Erlend Larsen, L. Landmark, Vinh Pham, Ø. Kure, P. Engelstad
{"title":"Routing with transmission buffer zones in MANETs","authors":"Erlend Larsen, L. Landmark, Vinh Pham, Ø. Kure, P. Engelstad","doi":"10.1109/WOWMOM.2009.5282463","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282463","url":null,"abstract":"Dealing with link breaks in MANETs is a challenge for the routing protocol. This paper proposes a mechanism to reduce the negative impact of link breaks on the routing. The transmission area of a node is divided into a safe zone close to the node and an unsafe zone (i.e. buffer zone) near the end of the transmission range. The probability is high that link breaks occur with neighboring nodes located in the buffer zone, while links to neighboring nodes in the safe zone are expected to be more stable. Thus, neighbors in the safe zone are preferred as relay nodes, while neighbors in the buffer zone are only used if necessary to avoid network partitioning. The main cost of this mechanism is that the mean number of hops between two nodes is higher than without the mechanism, but simulations show that the solution offers increased throughput.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115796105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Dessart, H. Fouchal, P. Hunel, Harry Gros-Desormeaux, Nicolas Vidot
{"title":"Distributed decision for medical alerts using wireless sensors","authors":"N. Dessart, H. Fouchal, P. Hunel, Harry Gros-Desormeaux, Nicolas Vidot","doi":"10.1109/WOWMOM.2009.5282404","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282404","url":null,"abstract":"In this paper we study how to detect anomalies in a distributed manner by using wireless sensor networks (WSNs). We focus on a medical context, where existing works generally provide large environments to monitor patients using sensors as simple transducers. Those devices forward sensed health parameters to a main base station. This station collects received data and may perform some computations. In this paper, we perform some distributed tasks on the sensors. We propose a distributed algorithm which allows to raise alarms under some initial rules to alert efficiently medical staff in case of critical situations without needless warnings.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jörg Dörflinger, C. Friedland, Makeda Mengistu, C. Merz, Sebastian Stadtrecher, Kathrin Pabst
{"title":"Mobile commerce in rural South Africa — Proof of concept of mobile solutions for the next billion mobile consumers","authors":"Jörg Dörflinger, C. Friedland, Makeda Mengistu, C. Merz, Sebastian Stadtrecher, Kathrin Pabst","doi":"10.1109/WOWMOM.2009.5282441","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282441","url":null,"abstract":"The biggest change in the mobile market in the coming years will not happen at the top consumer level where high end mobile devices will be equipped with the latest multimedia tools but at the untapped market of about one billion people in the mid segment of the world economic pyramid whose potential to become profitable telecom customers has been underestimated and misunderstood.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131508445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using end-to-middle security to protect against evil twin access points","authors":"E. Chen, Mitsutaka Ito","doi":"10.1109/WOWMOM.2009.5282395","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282395","url":null,"abstract":"The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call “end-to-middle security,” which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125467755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Niki Gazoni, Vangelis Angelakis, R. Bruno, M. Conti, V. Siris
{"title":"A framework for adaptive opportunistic forwarding in wireless networks","authors":"Niki Gazoni, Vangelis Angelakis, R. Bruno, M. Conti, V. Siris","doi":"10.1109/WOWMOM.2009.5282400","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282400","url":null,"abstract":"We present our initial work on the design and of an opportunistic forwarding scheme for a wireless network. The main focus in our work is to take advantage of the interplay of the lower layer parameters and thus decide the design aspects of the forwarding decisions for an adaptive probabilistic opportunistic forwarding scheme. We have already shown that our opportunistic scheme can outperform single path routing for moderate channel error values, we have also identified a tradeoff between differentiating the forwarder's back-off value to avoid collisions and reducing delay.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous computing and communication architecture toward energy efficient wireless sensor networks","authors":"Jing Wang","doi":"10.1109/PERCOM.2009.4912821","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912821","url":null,"abstract":"An asynchronous architecture, consisting of asynchronous sampling strategies and an active MAC protocol, is proposed to achieve a better tradeoff between energy efficiency and application's performance in wireless sensor networks (WSNs). Motivated by the data correlation in dense WSNs, asynchronous sampling strategies assign time shifts to nodes' sampling moments to obtain asynchronous sensory data, which is proved to contain more information than the synchronous sensory data at the same sampling rate. Regarding event report scenario, the proposed active MAC protocol adopts the optimal random slot selection probability not only for the medium access control but also for the sampling moments of nodes. By forming an asynchronous architecture of WSNs, the approach is able to achieve energy efficiency for data gathering applications and event detection applications, respectively.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}