{"title":"State-based key management scheme for wireless sensor networks","authors":"Jaemin Park, Z. Kim, Kwangjo Kim","doi":"10.1109/MAHSS.2005.1542877","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542877","url":null,"abstract":"In wireless sensor networks, the random key pre-distribution arises as the practical solution for sharing common keys between sensor nodes. Since sensor networks suffer from the resource constraints like limited memory space, key pre-distribution scheme should require less memory space as possible while supporting strong security strength, i.e., high resilience against node capture. However, the existing schemes still require a large number of keys for each sensor to carry. Although location information is facilitated as deployment knowledge for improvement, if two sensor nodes closely located each other have very low probability to be in active-state at the same time, unnecessary key assignments can be happened since keys shared only between them may be hardly used. In this paper, we propose a novel random key pre-distribution scheme that exploits new deployment knowledge, state of sensors, to avoid unnecessary key assignments and reduce the number of required keys that each sensor node should carry while supporting higher connectivity and better resilience against node captures. The analysis of our proposed scheme shows the better performance and security strength than the previous schemes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A link-quality and congestion-aware cross layer metric for multi-hop wireless routing","authors":"Golnaz Karbaschi, A. Fladenmuller","doi":"10.1109/MAHSS.2005.1542855","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542855","url":null,"abstract":"Wireless networks suffer from random variations in channel and network condition. This leads to poor performance in multi-hop wireless networks specially with a conventional non-flexible routing. To cope with instability of wireless links, a cross-layer routing that supports adaptivity and optimization across lower layers of protocol stack is needed. Cross layer routing intends to play an essential role in improving the performance of wireless networks but requires a careful attention on the choice of the metric. In this paper we propose a new link-quality and congestion aware metric for multi-hop wireless routing which is obtained from MAC layer. We show that still having a path with reasonable length our proposed metric improves the performance of routing in terms of end-to-end delay and throughput in comparison to minimum-hop count metric","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Simon, Leijun Huang, Emerson Farrugia, Sanjeev Setia
{"title":"Using multiple communication channels for efficient data dissemination in wireless sensor networks","authors":"R. Simon, Leijun Huang, Emerson Farrugia, Sanjeev Setia","doi":"10.1109/MAHSS.2005.1542829","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542829","url":null,"abstract":"This paper presents McTorrent and McSynch, two multichannel sensor network protocols for data dissemination. Both protocols are designed to take advantage of the spatial multiplexing properties of the half-duplex radio transceivers available on the current generation of sensor nodes. McTorrent is used for reliable end-to-end dissemination of a large data object. Compared to existing protocols, we show that McTorrent significantly reduces the amount of time required to propagate a large data object throughout a sensor network. McSynch is used to achieve data object synchronization within a local cluster of nodes. By using a scheduled channel access approach and an appropriate number of transmission channels, McSynch can significantly reduce the amount of time required to update a local cluster. We also describe our experiences implementing a multichannel system, and report on lessons learned for channel and frequency settings","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical approach to deploy large scale wireless sensor networks","authors":"Mike Sheldon, Deji Chen, M. Nixon, A. Mok","doi":"10.1109/MAHSS.2005.1542806","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542806","url":null,"abstract":"In a wireless sensor network, a sensor measures environmental data. It also relays data for other sensors. While sensing workload is the same among sensors, relaying workload differs. Sensors closer to the data sink carry more data traffic. This becomes more prominent as the network scales up. The drawback of this is that nodes in the network degrade unevenly and the network ages in a non-uniform way. This paper seeks the ways to deploy the network so that the workload is evenly distributed, thus the network overall behavior degrades in a smooth fashion. Assuming that the sensors should be evenly deployed within the monitored area, we look at the approach where a set of more powerful nodes are designated for data relaying. We look at the approach to deploy relaying nodes that are easy to implement in practice. In particular, we select sub-regions to deploy relaying nodes at calculated density. We propose a simple method where the density is simply based on the size of the area whose data is relayed by these nodes","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographical cluster based multihop ad hoc network routing with guaranteed delivery","authors":"Hannes Frey","doi":"10.1109/MAHSS.2005.1542838","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542838","url":null,"abstract":"Exploring the faces of a planar graph is a prominent approach to recover from routing failures which may occur during geographic greedy forwarding heuristics applied in multihop ad hoc networks. A recently studied variant of planar graph based recovery, termed geographical cluster based routing, performs face exploration along the edges of an overlay graph instead of using the network links directly. For this routing variant it has been observed, that there exist node placements which result in a connected physical network while any planar overlay graph which is constructed by simply removing edges from that graph is disconnected. This article for the first time describes a technique to locally construct an overlay graph which is both planar and connected. In addition we present a generic routing framework which is based on the overlay graph introduced in this work. In contrast to existing planar graph routing techniques the described framework allows major flexibility regarding the possible next hop candidate nodes. The framework is envisioned to serve as an interesting starting point for future performance measurements of a multitude of its possible instances","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132062199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New non-interactive key agreement and progression (NIKAP) protocols and their applications to security in ad hoc networks","authors":"Zhenjiang Li, J. Garcia-Luna-Aceves","doi":"10.1109/MAHSS.2005.1542873","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542873","url":null,"abstract":"Symmetric cryptographic primitives are preferable in designing security protocols for mobile ad hoc networks (MANETs) because they are computationally affordable for resource-constrained mobile devices forming a MANET. Most proposed key-distribution and key-agreement schemes for symmetric cryptosystem assume services from on-line centralized authorities, or require the interaction between communicating parties. However, the presence of a centralized authority violates the ad hoc definition of MANETs, and interactive schemes require the routing of the ad hoc network to be established before the key agreement, which is difficult to ensure in a mobile ad hoc network (MANET). We propose a new non-interactive key agreement and progression (NIKAP) scheme for MANETs, which does not require an on-line centralized authority, can establish and update pairwise shared keys between any two nodes in a non-interactive manner, is configurable to operate synchronously (S-NIKAP) or asynchronously (A-NIKAP), and is able to provide differentiated security services w.r.t. specified security policies. As the name implies, NIKAP is especially valuable to scenarios in which shared secret keys are desired to be computed without negotiation between nodes over insecure channels, and need to be updated frequently","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive operations for visualization of ad-hoc sensor system domains","authors":"M. Livingston, E. Herbst","doi":"10.1109/MAHSS.2005.1542818","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542818","url":null,"abstract":"Embedded sensors are envisioned to provide information about a variety of environments. One use of sensors is for military intelligence gathering in the field. Typically, these sensors are manually placed in an environment. In order to know whether the appropriate domain is covered by the sensor arrangement, we build an interface that provides visualizations of the sensor domains and coverage. To assist with planning the sensor layout, our new interface allows the user to interactively specify new locations and see the effect on the domain. To verify that line-of-sight communications requirements are met, the visualizations also show the user these relationships. These simple visualizations improve the understanding of the sensor domain. The interactive 3D display gives the user a tool for planning how to best use the available resources to get information","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-demand loop-free routing in ad hoc networks using source sequence numbers","authors":"H. Rangarajan, J. Garcia-Luna-Aceves","doi":"10.1109/MAHSS.2005.1542859","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542859","url":null,"abstract":"In any on-demand routing protocol, sources flood route requests (RREQ) to build routes to destinations, and each new RREQ is identified uniquely with a source-sequenced label (SSL) consisting of the source identifier and a locally generated sequence number. As a RREQ propagates, it creates a directed acyclic graph (DAG), because nodes relay each RREQ only once. We present the first framework for loop-free on-demand routing in ad hoc networks that is based directly on SSLs, rather than on independent mechanisms, which has been the way in which prior on-demand routing protocols have been designed. Extensive simulation results for simple protocol instantiations of our new framework operating in scenarios with 50 and 100-nodes under different traffic patterns show that our new protocols outperform AODV (Ad hoc on demand distance vector), DSR (dynamic source routing), and OLSR (optimized link state routing)","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative spatial multiplexing in mobile ad hoc networks","authors":"S. Kim","doi":"10.1109/MAHSS.2005.1542823","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542823","url":null,"abstract":"We propose a new cooperative relaying technique for delivering high-rate data in mobile ad hoc networks. The proposed approach is to make each relay node to detect only a subset (called sub-stream) of the source data stream and all relay nodes to forward their low rate sub-streams simultaneously over the same physical channel. At the destination, multiple receive antennas or RAKE fingers separate the sub-streams and reassemble them based on their spatial characteristics or spreading codes, respectively. The distinctive benefit of this approach is the reduction of transmit and receive processing requirements on each relay node, while providing significant savings in the overall transmit and receive energy, particularly in the high spectral efficiency regime. Therefore, the proposed approach is particularly attractive in situations where each relay can handle only low-rates due to limited resources in terms of energy, bandwidth, hardware, and space (size). The proposed relaying architecture also provides an additional physical layer security mechanism","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor networks deployment using flip-based sensors","authors":"S. Chellappan, Xiaole Bai, Bin Ma, D. Xuan","doi":"10.1109/MAHSS.2005.1542812","DOIUrl":"https://doi.org/10.1109/MAHSS.2005.1542812","url":null,"abstract":"In this paper, we study the issue of mobility based sensor networks deployment. The distinguishing feature of our work is that the sensors in our model have limited mobilities. More specifically, the mobility in the sensors we consider is restricted to a flip, where the distance of the flip is bounded. Given an initial deployment of sensors in a field, our problem is to determine a movement plan for the sensors in order to maximize the sensor network coverage, and minimize the number of flips. We propose a minimum-cost maximum-flow based solution to this problem. We prove that our solution optimizes both the coverage and the number of flips. We also study the sensitivity of coverage and the number of flips to flip distance under different initial deployment distributions of sensors. We observe that increased flip distance achieves better coverage, and reduces the number of flips required per unit increase in coverage. However, such improvements are constrained by initial deployment distributions of sensors, due to the limitations on sensor mobility","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}