a realistic highway mobility scenario to assess the routing performance in the two cases where standard IEEE 802.11 technology and a dynamic TDMA scheme are adopted at layer 2 respectively. We discuss on the dimensioning of the routing parameters in both cases and we provide a comparative analysis of the two MAC/routing integrated solutions","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Exploiting physical layer detection techniques to mitigate starvation in CSMA/CA wireless networks 利用物理层检测技术减轻CSMA/CA无线网络中的饥饿
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340487
A. Leonardi, S. Palazzo, A. Kabbani, E. Knightly
{"title":"Exploiting physical layer detection techniques to mitigate starvation in CSMA/CA wireless networks","authors":"A. Leonardi, S. Palazzo, A. Kabbani, E. Knightly","doi":"10.1109/WONS.2007.340487","DOIUrl":"https://doi.org/10.1109/WONS.2007.340487","url":null,"abstract":"Many proposed and implemented wireless MAC protocols are based on collision-avoidance handshakes between senders and receivers. Unfortunately, information asymmetry problems can potentially occur with such protocols and severely reduce the network capacity. In this paper, we introduce a receiver-initiated mechanism, called carrier sense multiple access with collision avoidance by receiver detection (CSMA/CARD), that makes use of collisions sensed at the physical layer of a receiver to mitigate the effect of such problems. More specifically, and depending on the exact nature of the handshake mechanism, collisions can be used by the receiver to predict whether some sender attempted to initiate a transmission towards this receiver. The receiver, in its turn, would initiate an action on its own to help expedite the handshake mechanism. Such a simple cooperation mechanism can be coupled with any appropriate MAC protocol to improve its performance. We evaluate the effectiveness of this approach with the 802.11 DCF MAC in particular, and we show that starvation and unfairness results can be highly mitigated","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The myth of non-overlapping channels: interference measurements in IEEE 802.11 非重叠信道的神话:IEEE 802.11中的干扰测量
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340486
P. Fuxjäger, D. Valerio, F. Ricciato
{"title":"The myth of non-overlapping channels: interference measurements in IEEE 802.11","authors":"P. Fuxjäger, D. Valerio, F. Ricciato","doi":"10.1109/WONS.2007.340486","DOIUrl":"https://doi.org/10.1109/WONS.2007.340486","url":null,"abstract":"It has become a widely accepted assumption that multiple IEEE 802.11b/g transmissions in physical proximity can coexist without interfering each other. This is claimed to be the case when using separate channels with a minimum distance of 25 MHz, e.g. channel 1 and 6, which are often referred to as non-overlapping. In contrast we show that in practice cross-channel interference can be present also between non-overlapping channels if the interfering transmitter is in the proximity of the receiver. This phenomenon is known as the \"near-far effect\" in wireless communications. On IEEE 802.11 this has two main effects: frame corruption due to increased interference noise and channel blocking due to spurious carrier detection. The problem can be particularly serious when using IEEE 802.11 technology to build multi-hop mesh networks. Through an extensive set of experiments with off-the-shelf certified WiFi chipsets we demonstrate the presence and the detrimental effects of cross-channel interference between non-overlapping channels. We adopt an incremental approach: we first consider the case of unacknowledged broadcast packets, then we extend to regular UDP streams, finally we provide preliminary results for multi-hop TCP flows","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Impact of transmission power on TCP performance in vehicular ad hoc networks 车载自组网中传输功率对TCP性能的影响
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340476
A. Chen, B. Khorashadi, D. Ghosal, C. Chuah
{"title":"Impact of transmission power on TCP performance in vehicular ad hoc networks","authors":"A. Chen, B. Khorashadi, D. Ghosal, C. Chuah","doi":"10.1109/WONS.2007.340476","DOIUrl":"https://doi.org/10.1109/WONS.2007.340476","url":null,"abstract":"Vehicular ad hoc networks (VANET) are characterized by high velocities and relatively uniform mobility of vehicles. As a result, the dynamics of VANET are different from generic mobile ad hoc networks. The behavior of vehicles and their effect on the protocol performance has not been comprehensively investigated in the context of VANET. In this work, we analyze the performance of multi-hop TCP in a multi-lane highway environment where vehicles are configured as clients or routers trying to reach a fixed access point. In particular, we look at the effect of tuning transmission power in dense and sparse road scenarios on the TCP throughput and latency. To conduct our study, we have developed an integrated simulation tool that accurately models both the vehicular mobility and the networking protocol stack. Using our simulation tool we obtain detailed TCP statistics and correlate them with the location, velocity, and other properties of VANET nodes. We study scenarios with a single sender as well as multiple senders. In each case, results show that throughput significantly deteriorates as the number of hops from the sender to the access point increases. A higher number of hops results in higher losses due to interference and loss of connectivity, which causes TCP to throttle back the sending rate unnecessarily","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Inter-vehicle communications: assessing information dissemination under safety constraints 车辆间通信:安全约束下的信息传播评估
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340471
M. Torrent-Moreno
{"title":"Inter-vehicle communications: assessing information dissemination under safety constraints","authors":"M. Torrent-Moreno","doi":"10.1109/WONS.2007.340471","DOIUrl":"https://doi.org/10.1109/WONS.2007.340471","url":null,"abstract":"The main goal of inter-vehicle communication technologies is to provide each vehicle with the required information about its surrounding in order to assist the driver avoiding potential dangers. The required information level, or awareness, can be achieved by the exchange of periodic status messages (beacons) among neighboring vehicles together with the quick dissemination of information about potential hazards. In previous work, we proposed an algorithm (D-FPAV) to control the beaconing load on the medium by adjusting the transmission power in a fair and distributed fashion. In this paper, we adapt a promising position-based message forwarding strategy in order to disseminate time-critical safety information. Moreover, we evaluate its performance when making use of D-FPAV, i.e., limiting the beaconing load on the medium, in a realistic highway environment with probabilistic radio propagation characteristics","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"203 S612","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
Modeling and analysis of TCP dynamics over IEEE 802.11 WLAN IEEE 802.11无线局域网TCP动态建模与分析
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services Pub Date : 2007-04-02 DOI: 10.1109/WONS.2007.340482
Jeonggyun Yu, Sunghyun Choi
{"title":"Modeling and analysis of TCP dynamics over IEEE 802.11 WLAN","authors":"Jeonggyun Yu, Sunghyun Choi","doi":"10.1109/WONS.2007.340482","DOIUrl":"https://doi.org/10.1109/WONS.2007.340482","url":null,"abstract":"Today, IEEE 802.11 wireless LAN (WLAN) is a prevailing solution for the wireless Internet access while transport control protocol (TCP) is the dominant transport protocol in the Internet. It is known that, in the infrastructure WLAN with multiple long-lived TCP flow stations, the actual number of contending TCP stations is limited to a small number, and the aggregated TCP throughput is basically independent of the total number of TCP stations. It is due to the behavior of the TCP flow control in the infrastructure WLAN, where the downlink (i.e., access point-to-stations) is the bottleneck link. In this paper, we develop an accurate and realistic analytical model of long-lived TCP over WLAN based on a well-known p-persistent model of the 802.11. We calculate the average number of the active TCP stations as well as the aggregated TCP throughput using our model for a given number of TCP stations and the maximum TCP receive window size. We verify our model via ns-2 simulations. Moreover, we find from our work that the minimum contention window sizes of the standards (i.e., 31 and 15 for IEEE 802.11b and 802.11a, respectively) are not optimal in the sense of the TCP throughput maximization","PeriodicalId":151450,"journal":{"name":"2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信