Ahmed A Elbery Nti, M. Bahnasy, Nosier, Egypt Bnosier@nti Sci Nti, Z. Ibrahim, Morsi
{"title":"Swift Start TCP, Problems, Modification, Analytical and Simulation Studies","authors":"Ahmed A Elbery Nti, M. Bahnasy, Nosier, Egypt Bnosier@nti Sci Nti, Z. Ibrahim, Morsi","doi":"10.1109/SENSORCOMM.2008.144","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.144","url":null,"abstract":"BBN Technologies designed an algorithm called Swift Start for TCP to mitigate the start up problem. Some drawbacks face that algorithm. This paper introduces a modification to that algorithm then it will evaluate the modified swift start TCP congestion control algorithm analytically and by simulation and then it will compare between its performance with that of slow start TCP and the original swift start in different network bandwidths and different path delay for single stream and multiple simultaneous streams.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115681595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks","authors":"G. Murphy, E. Popovici, W. Marnane","doi":"10.1109/SENSORCOMM.2008.38","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.38","url":null,"abstract":"This paper presents a versatile public-key cryptographic processor suitable for wireless sensor networks which uses minimal hardware resources while maintaining high flexibility. The processor architecture is scalable and all hardware configurations support arbitrary bit-lengths and domain parameters. The tradeoffs between hardware area and timing for the public-key operations are demonstrated on the FPGA layer of the 25 mm Tyndall mote.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125542465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DVD: A Secure Unicast Based Pairwise Key Generation Scheme for Wireless Sensor Networks","authors":"V. Kumar, D. Acharya","doi":"10.1109/SENSORCOMM.2008.125","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.125","url":null,"abstract":"Secure communications among large numbers of wireless sensor nodes that are randomly scattered in an environment is necessary to avoid unauthorized access to data. Secure communication among sensor nodes requires pairwise key distribution prior to the actual data transmission. In this work, we consider pairwise key generation and distribution problem in wireless sensor networks where large amount of resource limited wireless sensor nodes are randomly scattered around. Unlike most other schemes, our scheme does not require the sensor nodes to broadcast and store a key chain in their memory from a universal key space. The individual and the common pair wise keys are generated and unicasted inside the network. Simulation and results indicate that there is a significant decrease in the transmission cost and storage cost by the sensor nodes.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierre de Leusse, P. Periorellis, P. Watson, A. Maierhofer
{"title":"Secure & Rapid Composition of Infrastructure Services in the Cloud","authors":"Pierre de Leusse, P. Periorellis, P. Watson, A. Maierhofer","doi":"10.1109/SENSORCOMM.2008.130","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.130","url":null,"abstract":"A fundamental ambition of grid and distributed systems is to be capable of sustaining evolution and allowing for adaptability ((F. Losavio et al., 2002), (S. Radhakrishnan, 2005)). Furthermore, as the complexity and sophistication of theses structures increases, so does the need for adaptability of each component. One of the primary benefits of service oriented architecture (SOA) is the ability to compose applications, processes or more complex services from other services which increases the capacity for adaptation. This document proposes a novel infrastructure composition model that aims at increasing the adaptability of the capabilities exposed through it by dynamically managing their non functional requirements.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Kerasiotis, T. Stoyanova, A. Prayati, G. Papadopoulos
{"title":"A Topology-Oriented Solution Providing Accuracy for Outdoors RSS-Based Tracking in WSNs","authors":"F. Kerasiotis, T. Stoyanova, A. Prayati, G. Papadopoulos","doi":"10.1109/SENSORCOMM.2008.122","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.122","url":null,"abstract":"As tracking applications for moving objects become more challenging, demands for accurate and reliable tracking methods using wireless sensor networked devices increase. The use of received signal strength (RSS) of the propagated signals, provided by most sensor radios, is the popular means of achieving such a task. Despite the great RSS variation, which may result in inaccurate estimation of the mobile object position, the advantage is that RSS does not require any additional hardware as in cases like radar and ultrasound techniques and may lower the cost and the size of WSN devices. Parameters such as height from the ground and distance between nodes are examined for their impact on RSS in outdoor environments using the Tmote-Sky platform. Optimal parameter ranges are derived for solving major problems caused by node mobility as well as fading and reflection phenomena of the propagated signal.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gniadek, Yunfeng Li, Chung-Horng Lung, Qing Wei
{"title":"A Web Services-Based Infrastructure for Traffic Monitoring Using ZigBee","authors":"A. Gniadek, Yunfeng Li, Chung-Horng Lung, Qing Wei","doi":"10.1109/SENSORCOMM.2008.55","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.55","url":null,"abstract":"This paper presents our experience in building an infrastructure of combining ZigBee with Web services for remote accessing and control of a network. A prototype traffic monitoring system was implemented based on this infrastructure as a proof-of-concept. However there is a much wider range of applications for this infrastructure. Currently, the infrastructure mainly concerns with the information delivery within the network. A multi-layer architecture was designed and implemented so that the infrastructure can be flexible and extensible for multiple applications. Within the infrastructure, the access points send data collected from the wireless sensor network to the application server. The data is then stored in a database on the application server for fast and reliable transactions. Users may then request certain data through a Web Service, or the data could be automatically delivered to the subscribers which are driven by specific events. The result of this preliminary work is an extensible application framework for information delivery over a large and low-cost ZigBee sensor network, and Web services platform.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129861732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Networks Power-Aware Deployment","authors":"L. Barboni, M. Valle","doi":"10.1109/SENSORCOMM.2008.48","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.48","url":null,"abstract":"Wireless sensor networks (WSNs) are composed by battery supplied nodes. Node lifetime is defined as the time when the node works properly, before battery depletion. Distances between nodes determine the required radio output power level to ensure reliable connectivity among them, affecting then the node battery current consumption. If some node runs out, it could make unreliable network function. For this, it is important to implement a deployment which assures longer node lifetime; however, this problem is a very constrained and non-lineal one. In this paper, we propose a heuristic algorithm for searching network deployments. The algorithm predicts number of nodes, nodes distances and nodes output power level in order to give a deployment that reaches maximum battery lifetime and compliant with user specifications.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reverse Engineering Approach for the Web Service Modeling Ontology Specifications","authors":"H. E. Bouhissi, M. Malki, D. Bouchiha","doi":"10.1109/SENSORCOMM.2008.126","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.126","url":null,"abstract":"Semantic Web services (SWS) are the result of the evolution of the syntactic definition of Web services and the semantic Web. Several solutions were proposed for the specification of the semantic web services such as OWL-S (ontology Web language for services) and WSMO (Web service modeling ontology). However, these technologies require a human user intervention to select and choose the required services. We propose an approach to create service ontology with WSMO specifications starting from WSDL (Web service language description) by using the reverse engineering techniques. Reverse engineering aims to extract several types of information of existing software and to employ them for comprehension, renovation as well as maintenance of the system.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Sensor Networks with Distributed Intelligence Using Java RMI","authors":"A. Induruwa, M. Christian","doi":"10.1109/SENSORCOMM.2008.70","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.70","url":null,"abstract":"Measuring sensors are typically unintelligent. An intelligent monitoring and control system adds the necessary levels of intelligence so that sensors can be read and their behaviour can be controlled. The modern programmable embedded systems provide a cost effective yet powerful means of building distributed sensor networks for monitoring and control systems. When combined with the programmatic strengths of Java RMI and Oracle RDBMS, these embedded systems can be turned into powerful distributed sensor networks. This paper demonstrates the integration of several technologies including programmable Web enabled embedded systems, Java RMI Callback features, Oracle RDBMS and the Internet to provide a solution to the problem of monitoring and controlling unintelligent measuring sensors/instruments. The addition of the Oracle backend allows for long term storage of captured data that can be queried using standard SQL and used later, for example in carrying out trend analysis.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TDMA Protocol Requirements for Wireless Sensor Networks","authors":"Victor Cionca, T. Newe, V. Dădârlat","doi":"10.1109/SENSORCOMM.2008.69","DOIUrl":"https://doi.org/10.1109/SENSORCOMM.2008.69","url":null,"abstract":"TDMA is probably the best choice for an energy efficient multiple access protocol for wireless sensor networks. As such there exist many approaches of increased complexity, using different algorithms and combining information from other layers or multiple access techniques. There are many surveys detailing the protocols and their advantages and disadvantages, but we feel that they don't give a general image of TDMA techniques, which would be useful in choosing the protocol for a network deployment, or even for someone trying to develop a new MAC protocol. We analyze the different algorithms used in TDMA protocols and we present a list of characteristics that a robust TDMA protocol requires. We also give a brief survey of several protocols.","PeriodicalId":359452,"journal":{"name":"2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122258097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}