2014 IEEE International Conference on Distributed Computing in Sensor Systems最新文献

筛选
英文 中文
Dimensioning of Wireless Sensor and Actuator Networks for Guaranteed Delivery Time 保证交货时间的无线传感器和执行器网络尺寸
P. Suriyachai
{"title":"Dimensioning of Wireless Sensor and Actuator Networks for Guaranteed Delivery Time","authors":"P. Suriyachai","doi":"10.1109/DCOSS.2014.48","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.48","url":null,"abstract":"Wireless sensor and actuator network (WSAN) applications are used in many critical scenarios. For instance, upon receiving an over-threshold pressure value, the control station of a gas separation plant issues a command to corresponding actuators to close gas valves to prevent a fire accident. In such control-loop systems, messages must be transported reliably within a tight deadline. This paper presents two components: a new network dimensioning method and a simple MAC protocol, to support control-loop systems in WSANs. The dimensioning method is used to specify the worst-case network topology, traffic and node forwarding rates prior to a network deployment. The MAC protocol is designed to ensure that the specifications and design assumptions are not violated in a subsequent deployment. The experimental evaluation clearly indicates that messages are delivered within the guaranteed delay bound.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS 面向能量的CPS认证协议漏洞分析
Priyanka D. Harish, Swapnoneel Roy
{"title":"Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS","authors":"Priyanka D. Harish, Swapnoneel Roy","doi":"10.1109/DCOSS.2014.52","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.52","url":null,"abstract":"In this work we compute the energy generated by modular exponentiation, a widely used powerful tool in password authentication protocols for cyber physical systems. We observe modular exponentiation to be an expensive operation in terms of energy consumption in addition to be known to be computationally intensive. We then analyze the security and energy consumption an advanced smart card based password authentication protocol for cyber physical systems, that use modular exponentiation. We devise a generic cryptanalysis method on the protocol, in which the attacker exploits the energy and computational intensive nature of modular exponentiation to a perform denial of service (DoS) attack. We also show other similar protocols to be vulnerable to this attack. We then suggest methods to prevent this attack.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Dual-Sensor Enabled Indoor Localization System with Crowdsensing Spot Survey 基于众感点测量的双传感器室内定位系统
Chi Zhang, Jun Luo, Jianxin Wu
{"title":"A Dual-Sensor Enabled Indoor Localization System with Crowdsensing Spot Survey","authors":"Chi Zhang, Jun Luo, Jianxin Wu","doi":"10.1109/DCOSS.2014.14","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.14","url":null,"abstract":"We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field. Combining the two techniques, MaWi not only achieves a high localization accuracy, but also effectively reduces human labor in building fingerprint databases: to avoid war-driving, MaWi is designed to work with low quality fingerprint databases that can be efficiently built by only one person. Our experiments demonstrate that MaWi, with a fingerprint database as scarce as one data sample at each spot, outperforms the state-of-the-art proposals working on a richer fingerprint database.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Optimizing router nodes placement for designing distributed sensor networks 分布式传感器网络设计中的路由器节点布局优化
M. Mozumdar, A. Ganesan, Alireza Ameri Daragheh
{"title":"Optimizing router nodes placement for designing distributed sensor networks","authors":"M. Mozumdar, A. Ganesan, Alireza Ameri Daragheh","doi":"10.1109/DCOSS.2014.46","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.46","url":null,"abstract":"Designing a distributed wireless sensor network can be a difficult effort without using simulation tools. These tools should provide a robust and efficient solution for the problem with quick response time. However, available simulation tools for designing wireless sensor networks are very limited. Authors in [1] proposed an interactive design tool based on Dijkstra's algorithm which can assist rapid design of sensor network. However, it has a very high execution time when the network size is relatively large, i.e. n 50. Moreover, it produces a suboptimal solution with large number of router nodes. In this paper, we present efficient and robust synthesis algorithms which exclusively reduce run time for large networks as much as 1000% and also produce a synthesized network with a reduced number of router nodes as much as 150% in comparison to similar previous works.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Successive Group Decoding to Mitigate Interference in Wireless Systems 减少无线系统干扰的最优连续组解码
O. Abu-Ella, M. Elmusrati
{"title":"Optimal Successive Group Decoding to Mitigate Interference in Wireless Systems","authors":"O. Abu-Ella, M. Elmusrati","doi":"10.1109/DCOSS.2014.42","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.42","url":null,"abstract":"In this paper we aim to assess the performance of the optimal successive group decoder (OSGD) in the wireless interference channel (IC) for different scenarios using wide range of testing metrics. Therefore, we inspect the capability of OSGD to mitigate interference, also, we evaluate its minimum required energy per bit under specific quality of service (QoS) constraints. This paper explores the performance of the OSGD in different SNR environments, using several transmit-receive multiple-input multiple-output (MIMO) antenna configurations. The obtained numerical results of this paper show that OSGD technique exhibits very efficient performance to cope with interference in the investigated scenarios, proving its competency comparing to the most developed interference cancellation approaches.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126514726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlashTrack: A Fast, In-network Tracking System for Sensor Networks FlashTrack:用于传感器网络的快速网络内跟踪系统
Hao Jiang, Jiannan Zhai, J. Hallstrom
{"title":"FlashTrack: A Fast, In-network Tracking System for Sensor Networks","authors":"Hao Jiang, Jiannan Zhai, J. Hallstrom","doi":"10.1109/DCOSS.2014.24","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.24","url":null,"abstract":"We revisit the classic object tracking problem with a novel and effective, yet straightforward distributed solution for resource-lean devices. The difficulty of object tracking lies in the mismatch between the limited computational capacity of typical sensor nodes and the processing requirements of typical tracking algorithms. In this paper, we introduce an in-network system for tracking mobile objects using resource-lean sensors. The system is based on a distributed, dynamically-scoped tracking algorithm which alters the event detection region and reporting rate based on object speed. A leader node records the detected samples across the event region and estimates the object's location in situ. We study the performance of our tracking implementation on an 80-node test bed. The results show that it achieves high performance, even for very fast objects, and is readily implemented on resource-lean sensors. While the area is well-studied, the unique combination of algorithmic features represents a significant addition to the literature.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"11 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Near-Optimal Deterministic Steiner Tree Maintenance in Sensor Networks 传感器网络的近最优确定性Steiner树维护
Gokarna Sharma, C. Busch
{"title":"Near-Optimal Deterministic Steiner Tree Maintenance in Sensor Networks","authors":"Gokarna Sharma, C. Busch","doi":"10.1145/2854155","DOIUrl":"https://doi.org/10.1145/2854155","url":null,"abstract":"We consider the group communication maintenance problem between a set of k mobile agents that are tracked by a static sensor network. We develop a scalable deterministic distributed algorithm for maintaining a Steiner tree of the agents so that group communication between them can be provided in the minimum cost possible. The main idea is that our algorithm maintains a virtual tree of mobile agents which can be immediately converted to an actual Steiner tree at all times. Our algorithm achieves the Steiner tree with total length at most O (log k) times the length of the minimum Steiner tree in the constant-doubling graph model. The total communication cost (messages) to maintain the Steiner tree is only O (min {log n, log D}) times the optimal communication cost, where n and D, respectively, are the number of nodes and the diameter of the network. We also develop improved algorithms for the k-center, sparse aggregation, and distributed matching problems. Experimental evaluation results show the benefits of our algorithms compared to previous algorithms. These four problems are NP-hard and, to the best of our knowledge, our algorithms are the first near-optimal deterministic algorithms for maintaining approximate solutions to these problems with low maintenance costs in a distributed setting.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of PIR Sensor Deployment in Critical Area Surveillance Networks 关键区域监控网络中PIR传感器部署的性能评估
Serkan Akbas, Mehmet Akif Efe, S. Özdemir
{"title":"Performance Evaluation of PIR Sensor Deployment in Critical Area Surveillance Networks","authors":"Serkan Akbas, Mehmet Akif Efe, S. Özdemir","doi":"10.1109/DCOSS.2014.56","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.56","url":null,"abstract":"In recent years, wireless sensor networks offer cost effective solutions to various surveillance and tracking applications with the developments in sensor techniques. In many of these applications, sensor nodes that are equipped with directional sensors and they operate autonomously in unattended environments. The deployment strategy of directional sensor nodes is critical to improve target detection and tracking accuracy. In this paper, deployment of passive infrared motion (PIR) sensors is analyzed in terms of coverage issue. A PIR Sensor Deployment (PSD) problem is addressed using deployment schemes that are based on computational geometry. Finally, the performance of deployment schemes is evaluated in a Java based simulation environment.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Energy Efficient Handover in HetNets Using IEEE 802.21 基于IEEE 802.21的HetNets节能切换
Gurkan Coskun, Ibrahim Hökelek, H. A. Çırpan
{"title":"Energy Efficient Handover in HetNets Using IEEE 802.21","authors":"Gurkan Coskun, Ibrahim Hökelek, H. A. Çırpan","doi":"10.1109/DCOSS.2014.51","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.51","url":null,"abstract":"Along with the widespread usage of mobile devices supporting multiple radio interfaces, users can connect to the mobile operator's network using different access technologies such as UMTS, WLAN and WiMAX/LTE. Depending on the network conditions and the QoS requirements of users, the usage of the right technology at the right time can provide more effective networking with higher data rate, lower cost, longer battery duration, and higher coverage area. To enable this networking effectiveness, a seamless handover mechanism to minimize service disruption is required. IEEE 802.21, which defines a set of standards for media independent handover, is capable of realizing both horizontal and vertical handovers. In this paper, a new algorithm is proposed to provide energy efficient handovers among UMTS, WiMAX, and WLAN networks. The proposed algorithm is implemented within the IEEE 802.21 framework and its performance analysis is performed using the ns-2.29 simulator. Simulation results show that the proposed algorithm significantly increases the service duration and hence decreases packet losses by dynamically changing the video downloading rate according to handover decisions and the remaining battery power levels.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical Data BASN生成医疗数据安全共享的鲁棒水印技术
V. Goudar, M. Potkonjak
{"title":"A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical Data","authors":"V. Goudar, M. Potkonjak","doi":"10.1109/DCOSS.2014.22","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.22","url":null,"abstract":"As remote health monitoring BASN technology matures and begins to proliferate, several issues related to the secure sharing of the resulting medical electronic data have come to the fore. This includes the need to provide the data owner (BASN user / patient) and the data consumers (healthcare providers, insurance companies, medical research facilities) secure control over the medical data as it is shared between these various stakeholders. In this paper, we focus on three secure sharing use-cases: proof of ownership, wherein the data owner must prove that she/he is the originator of the data, data tracking, wherein the data owner must trace unauthorized sharing of her/his bio signal data, and content authentication, wherein the data owner must prove whether the bio signal data has been maliciously altered. To address these use-cases, we develop a robust watermarking technique to embed security information into bio signal data such that the semantic fidelity of the data is unaffected, the bio-signal waveforms are altered imperceptibly, and the watermark is not easily corrupted, recovered or spoofed by malicious data consumers. Based on experimentally collected datasets from a gait-stability monitoring BASN, we show that our watermarking technique can robustly and effectively embed up to 1000 bit watermarks under these constraints.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信