{"title":"Demonstration of bird species detection using an acoustic wireless sensor network","authors":"Darren Moore","doi":"10.1109/LCN.2008.4664273","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664273","url":null,"abstract":"A wireless sensor network application for detection of bird calls is described. The detection algorithm is based on a likelihood ratio test between statistical models of the target and non-target audio frames. The algorithm has been implemented on CSIROpsilas wireless sensor network platform, using a DSP coprocessor board on each node for signal processing and detection. Results are presented for detection of the logrunner bird species.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"191 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communication","authors":"Annette Böhm, M. Jonsson","doi":"10.1109/LCN.2008.4664253","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664253","url":null,"abstract":"Support for real-time traffic is crucial to many ITS (intelligent transport systems) safety applications. At the same time it is desirable to provide a number of non-safety services. In this paper, we propose a communication system for safety-critical V2I (vehicle-to-infrastructure) communication based on an extension to the upcoming IEEE 802.11p MAC standard. Real-time analysis provides the tool to adapt the resources set aside for collision-free, safety-critical data traffic to the communication needs of the current number of supported vehicles. The remaining bandwidth is available to other services according to the contention-based random access method defined in the standard. The performance of the proposed concept is evaluated through a simulation analysis based on a merge assistance scenario supported by roadside infrastructure.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jérémie Leguay, Mario Lopez-Ramos, K. Jean-Marie, V. Conan
{"title":"An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks","authors":"Jérémie Leguay, Mario Lopez-Ramos, K. Jean-Marie, V. Conan","doi":"10.1109/LCN.2008.4664275","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664275","url":null,"abstract":"The purpose of this work is to bridge the gap between high-end networked devices and wireless networks of ubiquituous and resource-constrained sensors and actuators by extensively applying Service-Oriented Architecture (SOA) patterns. We present a multi-level approach that implements existing SOA standards on higher tiers, and propose a novel protocol stack, WSN-SOA, which brings the benefits of SOA to low capacity nodes without the overhead of XML-based technologies. This solution fully supports network dynamicity, auto-configuration, service discovery, device heterogeneity and interoperability with legacy architectures. As a proof-of-concept, we have studied a surveillance scenario in which the detection of an intruder, conducted within the range of a network of wireless sensors (e.g., MICAz from Crossbow), leads to the automatic triggering of tracking activities by a Linux-powered network camera and of alerts and video streams toward a control room.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CDMA/MPLS platforms for WIMAX mesh networks","authors":"Imam Al-wazedi, A. Elhakeem","doi":"10.1109/LCN.2008.4664292","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664292","url":null,"abstract":"Wide band mesh or star oriented networks have recently become a subject of greater interest. Providing wideband access for a variety of applications has led to the inception of WIMAX. Classic access techniques such as FDMA and TDMA have been norm for such networks. Their maximum transmitter power is much less than their TDMA and FDMA counter parts, which are very important assets for mobile operation. In this paper we introduce a code division multiple access/Time division duplex technique CDMA/TDD for such networks. The CDMA approach is an almost play and plug technology for wireless access, making it amenable for implementation by WIMAX service station. In addition we adopt a virtual circuit (label) to improve packet overhead efficiency. We outline briefly the new transmitter and receiver structures then evaluate efficiency, delay and delay jitter. By analysis we show the advantages over classic counter parts with respect to total network efficiency achievable especially for larger number of hops.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two dynamic restoration schemes for survivable traffic grooming in WDM networks","authors":"Huaxiong Yao, Yan Yang, Zongkai Yang","doi":"10.1109/LCN.2008.4664236","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664236","url":null,"abstract":"This paper addresses dynamic restoration to the scenario of single link failure for survivable traffic grooming in WDM mesh networks. Two restoration schemes are proposed, dynamic restoration at connection granularity (DRAC) and dynamic restoration at lightpath granularity (DRAL). DRAC routes a failed connection to a new multihop path, while DRAL routes a failed lightpath to a new lightpath or other available lightpath. Then we compare the two restoration schemes with other schemes for survivable traffic grooming.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks","authors":"Pascal Schöttle, T. Dreibholz, E. Rathgeb","doi":"10.1109/LCN.2008.4664171","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664171","url":null,"abstract":"The Reliable Server Pooling (RSerPool) architecture is the IETFpsilas upcoming standard of a lightweight server redundancy and session failover framework for availability-critical applications. RSerPool combines the ideas from different research areas into a single, resource-efficient and unified architecture. Although there have already been a number of research papers on the pool management, load distribution and failover handling performance of RSerPool, the robustness against intentional attacks has not been intensively addressed yet. Therefore, the first goal of this paper is to provide a robustness analysis in order to outline the attack bandwidth necessary for a significant impact on RSerPool-based services. After that, we present our anomaly detection approach that has been designed to protect RSerPool systems against attacks. We also show the effectiveness of this approach by simulations.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124730913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding","authors":"Long Long, A. Kamal","doi":"10.1109/LCN.2008.4664153","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664153","url":null,"abstract":"In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimizing the number of Line Terminating Equipment (LTE) on two types of unidirectional rings, namely, single-hub and un-hubbed rings, as our objective. In single-hub rings, we investigate the minimum cost provisioning of uniform all-to-all traffic in two cases: where network coding is used to linearly combine data, and where it is not used and data is transmitted without coding. We generalize the service mode to many-to-many and evaluate the cost of provisioning. In un-hubbed ring, we propose a multi-hub approach to obtain the minimum cost provisioning in the case of all-to-all and many-to-many traffic. From our numerical results, we find that under many to many traffic, network coding can reduce the network cost by 10-20% in single-hub rings and 1-5% in un-hubbed rings.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124754657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time intrusion prevention and security analysis of networks using HMMs","authors":"K. Haslum, M. Moe, S. J. Knapskog","doi":"10.1109/LCN.2008.4664305","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664305","url":null,"abstract":"In this paper we propose to use a hidden Markov model (HMM) to model sensors for an intrusion prevention system (IPS). Observations from different sensors are aggregated in the HMM and the intrusion frequency security metric is estimated. We use a Markov model that captures the interaction between the attacker and the network to model and predict the next step of an attacker. A new HMM is created and used for updating the estimated system state for each observation, based on the sensor trustworthiness and the time since last observation processed. Our objective is to calculate and maintain a state probability distribution that can be used for intrusion prediction and prevention. We show how our sensor model can be applied to an IPS architecture based on intrusion detection system (IDS) sensors, real-time traffic surveillance and online risk assessment. Our approach is illustrated by a small case study.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networks","authors":"Abduladhim Ashtaiwi, H. Hassanein","doi":"10.1109/LCN.2008.4664266","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664266","url":null,"abstract":"Wireless mesh networks (WMNs) have the potential in supporting multimedia applications with last-mile Internet access. To achieve this objective, shortcomings such as scarcity of the wireless link capacity and the lack of robust QoS scheduling must be overcome. In this paper, we consider WMNs utilizing the new IEEE 802.11n standard. Based on the standardpsilas physical and medium access control (MAC) layer enhancements, we propose adapting the modulation and code scheme (MCS) index and aggregation frame length according to the online assessed link quality, performing frame aggregation by packing multiple small subframes. We also propose performing QoS bandwidth provisioning by optimally aggregating subframes according to their QoS constraints and fairness. Performance results show that incorporating link adaptation, frame aggregation, and QoS bandwidth provisioning can considerably improve the system performance in terms of MAC delay, achieved throughput and packet dropping ratio. The results also show that packet aggregation scheme has a crucial impact on system performance when aggregating small packet sizes.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS provisioning in WCDMA cellular networks through rate and coverage adaptation","authors":"K. Ali, H. Hassanein, H. Mouftah","doi":"10.1109/LCN.2008.4664262","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664262","url":null,"abstract":"Our previous work proposed a novel mechanism for coverage control in WCDMA systems that can be used in instances of congestion and load imbalance. In this paper, we expand our work to accommodate the heterogeneous nature of traffic in future networks. More importantly, we derive a mathematical model to involve more realistic considerations for inter-cell interference in a system with mixed coverage. Based on different load scenarios in a hotspot area and different coverage combinations of the loaded and supporting sectors, the model is used to quantify the degradation level in the QoS parameters of low priority traffic to preserve the QoS level of high priority traffic. Achievable data rates and Bit Error Rates (BER) are determined for every possible coverage combination. The effect of rate and coverage adaptation on the transmission powers of mobile users is also analyzed.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}