2013 IEEE International Conference on Sensing, Communications and Networking (SECON)最新文献

筛选
英文 中文
Enabling sustainable sensing in adverse environments 在不利环境中实现可持续传感
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6644989
Josiah D. Hester, T. King, A. Propst, K. Piratla, Jacob M. Sorber
{"title":"Enabling sustainable sensing in adverse environments","authors":"Josiah D. Hester, T. King, A. Propst, K. Piratla, Jacob M. Sorber","doi":"10.1109/SAHCN.2013.6644989","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644989","url":null,"abstract":"Water infrastructure has been degrading on a national scale in the U.S. for years. Much of this degradation is caused by massive leakage in aging water mains. Water is a critical, and finite resource, early identification of these leaks would not only save cities millions of dollars in revenue but also safeguard our limited natural resources. Current methods of leak detection are either too costly, unscalable, or only feasible in the short-term. We propose using environmentally powered embedded adaptive sensors to provide cost-effective water-monitoring infrastructure that can operate maintenance free for the lifetime of a water main. In this poster we will present our early monitoring system, and initial results and analysis from our current deployment in the Clemson University water distribution network. We also present future directions and key research questions.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"38 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115637514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks 之字形:战术自组织网络中基于部分相互撤销的信任管理
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6644971
Xin Chen, Harshal Patankar, Sencun Zhu, M. Srivatsa, Jeff Opper
{"title":"Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks","authors":"Xin Chen, Harshal Patankar, Sencun Zhu, M. Srivatsa, Jeff Opper","doi":"10.1109/SAHCN.2013.6644971","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644971","url":null,"abstract":"One of the key challenges in operational trust management is to continually monitor the behavior of a node and update its trust score accordingly - evidently, both speed and accuracy is of great importance here. To achieve these goals, several papers have explored the concept of mutual revocation (sometimes termed suicide) wherein the trust value of both the accuser and the accused node are temporarily set to zero without involving a quorum. In this paper we explore a partial mutual revocation approach wherein we design a class of trust update functions to temporarily punish both the accuser and accused node (without involving a quorum) - however, the trust update function does not essentially set their trust values to zero; instead it partially lowers the trust values of both the accuser and the accused. In addition, we allow a trusted authority or a quorum may (periodically) review such partial mutual revocations and update the trust values of the accuser and the accused nodes accordingly (e.g., reward the accuser and punish the accused if the accusation was deemed true). We present a detailed design of the trust update functions for partial mutual revocation. Through both analysis and simulations, we evaluate the effectiveness of partial revocation under different attack strategies and report its performance in terms of revocation immediacy, revocation accuracy and abuse resistance.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network self-organization in the Internet of Things 物联网中的网络自组织
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/IOT-NC.2013.6694050
A. Athreya, P. Tague
{"title":"Network self-organization in the Internet of Things","authors":"A. Athreya, P. Tague","doi":"10.1109/IOT-NC.2013.6694050","DOIUrl":"https://doi.org/10.1109/IOT-NC.2013.6694050","url":null,"abstract":"The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the Internet of Things. We then identify and describe the key components of self-organization in the Internet of Things and discuss enabling technologies. Finally we discuss possible tailoring of prior work of other related applications to suit the needs of self-organization in the Internet of Things paradigm.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Actuator quality in the Internet of Things 物联网中的执行器质量
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6644957
J. Aráuz, Tony Fynn-Cudjoe
{"title":"Actuator quality in the Internet of Things","authors":"J. Aráuz, Tony Fynn-Cudjoe","doi":"10.1109/SAHCN.2013.6644957","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644957","url":null,"abstract":"In this paper we look at a generally unexplored area, the operational boundaries that determine perceived quality in actuators connected to the Internet of Things (IoT). Research in the area of IoT has placed emphasis on networked devices with sensing capabilities generally overlooking other types of applications. We believe that as the IoT grows it is important to understand what impacts the perceived quality of experience when a user commands networked actuators. Our research finds direct applicability in the control of cyberphysical systems such as those present in networked unmanned vehicles, autonomous control of automobiles or real-time industrial process control, among other options. Using a real packet-based actuating testbed along with qualitative and quantitative experimental data we study the quality experienced by actual users. We quantify how different network metrics affect perceived quality and propose the first characterization framework in the area.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Ravine streams: Persistent data streams in disruptive sensor networks 峡谷流:破坏性传感器网络中的持久数据流
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6645016
Mingsen Xu, Wenzhan Song
{"title":"Ravine streams: Persistent data streams in disruptive sensor networks","authors":"Mingsen Xu, Wenzhan Song","doi":"10.1109/SAHCN.2013.6645016","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645016","url":null,"abstract":"Opportunistic network coding has been developed and applied in disruptive networks to provide optimal data delivery. Though network coding system utilizes coding opportunities among multiple paths, its application in data collection suffers from a disconnected sink node and the limited storage space available for data cache. The state-of-the-art approach has studied preserving data persistence as an optimization problem under storage and energy constraints, without considering disruptive network dynamics during data redistribution. In this paper, we propose Ravine Streams (RS) to maximize data preservation under the constraints of limited storage and probabilistic node failure throughout data redistribution. Our RS approach leverages adaptive power control to achieve ensured storage of each redistribution data. Meanwhile, in the course of data redistribution, distributed coding-based rebroadcast strategy not only reduces the data duplication, but also improves the statistical property of symbol randomness. We show that the performance of preserving data persistence of proposed RS is approximately bounded by the optimal solutions. The experimental evaluations demonstrate that RS increases data delivery ratio, consumes even less communication energy with only comparable storage cost, when compared with existing data preserving algorithms.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132073068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity optimization of femtocell networks 移动蜂窝网络的容量优化
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6645017
G. Fusco, N. Azimi, Himanshu Gupta
{"title":"Capacity optimization of femtocell networks","authors":"G. Fusco, N. Azimi, Himanshu Gupta","doi":"10.1109/SAHCN.2013.6645017","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645017","url":null,"abstract":"Femtocells are short-range devices deployed to provide increased coverage and capacity in a small area. They offer a way to increase the capacity of a cellular network by relaying cellular traffic to the wired network. In this paper, we address the problem of optimizing the overall capacity of a femtocell network, as defined by Shannon's law and physical interference, by appropriate power and channel assignment to the femtocells. In particular, we design an approximation algorithm for the objective of maximizing the total network capacity, for large uniform networks with arbitrary coverage regions. We also consider the second objective of maximizing the minimum capacity at a femtocell in the network, and design an algorithm for arbitrary networks which has an appropriate performance guarantee if there is a lower-bound on the distance of any two femtocells. Through simulations, we demonstrate the performance of our designed algorithms by comparing them with a bound on the optimal values.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A prototype of Virtual Traffic Lights on Android-based smartphones android智能手机上的虚拟交通灯原型
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6644984
Manuel Nakamurakare, Wantanee Viriyasitavat, O. Tonguz
{"title":"A prototype of Virtual Traffic Lights on Android-based smartphones","authors":"Manuel Nakamurakare, Wantanee Viriyasitavat, O. Tonguz","doi":"10.1109/SAHCN.2013.6644984","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644984","url":null,"abstract":"Virtual Traffic Lights (VTL) is a recently proposed self-organizing traffic control scheme that has the potential to mitigate traffic congestion in urban areas. This paper reports a prototype design effort on Virtual Traffic Lights using Android-based smartphones. The experiments performed show the feasibility of implementing VTL using smartphones' WiFi devices.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
ASIA: Accelerated secure in-network aggregation in vehicular sensing networks 亚洲:车辆传感网络中的加速安全网络内聚合
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6645023
Xiao Wang, P. Tague
{"title":"ASIA: Accelerated secure in-network aggregation in vehicular sensing networks","authors":"Xiao Wang, P. Tague","doi":"10.1109/SAHCN.2013.6645023","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645023","url":null,"abstract":"Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational overhead while retaining satisfactory security. We replace the most common tree graph with a directed acyclic graph as the aggregation structure. Resulting redundancy in information flow offers the opportunity for misbehavior detection. Meanwhile, by leveraging time asymmetry, upstream nodes in the structure can verify downstream messages through the modified light-weight TESLA scheme. We analyze the security properties of ASIA and provide evaluation results. We show that ASIA can largely accelerate message verifications and drastically reduce computational and communication overhead compared to existing schemes using the resource-consuming Elliptic Curve Digital Signature Algorithm.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131508415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Recursive validation and clustering for distributed spectrum sensing in CR-MANET CR-MANET中分布式频谱感知的递归验证与聚类
2013 IEEE International Conference on Sensing, Communications and Networking (SECON) Pub Date : 2013-06-24 DOI: 10.1109/SAHCN.2013.6644997
Kanthakumar Pongaliur, T. Camp, Li Xiao
{"title":"Recursive validation and clustering for distributed spectrum sensing in CR-MANET","authors":"Kanthakumar Pongaliur, T. Camp, Li Xiao","doi":"10.1109/SAHCN.2013.6644997","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644997","url":null,"abstract":"In cognitive radio networks, secondary users need to accurately identify primary user spectrum occupancy in order to use it. Accurate spectrum sensing is hindered by signal fading, hidden terminal problems, byzantine failures, etc. Centralized cooperative spectrum sensing works well if the secondary user network is infrastructure based and there is a centralized basestation making network wide decisions. When the secondary users network is a cognitive radio mobile ad-hoc network (CR-MANET), then decisions need to be made in a distributed manner and cooperative spectrum sensing introduces additional problems due to the presence of malicious users. These malicious secondary users encourage other secondary users to make a wrong spectrum occupancy decision by feeding inaccurate measurements. We study this problem and present a solution to improve primary user spectrum occupancy identification accuracy in the presence of malicious users. A virtual neighbor cluster is created in which the mobile device forms an evolving cluster of past neighbor devices that aids in validating the input gathered from the current neighboring devices. Next, a recursive partitioning around medoids based clustering is performed to identify a tightly bound set of valid inputs. The validated inputs from both the methods form a decision cluster and the data is fused to get the decision on primary user occupancy. Two data fusion strategies are presented and their use depends on the amount of dynamism in the CR-MANET. The analysis and results show the accuracy of primary user occupancy detection even in the presence of large number of malicious users and signal measurement errors.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TAS-MAC: A traffic-adaptive synchronous MAC protocol for wireless sensor networks TAS-MAC:无线传感器网络的流量自适应同步MAC协议
Pei Huang, Chin-Jung Liu, Li Xiao
{"title":"TAS-MAC: A traffic-adaptive synchronous MAC protocol for wireless sensor networks","authors":"Pei Huang, Chin-Jung Liu, Li Xiao","doi":"10.1145/2835180","DOIUrl":"https://doi.org/10.1145/2835180","url":null,"abstract":"Duty cycling improves energy efficiency but limits throughput and introduces significant end-to-end delay in wireless sensor networks. In this paper, we present a traffic-adaptive synchronous MAC protocol (TAS-MAC), which is a high throughput low delay MAC protocol tailored for low power consumption. It achieves high throughput by using Time Division Multiple Access (TDMA) with a novel traffic-adaptive allocation mechanism that assigns time slots only to nodes located on active routes. TAS-MAC reduces the end-to-end delay by notifying all nodes on active routes of incoming traffic in advance. These nodes will claim time slots for data transmission and forward a packet through multiple hops in a cycle. The desirable traffic-adaptive feature is achieved by decomposing traffic notification and data transmission scheduling into two phases, specializing their duties and improving their efficiency respectively. Simulation results and tests on TelosB motes demonstrate that the two-phase design significantly improves the throughput of current synchronous MAC protocols and achieves the similar low delay of slot stealing assisted TDMA with much lower power consumption.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书