2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop最新文献

筛选
英文 中文
VANET mobility modeling challenged by feedback loops 反馈回路对VANET机动性建模的挑战
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970499
Martin Meyer, Ó. Trullols-Cruces, A. Hess, K. Hummel, J. Barceló-Ordinas, C. Casetti, G. Karlsson
{"title":"VANET mobility modeling challenged by feedback loops","authors":"Martin Meyer, Ó. Trullols-Cruces, A. Hess, K. Hummel, J. Barceló-Ordinas, C. Casetti, G. Karlsson","doi":"10.1109/Med-Hoc-Net.2011.5970499","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970499","url":null,"abstract":"VANET applications are often providing street traffic information to vehicles and drivers, regarding, for instance, traffic conditions and parking space availability. This information influences in turn the driving behavior in real-world settings. Mobility models used in current VANET simulations are mostly ignoring this feedback entirely. In cases the feedback is included, it is mainly based on ad-hoc approaches with lack of generality.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A centralized inter-network resource sharing (CIRS) scheme in IEEE 802.22 cognitive networks IEEE 802.22认知网络中的集中式网络间资源共享(CIRS)方案
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970487
C. Passiatore, P. Camarda
{"title":"A centralized inter-network resource sharing (CIRS) scheme in IEEE 802.22 cognitive networks","authors":"C. Passiatore, P. Camarda","doi":"10.1109/Med-Hoc-Net.2011.5970487","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970487","url":null,"abstract":"IEEE 802.22 is a standard for Wireless Regional Area Network (WRAN) based on cognitive radio techniques. It allows sharing of geographically unused spectrum allocated to the Television Broadcast Service, without causing harmful interference to the licensed users. An open issue in cognitive 802.22 networks is represented by the resource distribution among WRANs. The contribution of this paper is a resource sharing algorithm which assigns resources to overlapped WRANs in such a way to avoid harmful interference among them. Specifically, we propose a collision free resource sharing method which, working in a multichannel environment, aims to assign band to the coexisting WRANs, satisfying their spectrum demand and determining a fair spectrum scheduling. The novel method adapts to the continuous changes of the spectrum availability due to necessity of vacating a channel in case of the incumbent primary users or otherwise due to the addition of unused band. Moreover, the introduced allocation scheme takes into account the issue of spatial diversity, i.e. the case where some channels do not spatially cover all the WRANs. The effectiveness of the proposed multichannel resource sharing scheme is proved through simulations, and the results, compared with other methods already known in literature, show that the algorithm makes a resource assignment which satisfies the requests and improve the use of the available channels, increasing the spectral efficiency.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Green wireless networking: Three questions 绿色无线网络:三个问题
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970491
M. Marsan, M. Meo
{"title":"Green wireless networking: Three questions","authors":"M. Marsan, M. Meo","doi":"10.1109/Med-Hoc-Net.2011.5970491","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970491","url":null,"abstract":"In this short note we briefly discuss three issues related to the relevance and the possible impact of research in the field of green networking, with special attention to the wireless case, since this is the context where energy efficiency is needed most.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A compiler assisted approach for component based reconfigurable MAC design 一种编译器辅助的基于组件的可重构MAC设计方法
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970480
J. Ansari, Xi Zhang, P. Mähönen
{"title":"A compiler assisted approach for component based reconfigurable MAC design","authors":"J. Ansari, Xi Zhang, P. Mähönen","doi":"10.1109/Med-Hoc-Net.2011.5970480","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970480","url":null,"abstract":"Cognitive radio networks require reconfiguration and adaptivity in order to efficiently meet the changing application demands and network conditions. We have developed a framework which allows composition of MAC protocols using a library of MAC components [1]. These components are implemented with a hardware-software co-design approach so as to satisfy the timeliness requirements as well as to provide the desired degree of flexibility. A domain specific MAC language and corresponding MAC-meta compiler toolchain is developed to realize highly dynamic and reconfigurable MAC solutions using the MAC components. The prototype implementation on WARP [2] SDR boards indicates that our approach eases the MAC development without compromising on the performance characteristics as compared to the monolithic way of implementing MAC protocols.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uisce: Characteristic-based routing in mobile ad hoc networks 移动自组织网络中基于特征的路由
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970476
Guoxian Yang, S. Weber
{"title":"Uisce: Characteristic-based routing in mobile ad hoc networks","authors":"Guoxian Yang, S. Weber","doi":"10.1109/Med-Hoc-Net.2011.5970476","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970476","url":null,"abstract":"The goal of communication in computer networks is the delivery of information to endpoints with certain properties. In wired networks, identities such as IP addresses are used to guide information through a network and the properties of network nodes are mapped to these identities by service discovery mechanisms. In mobile ad hoc networks (MANETs), identities lose their guiding ability because of the dynamism of the topology.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulative performance evaluation of the simTD Self Organizing Traffic Information System simTD自组织交通信息系统仿真性能评价
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970497
D. Eckhoff, Tobias Gansen, R. Mänz, Daniel Thum, Oliver Klages, C. Sommer
{"title":"Simulative performance evaluation of the simTD Self Organizing Traffic Information System","authors":"D. Eckhoff, Tobias Gansen, R. Mänz, Daniel Thum, Oliver Klages, C. Sommer","doi":"10.1109/Med-Hoc-Net.2011.5970497","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970497","url":null,"abstract":"The simTD (Safe and Intelligent Mobility: Test Field Germany) research project is another step towards bringing Car-to-X technology to marketability. One of its envisioned applications is a Traffic Information System (TIS) based on self-generated maps for vehicles not equipped with digital maps. To assure reliable operation, the function itself, its performance and the effect of its input parameters was simulatively evaluated before it was validated on real vehicles. In this paper we demonstrate how to adequately parameterize and evaluate such a TIS. We find feasible values for the input parameters for the creation of self-generated maps to ensure solid operation of the function. We further contribute to the community and other projects using similar TIS deployments by introducing applicable metrics for TIS evaluation in general and show our findings for the simTD research project.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient distributed privacy-preserving recommendation system 一个高效的分布式隐私保护推荐系统
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970495
Frederik Armknecht, T. Strufe
{"title":"An efficient distributed privacy-preserving recommendation system","authors":"Frederik Armknecht, T. Strufe","doi":"10.1109/Med-Hoc-Net.2011.5970495","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970495","url":null,"abstract":"Implementing a recommendation system on the data of mobile social networks exploits knowledge about behavior and preferences of its users and hence raises serious privacy concerns. Leveraging the wealth of aggregated information in these services promises an immense benefit by allowing suggestions for presumably appreciated, yet previously unseen restaurants, sights, and further types of locations. Privacy preserving recommenders based on homomorphic encryption have been proposed, which have a systematic draw-back: while recommender systems often store their information as real values, all homomorphic encryption schemes used today process only data from other algebraic structures, e.g., the ring of integers modulo some integer n. Therefore, we present a novel distributed recommender and a homomorphic encryption scheme, which works directly on real numbers and which possesses some remarkable properties: it is conceptually simple, efficient, and provably secure.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115829980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols 动态帧aloha协议的性能:缩小与树协议的差距
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970500
L. Barletta, F. Borgonovo, M. Cesana
{"title":"Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols","authors":"L. Barletta, F. Borgonovo, M. Cesana","doi":"10.1109/Med-Hoc-Net.2011.5970500","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970500","url":null,"abstract":"The Dynamic-Frame-Aloha protocol, largely studied in the 60s in the field of random access satellite systems, is nowadays commonly applied also to Radio Frequency Identification systems to orchestrate the transmissions from the tags to the reader. In a nutshell, tags respond to reader's interrogation in slots randomly chosen in a frame whose size is dynamically set by the reader according to the current backlog (remaining tags to be resolved). In this paper, we explore the performance of the DFA protocol under Poisson-distributed population of tags when different strategies are adopted in setting the frame length and estimating the traffic backlog. We further analytically characterize the best strategy in the two cases where the frame is entirely explored or a new frame can be restarted at any slot.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
HRAN: Heat routing protocol for Ad-Hoc Networks HRAN: Ad-Hoc网络的热路由协议
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970479
J. Trindade, T. Vazão
{"title":"HRAN: Heat routing protocol for Ad-Hoc Networks","authors":"J. Trindade, T. Vazão","doi":"10.1109/Med-Hoc-Net.2011.5970479","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970479","url":null,"abstract":"In this paper we propose a new routing protocol for large scale Mobile Adhoc Networks, named HRAN. The protocol supports large networks, requires few resources from devices and lowers the control message overhead associated with discovering new routes. It works by simulating the paradigm of heat trails in a physical environment through the use of bloom filters. In our protocol each node emits a certain quantity of heat and as the node moves a heat trail is formed. After a node leaves a location the heat from surrounding nodes slowly dissipates. This heat information is then used to guide routing queries from the source to the destination.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128697274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers 基于移动读写器的限能RFID系统中人在和路由分流攻击
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop Pub Date : 2011-06-12 DOI: 10.1109/Med-Hoc-Net.2011.5970494
L. Galluccio, G. Morabito, Marco Catania
{"title":"Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers","authors":"L. Galluccio, G. Morabito, Marco Catania","doi":"10.1109/Med-Hoc-Net.2011.5970494","DOIUrl":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970494","url":null,"abstract":"Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信