29th Annual IEEE International Conference on Local Computer Networks最新文献

筛选
英文 中文
Walking GPS: a practical solution for localization in manually deployed wireless sensor networks 行走GPS:在手动部署的无线传感器网络定位的实用解决方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.136
R. Stoleru, T. He, J. Stankovic
{"title":"Walking GPS: a practical solution for localization in manually deployed wireless sensor networks","authors":"R. Stoleru, T. He, J. Stankovic","doi":"10.1109/LCN.2004.136","DOIUrl":"https://doi.org/10.1109/LCN.2004.136","url":null,"abstract":"We present the design, implementation and evaluation of a simple, practical and cost effective localization solution, called walking GPS, that can be used in real, manual deployments of wireless sensor networks. We evaluate our localization solution exclusively in real deployments of MICA2 and XSM motes. Our experiments show that 100% of the deployed motes localize (i.e,. have a location position) and that the average localization errors are within 1 to 2 meters, due mainly to the limitations of the existing commercial GPS devices.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122862258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
QoS control scheme guaranteeing the delay, jitter and throughput in the IP router QoS控制方案,保证IP路由器的延迟、抖动和吞吐量
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.99
Rie Fujita, Hiroki Shimabara, H. Tode, T. Masaki, K. Murakami
{"title":"QoS control scheme guaranteeing the delay, jitter and throughput in the IP router","authors":"Rie Fujita, Hiroki Shimabara, H. Tode, T. Masaki, K. Murakami","doi":"10.1109/LCN.2004.99","DOIUrl":"https://doi.org/10.1109/LCN.2004.99","url":null,"abstract":"Recently, various applications have emerged with improvement of the speed and capacity of the Internet. In the future, various types of traffic will co-exist. Thus, it is required to guarantee QoS suitable for the attribute of each traffic. So far, to realize QoS guarantee per flow, we have proposed a class-based output buffer control mechanism, based on autonomous flow management. However, it guarantees only the bandwidth. We expand the function of this mechanism to guarantee delay, jitter and bandwidth. In addition, we show the effectiveness of our proposal by computer simulation.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks 多跳自组织网络中针对合谋恶意节点的协同信任安全路由
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.36
Tirthankar Ghosh, N. Pissinou, K. Makki
{"title":"Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks","authors":"Tirthankar Ghosh, N. Pissinou, K. Makki","doi":"10.1109/LCN.2004.36","DOIUrl":"https://doi.org/10.1109/LCN.2004.36","url":null,"abstract":"The Trust-embedded AODV (T-AODV) routing protocol was designed by us to secure the ad hoc network from independent malicious nodes by finding a secure end-to-end route. In This work we have proposed an extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network. It finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities. In this respect, the solution is unique and, to the best of our knowledge, the first such solution proposed so far. We have shown the efficiency of our protocol by extensive simulation and also analyzed its security by evaluating different threat scenarios.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Collaborative data fusion tracking in sensor networks using Monte Carlo methods 基于蒙特卡罗方法的传感器网络协同数据融合跟踪
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.34
Y. Wong, J. K. Wu, L. Ngoh, L. Wong
{"title":"Collaborative data fusion tracking in sensor networks using Monte Carlo methods","authors":"Y. Wong, J. K. Wu, L. Ngoh, L. Wong","doi":"10.1109/LCN.2004.34","DOIUrl":"https://doi.org/10.1109/LCN.2004.34","url":null,"abstract":"The multi-modality nature of sensor networks and their potentially large-scale deployment have generated highly dimensional network data. This paper proposes a hierarchical collaborative data fusion scheme based on particle filters for cross-sensor fusion and cross-modality fusion for target tracking applications.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ELECTION: energy-efficient and low-latency scheduling technique for wireless sensor networks 选举:无线传感器网络的节能和低延迟调度技术
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.49
S. Begum, Shao-Cheng Wang, B. Krishnamachari, A. Helmy
{"title":"ELECTION: energy-efficient and low-latency scheduling technique for wireless sensor networks","authors":"S. Begum, Shao-Cheng Wang, B. Krishnamachari, A. Helmy","doi":"10.1109/LCN.2004.49","DOIUrl":"https://doi.org/10.1109/LCN.2004.49","url":null,"abstract":"We propose ELECTION, a new sleep scheduling scheme that adaptively schedules the sleep cycles of both communication radios and sensors in wireless active sensor networks. Taking advantage of spatial and temporal correlations in the underlying physical phenomenon, our scheme controls sleeping schedules of radios and sensors, and adaptively meets the energy efficiency, latency and responsiveness needs of applications. During the normal phase of operation, sensors take samples of the environment once at each wakeup time, and based on the perceived environment they adapt their sleep cycles. When an abnormality is perceived from the sampled data, sensors communicate with their neighbors to form a cluster and report to the base station. Analysis and simulation results show that ELECTION outperforms existing protocols significantly in terms of energy savings as well as delay and responsiveness.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125758375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Generic architecture for power aware routing in wireless sensor networks 无线传感器网络中功率感知路由的通用架构
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.61
Rishi Ranjan, A. Saad
{"title":"Generic architecture for power aware routing in wireless sensor networks","authors":"Rishi Ranjan, A. Saad","doi":"10.1109/LCN.2004.61","DOIUrl":"https://doi.org/10.1109/LCN.2004.61","url":null,"abstract":"We describe the design and implementation of a generic architecture to provide a collective solution for power-aware routing to a wide range of problems in wireless sensor network environments. Power aware-routing is integral to the solutions proposed for a variety of wireless sensor network problems. This can lead to challenging technical problems and deployment barriers when attempting to integrate the proposed solutions. We have identified coupling between sources and sinks as the main factor for different design choices for a range of problems. We developed a core-based hierarchical routing framework and protocol for efficient power-aware routing that is used to decouple the sources from sinks. We show the efficiency of our approach via simulation.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A cluster process monitoring tool for intrusion detection: proof-of-concept 用于入侵检测的集群进程监控工具:概念验证
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.1
W. Yurcik, Xin Meng, G. Koenig
{"title":"A cluster process monitoring tool for intrusion detection: proof-of-concept","authors":"W. Yurcik, Xin Meng, G. Koenig","doi":"10.1109/LCN.2004.1","DOIUrl":"https://doi.org/10.1109/LCN.2004.1","url":null,"abstract":"Large-scale commodity cluster systems are finding increasing deployment in academic, research, and commercial settings. As a direct result of this popularity, cluster systems are also under increasing security threats. Unfortunately, there have been no corresponding improvements in security tools that specifically address the unique needs of cluster security. The paper describes an ongoing research effort at the National Center for Supercomputing Applications to develop tools for managing cluster security via process monitoring. We describe an extensible architecture and present details of a prototype process monitoring tool focused on intrusion detection.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Radial coordination for convergecast in wireless sensor networks 无线传感器网络中收敛的径向协调
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.101
Qingfeng Huang, Ying Zhang
{"title":"Radial coordination for convergecast in wireless sensor networks","authors":"Qingfeng Huang, Ying Zhang","doi":"10.1109/LCN.2004.101","DOIUrl":"https://doi.org/10.1109/LCN.2004.101","url":null,"abstract":"Convergecast is frequently used for supporting various tasks in sensor network applications. We investigate the problem of packet loss in the convergecast process in wireless sensor networks due to congestion and collisions near the sink, and propose a simple yet powerful coordinated convergecast protocol for achieving high convergecast reliability. We study the performance of the new protocol via simulation and show the tradeoffs among reliability, latency, throughput and energy consumption. To compare this protocol with other existing convergecast protocols, a real application scenario is used. Simulation shows that this protocol can achieve dramatic improvement in reliability comparing to existing convergecast protocols.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Learning-enforced time domain routing to mobile sinks in wireless sensor fields 无线传感器领域移动sink的学习强制时域路由
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.71
Pritam Baruah, Rahul Urgaonkar, B. Krishnamachari
{"title":"Learning-enforced time domain routing to mobile sinks in wireless sensor fields","authors":"Pritam Baruah, Rahul Urgaonkar, B. Krishnamachari","doi":"10.1109/LCN.2004.71","DOIUrl":"https://doi.org/10.1109/LCN.2004.71","url":null,"abstract":"We propose a learning-based approach to efficiently and reliably route data to a mobile sink in a wireless sensor field. Specifically, we consider a mobile sink that does not know when to query or does not need to query. Furthermore, the sink moves in a certain pattern within the sensor field. Such a sink passively listens for incoming data that distant source sensors unilaterally push towards it. Unlike traditional routing mechanisms, our technique takes the time-domain explicitly into account, with each node involved making the decision \"at this time what is the best way to forward the packet to the sink?\". In the presented scheme, motes (nodes in the vicinity of the sink) learn its movement pattern over time and statistically characterize it as a probability distribution function. Having obtained this information at the motes, our scheme uses reinforcement learning to locate the sink efficiently at any point of time.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Decoupling loss differentiation and loss recovery to ensure security and performance 将损失区分和损失恢复解耦,确保安全性和性能
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.40
V. Obanaik, Zhao Hang, A. Ananda
{"title":"Decoupling loss differentiation and loss recovery to ensure security and performance","authors":"V. Obanaik, Zhao Hang, A. Ananda","doi":"10.1109/LCN.2004.40","DOIUrl":"https://doi.org/10.1109/LCN.2004.40","url":null,"abstract":"Protocols such as TCP and congestion control mechanisms like TFRC (TCP-friendly rate control) suffer in a hybrid wired-cum-wireless scenario where losses can occur for reasons other than congestion, viz., due to bit errors in the wireless link. The existing solutions to address the problem either misclassify the losses, violate end-to-end semantics, do not coexist with IPSec or are TCP-specific. We have previously proposed an innovative mechanism, secure performance enhancing proxy (SPEP), which preserves end-to-end semantics, ensures end-to-end security and enhances performance. We show that the decoupling of loss differentiation from the loss recovery mechanism enables SPEP to serve as a generic loss differentiation mechanism at the network layer. We show by means of test bed experiments that SPEP works in conjunction with any transport layer and protocols such as UDP with TFRC.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信