IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.最新文献

筛选
英文 中文
State-based key management scheme for wireless sensor networks 基于状态的无线传感器网络密钥管理方案
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542877
Jaemin Park, Z. Kim, Kwangjo Kim
{"title":"State-based key management scheme for wireless sensor networks","authors":"Jaemin Park, Z. Kim, Kwangjo Kim","doi":"10.1109/MAHSS.2005.1542877","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542877","url":null,"abstract":"In wireless sensor networks, the random key pre-distribution arises as the practical solution for sharing common keys between sensor nodes. Since sensor networks suffer from the resource constraints like limited memory space, key pre-distribution scheme should require less memory space as possible while supporting strong security strength, i.e., high resilience against node capture. However, the existing schemes still require a large number of keys for each sensor to carry. Although location information is facilitated as deployment knowledge for improvement, if two sensor nodes closely located each other have very low probability to be in active-state at the same time, unnecessary key assignments can be happened since keys shared only between them may be hardly used. In this paper, we propose a novel random key pre-distribution scheme that exploits new deployment knowledge, state of sensors, to avoid unnecessary key assignments and reduce the number of required keys that each sensor node should carry while supporting higher connectivity and better resilience against node captures. The analysis of our proposed scheme shows the better performance and security strength than the previous schemes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A link-quality and congestion-aware cross layer metric for multi-hop wireless routing 多跳无线路由的链路质量和拥塞感知跨层度量
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542855
Golnaz Karbaschi, A. Fladenmuller
{"title":"A link-quality and congestion-aware cross layer metric for multi-hop wireless routing","authors":"Golnaz Karbaschi, A. Fladenmuller","doi":"10.1109/MAHSS.2005.1542855","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542855","url":null,"abstract":"Wireless networks suffer from random variations in channel and network condition. This leads to poor performance in multi-hop wireless networks specially with a conventional non-flexible routing. To cope with instability of wireless links, a cross-layer routing that supports adaptivity and optimization across lower layers of protocol stack is needed. Cross layer routing intends to play an essential role in improving the performance of wireless networks but requires a careful attention on the choice of the metric. In this paper we propose a new link-quality and congestion aware metric for multi-hop wireless routing which is obtained from MAC layer. We show that still having a path with reasonable length our proposed metric improves the performance of routing in terms of end-to-end delay and throughput in comparison to minimum-hop count metric","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Using multiple communication channels for efficient data dissemination in wireless sensor networks 在无线传感器网络中利用多种通信通道实现数据的高效传播
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542829
R. Simon, Leijun Huang, Emerson Farrugia, Sanjeev Setia
{"title":"Using multiple communication channels for efficient data dissemination in wireless sensor networks","authors":"R. Simon, Leijun Huang, Emerson Farrugia, Sanjeev Setia","doi":"10.1109/MAHSS.2005.1542829","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542829","url":null,"abstract":"This paper presents McTorrent and McSynch, two multichannel sensor network protocols for data dissemination. Both protocols are designed to take advantage of the spatial multiplexing properties of the half-duplex radio transceivers available on the current generation of sensor nodes. McTorrent is used for reliable end-to-end dissemination of a large data object. Compared to existing protocols, we show that McTorrent significantly reduces the amount of time required to propagate a large data object throughout a sensor network. McSynch is used to achieve data object synchronization within a local cluster of nodes. By using a scheduled channel access approach and an appropriate number of transmission channels, McSynch can significantly reduce the amount of time required to update a local cluster. We also describe our experiences implementing a multichannel system, and report on lessons learned for channel and frequency settings","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A practical approach to deploy large scale wireless sensor networks 一种部署大规模无线传感器网络的实用方法
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542806
Mike Sheldon, Deji Chen, M. Nixon, A. Mok
{"title":"A practical approach to deploy large scale wireless sensor networks","authors":"Mike Sheldon, Deji Chen, M. Nixon, A. Mok","doi":"10.1109/MAHSS.2005.1542806","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542806","url":null,"abstract":"In a wireless sensor network, a sensor measures environmental data. It also relays data for other sensors. While sensing workload is the same among sensors, relaying workload differs. Sensors closer to the data sink carry more data traffic. This becomes more prominent as the network scales up. The drawback of this is that nodes in the network degrade unevenly and the network ages in a non-uniform way. This paper seeks the ways to deploy the network so that the workload is evenly distributed, thus the network overall behavior degrades in a smooth fashion. Assuming that the sensors should be evenly deployed within the monitored area, we look at the approach where a set of more powerful nodes are designated for data relaying. We look at the approach to deploy relaying nodes that are easy to implement in practice. In particular, we select sub-regions to deploy relaying nodes at calculated density. We propose a simple method where the density is simply based on the size of the area whose data is relayed by these nodes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Geographical cluster based multihop ad hoc network routing with guaranteed delivery 基于地理集群的多跳自组网路由保证传输
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542838
Hannes Frey
{"title":"Geographical cluster based multihop ad hoc network routing with guaranteed delivery","authors":"Hannes Frey","doi":"10.1109/MAHSS.2005.1542838","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542838","url":null,"abstract":"Exploring the faces of a planar graph is a prominent approach to recover from routing failures which may occur during geographic greedy forwarding heuristics applied in multihop ad hoc networks. A recently studied variant of planar graph based recovery, termed geographical cluster based routing, performs face exploration along the edges of an overlay graph instead of using the network links directly. For this routing variant it has been observed, that there exist node placements which result in a connected physical network while any planar overlay graph which is constructed by simply removing edges from that graph is disconnected. This article for the first time describes a technique to locally construct an overlay graph which is both planar and connected. In addition we present a generic routing framework which is based on the overlay graph introduced in this work. In contrast to existing planar graph routing techniques the described framework allows major flexibility regarding the possible next hop candidate nodes. The framework is envisioned to serve as an interesting starting point for future performance measurements of a multitude of its possible instances","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132062199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
New non-interactive key agreement and progression (NIKAP) protocols and their applications to security in ad hoc networks 新的非交互式密钥协议和进展(NIKAP)协议及其在自组织网络安全中的应用
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542873
Zhenjiang Li, J. Garcia-Luna-Aceves
{"title":"New non-interactive key agreement and progression (NIKAP) protocols and their applications to security in ad hoc networks","authors":"Zhenjiang Li, J. Garcia-Luna-Aceves","doi":"10.1109/MAHSS.2005.1542873","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542873","url":null,"abstract":"Symmetric cryptographic primitives are preferable in designing security protocols for mobile ad hoc networks (MANETs) because they are computationally affordable for resource-constrained mobile devices forming a MANET. Most proposed key-distribution and key-agreement schemes for symmetric cryptosystem assume services from on-line centralized authorities, or require the interaction between communicating parties. However, the presence of a centralized authority violates the ad hoc definition of MANETs, and interactive schemes require the routing of the ad hoc network to be established before the key agreement, which is difficult to ensure in a mobile ad hoc network (MANET). We propose a new non-interactive key agreement and progression (NIKAP) scheme for MANETs, which does not require an on-line centralized authority, can establish and update pairwise shared keys between any two nodes in a non-interactive manner, is configurable to operate synchronously (S-NIKAP) or asynchronously (A-NIKAP), and is able to provide differentiated security services w.r.t. specified security policies. As the name implies, NIKAP is especially valuable to scenarios in which shared secret keys are desired to be computed without negotiation between nodes over insecure channels, and need to be updated frequently","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Interactive operations for visualization of ad-hoc sensor system domains 用于自组织传感器系统域可视化的交互式操作
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542818
M. Livingston, E. Herbst
{"title":"Interactive operations for visualization of ad-hoc sensor system domains","authors":"M. Livingston, E. Herbst","doi":"10.1109/MAHSS.2005.1542818","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542818","url":null,"abstract":"Embedded sensors are envisioned to provide information about a variety of environments. One use of sensors is for military intelligence gathering in the field. Typically, these sensors are manually placed in an environment. In order to know whether the appropriate domain is covered by the sensor arrangement, we build an interface that provides visualizations of the sensor domains and coverage. To assist with planning the sensor layout, our new interface allows the user to interactively specify new locations and see the effect on the domain. To verify that line-of-sight communications requirements are met, the visualizations also show the user these relationships. These simple visualizations improve the understanding of the sensor domain. The interactive 3D display gives the user a tool for planning how to best use the available resources to get information","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On-demand loop-free routing in ad hoc networks using source sequence numbers 使用源序列号的自组织网络中的按需无环路路由
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542859
H. Rangarajan, J. Garcia-Luna-Aceves
{"title":"On-demand loop-free routing in ad hoc networks using source sequence numbers","authors":"H. Rangarajan, J. Garcia-Luna-Aceves","doi":"10.1109/MAHSS.2005.1542859","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542859","url":null,"abstract":"In any on-demand routing protocol, sources flood route requests (RREQ) to build routes to destinations, and each new RREQ is identified uniquely with a source-sequenced label (SSL) consisting of the source identifier and a locally generated sequence number. As a RREQ propagates, it creates a directed acyclic graph (DAG), because nodes relay each RREQ only once. We present the first framework for loop-free on-demand routing in ad hoc networks that is based directly on SSLs, rather than on independent mechanisms, which has been the way in which prior on-demand routing protocols have been designed. Extensive simulation results for simple protocol instantiations of our new framework operating in scenarios with 50 and 100-nodes under different traffic patterns show that our new protocols outperform AODV (Ad hoc on demand distance vector), DSR (dynamic source routing), and OLSR (optimized link state routing)","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cooperative spatial multiplexing in mobile ad hoc networks 移动自组织网络中的协同空间复用
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542823
S. Kim
{"title":"Cooperative spatial multiplexing in mobile ad hoc networks","authors":"S. Kim","doi":"10.1109/MAHSS.2005.1542823","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542823","url":null,"abstract":"We propose a new cooperative relaying technique for delivering high-rate data in mobile ad hoc networks. The proposed approach is to make each relay node to detect only a subset (called sub-stream) of the source data stream and all relay nodes to forward their low rate sub-streams simultaneously over the same physical channel. At the destination, multiple receive antennas or RAKE fingers separate the sub-streams and reassemble them based on their spatial characteristics or spreading codes, respectively. The distinctive benefit of this approach is the reduction of transmit and receive processing requirements on each relay node, while providing significant savings in the overall transmit and receive energy, particularly in the high spectral efficiency regime. Therefore, the proposed approach is particularly attractive in situations where each relay can handle only low-rates due to limited resources in terms of energy, bandwidth, hardware, and space (size). The proposed relaying architecture also provides an additional physical layer security mechanism","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Sensor networks deployment using flip-based sensors 使用翻转传感器部署传感器网络
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. Pub Date : 2005-12-12 DOI: 10.1109/MAHSS.2005.1542812
S. Chellappan, Xiaole Bai, Bin Ma, D. Xuan
{"title":"Sensor networks deployment using flip-based sensors","authors":"S. Chellappan, Xiaole Bai, Bin Ma, D. Xuan","doi":"10.1109/MAHSS.2005.1542812","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542812","url":null,"abstract":"In this paper, we study the issue of mobility based sensor networks deployment. The distinguishing feature of our work is that the sensors in our model have limited mobilities. More specifically, the mobility in the sensors we consider is restricted to a flip, where the distance of the flip is bounded. Given an initial deployment of sensors in a field, our problem is to determine a movement plan for the sensors in order to maximize the sensor network coverage, and minimize the number of flips. We propose a minimum-cost maximum-flow based solution to this problem. We prove that our solution optimizes both the coverage and the number of flips. We also study the sensitivity of coverage and the number of flips to flip distance under different initial deployment distributions of sensors. We observe that increased flip distance achieves better coverage, and reduces the number of flips required per unit increase in coverage. However, such improvements are constrained by initial deployment distributions of sensors, due to the limitations on sensor mobility","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信