2008 33rd IEEE Conference on Local Computer Networks (LCN)最新文献

筛选
英文 中文
Demonstration of bird species detection using an acoustic wireless sensor network 使用声学无线传感器网络进行鸟类种类检测的演示
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664273
Darren Moore
{"title":"Demonstration of bird species detection using an acoustic wireless sensor network","authors":"Darren Moore","doi":"10.1109/LCN.2008.4664273","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664273","url":null,"abstract":"A wireless sensor network application for detection of bird calls is described. The detection algorithm is based on a likelihood ratio test between statistical models of the target and non-target audio frames. The algorithm has been implemented on CSIROpsilas wireless sensor network platform, using a DSP coprocessor board on each node for signal processing and detection. Results are presented for detection of the logrunner bird species.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"191 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communication 支持安全关键车辆与基础设施通信中的实时数据流量
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664253
Annette Böhm, M. Jonsson
{"title":"Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communication","authors":"Annette Böhm, M. Jonsson","doi":"10.1109/LCN.2008.4664253","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664253","url":null,"abstract":"Support for real-time traffic is crucial to many ITS (intelligent transport systems) safety applications. At the same time it is desirable to provide a number of non-safety services. In this paper, we propose a communication system for safety-critical V2I (vehicle-to-infrastructure) communication based on an extension to the upcoming IEEE 802.11p MAC standard. Real-time analysis provides the tool to adapt the resources set aside for collision-free, safety-critical data traffic to the communication needs of the current number of supported vehicles. The remaining bandwidth is available to other services according to the contention-based random access method defined in the standard. The performance of the proposed concept is evaluated through a simulation analysis based on a merge assistance scenario supported by roadside infrastructure.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks 面向异构动态无线传感器网络的高效服务架构
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664275
Jérémie Leguay, Mario Lopez-Ramos, K. Jean-Marie, V. Conan
{"title":"An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks","authors":"Jérémie Leguay, Mario Lopez-Ramos, K. Jean-Marie, V. Conan","doi":"10.1109/LCN.2008.4664275","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664275","url":null,"abstract":"The purpose of this work is to bridge the gap between high-end networked devices and wireless networks of ubiquituous and resource-constrained sensors and actuators by extensively applying Service-Oriented Architecture (SOA) patterns. We present a multi-level approach that implements existing SOA standards on higher tiers, and propose a novel protocol stack, WSN-SOA, which brings the benefits of SOA to low capacity nodes without the overhead of XML-based technologies. This solution fully supports network dynamicity, auto-configuration, service discovery, device heterogeneity and interoperability with legacy architectures. As a proof-of-concept, we have studied a surveillance scenario in which the detection of an intruder, conducted within the range of a network of wireless sensors (e.g., MICAz from Crossbow), leads to the automatic triggering of tracking activities by a Linux-powered network camera and of alerts and video streams toward a control room.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
CDMA/MPLS platforms for WIMAX mesh networks 用于WIMAX网状网络的CDMA/MPLS平台
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664292
Imam Al-wazedi, A. Elhakeem
{"title":"CDMA/MPLS platforms for WIMAX mesh networks","authors":"Imam Al-wazedi, A. Elhakeem","doi":"10.1109/LCN.2008.4664292","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664292","url":null,"abstract":"Wide band mesh or star oriented networks have recently become a subject of greater interest. Providing wideband access for a variety of applications has led to the inception of WIMAX. Classic access techniques such as FDMA and TDMA have been norm for such networks. Their maximum transmitter power is much less than their TDMA and FDMA counter parts, which are very important assets for mobile operation. In this paper we introduce a code division multiple access/Time division duplex technique CDMA/TDD for such networks. The CDMA approach is an almost play and plug technology for wireless access, making it amenable for implementation by WIMAX service station. In addition we adopt a virtual circuit (label) to improve packet overhead efficiency. We outline briefly the new transmitter and receiver structures then evaluate efficiency, delay and delay jitter. By analysis we show the advantages over classic counter parts with respect to total network efficiency achievable especially for larger number of hops.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two dynamic restoration schemes for survivable traffic grooming in WDM networks WDM网络中可生存业务疏导的两种动态恢复方案
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664236
Huaxiong Yao, Yan Yang, Zongkai Yang
{"title":"Two dynamic restoration schemes for survivable traffic grooming in WDM networks","authors":"Huaxiong Yao, Yan Yang, Zongkai Yang","doi":"10.1109/LCN.2008.4664236","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664236","url":null,"abstract":"This paper addresses dynamic restoration to the scenario of single link failure for survivable traffic grooming in WDM mesh networks. Two restoration schemes are proposed, dynamic restoration at connection granularity (DRAC) and dynamic restoration at lightpath granularity (DRAL). DRAC routes a failed connection to a new multihop path, while DRAL routes a failed lightpath to a new lightpath or other available lightpath. Then we compare the two restoration schemes with other schemes for survivable traffic grooming.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks 异常检测在可靠服务器池系统中的应用,以提高对拒绝服务攻击的鲁棒性
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664171
Pascal Schöttle, T. Dreibholz, E. Rathgeb
{"title":"On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks","authors":"Pascal Schöttle, T. Dreibholz, E. Rathgeb","doi":"10.1109/LCN.2008.4664171","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664171","url":null,"abstract":"The Reliable Server Pooling (RSerPool) architecture is the IETFpsilas upcoming standard of a lightweight server redundancy and session failover framework for availability-critical applications. RSerPool combines the ideas from different research areas into a single, resource-efficient and unified architecture. Although there have already been a number of research papers on the pool management, load distribution and failover handling performance of RSerPool, the robustness against intentional attacks has not been intensively addressed yet. Therefore, the first goal of this paper is to provide a robustness analysis in order to outline the attack bandwidth necessary for a significant impact on RSerPool-based services. After that, we present our anomaly detection approach that has been designed to protect RSerPool systems against attacks. We also show the effectiveness of this approach by simulations.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124730913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding 利用网络编码降低单向WDM环中多对多通信的网络开销
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664153
Long Long, A. Kamal
{"title":"Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding","authors":"Long Long, A. Kamal","doi":"10.1109/LCN.2008.4664153","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664153","url":null,"abstract":"In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimizing the number of Line Terminating Equipment (LTE) on two types of unidirectional rings, namely, single-hub and un-hubbed rings, as our objective. In single-hub rings, we investigate the minimum cost provisioning of uniform all-to-all traffic in two cases: where network coding is used to linearly combine data, and where it is not used and data is transmitted without coding. We generalize the service mode to many-to-many and evaluate the cost of provisioning. In un-hubbed ring, we propose a multi-hub approach to obtain the minimum cost provisioning in the case of all-to-all and many-to-many traffic. From our numerical results, we find that under many to many traffic, network coding can reduce the network cost by 10-20% in single-hub rings and 1-5% in un-hubbed rings.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124754657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-time intrusion prevention and security analysis of networks using HMMs 基于hmm的网络实时入侵防御与安全分析
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664305
K. Haslum, M. Moe, S. J. Knapskog
{"title":"Real-time intrusion prevention and security analysis of networks using HMMs","authors":"K. Haslum, M. Moe, S. J. Knapskog","doi":"10.1109/LCN.2008.4664305","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664305","url":null,"abstract":"In this paper we propose to use a hidden Markov model (HMM) to model sensors for an intrusion prevention system (IPS). Observations from different sensors are aggregated in the HMM and the intrusion frequency security metric is estimated. We use a Markov model that captures the interaction between the attacker and the network to model and predict the next step of an attacker. A new HMM is created and used for updating the estimated system state for each observation, based on the sensor trustworthiness and the time since last observation processed. Our objective is to calculate and maintain a state probability distribution that can be used for intrusion prediction and prevention. We show how our sensor model can be applied to an IPS architecture based on intrusion detection system (IDS) sensors, real-time traffic surveillance and online risk assessment. Our approach is illustrated by a small case study.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networks 利用IEEE 802.11n增强无线网状网络的QoS支持
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664266
Abduladhim Ashtaiwi, H. Hassanein
{"title":"Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networks","authors":"Abduladhim Ashtaiwi, H. Hassanein","doi":"10.1109/LCN.2008.4664266","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664266","url":null,"abstract":"Wireless mesh networks (WMNs) have the potential in supporting multimedia applications with last-mile Internet access. To achieve this objective, shortcomings such as scarcity of the wireless link capacity and the lack of robust QoS scheduling must be overcome. In this paper, we consider WMNs utilizing the new IEEE 802.11n standard. Based on the standardpsilas physical and medium access control (MAC) layer enhancements, we propose adapting the modulation and code scheme (MCS) index and aggregation frame length according to the online assessed link quality, performing frame aggregation by packing multiple small subframes. We also propose performing QoS bandwidth provisioning by optimally aggregating subframes according to their QoS constraints and fairness. Performance results show that incorporating link adaptation, frame aggregation, and QoS bandwidth provisioning can considerably improve the system performance in terms of MAC delay, achieved throughput and packet dropping ratio. The results also show that packet aggregation scheme has a crucial impact on system performance when aggregating small packet sizes.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
QoS provisioning in WCDMA cellular networks through rate and coverage adaptation 通过速率和覆盖自适应实现WCDMA蜂窝网络的QoS提供
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664262
K. Ali, H. Hassanein, H. Mouftah
{"title":"QoS provisioning in WCDMA cellular networks through rate and coverage adaptation","authors":"K. Ali, H. Hassanein, H. Mouftah","doi":"10.1109/LCN.2008.4664262","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664262","url":null,"abstract":"Our previous work proposed a novel mechanism for coverage control in WCDMA systems that can be used in instances of congestion and load imbalance. In this paper, we expand our work to accommodate the heterogeneous nature of traffic in future networks. More importantly, we derive a mathematical model to involve more realistic considerations for inter-cell interference in a system with mixed coverage. Based on different load scenarios in a hotspot area and different coverage combinations of the loaded and supporting sectors, the model is used to quantify the degradation level in the QoS parameters of low priority traffic to preserve the QoS level of high priority traffic. Achievable data rates and Bit Error Rates (BER) are determined for every possible coverage combination. The effect of rate and coverage adaptation on the transmission powers of mobile users is also analyzed.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信