International Symposium on Wireless and pervasive Computing (ISWPC)最新文献

筛选
英文 中文
A scheme to reduce merging collisions in TDMA-based VANETs 基于tdma的vanet中减少合并碰撞的一种方案
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-12-01 DOI: 10.1109/ISWPC.2013.6707435
Jeng-Ji Huang, Yu-Shiang Chiu
{"title":"A scheme to reduce merging collisions in TDMA-based VANETs","authors":"Jeng-Ji Huang, Yu-Shiang Chiu","doi":"10.1109/ISWPC.2013.6707435","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707435","url":null,"abstract":"It is well known that a time division multiple access (TDMA)-based medium access control (MAC) is advantageous in many aspects in vehicular ad hoc networks (VANETs). These include its ability to prevent the hidden-terminal problem, and the guarantee of strict quality-of-service (QoS) for providing real-time applications. However, time slot assignments to vehicles could suffer from an unstable problem, called merging collisions. This problem is due mainly to the changing network topology of a VANET, which can be characterized by vehicles joining into or leaving from a cluster of vehicles. In this paper, we focus on the problem of unstable time slot assignments facing several existing TDMA approaches, and a scheme is proposed to effectively alleviate this problem.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
QoS control over the power saving in 3GPP LTE advanced wireless networks 3GPP LTE高级无线网络节能的QoS控制
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-12-01 DOI: 10.1109/ISWPC.2013.6707436
Jeng-Ji Huang, Ting-Han Kuo, Tzu-Han Chen, Chen-Ju Yang
{"title":"QoS control over the power saving in 3GPP LTE advanced wireless networks","authors":"Jeng-Ji Huang, Ting-Han Kuo, Tzu-Han Chen, Chen-Ju Yang","doi":"10.1109/ISWPC.2013.6707436","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707436","url":null,"abstract":"The power saving operation, called discontinuous reception (DRX), in Third-Generation Partnership Project (3GPP) Long-Term Evolution Advanced (LTE Advanced) has recently been discussed in many studies. However, most of them focus only on the first moments, i.e. means, of interested performance metrics such as power-saving factor, transmission delay, etc. In order to gain full quality of service (QoS) control for real-time applications, it is imperative to obtain the distribution function of, in particular, the transmission delay. Thus, in this paper, extensive simulations are performed to examine the effects of various DRX parameters on the distribution function of the transmission delay.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116468589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Polynomial time approximation scheme for t-latency bounded information propagation problem in heterogeneous wireless networks 异构无线网络中t延迟有界信息传播问题的多项式时间逼近方法
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707432
R. Rafiq, R. Farhan, M. S. Rahman
{"title":"Polynomial time approximation scheme for t-latency bounded information propagation problem in heterogeneous wireless networks","authors":"R. Rafiq, R. Farhan, M. S. Rahman","doi":"10.1109/ISWPC.2013.6707432","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707432","url":null,"abstract":"In a network sometimes we need to propagate information within a given time period t, which is called t-latency. Any node that accepts information from the other nodes will start transmitting that information if it satisfies the required conditions of the protocol that is in use. In a t-latency bounded information propagation problem, we need to find a minimal set of nodes that will start to transmit information initially so that the whole set of nodes can start transmitting within the given time period, t. In this paper we provide an approximation scheme for a t-latency bounded information propagation problem in heterogeneous wireless networks and we are the first to propose such scheme. We also derive the approximation ratio of our scheme and show that the ratio is bounded by a factor ε which is constant for a particular network.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121832316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs 基于高效TDMA的VANETs自适应数据分发虚拟后退算法
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707447
Amit Dua, Neeraj Kumar, S. Bawa, N. Chilamkurti
{"title":"Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs","authors":"Amit Dua, Neeraj Kumar, S. Bawa, N. Chilamkurti","doi":"10.1109/ISWPC.2013.6707447","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707447","url":null,"abstract":"With an exponential growth of Internet related technologies, there is an emergence of new class of efficient data dissemination using Vehicular Ad Hoc networks for the safety of peoples. As there are limited number of channels in IEEE 802.11 a/b/g/p standards, so efficient mechanisms are required to allocate the same for new incoming requests from the users. Keeping in view of the same, we propose a modified TDMA based virtual back off algorithm for VANETs. Vehicles are assumed to be arrived using Poisson distribution and served as exponential. By varying the distance from RSUs, we have provided the analysis of end-to end delay for varying speed of vehicles.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122760877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System 基于云信任管理系统的参与式感知中Sybil攻击检测
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707448
Shih-Hao Chang, Yeong-Sheng Chen, Shin-Ming Cheng
{"title":"Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System","authors":"Shih-Hao Chang, Yeong-Sheng Chen, Shin-Ming Cheng","doi":"10.1109/ISWPC.2013.6707448","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707448","url":null,"abstract":"Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Cloud based Trust Management Scheme (CbTMS) framework for detecting Sybil attacks in participatory sensing network. Our CbTMS was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Establishing secured communications in cluster based wireless sensor networks 在基于集群的无线传感器网络中建立安全通信
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707426
Q. Mamun, M. Islam, M. Kaosar
{"title":"Establishing secured communications in cluster based wireless sensor networks","authors":"Q. Mamun, M. Islam, M. Kaosar","doi":"10.1109/ISWPC.2013.6707426","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707426","url":null,"abstract":"The security of wireless sensor networks (WSNs) is a big challenge due to their resource-constraint nature. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present a secured key management scheme adopted on cluster based topology of sensor network. The proposed scheme uses partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. The scheme outperforms other random key pre-distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal spectrum sensing framework with interference constraint in cognitive radio networks 认知无线电网络中具有干扰约束的最优频谱感知框架
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707442
Hyuk Wu, Dong-Jun Lee, Changtaek Shin
{"title":"Optimal spectrum sensing framework with interference constraint in cognitive radio networks","authors":"Hyuk Wu, Dong-Jun Lee, Changtaek Shin","doi":"10.1109/ISWPC.2013.6707442","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707442","url":null,"abstract":"In cognitive radio networks, several research works on optimal spectrum sensing framework have addressed maximization of throughput of secondary users under constraints on interference incurred to primary user signal. When a plausible statistical modeling of primary user signal is given, the amount of interference to primary user signal can be estimated and used to produce the optimal spectrum sensing and data transmission time. However, previous works on this area have some flaws in the modeling of interference to primary user signal. In this study we apply more accurate modeling of primary user signal to the spectrum sensing framework. Our method uses Chapman-Kolmogorov equation to model the behavior of primary user signal in a certain instant and derive the optimal spectrum sensing framework. Numerical results show that the proposed method results in higher throughput of secondary users than previous methods.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An in-vehicle communication scheme for multi-system integration 一种多系统集成的车载通信方案
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707427
Chih-Chiang Kuo, Jyun-Naih Lin, S. Wu, Cheng-Hsuan Cho, Yi-Hong Chu, F. C. Tsai
{"title":"An in-vehicle communication scheme for multi-system integration","authors":"Chih-Chiang Kuo, Jyun-Naih Lin, S. Wu, Cheng-Hsuan Cho, Yi-Hong Chu, F. C. Tsai","doi":"10.1109/ISWPC.2013.6707427","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707427","url":null,"abstract":"With more and more devices being introduced into vehicles to provide additional driving functionality, driving experience is seemingly getting more complex and frustrated due to an influx of individual messages. To help manage the information, we need a mechanism to orchestrate the operations of the in-vehicle devices so that such frustration can be eased. In this study, we propose an in-vehicle communication scheme for multi-system integration, where an effective system service discovery protocol is used. This proposed design also contains mutual communication methods and the data exchange methodologies for system integration. Experimental results with data analysis demonstrate the success of the proposed design.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A RFID QoS mechanism for IoT tracking applications 用于物联网跟踪应用的RFID QoS机制
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707429
Rafael Perazzo Barbosa Mota, D. Batista
{"title":"A RFID QoS mechanism for IoT tracking applications","authors":"Rafael Perazzo Barbosa Mota, D. Batista","doi":"10.1109/ISWPC.2013.6707429","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707429","url":null,"abstract":"In this paper, we propose a mechanism that reduces useless responses for RFID systems in the Internet of Things (IoT) environment, for tracking applications. The mechanism achieves its objectives by reducing the number of packets exchanged between readers and tags. We analyze the behavior of our proposal by considering the average number of identification rounds. With extensive simulations using an RFID module for the ns-2 simulator, we show the benefit of the proposed mechanism. When compared to the Pure Q Algorithm and Binary Tree Slotted Aloha, our mechanism reduces the number of packets up to 43%, which is a good result in terms of performance of IoT applications and energy consumption of the devices used in the communications.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129917800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance comparison of collision resolution algorithms with amount of feedback information 具有反馈信息量的碰撞分辨算法性能比较
International Symposium on Wireless and pervasive Computing (ISWPC) Pub Date : 2013-11-01 DOI: 10.1109/ISWPC.2013.6707439
N. Wattanamongkhol
{"title":"Performance comparison of collision resolution algorithms with amount of feedback information","authors":"N. Wattanamongkhol","doi":"10.1109/ISWPC.2013.6707439","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707439","url":null,"abstract":"This paper presents the performance comparison of eight collision resolution algorithms. It can be systematically applied for random access protocols under different feedback information which includes binary, ternary and feedback of the number of accessing packets. Each algorithm is derived from the combination of uniform selection algorithm and three effective strategies, including splitting, adaptive frame size, and skipped slot. This paper aims to investigate which one strategy in these three strategies is the best effective to improve the system performance. Based on simulation results, when the information about number of accessing packets is available, significant improvement in mean access delay can be achieved. We found that the splitting strategy is the most effective strategy, following by adaptive frame size and skipped slot.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130172265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信