2010 International Conference on Data Communication Networking (DCNET)最新文献

筛选
英文 中文
A novel secure and multipath routing algorithm in Wireless Sensor Networks 一种新的无线传感器网络安全多径路由算法
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002983100250034
Bayrem Triki, S. Rekhis, N. Boudriga
{"title":"A novel secure and multipath routing algorithm in Wireless Sensor Networks","authors":"Bayrem Triki, S. Rekhis, N. Boudriga","doi":"10.5220/0002983100250034","DOIUrl":"https://doi.org/10.5220/0002983100250034","url":null,"abstract":"Multipath routing in Wireless Sensors Networks (WSNs) is used in order to tolerate node failures and improve the reliability of data routing. To make a multipath routing algorithm adaptive to the sensitivity of the used application, communicating nodes in the network should be able to specify to which extent the established paths are disjoint. In this paper, we propose a novel routing algorithm for Wireless Sensor Networks (WSN) entitled Secure Multipath Routing Algorithm (SeMuRa). We extend the concept of k-connectivity to k-x-connectivity where x is the value of threshold representing the maximal number of nodes shared between any two paths in the set of the k established paths. The proposed algorithm: a) is based on on-demand routing; b) uses labels in the datagrams exchanged during the route discovery to carry the threshold x; and c) is secure thanks to the use of threshold signature. A simulation is conducted to prove the efficiency of the algorithm and estimate the additional overhead.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"15 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120820321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multimetric network tomography 多尺度网络层析成像
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002982000800084
M. Raza, B. Robertson, W. Phillips, J. Ilow
{"title":"Multimetric network tomography","authors":"M. Raza, B. Robertson, W. Phillips, J. Ilow","doi":"10.5220/0002982000800084","DOIUrl":"https://doi.org/10.5220/0002982000800084","url":null,"abstract":"We introduce a novel concept of multiple metric network tomography in this paper. The conventional network tomography observes a single parameter directly and infers another parameter indirectly from the the directly measured parameter. We consider observing two parameters (packet loss rate (PLR) and path delays) directly and use both of these parameters to infer a single parameter indirectly. We applied a variation of NTF1 model of non negative tensor factorization (NTF) for this purpose and estimated link delay. Simulation results should show a better correlation between the estimated and measured link delays when duplex of metrics is used as compared to using only the path level link delays for estimating the link delays on a test bed.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive File Transfer Middleware for mobile applications 移动应用的自适应文件传输中间件
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002990100450052
Mario A. Gomez-Rodriguez, Víctor Jesús Sosa Sosa, I. Lopez-Arevalo
{"title":"Adaptive File Transfer Middleware for mobile applications","authors":"Mario A. Gomez-Rodriguez, Víctor Jesús Sosa Sosa, I. Lopez-Arevalo","doi":"10.5220/0002990100450052","DOIUrl":"https://doi.org/10.5220/0002990100450052","url":null,"abstract":"Current mobile devices such as mobile phones and PDAs are able to run applications that can demand a considerable storage space. When these devices run out of local memory, they require backing up their files in an external storage device, which could restrict the user mobility. This paper presents an Adaptive File Transfer Middleware (AFTM) for mobile applications. This middleware eases the transfer of files between a mobile device and an external storage server by accessing the best wireless connection (WiFi, GPRS/UMTS) available, considering quality and cost of the service. AFTM is also able to use the Multimedia Messaging Service (MMS) as another option for transferring files. A File Backup Service (FBS) was built on top of the AFTM. The FBS will detect when the device ran out of local memory and will automatically send selected files from the mobile device to an external storage server, freeing the mobile storage memory. To decide which files should be backed up, FBS implements several file replacement policies. Results showed that the selection of one replacement policy will be a trade-off between the efficiency of the algorithm and the cost of the wireless service available when a file needs to be backed up.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical traffic multiplexing with service guarantees over optical core networks 统计流量复用,在光核心网络上提供业务保障
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002991701140118
A. Drakos, T. Orphanoudakis, C. Politi, A. Stavdas
{"title":"Statistical traffic multiplexing with service guarantees over optical core networks","authors":"A. Drakos, T. Orphanoudakis, C. Politi, A. Stavdas","doi":"10.5220/0002991701140118","DOIUrl":"https://doi.org/10.5220/0002991701140118","url":null,"abstract":"Statistical multiplexing at the optical layer has been considered a critical requirement in order to build the next generation of ultra-high capacity optical transport networks in a cost-efficient manner. However, even today, the state of the art of commercially available optical core networks is based on mature wavelength switching and routing technologies, which lack a transport and control plane architecture that can support statistical traffic multiplexing with guaranteed Quality of Service (QoS) across a wide range of QoS parameters even if they can support fast reconfiguration at msec time scales. For several years, most research efforts have focused on the concepts of Optical Burst Switching (OBS) and Optical Packet Switching (OPS), which are based on the hybrid use of electronic nodes and optical switches to exploit Time Division Multiplexing (TDM) in order to achieve statistical multiplexing and dynamic resource reservation over optical networks. While burst switching has been experimentally proven as a technically feasible technique, its performance suffers especially under strict requirements for QoS guarantees. In this paper we evaluate the performance gains that can be achieved exploiting statistical multiplexing over a large scale core optical network and we demonstrate the efficiency of the CANON architecture (Clustered Architecture for Nodes in an Optical Network) as a viable alternative to OBS, which can achieve both targets for statistical multiplexing gains and QoS guarantees at the same time.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123338694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Studying media access and control protocols 学习媒体访问和控制协议
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002999301310134
A. F. Y. Mohammed
{"title":"Studying media access and control protocols","authors":"A. F. Y. Mohammed","doi":"10.5220/0002999301310134","DOIUrl":"https://doi.org/10.5220/0002999301310134","url":null,"abstract":"The goal of this project is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The project fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) resources and the knowledge of undergraduate students. The project is targeted at (1) instructors of undergraduates who might use this work to develop their own lesson plans and course material and (2) students of physical and link layer protocols who want a practical tool for carrying out experiments in these layers.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobility and security models for wireless sensor networks using Voronoi tessellations 使用Voronoi镶嵌的无线传感器网络的移动性和安全性模型
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002989501040113
Manel Abdelkader, Mohamed Hamdi, N. Boudriga
{"title":"Mobility and security models for wireless sensor networks using Voronoi tessellations","authors":"Manel Abdelkader, Mohamed Hamdi, N. Boudriga","doi":"10.5220/0002989501040113","DOIUrl":"https://doi.org/10.5220/0002989501040113","url":null,"abstract":"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denoising network tomography estimations 去噪网络层析估计
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002972800670072
M. Raza, B. Robertson, W. Phillips, J. Ilow
{"title":"Denoising network tomography estimations","authors":"M. Raza, B. Robertson, W. Phillips, J. Ilow","doi":"10.5220/0002972800670072","DOIUrl":"https://doi.org/10.5220/0002972800670072","url":null,"abstract":"In this paper, we apply the technique of sparse shrinkage coding (SCS) to denoise the network tomography model with errors. SCS is used in the field of image recognition for denoising of the image data and we are the first one to apply this technique for estimating error free link delays from erroneous link delay data. To make SCS properly adoptable in network tomography, we have made some changes in the SCS technique such as the use of Non Negative Matrix Factorization (NNMF) instead of ICA for the purpose of estimating sparsifying transformation. Our technique does not need the knowledge of the routing matrix which is assumed known in conventional tomography. The estimated error free link delays are compared with the original error free link delays based on the data obtained from a laboratory test bed. The simulation results reveal that denoising of the tomography data has been carried out successfully by applying SCS.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Handover Mechanism for Multicast and Broadcast Services in IEEE 802.16e systems IEEE 802.16e系统中多播和广播业务的增强切换机制
2010 International Conference on Data Communication Networking (DCNET) Pub Date : 2010-07-26 DOI: 10.5220/0002933600120018
Mingon Kim, Yazan M. Allawi, Jung-Sook Jang, Jin-Kyu Kang, SangCheol Lee, Minho Kang
{"title":"Enhanced Handover Mechanism for Multicast and Broadcast Services in IEEE 802.16e systems","authors":"Mingon Kim, Yazan M. Allawi, Jung-Sook Jang, Jin-Kyu Kang, SangCheol Lee, Minho Kang","doi":"10.5220/0002933600120018","DOIUrl":"https://doi.org/10.5220/0002933600120018","url":null,"abstract":"The handover delay time spent in the service connections running at a Mobile Station (MS) in IEEE 802.16e systems can have a negative impact on real-time applications; especially, a connection for Multicast and Broadcast Service (MBS) could suffer additional handover delays due to multicast session update (the process of updating its associated MBS zone), where its MS moves out of its associated MBS zone. Taking this issue into account, this paper proposes an Enhanced Handover Mechanism (EHM) that can create the reduction of both the required time to scan neighbor Base Stations (BSs) and the number of the MBS session update by firstly selecting a neighbor BS guaranteeing a satisfactory level of Received Signal Strength (RSS) value in the current associated MBS zone as the target BS as many as possible. Simulation results show that the EHM can create the reduction of the handover delay time of both multicast and unicast connections while maintaining a satisfactory RSS value of an MS. As a consequence, enhancement of mobility support for real-time MBS can be achieved while keeping compatibility to IEEE 802.16e systems.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信