A. Chockalingam, D. Manjunath, M. Franceschetti, L. Tassiulas
{"title":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","authors":"A. Chockalingam, D. Manjunath, M. Franceschetti, L. Tassiulas","doi":"10.1145/2491288","DOIUrl":"https://doi.org/10.1145/2491288","url":null,"abstract":"","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, S. Xia
{"title":"Cut-and-sew: a distributed autonomous localization algorithm for 3D surface wireless sensor networks","authors":"Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, S. Xia","doi":"10.1145/2491288.2491301","DOIUrl":"https://doi.org/10.1145/2491288.2491301","url":null,"abstract":"Location awareness is imperative for a variety of sensing applications and network operations. Although a diversity of GPS-less and GPS-free solutions have been developed recently for autonomous localization in wireless sensor networks, they primarily target at 2D planar or 3D volumetric settings. There exists unique and fundamental hardness to extend them to 3D surface. The contributions of this work are twofold. First, it proposes a theoretically-proven algorithm for the 3D surface localization problem. Seeing the challenges to localize general 3D surface networks and the solvability of the localization problem on single-value (SV) surface, this work proposes the {em cut-and-sew} algorithm that takes a divide-and-conquer approach by partitioning a general 3D surface network into SV patches, which are localized individually and then merged into a unified coordinates system. The algorithm is optimized by discovering the minimum SV partition, an optimal partition that creates a minimum set of SV patches. Second, it develops practically-viable solutions for real-world sensor network settings where the inputs are often noisy. The proposed algorithm is implemented and evaluated via simulations and experiments in an indoor testbed. The results demonstrate that the proposed cut-and-sew algorithm achieves perfect 100% localization rate and the desired robustness against measurement errors.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Xie, Qun A. Li, X. Chen, Sanglu Lu, Daoxu Chen
{"title":"Continuous scanning with mobile reader in RFID systems: an experimental study","authors":"Lei Xie, Qun A. Li, X. Chen, Sanglu Lu, Daoxu Chen","doi":"10.1145/2491288.2491290","DOIUrl":"https://doi.org/10.1145/2491288.2491290","url":null,"abstract":"In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. Through our model, we have designed very efficient algorithms to maximize the time-efficiency and energy-efficiency by adjusting the reader's power and moving speed. Our experiments show that our algorithms can reduce the total scanning time by 50% and the total energy consumption by 83% compared to the prior solutions.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Navid Abedini, Swetha Sampath, Rajarshi Bhattacharyya, Suman Paul, S. Shakkottai
{"title":"Realtime streaming with guaranteed QoS over wireless D2D networks","authors":"Navid Abedini, Swetha Sampath, Rajarshi Bhattacharyya, Suman Paul, S. Shakkottai","doi":"10.1145/2491288.2491308","DOIUrl":"https://doi.org/10.1145/2491288.2491308","url":null,"abstract":"We consider a group of co-located wireless peer devices that desire to synchronously receive a live content stream. The devices are each equipped with an expensive unicast base-station-to-device (B2D) interface, as well as a broadcast device-to-device (D2D) interface over a shared medium. The stream is divided into blocks, which must be played out soon after their initial creation. If a block is not received within a specific time after its creation, it is rendered useless and dropped. The blocks in turn are divided into random linear coded chunks to facilitate sharing across the devices. We transform the problem into the two questions of (i) deciding which peer should broadcast a chunk on the D2D channel at each time, and (ii) how long B2D transmissions should take place for each block. We analytically develop a provably-minimum-cost algorithm that can ensure that QoS targets can be met for each device. We study its performance via simulations, and present an overview of our implementation on Android phones using the algorithm as a basis.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Han, Liu Xiang, Jun Luo, Mingjun Xiao, Liusheng Huang
{"title":"Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks","authors":"K. Han, Liu Xiang, Jun Luo, Mingjun Xiao, Liusheng Huang","doi":"10.1145/2491288.2491326","DOIUrl":"https://doi.org/10.1145/2491288.2491326","url":null,"abstract":"Because data dissemination is crucial to Wireless Sensor Networks (WSNs), its energy-efficiency and reliability are of paramount importance. While achieving these two goals together is highly non-trivial, the situation is exacerbated if WSN nodes are duty-cycled (DC) and their transmission power is adjustable. In this paper, we study the problem of minimizing the expected total transmission power for reliable data dissemination (multicast/broadcast) in DC-WSNs. Due to the NP-hardness of the problem, we design efficient approximation algorithms with provable performance bounds for it.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging","authors":"Pinaki Sarkar, B. K. Rai, Aritra Dhar","doi":"10.1145/2491288.2491329","DOIUrl":"https://doi.org/10.1145/2491288.2491329","url":null,"abstract":"Key management, one of the most challenging problems in Wireless Sensor Network (WSN) has been efficiently addressed using Key Predistribution (KPD) schemes. This paper analyzes a localized KPD based on the Transversal Design (TD) design or Reed Solomon (RS) codes schemes; later two shown to be similar. They lack full direct communications among their constituent nodes and so, rely on multi-hop involving other nodes reducing the overall efficiency of the system. The communication issue for TD or RS and hence the localized KPD gets resolved by Deterministic Merging of exactly two nodes. The weakness of `selective node attack' of the merged designs, similar to their original KPDs, is overcome by invoking the novel trick of Sarkar emph{et al.} Simulation results confirm that the various network parameters of the proposed schemes improves significantly over a random counterpart among other existing schemes.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116664349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcelo G. Almiron, Olga Goussevskaia, A. Loureiro, J. Rolim
{"title":"Connectivity in obstructed wireless networks: from geometry to percolation","authors":"Marcelo G. Almiron, Olga Goussevskaia, A. Loureiro, J. Rolim","doi":"10.1145/2491288.2491306","DOIUrl":"https://doi.org/10.1145/2491288.2491306","url":null,"abstract":"In this work, we analyze an alternative model for obstructed wireless networks. The model is based on a grid structure of one-dimensional street segments and two-dimensional street intersections. This structure provides a realistic representation of a variety of network scenarios with obstacles and, at the same time, allows a simple enough analysis, which is partly based on percolation theory and partly based on geometric properties. We propose three different ways of modeling the geometric part of the network and derive analytical bounds for the connectivity probability and the critical transmission range for connectivity in the network. Finally, we present extensive simulations that demonstrate that our analytical results provide good approximations, especially for high density scenarios.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximizing network throughput with minimal remote data transfer cost in unreliable wireless sensor networks","authors":"Xu Xu, W. Liang, X. Jia, Wenzheng Xu","doi":"10.1145/2491288.2491315","DOIUrl":"https://doi.org/10.1145/2491288.2491315","url":null,"abstract":"In this paper we consider the use of a link-unreliable wireless sensor network for remote monitoring, where the monitoring center is geographically located far away from the region of the deployed sensor network. The sensing data is transferred to the monitoring center by the third party communication service, which incurs service cost. We first formulate a novel optimization problem of maximizing the network throughput with minimal service cost, which is shown to be NP-hard. We then develop approximation algorithms. We finally evaluate the performance of the proposed algorithms by simulations. Experimental results demonstrate that the solutions delivered by proposed algorithms are fractional to the optimum.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qute: quality-of-monitoring aware sensing and routing strategy in wireless sensor networks","authors":"Shaojie Tang, Jie Wu","doi":"10.1145/2491288.2491311","DOIUrl":"https://doi.org/10.1145/2491288.2491311","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used to monitor the physical environment. In a highly redundant sensor network, sensor readings from nearby sensors often have high similarity. In this work, we are interested in how to decide an appropriate sensing rate for each sensor node, in order to maximize the overall Quality-of-Monitoring (QoM), while ensuring that all readings can be transmitted to the sink. Note that a feasible sensing rate allocation should satisfy both energy constraint on each sensor node and flow conservation through the network. In order to capture the statistical correlations among sensor readings, we first introduce the concept of correlation graph. The correlation graph is further decomposed into several correlation components, and sensor readings from the same correlation component are highly correlated. For each correlation component, we defined a general utility function to estimate the QoM. The utility function of each correlation component is a non-decreasing submodular function of the total sensing rates allocated to that correlation component. Then we formulate the QoM-aware sensing rate allocation problem as a utility maximization problem under limited power supply on each node. To tackle this problem, we adopted an efficient algorithm, called Qute, by jointly considering both the energy constraint on each node and flow conservation through the network. Under some settings, we analytically show that Qute can find the optimal QoM-aware sensing rate allocation which achieves the maximum total utility. We conducted extensive testbed verifications of our schemes, and experimental results validate our theoretical results.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristic function of connectivity with obstacles","authors":"Yun Wu, Xinbing Wang","doi":"10.1145/2491288.2491314","DOIUrl":"https://doi.org/10.1145/2491288.2491314","url":null,"abstract":"Previous works usually simplify the network area as a disk, a square or a torus without obstacles. However, geometry in practical environment is much more intricate. Rectilinear communication between nodes is often blocked by external surroundings, such as buildings and mountains. Complicated shapes of the obstacles may cause the computation intractable. In this paper, we propose a characteristic function of connectivity to capture the geometric features of an ad-hoc network. The function can be expressed as power series, of which the orders and coefficients is based on the characteristics of the network. We formulate the shapes with fundamental factors and investigate their algebraic impact on connectivity. The critical transmission range is also calculated to mitigate the influence of obstacles.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}