G. Santhosh Kumar, L. Varghese, K. Mathew, K. Jacob
{"title":"Evaluation of the Power Consumption of Routing Protocols for Wireless Sensor Networks","authors":"G. Santhosh Kumar, L. Varghese, K. Mathew, K. Jacob","doi":"10.1109/ISAHUC.2006.4290675","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290675","url":null,"abstract":"Sensor networks are one of the fastest growing areas in broad wireless ad hoc networking field. A sensor node, typically, contains signal-processing circuits, micro-controllers and a wireless transmitter/receiver antenna. Energy saving is one of the critical issue for sensor networks since most sensors are equipped with non-rechargeable batteries that have limited lifetime. Routing schemes are used to transfer data collected by sensor nodes to base stations. In the literature many routing protocols for wireless sensor networks are suggested. In this work, four routing protocols for wireless sensor networks viz. flooding, gossiping, GBR and LEACH have been simulated using TinyOS and their power consumption is studied using PowerTOSSIM. A realization of these protocols has been carried out using Mica2 Motes.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124456650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Mobile Ad Hoc Networks through AntTree Clustering and Threshold Cryptography","authors":"P. Subathra, S. Sivagurunathan, G.S.R.E. Selvanj","doi":"10.1109/ISAHUC.2006.4290646","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290646","url":null,"abstract":"Security has become a prime concern in providing communication between mobile nodes in a hostile environment. Unlike wired networks, the unique characteristics of Mobile Ad Hoc networks (MANETs) pose a number of non-trivial challenges to security design. This paper presents a threshold security mechanism with an AntTree clustering algorithm. Nodes which have similar movement pattern are grouped into a cluster. Clustering requires flooding of control information to all the constituent nodes in the network. Flooding is expensive in terms of overhead. It also litters valuable resources such as bandwidth and power. An improvement to flooding is to select probabilistically, a subset of nodes to rebroadcast. To perform efficient clustering, we introduce a new signal strength based metric to estimate the distance between any two nodes in the mobile environment. We employ a threshold cryptographic scheme to protect routing information and data traffic. To ensure distributed trust in the clustered environment, we divide the private key (k) into n pieces in such a way that k is easily reconstructable from any t number of pieces. Even complete knowledge of (t-1) pieces reveal absolutely no information about k.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Classification Using Mobility Patterns in Macrocellular Wireless Networks","authors":"M. S. Sricharan, V. Vaidehi","doi":"10.1109/ISAHUC.2006.4290660","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290660","url":null,"abstract":"As more and more applications go mobile it's becoming increasingly important to understand user mobility patterns and network usage characteristics in wireless networks. Such an understanding would guide the design of applications geared toward mobile environments, would help improve simulation tools, by providing a more representative workload and better user mobility models, and could result in a more effective deployment of wireless network components. User mobility affects quality of service, and makes capacity planning more difficult. This paper presents an analysis of user mobility patterns in macrocellular wireless networks, based on empirical data obtained from several users. Based on mobility and degree of predictability a mobile user classification is attempted. Since prediction algorithms and simulation studies heavily rely on the user mobility characteristics, a classification of the heterogeneous user population would help to spawn a more realistic environment to study system performances.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Mobility Support by Mac Protocols Using Directional Antennas for Wireless Ad Hoc Networks","authors":"P. Kiran","doi":"10.1109/ISAHUC.2006.4290663","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290663","url":null,"abstract":"With the introduction of directional antennas in to the wireless ad hoc networks, there has been an intense work done on proposing a specialized MAC protocol that exploits the advantages of the directional antennas. Some protocols proposed extensions to the distributed coordination function (DCF) using directional antennas while other protocols proposed new MAC methods exploiting the directional transmission capability of directional antennas. MAC protocols proposed have exposed some new problems like hidden/exposed terminal problem and deafness that are specific to the directional antennas. Apart from the specific problems with directional antennas, mobility that is a general problem in the omnidirectional antennas is a specific problem which most of the protocols ignored, as it would reduce the efficiency of the proposed protocol using directional antennas. In this paper, we will exploit the mobility problem and discuss about the very few protocols that have considered the mobility in their models.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation in Pervasive Computing Environments: A Multi-agent approach","authors":"Vivek Menon","doi":"10.1109/ISAHUC.2006.4290670","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290670","url":null,"abstract":"This paper proposes a multi-agent based context-aware adaptive system that can autonomously adapt the levels of performance of applications/services in event of a significant mismatch between demand and supply of resources in a pervasive computing environment. In event of scarcity of resources, the system autonomously chooses a best-fit adaptation strategy relevant to the context based on user preferences. The primary emphasis here is to continue to provide acceptable levels of a service, avoiding as far as possible, a direct involvement of the user.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured on demand Position Based Private Routing Protocol for mobile Adlloc network-SO2P","authors":"M. Jaiganesh, M. Devi, M. Prabakar","doi":"10.1109/ISAHUC.2006.4290644","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290644","url":null,"abstract":"Privacy is needed in adhoc networks. A secured on demand position based private routing algorithm is proposed for communication anonymity and provide a security in mobile adhoc network. Here we use cryptography algorithm for providing security to prevent message hacking information from internal & external attackers. The position information of nodes is drawn by GPS (global positioning system). Here, we provide a terminal node behave like server to getting position information of nodes in the network. A simulator based on GLOMOSIM is developed for evaluating security. It provides a secure data transmission between the nodes. In our design, the server with the process of GPS system records all the information about the terminal nodes involved in the ad-hoc networks. This server will send the position reply (PREP) to the source when it receives the position request (PREQ). This PREP is encrypted to provide the security and it's transmitted to all the intermediate nodes in the ad-hoc networks and the intermediate performs decryption and gets the destination address. The intermediate nodes checks with its own address and if it matches it request for the data and it sends node reply, else it will again sends the PREP to all the other intermediate nodes. This node reply is then analyzed to find the optimal route.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Corrective Approach to Alleviate the Sellishness of Mobile Nodes Indulging in Packet Drop","authors":"K. Komathy, P. Narayanasamy","doi":"10.1109/ISAHUC.2006.4290652","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290652","url":null,"abstract":"Mobile ad hoc networks, which could be deployed rapidly as multi hop packet networks with relatively low expense unlike traditional wireless networks, are more suitable for critical applications such as military and disaster scenarios and also for commercial applications like sensor networks and conferencing. Packet dropping is a more expensive offense in a resource constraint network such as an ad hoc network, as it degrades the performance very severely. This paper presents a proactive distributed authentication mechanism using a dynamic trust management that blacklists the nodes, which drop packets. The significance of this mechanism is to enforce cooperation among nodes to augment the throughput of the network. Prime objective of this paper is to detect and also correct the selfish behavior of the mobile nodes dynamically, which helps to isolate the malicious nodes from using the network services and thereby controlling the packet dropping significantly.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicast Tree Computation for Group Communication in Mobile Networks using Optimization Techniques","authors":"N. Gopalan, C. Mala, R. Shriram, S. Agarwal","doi":"10.1109/ISAHUC.2006.4290653","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290653","url":null,"abstract":"Modern group communication based applications require multiple parameters to be considered for routing in a Cellular network. Traditional algorithms fail in the situations where these parameters frequently change due to the dynamism prevailing in the network. A new technique for topology discovery in these types of networks using ant colony optimization (ACO) has been proposed based on the restricted flooding principle. To provide a better quality of service in routing with multiple constraints, a genetic algorithm based routing has been proposed to find optimal routes within a shorter span of time than the traditional deterministic routing algorithms. Moreover, with the exponential growth in the number of mobile users, to enable a large number of users to participate in a group communication, a parallel genetic algorithm (GA) is proposed in this paper. Our simulation results show that the topology discovery using ant colony optimization is faster. The Call service rate using parallel genetic algorithm is more than that of sequential genetic algorithm and the Call blocking rate of parallel genetic algorithm is less than that of sequential genetic algorithm, for large number of routers in the network.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133644202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Efficient Dynamic Group Key Agreement Protocol for an Ad Hoc Network","authors":"R. C. Gangwar, A. Sarje","doi":"10.1109/ISAHUC.2006.4290648","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290648","url":null,"abstract":"A group key agreement protocol is a key establishment technique in which a group key is derived by two or more members as a function of information contributed by each member, such that no member can predetermine the resulting value. After a successful run of the protocol all members share an identical secret key. When the group composition changes due to join (leave) of new (old) member (s), one can employ supplementary group key agreement protocol to derive a new group key. Thus, they are well suited to the group key establishment needs of mobile ad hoc networks. The problem of designing secure and efficient group key agreement protocol for an ad hoc network with low communication cost, computation cost, and round complexity is a very challenging task. In this paper, we present briefly some group key agreement protocols and analyse them for efficient dynamic membership events for judging their suitability for an ad hoc network.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"33 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Reliability Scheme for Wireless Sensor Networks using PSFQ","authors":"B. Paramasivan, Dr. S. Radha Krishnan","doi":"10.1109/ISAHUC.2006.4290656","DOIUrl":"https://doi.org/10.1109/ISAHUC.2006.4290656","url":null,"abstract":"There is a growing need to support reliable data communications in Sensor Networks that are capable of supporting new applications. To our knowledge, there has been little work on the design of reliable transport protocols for sensor networks. This is because, vast majority of sensor network applications do not require reliable data delivery. There are a number of challenges associated with the development of a reliable transport protocol for Sensor Networks. Pump Slowly, Fetch Quickly [PSFQ], is the first developed protocol to provide data reliability in sensor networks. PSFQ is a simple, scalable, and robust transport protocol that is customizable to meet the needs of emerging reliable data applications in sensor networks. In this paper, we demonstrate a new dimension of PSFQ as an effort to increase the protocol performance. Here a sensor node is allowed to buffer a sufficiently large amount of data into its buffer, thereby allowing simultaneous transmission of multiple packets. In order to allow a sensor node to hold more number of data we are providing additional buffer space for each node. This enables the node to hold more than one packet in its buffer; thereby a sensor node can transmit more than one packet simultaneously. By this we can get an improved transmission rate and reduced latency. This would also quicken the fetch operation. By more buffer space we can hold more packets for a reasonable amount of time, this will improve the availability of the packets, and hence the fetches are made faster.","PeriodicalId":165524,"journal":{"name":"2006 International Symposium on Ad Hoc and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}