2008 Fourth International Conference on Wireless Communication and Sensor Networks最新文献

筛选
英文 中文
Decentralised clustered and hash based intrusion detection system for wireless sensor networks 基于散列和分散集群的无线传感器网络入侵检测系统
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772676
S. Patel, K. Pandey, V. Rathod
{"title":"Decentralised clustered and hash based intrusion detection system for wireless sensor networks","authors":"S. Patel, K. Pandey, V. Rathod","doi":"10.1109/WCSN.2008.4772676","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772676","url":null,"abstract":"Looking at the future of the wireless sensor networks and the applications which are likely to be deployed on it, the security is now becoming an evident feature. Lot many security architectures are proposed, but looking to the energy and memory constraints, the implementation still demands good amount of research. The simpler way seems is, to detect the intruder as early as possible and take the corrective steps for damage control. Here we propose an improved secured hash based IDS strategy using deployment knowledge. This knowledge and strategy can be used to prevent exterior and interior intruders using one way spatial and temporal hash functions.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performability and survivability analysis of GSM GSM的性能和生存性分析
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772710
N. Purohit, S. Tokekar
{"title":"Performability and survivability analysis of GSM","authors":"N. Purohit, S. Tokekar","doi":"10.1109/WCSN.2008.4772710","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772710","url":null,"abstract":"The concept of performability takes into accounts both availability and performance of a system [1][2] and survivability is broadly defined as the degree to which a system is able to provide critical services [3]. The ideal survivability goal is to make a network failure imperceptible to the users by providing service continuity and minimizing network congestion. This paper addresses above issues for a Global System for Mobile (GSM) network. There exist many failure scenarios in GSM networks like base transreceiver station (BTS) failure, VLR, HLR or other database failure etc. When a BTS stops all functioning, it is designated as BTS failure which is primarily considered in developing models and further analysis. Markov models have been developed for accessing the performance, availability and survivability of GSM with a scheme developed for minimizing the impact of failure. Its merits over ordinary GSM network are established in terms of performability and various attributes of survivability following general framework discussed in [Yun Liu and Trivedi, 2003].","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of space-time trellis codes with receive antenna selection 接收天线选择时空格码的性能分析
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772700
A. Hiwale, Ashok A. Ghatol, S. Bhad
{"title":"Performance analysis of space-time trellis codes with receive antenna selection","authors":"A. Hiwale, Ashok A. Ghatol, S. Bhad","doi":"10.1109/WCSN.2008.4772700","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772700","url":null,"abstract":"This paper discusses the performance analysis of multi-antennas systems with receive antenna selection over quasistatic fading channels. In performing the analysis with antenna selection, the selection criterion adopted is based on selecting best Nr antennas out of the available NR receive antennas such that the instantaneous signal-to-noise ratio (SNR) at the receiver is maximized. It is assumed that the total number of transmit antennas, NT = 2, are equal to or greater than the total number of receive antennas. From the analysis it is shown that the resulting diversity order with antenna selection is maintained as that of full complexity system, however the coding gain deteriorates in proportion with reduced number of receive antennas. The results obtained with antenna selection with NR = 2 and NR = 3 multi-antenna systems are compared.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed energy efficient routing in ad hoc networks 自组织网络中的分布式节能路由
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772674
R. Joshi, P. Rege
{"title":"Distributed energy efficient routing in ad hoc networks","authors":"R. Joshi, P. Rege","doi":"10.1109/WCSN.2008.4772674","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772674","url":null,"abstract":"Ad hoc networks are non-infrastructure networks consisting of mobile nodes. Since the mobile nodes have limited battery power, it is very important to use energy efficiently in ad hoc networks. In order to maximize the lifetime of an ad hoc network, traffic should be sent via a route that can avoid nodes with low energy while minimizing the total transmission power. In addition, considering that the nodes of ad hoc networks are mobile, on-demand routing protocols are preferred for ad hoc networks. Existing power-aware routing algorithm need to be modified to meet the requirement of energy efficient routing and also this on demand protocol should be addressing mobility issue. In this paper we propose a novel on-demand power aware routing algorithm, DEEAR (Distributed Energy-efficient AODV Routing) protocol. DEEAR prolongs the network lifetime by compromising between minimum energy consumption and fair energy consumption without additional control packets. DEEAR also improves network throughput as well as improvement in data packet delivery ratio.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Length-based anchor-free distributed localization in a covered sensor network 覆盖传感器网络中基于长度的无锚点分布式定位
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772686
B. Sau, K. Mukhopadhyaya
{"title":"Length-based anchor-free distributed localization in a covered sensor network","authors":"B. Sau, K. Mukhopadhyaya","doi":"10.1109/WCSN.2008.4772686","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772686","url":null,"abstract":"Centralized localization dissipates a lot of energy in pooling the proximity information of the individual nodes. In contrast a distributed algorithm usually uses only local information at each node. Most localization algorithms available in the literature are are anchor based or they estimate the position of the sensors at the cost of losing accuracy. In this paper, we propose an anchor-free length-based distributed localization technique under a restricted model which solves a specialized case of this problem. The model assumes that all known distances between the sensors are less than the communication range of the sensors and all unknown distances are greater. We also assume that communication range is at least twice as much as the sensing range. Every point in the field of interest is assumed to be covered by some sensor. Each sensor localizes some of its neighbours with information from its neighbours. Each node communicates information for localization to its neighbours only; thus reducing traffic over the network. We also show that, the time required to localize all sensors uniquely under this model is linear in the number of sensors.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125222040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Spectrum hand-off schemes and optimum utilization of spectrum holes in cognitive radio networks 认知无线电网络中频谱切换方案及频谱空穴的优化利用
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772707
C. Viz, S. Udgata
{"title":"Spectrum hand-off schemes and optimum utilization of spectrum holes in cognitive radio networks","authors":"C. Viz, S. Udgata","doi":"10.1109/WCSN.2008.4772707","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772707","url":null,"abstract":"Two main problems in wireless communications are (1) limited available spectrum and (2) inefficiency in the spectrum allocation policy. These problems lead to the blocking of both initial and hand-off calls. We propose a spectrum allocation scheme in two phases. In the first phase, a collision between two calls for spectral band allocation is resolved. In second phase, spectral band allocation among a number of calls is considered. The main objective for the schemes is to minimize the forced termination of hand-off calls and an opportunistic spectrum channel allocation is achieved by assigning different priority levels to different calls.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart vibration sensor with wireless communication for recording & analyzing Train Vibration 具有无线通信的智能振动传感器,用于记录和分析列车振动
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772695
A. Dubey, A. Verma
{"title":"Smart vibration sensor with wireless communication for recording & analyzing Train Vibration","authors":"A. Dubey, A. Verma","doi":"10.1109/WCSN.2008.4772695","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772695","url":null,"abstract":"High-speed trains are one of the most impressive developments of the recent years having brought a new degree of comfort for travelers. These train posed serious accidents because of the high level of vibration, which they can generate. In the present paper a smart vibration sensor is developed which is a self-sensation device equipped with recording and wireless communication interface. One programmed microcontroller 89C52 is used, which record vibration of trains with real time into memory.There is certain limit of vibrations, which is acceptable by track. Beyond this limit track can be damaged and may result major casualty.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure path loss prediction using fuzzy logic approach 基于模糊逻辑的安全路径损失预测
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772717
A. Gupta, S.C. Sharma, Sandip Vijay, V. Gupta
{"title":"Secure path loss prediction using fuzzy logic approach","authors":"A. Gupta, S.C. Sharma, Sandip Vijay, V. Gupta","doi":"10.1109/WCSN.2008.4772717","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772717","url":null,"abstract":"Efficiency of present path loss models suffers when they are used in the environment other than for which they have been designed. The aim of this paper is to propose the predicting the path loss with the field measurement models and represent them in a more convenient form for the proposed fuzzy logic modeling. This paper proposes method to predict path loss for correct location of base station in cellular mobile communication systems using fuzzy logic. The propagation medium is classified in to several well-established propagation environments defined as a fuzzy set such as free space, flat area terrain, light vegetation terrain, heavy vegetation terrain, and village terrain. A unique mean path loss exponent (n) is assigned to each propagation environment, which is established by means of the experimental. Fuzzy logic is used to determine ldquonrdquo number for an unknown environment, which will be obtained using linguistic rules that provide a fine-tuning of the known propagation environments. HATA model proposed by M. Hata has been used for the present analysis.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security topology in wireless sensor networks with routing optimisation 基于路由优化的无线传感器网络安全拓扑
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772673
M. Ismail, M. Y. Sanavullah
{"title":"Security topology in wireless sensor networks with routing optimisation","authors":"M. Ismail, M. Y. Sanavullah","doi":"10.1109/WCSN.2008.4772673","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772673","url":null,"abstract":"Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A new algorithm of encryption in non-cooperation IFF system 非合作敌我识别系统中的一种新的加密算法
2008 Fourth International Conference on Wireless Communication and Sensor Networks Pub Date : 2008-12-01 DOI: 10.1109/WCSN.2008.4772696
Ya Zhang, Bo Li, Shizhong Li
{"title":"A new algorithm of encryption in non-cooperation IFF system","authors":"Ya Zhang, Bo Li, Shizhong Li","doi":"10.1109/WCSN.2008.4772696","DOIUrl":"https://doi.org/10.1109/WCSN.2008.4772696","url":null,"abstract":"The technology of identification of friend or foe(IFF) has been extensively applied in the information warfare with the development of science and technology. The Algorithm of dynamic encryption based on current date as seed, two times operation to the seed by two groups of keys, is put in Non-Cooperation IFF system in this paper, which data quantity is smaller and security, reliability, confidentiality also could meet the need of requirement, so it fit high dynamic and high mobility weapon system.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信