{"title":"A novel secure and multipath routing algorithm in Wireless Sensor Networks","authors":"Bayrem Triki, S. Rekhis, N. Boudriga","doi":"10.5220/0002983100250034","DOIUrl":"https://doi.org/10.5220/0002983100250034","url":null,"abstract":"Multipath routing in Wireless Sensors Networks (WSNs) is used in order to tolerate node failures and improve the reliability of data routing. To make a multipath routing algorithm adaptive to the sensitivity of the used application, communicating nodes in the network should be able to specify to which extent the established paths are disjoint. In this paper, we propose a novel routing algorithm for Wireless Sensor Networks (WSN) entitled Secure Multipath Routing Algorithm (SeMuRa). We extend the concept of k-connectivity to k-x-connectivity where x is the value of threshold representing the maximal number of nodes shared between any two paths in the set of the k established paths. The proposed algorithm: a) is based on on-demand routing; b) uses labels in the datagrams exchanged during the route discovery to carry the threshold x; and c) is secure thanks to the use of threshold signature. A simulation is conducted to prove the efficiency of the algorithm and estimate the additional overhead.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"15 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120820321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimetric network tomography","authors":"M. Raza, B. Robertson, W. Phillips, J. Ilow","doi":"10.5220/0002982000800084","DOIUrl":"https://doi.org/10.5220/0002982000800084","url":null,"abstract":"We introduce a novel concept of multiple metric network tomography in this paper. The conventional network tomography observes a single parameter directly and infers another parameter indirectly from the the directly measured parameter. We consider observing two parameters (packet loss rate (PLR) and path delays) directly and use both of these parameters to infer a single parameter indirectly. We applied a variation of NTF1 model of non negative tensor factorization (NTF) for this purpose and estimated link delay. Simulation results should show a better correlation between the estimated and measured link delays when duplex of metrics is used as compared to using only the path level link delays for estimating the link delays on a test bed.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mario A. Gomez-Rodriguez, Víctor Jesús Sosa Sosa, I. Lopez-Arevalo
{"title":"Adaptive File Transfer Middleware for mobile applications","authors":"Mario A. Gomez-Rodriguez, Víctor Jesús Sosa Sosa, I. Lopez-Arevalo","doi":"10.5220/0002990100450052","DOIUrl":"https://doi.org/10.5220/0002990100450052","url":null,"abstract":"Current mobile devices such as mobile phones and PDAs are able to run applications that can demand a considerable storage space. When these devices run out of local memory, they require backing up their files in an external storage device, which could restrict the user mobility. This paper presents an Adaptive File Transfer Middleware (AFTM) for mobile applications. This middleware eases the transfer of files between a mobile device and an external storage server by accessing the best wireless connection (WiFi, GPRS/UMTS) available, considering quality and cost of the service. AFTM is also able to use the Multimedia Messaging Service (MMS) as another option for transferring files. A File Backup Service (FBS) was built on top of the AFTM. The FBS will detect when the device ran out of local memory and will automatically send selected files from the mobile device to an external storage server, freeing the mobile storage memory. To decide which files should be backed up, FBS implements several file replacement policies. Results showed that the selection of one replacement policy will be a trade-off between the efficiency of the algorithm and the cost of the wireless service available when a file needs to be backed up.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Drakos, T. Orphanoudakis, C. Politi, A. Stavdas
{"title":"Statistical traffic multiplexing with service guarantees over optical core networks","authors":"A. Drakos, T. Orphanoudakis, C. Politi, A. Stavdas","doi":"10.5220/0002991701140118","DOIUrl":"https://doi.org/10.5220/0002991701140118","url":null,"abstract":"Statistical multiplexing at the optical layer has been considered a critical requirement in order to build the next generation of ultra-high capacity optical transport networks in a cost-efficient manner. However, even today, the state of the art of commercially available optical core networks is based on mature wavelength switching and routing technologies, which lack a transport and control plane architecture that can support statistical traffic multiplexing with guaranteed Quality of Service (QoS) across a wide range of QoS parameters even if they can support fast reconfiguration at msec time scales. For several years, most research efforts have focused on the concepts of Optical Burst Switching (OBS) and Optical Packet Switching (OPS), which are based on the hybrid use of electronic nodes and optical switches to exploit Time Division Multiplexing (TDM) in order to achieve statistical multiplexing and dynamic resource reservation over optical networks. While burst switching has been experimentally proven as a technically feasible technique, its performance suffers especially under strict requirements for QoS guarantees. In this paper we evaluate the performance gains that can be achieved exploiting statistical multiplexing over a large scale core optical network and we demonstrate the efficiency of the CANON architecture (Clustered Architecture for Nodes in an Optical Network) as a viable alternative to OBS, which can achieve both targets for statistical multiplexing gains and QoS guarantees at the same time.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123338694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studying media access and control protocols","authors":"A. F. Y. Mohammed","doi":"10.5220/0002999301310134","DOIUrl":"https://doi.org/10.5220/0002999301310134","url":null,"abstract":"The goal of this project is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The project fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) resources and the knowledge of undergraduate students. The project is targeted at (1) instructors of undergraduates who might use this work to develop their own lesson plans and course material and (2) students of physical and link layer protocols who want a practical tool for carrying out experiments in these layers.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility and security models for wireless sensor networks using Voronoi tessellations","authors":"Manel Abdelkader, Mohamed Hamdi, N. Boudriga","doi":"10.5220/0002989501040113","DOIUrl":"https://doi.org/10.5220/0002989501040113","url":null,"abstract":"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising network tomography estimations","authors":"M. Raza, B. Robertson, W. Phillips, J. Ilow","doi":"10.5220/0002972800670072","DOIUrl":"https://doi.org/10.5220/0002972800670072","url":null,"abstract":"In this paper, we apply the technique of sparse shrinkage coding (SCS) to denoise the network tomography model with errors. SCS is used in the field of image recognition for denoising of the image data and we are the first one to apply this technique for estimating error free link delays from erroneous link delay data. To make SCS properly adoptable in network tomography, we have made some changes in the SCS technique such as the use of Non Negative Matrix Factorization (NNMF) instead of ICA for the purpose of estimating sparsifying transformation. Our technique does not need the knowledge of the routing matrix which is assumed known in conventional tomography. The estimated error free link delays are compared with the original error free link delays based on the data obtained from a laboratory test bed. The simulation results reveal that denoising of the tomography data has been carried out successfully by applying SCS.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingon Kim, Yazan M. Allawi, Jung-Sook Jang, Jin-Kyu Kang, SangCheol Lee, Minho Kang
{"title":"Enhanced Handover Mechanism for Multicast and Broadcast Services in IEEE 802.16e systems","authors":"Mingon Kim, Yazan M. Allawi, Jung-Sook Jang, Jin-Kyu Kang, SangCheol Lee, Minho Kang","doi":"10.5220/0002933600120018","DOIUrl":"https://doi.org/10.5220/0002933600120018","url":null,"abstract":"The handover delay time spent in the service connections running at a Mobile Station (MS) in IEEE 802.16e systems can have a negative impact on real-time applications; especially, a connection for Multicast and Broadcast Service (MBS) could suffer additional handover delays due to multicast session update (the process of updating its associated MBS zone), where its MS moves out of its associated MBS zone. Taking this issue into account, this paper proposes an Enhanced Handover Mechanism (EHM) that can create the reduction of both the required time to scan neighbor Base Stations (BSs) and the number of the MBS session update by firstly selecting a neighbor BS guaranteeing a satisfactory level of Received Signal Strength (RSS) value in the current associated MBS zone as the target BS as many as possible. Simulation results show that the EHM can create the reduction of the handover delay time of both multicast and unicast connections while maintaining a satisfactory RSS value of an MS. As a consequence, enhancement of mobility support for real-time MBS can be achieved while keeping compatibility to IEEE 802.16e systems.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}