IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.最新文献

筛选
英文 中文
A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks 基于aodv的移动自组织网络自适应入侵检测方法
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542870
S. Kurosawa, Hidehisa Nakayama, N. Kato, A. Jamalipour, Y. Nemoto
{"title":"A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks","authors":"S. Kurosawa, Hidehisa Nakayama, N. Kato, A. Jamalipour, Y. Nemoto","doi":"10.1109/MAHSS.2005.1542870","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542870","url":null,"abstract":"Mobile ad hoc networks (MANET) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network attacks and therefore the security is a more significant issue than in infrastructure-type wireless networks. In these networks, it is difficult to identify malicious hosts, as the topology of the network changes dynamically. A malicious host can easily interrupt a route for which the malicious host is one of the forming nodes in the communication path. In the literature, there are several proposals to detect such malicious host inside the network. In those methods usually a baseline profile is defined in accordance to static training data and then they are used to verify the identity and the topology of the network, thus avoiding any malicious host to be joined in the network. Since the topology of a MANET is dynamically changing, use of a static profile is not efficient. In this paper, we propose a new intrusion detection scheme based on a learning process, so that the training data can be updated at particular time intervals. The simulation results show the effectiveness of the proposed technique compared to conventional schemes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Predictive protocol management with contingency planning for wireless sensor networks 基于应急计划的无线传感器网络预测协议管理
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542790
I. Howitt, John C. Stamper, A. Raja, Verghese Mappillai
{"title":"Predictive protocol management with contingency planning for wireless sensor networks","authors":"I. Howitt, John C. Stamper, A. Raja, Verghese Mappillai","doi":"10.1109/MAHSS.2005.1542790","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542790","url":null,"abstract":"Wireless sensor networks (WSN) are a subset of wireless networking applications focused on enabling sensor and actuator connectivity without the use of wires. Energy consumption among the wireless devices participating in these networks is a major constraint on the deployment for a broad range of applications enabled by WSNs. This paper introduces, for the first time, a novel methodology based on predictive protocol management with contingency planning (PPM and CP). This approach allows efficient update of the WSN operational mode in order to optimize the energy utilization based on the time varying characteristics of the radio-frequency (RF) in which the network operates","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC layer support for group communication in wireless sensor networks MAC层支持无线传感器网络中的组通信
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542824
Rong L. Zheng, L. Sha, W. Feng
{"title":"MAC layer support for group communication in wireless sensor networks","authors":"Rong L. Zheng, L. Sha, W. Feng","doi":"10.1109/MAHSS.2005.1542824","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542824","url":null,"abstract":"In this paper, we investigate the problem of providing efficient communication primitives across domains of wireless sensor network (WSN) applications. We argue both qualitatively and quantitatively that group communication among sensors of geographic proximity is one of the basic building blocks of many WSN applications. Furthermore, group communication awareness needs to be embedded and implemented at the MAC layer due to the broadcast nature of wireless medium. We devise a MAC protocol, called LGC-MAC to enable efficient single-hop one-to-many and many-to-one communication. We present case studies of two example applications, acoustic target tracking and propagation of information with feedback using LGC-MAC and demonstrate that LGC-MAC can improve the response time, alleviate channel contention and provide better fault tolerance to packet collisions and wireless errors","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A reliable routing protocol design for wireless sensor networks 一种可靠的无线传感器网络路由协议设计
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542774
Yanjun Li, Jiming Chen, Ruizhong Lin, Zhi Wang
{"title":"A reliable routing protocol design for wireless sensor networks","authors":"Yanjun Li, Jiming Chen, Ruizhong Lin, Zhi Wang","doi":"10.1109/MAHSS.2005.1542774","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542774","url":null,"abstract":"Many routing protocols have been proposed for wireless sensor networks in recent years. For some special applications, not only energy aware but link reliable is needed. Historical link status should be captured while making routing decisions. In this paper, we design a reliable link quality estimation based routing protocol (LQER), which integrates the approach of minimum hop field and (m, k). The performance of LQER is evaluated by simulation experiments to be more energy-aware, with lower loss rate and better scalability than MHFR (Z. Ma and Y. Sun, 2004) and MCR (F. Ye et al., 2001). Thus the whole network may obtain longer lifetime and better link quality","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An energy-efficient unequal clustering mechanism for wireless sensor networks 一种高效的无线传感器网络不均匀聚类机制
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542849
Chengfa Li, Mao Ye, Guihai Chen, Jie Wu
{"title":"An energy-efficient unequal clustering mechanism for wireless sensor networks","authors":"Chengfa Li, Mao Ye, Guihai Chen, Jie Wu","doi":"10.1109/MAHSS.2005.1542849","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542849","url":null,"abstract":"Clustering provides an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques, selecting cluster heads with more residual energy and rotating cluster heads periodically, to distribute the energy consumption among nodes in each cluster and extend the network lifetime. However, they rarely consider the hot spots problem in multihop wireless sensor networks. When cluster heads cooperate with each other to forward their data to the base station, the cluster heads closer to the base station are burdened with heavy relay traffic and tend to die early, leaving areas of the network uncovered and causing network partition. To address the problem, we propose an energy-efficient unequal clustering (EEUC) mechanism for periodical data gathering in wireless sensor networks. It partitions the nodes into clusters of unequal size, and clusters closer to the base station have smaller sizes than those farther away from the base station. Thus cluster heads closer to the base station can preserve some energy for the inter-cluster data forwarding. We also propose an energy-aware multihop routing protocol for the inter-cluster communication. Simulation results show that our unequal clustering mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114116318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 755
Efficient multicasting in multi-hop ad hoc networks using directional antennas 定向天线在多跳自组织网络中的高效多播
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542856
Ravindra Vaishampayan, J. Garcia-Luna-Aceves, K. Obraczka
{"title":"Efficient multicasting in multi-hop ad hoc networks using directional antennas","authors":"Ravindra Vaishampayan, J. Garcia-Luna-Aceves, K. Obraczka","doi":"10.1109/MAHSS.2005.1542856","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542856","url":null,"abstract":"We present the Protocol for multicasting over directional antennas (MODA) for mobile ad hoc networks (MANET). MODA is the first protocol for MANET's that uses directional antennas to reduce data packet overhead. Without increasing energy consumption, MODA increases the range of transmission as a result of which fewer nodes are involved in the forwarding process, which results in a reduction in data packet overhead. Using simulations in Qualnet 3.5, we compare MODA with PUMA and ODMRP. The results from a wide range of scenarios of varying mobility, group members, number of senders, traffic load, and number of multicast groups show that MODA attains comparable packet delivery ratios to ODMRP and PUMA, while incurring far less overhead","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"582 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security and trust assurances for smart environments 智能环境的安全与信任保障
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542804
S. Naqvi, M. Riguidel
{"title":"Security and trust assurances for smart environments","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/MAHSS.2005.1542804","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542804","url":null,"abstract":"Smart sensor networks increasingly become viable solutions to many challenging problems and will successively be employed in many areas in the near future. However, deploying a new technology without security and trust issues in mind has often proved to be unreasonably dangerous. We propose a security and trust vision for these smart environments. This paper provides the details of the concepts of Infospheres and security domains which lead to the phenomenon of virtualization of security services. We propose virtual-to-virtual (V2V) paradigm to solve the security and trust problems of the smart environments","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121505103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy conserving multicast for MANET with swarm intelligence 基于群智能的MANET节能组播
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542864
C. Jaikaeo, V. Sridhara, Chien-Chung Shen
{"title":"Energy conserving multicast for MANET with swarm intelligence","authors":"C. Jaikaeo, V. Sridhara, Chien-Chung Shen","doi":"10.1109/MAHSS.2005.1542864","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542864","url":null,"abstract":"The paper describes a distributed energy-conserving multicast routing protocol, termed ECMANSI, which makes use of the biological metaphor of swarm intelligence to create the multicast structure. ECMANSI adopts a core-based approach by establishing connectivity among the group members through a designated core node. Each node explores a better path with lesser transmission power to the core, which results in an energy efficient multicast structure. Results from extensive simulations have validated the efficiency of the protocol","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125705566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Efficient pairwise key establishment and management in static wireless sensor networks 静态无线传感器网络中有效的密钥配对建立与管理
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542842
Yi Cheng, D. Agrawal
{"title":"Efficient pairwise key establishment and management in static wireless sensor networks","authors":"Yi Cheng, D. Agrawal","doi":"10.1109/MAHSS.2005.1542842","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542842","url":null,"abstract":"Key establishment and management is the core of security protocols for wireless sensor networks deployed in the hostile environment. Due to the strict resource constraints, traditional asymmetric key cryptosystems, such as public/private key based schemes, are infeasible for large-scale wireless sensor networks. Research shows that pre-distributing pairwise keys into wireless sensor nodes before deployment is a practical way to deal with the key establishment problem. Existing random key based key pre-distribution schemes only provide probabilistic connectivity of the network and some level of network resilience. In this paper, we propose an efficient pairwise key establishment and management scheme to achieve both network connectivity and resilience for static wireless sensor networks. Compared with current key pre-distribution schemes, our scheme supports large network size, and has lower communication and computational overhead","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131977417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
A cross-layer approach to service discovery and selection in MANETs 一种跨层的服务发现与选择方法
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542832
Alex Varshavsky, B. Reid, E. D. Lara
{"title":"A cross-layer approach to service discovery and selection in MANETs","authors":"Alex Varshavsky, B. Reid, E. D. Lara","doi":"10.1109/MAHSS.2005.1542832","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542832","url":null,"abstract":"When a service is offered by multiple servers in a mobile ad hoc network (MANETs), the manner in which clients and servers are paired together, referred to as service selection, is crucial to network performance. Good service selection groups clients with nearby servers, localizing communication, which in turn reduces inter-node interference and allows for multiple concurrent transmissions in different parts of the network. Although much previous research has concentrated on service discovery in MANETs, not much effort has gone into understanding the effects of service selection. This paper demonstrates that service selection in MANETs has profound implications for network performance. Specifically, we show that effective service selection can improve network throughput by up to 400%. We show that to maximize performance service selection decisions need to be continuously reassessed to offset the effects of topology changes. We argue that effective service selection in MANETs requires a cross-layer approach that integrates service discovery and selection functionality with network ad hoc routing mechanisms. The cross-layer approach leverages existing routing traffic and allows clients to switch to better servers as network topology changes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信