2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops最新文献

筛选
英文 中文
Routing with transmission buffer zones in MANETs 在manet中带传输缓冲区的路由
Erlend Larsen, L. Landmark, Vinh Pham, Ø. Kure, P. Engelstad
{"title":"Routing with transmission buffer zones in MANETs","authors":"Erlend Larsen, L. Landmark, Vinh Pham, Ø. Kure, P. Engelstad","doi":"10.1109/WOWMOM.2009.5282463","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282463","url":null,"abstract":"Dealing with link breaks in MANETs is a challenge for the routing protocol. This paper proposes a mechanism to reduce the negative impact of link breaks on the routing. The transmission area of a node is divided into a safe zone close to the node and an unsafe zone (i.e. buffer zone) near the end of the transmission range. The probability is high that link breaks occur with neighboring nodes located in the buffer zone, while links to neighboring nodes in the safe zone are expected to be more stable. Thus, neighbors in the safe zone are preferred as relay nodes, while neighbors in the buffer zone are only used if necessary to avoid network partitioning. The main cost of this mechanism is that the mean number of hops between two nodes is higher than without the mechanism, but simulations show that the solution offers increased throughput.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115796105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed decision for medical alerts using wireless sensors 使用无线传感器的医疗警报分布式决策
N. Dessart, H. Fouchal, P. Hunel, Harry Gros-Desormeaux, Nicolas Vidot
{"title":"Distributed decision for medical alerts using wireless sensors","authors":"N. Dessart, H. Fouchal, P. Hunel, Harry Gros-Desormeaux, Nicolas Vidot","doi":"10.1109/WOWMOM.2009.5282404","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282404","url":null,"abstract":"In this paper we study how to detect anomalies in a distributed manner by using wireless sensor networks (WSNs). We focus on a medical context, where existing works generally provide large environments to monitor patients using sensors as simple transducers. Those devices forward sensed health parameters to a main base station. This station collects received data and may perform some computations. In this paper, we perform some distributed tasks on the sensors. We propose a distributed algorithm which allows to raise alarms under some initial rules to alert efficiently medical staff in case of critical situations without needless warnings.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile commerce in rural South Africa — Proof of concept of mobile solutions for the next billion mobile consumers 南非农村的移动商务——为下一个十亿移动消费者提供移动解决方案的概念证明
Jörg Dörflinger, C. Friedland, Makeda Mengistu, C. Merz, Sebastian Stadtrecher, Kathrin Pabst
{"title":"Mobile commerce in rural South Africa — Proof of concept of mobile solutions for the next billion mobile consumers","authors":"Jörg Dörflinger, C. Friedland, Makeda Mengistu, C. Merz, Sebastian Stadtrecher, Kathrin Pabst","doi":"10.1109/WOWMOM.2009.5282441","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282441","url":null,"abstract":"The biggest change in the mobile market in the coming years will not happen at the top consumer level where high end mobile devices will be equipped with the latest multimedia tools but at the untapped market of about one billion people in the mid segment of the world economic pyramid whose potential to become profitable telecom customers has been underestimated and misunderstood.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131508445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using end-to-middle security to protect against evil twin access points 使用端到端安全来防止邪恶的双重访问点
E. Chen, Mitsutaka Ito
{"title":"Using end-to-middle security to protect against evil twin access points","authors":"E. Chen, Mitsutaka Ito","doi":"10.1109/WOWMOM.2009.5282395","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282395","url":null,"abstract":"The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call “end-to-middle security,” which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125467755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework for adaptive opportunistic forwarding in wireless networks 无线网络中自适应机会转发的框架
Niki Gazoni, Vangelis Angelakis, R. Bruno, M. Conti, V. Siris
{"title":"A framework for adaptive opportunistic forwarding in wireless networks","authors":"Niki Gazoni, Vangelis Angelakis, R. Bruno, M. Conti, V. Siris","doi":"10.1109/WOWMOM.2009.5282400","DOIUrl":"https://doi.org/10.1109/WOWMOM.2009.5282400","url":null,"abstract":"We present our initial work on the design and of an opportunistic forwarding scheme for a wireless network. The main focus in our work is to take advantage of the interplay of the lower layer parameters and thus decide the design aspects of the forwarding decisions for an adaptive probabilistic opportunistic forwarding scheme. We have already shown that our opportunistic scheme can outperform single path routing for moderate channel error values, we have also identified a tradeoff between differentiating the forwarder's back-off value to avoid collisions and reducing delay.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous computing and communication architecture toward energy efficient wireless sensor networks 面向高能效无线传感器网络的异步计算与通信架构
Jing Wang
{"title":"Asynchronous computing and communication architecture toward energy efficient wireless sensor networks","authors":"Jing Wang","doi":"10.1109/PERCOM.2009.4912821","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912821","url":null,"abstract":"An asynchronous architecture, consisting of asynchronous sampling strategies and an active MAC protocol, is proposed to achieve a better tradeoff between energy efficiency and application's performance in wireless sensor networks (WSNs). Motivated by the data correlation in dense WSNs, asynchronous sampling strategies assign time shifts to nodes' sampling moments to obtain asynchronous sensory data, which is proved to contain more information than the synchronous sensory data at the same sampling rate. Regarding event report scenario, the proposed active MAC protocol adopts the optimal random slot selection probability not only for the medium access control but also for the sampling moments of nodes. By forming an asynchronous architecture of WSNs, the approach is able to achieve energy efficiency for data gathering applications and event detection applications, respectively.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信