2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)最新文献

筛选
英文 中文
Property Based Intrusion Detection to Secure OLSR 基于属性的入侵检测保护OLSR
F. Cuppens, N. Cuppens-Boulahia, S. Nuon, T. Ramard
{"title":"Property Based Intrusion Detection to Secure OLSR","authors":"F. Cuppens, N. Cuppens-Boulahia, S. Nuon, T. Ramard","doi":"10.1109/ICWMC.2007.72","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.72","url":null,"abstract":"In this paper, we examine security issues related to proactive routing protocols for mobile ad-hoc networks (MANETs). Specifically, we investigate security properties of the optimized link-state routing (OLSR) protocol, a proactive routing protocol for MANETs. We analyze the possible attacks against the integrity of the network routing infrastructure, and present techniques to counter some attacks. Our main approach is based on a formal model to describe normal and incorrect node behaviors. This model allows us to derive security properties. The algorithm checks if these security properties are violated. If they are, detection occurs to allow the normal node to find a path without incorrect node behavior. Our approach does not change the message format, so it is very easy to implement the corresponding algorithm. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124568752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An Enhanced Perimeter Coverage Based Density Control Algorithm for Wireless Sensor Network 一种基于周界覆盖的增强无线传感器网络密度控制算法
Shaofeng Jiang, Ming-hua Yang, Han Song, Jie-min Wang
{"title":"An Enhanced Perimeter Coverage Based Density Control Algorithm for Wireless Sensor Network","authors":"Shaofeng Jiang, Ming-hua Yang, Han Song, Jie-min Wang","doi":"10.1109/ICWMC.2007.19","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.19","url":null,"abstract":"In wireless sensor network, one of the main design challenges is to obtain long network lifetime by turning off some redundant nodes while maintaining sufficient sensing coverage and connectivity. In this paper, we investigates the criterion to decide whether a sensor is redundant, and propose a improved method to determine if a sensor is completely covered by its neighbors, especially for boundary sensors. Then we propose an enhanced perimeter coverage based density control algorithm (ETCDC) for large scale sensor networks. Experimental results show that our algorithm outperforms the TEAS algorithm and the Jiang's algorithm with respect to the number of off- duty sensors needed, thus extend the network lifetime.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Predictive Resource Reservation Access for Multimedia Integration over GEO Satellite Networks 基于地球同步轨道卫星网络的多媒体集成预测资源预留访问
P. Koutsakis
{"title":"Predictive Resource Reservation Access for Multimedia Integration over GEO Satellite Networks","authors":"P. Koutsakis","doi":"10.1109/ICWMC.2007.70","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.70","url":null,"abstract":"The provision of acceptable quality-of-service (QoS) for integrated multimedia traffic over a geosynchronous earth orbit (GEO) satellite network demands the existence of a well-designed medium access control (MAC) protocol. This paper proposes a new dynamic satellite bandwidth allocation technique (predictive resource reservation access, PRRA) which is based on accurate videoconference traffic prediction. Our work is combined with another work on data traffic modeling and prediction and is shown to provide very good throughput and delay results when compared with other protocols from the literature.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contexts and Context-Based Access Control 上下文和基于上下文的访问控制
E. Fernández, M. Larrondo-Petrie, A.E. Escobar
{"title":"Contexts and Context-Based Access Control","authors":"E. Fernández, M. Larrondo-Petrie, A.E. Escobar","doi":"10.1109/ICWMC.2007.30","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.30","url":null,"abstract":"The increasing diffusion of portable devices and the widespread availability of wireless networks where users live, work and travel, together create opportunities for users to access resources anywhere, any time and from various access devices. Ubiquitous systems in charge of providing and controlling access to these resources require a precise conceptual model to define the user context and the resources she can reach in each context. We propose a UML model for contexts, unifying previous models which could become the core for a context-based access control framework representing security constraints in the form of classes and associations. A generic model such as this one can be used to develop new systems and evaluate existing systems. The model for the context part has value on its own and can be used independently.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power Aware Routing Algorithms for Wireless Sensor Networks 无线传感器网络的功率感知路由算法
Suyoung Yoon, R. Dutta, M. Sichitiu
{"title":"Power Aware Routing Algorithms for Wireless Sensor Networks","authors":"Suyoung Yoon, R. Dutta, M. Sichitiu","doi":"10.1109/ICWMC.2007.69","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.69","url":null,"abstract":"Recently there have been numerous research results in the area of power efficiency in ad hoc and wireless sensor networks. This paper discusses the effect of power efficient routing algorithms on the lifetime of multihop wireless sensor networks (WSNs). The WSNs considered are special cases of mobile ad hoc networks (MANETs); in particular, we assume that all data and control traffic in the WSN is flowing between the sensor nodes and the base station. This assumption results in a considerably simpler problem and solution than for the more general MANETs. We calculate analytically lifetime bounds of the WSN under specific routing algorithms. The main result of the paper is that, for WSNs, the choice of the routing algorithm has almost no consequence to the lifetime of the network. This result, as well as being obviously useful, is somewhat surprising since this is not true of general MANETs.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On Metrics for Mobility Oriented Self Adaptive Protocols 面向移动的自适应协议的度量研究
Cholatip Yawut, B. Paillassa, R. Dhaou
{"title":"On Metrics for Mobility Oriented Self Adaptive Protocols","authors":"Cholatip Yawut, B. Paillassa, R. Dhaou","doi":"10.1109/ICWMC.2007.60","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.60","url":null,"abstract":"Mobile networks performance may be enhanced by cross-layer mechanisms. Some of those mechanisms are based on mobility metrics. For example, the establishment of a route by choosing less mobile node could improve the routing protocol. In this paper, we study the ability of mobility metrics to reflect the mobility. The proposed approach evaluates the ability of a metric from its influence over routing protocols. Three routing protocols are considered: AODV, DSR and OLSR. The studied mobility metrics are frequency of link state changes (LC), link connectivity duration (LD) and link stability metric (LS). The metrics are evaluated by simulation, firstly in a general case then in a scenario case.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures 用于无线传感器网络的安全协议:安全体系结构综述
David Boyle, T. Newe
{"title":"Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures","authors":"David Boyle, T. Newe","doi":"10.1109/ICWMC.2007.80","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.80","url":null,"abstract":"Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132538592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
SRAP: Scheduled Random Access Protocol Achieving High Throughput and Traffic Adaptivity in WLANs SRAP:在无线局域网中实现高吞吐量和业务量自适应的计划随机访问协议
X. Tian, Xiang Chen, T. Ideguchi
{"title":"SRAP: Scheduled Random Access Protocol Achieving High Throughput and Traffic Adaptivity in WLANs","authors":"X. Tian, Xiang Chen, T. Ideguchi","doi":"10.1109/ICWMC.2007.84","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.84","url":null,"abstract":"Enhancing throughput for limited channel capacity in wireless LANs is an important subject due to limited wireless channel bandwidth. A great deal of research has been carried out and some of proposed schemes are effective. Specifically, considerable effort has been devoted to improving the IEEE 802.11 standard which is utilized widely. Previous theoretical analysis gave the upper bound of IEEE 802.11 DCF throughput which is far below the channel capacity and corresponding algorithm was proposed, which can achieve the throughput close to the upper bound. It seems that we cannot expect to enhance the throughput much more in a usual way. In the meantime, besides throughput, there are some other issues for DCF such as fairness and QoS support. However, except for several hybrid protocols, most proposals were either based on contention mode or schedule mode and neither of the two modes has possessed the good characters of the other. In this paper, we propose a new MAC scheme used for DCF (with no control node) that dynamically adapts to traffic changes without degradation of delay in the case of low traffic load and achieves high throughput which is close to transmission capacity in saturated case. The key idea is to divide the virtual frame into two parts, i.e., schedule part and contention part, and to enable each node to reserve a slot in schedule part. Unlike conventional hybrid protocols, every node does not have to intentionally reset any parameter according to the changing traffic load except its queue length. A distinguishing feature of this scheme is the novel way of allowing WLANs to work with low delay as in the contention-based mode and achieve high throughput as in the schedule-based mode without complicated on-line estimation required in previous schemes. This makes our scheme simpler and more reliable. According to analysis, we show that our scheme can greatly improve the throughput no matter whether the network is in saturated or unsaturated case.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131815624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Performance Analysis of Forward Error Correction Techniques Used in Wireless Communications 无线通信中前向纠错技术的性能比较分析
A. Çalhan, C. Çeken, I. Erturk
{"title":"Comparative Performance Analysis of Forward Error Correction Techniques Used in Wireless Communications","authors":"A. Çalhan, C. Çeken, I. Erturk","doi":"10.1109/ICWMC.2007.28","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.28","url":null,"abstract":"High bit error rates of the wireless communication medium require employing forward error correction methods on the data transferred, where usually convolutional coding techniques are utilized. As a result of their strong mathematical structure these codes are superior to their counterparts in especially real-time applications. The main decoding strategy for convolutional codes is based on the Viterbi algorithm. Common use of convolutional codes has boosted the development of different decoding schemes. These studies resulted in a new error correcting method called Turbo code. In this research work, Viterbi decoding algorithm that is the basis for forward error correction (FEC) techniques, and log-MAP and SOVA turbo decoding algorithms are studied using MATLAB software. An example image transfer application has also been realized for comparative performance analysis of these techniques. The simulation results obtained show that the log-MAP decoding algorithm achieves up to 100 times better BER performance especially for increasing SNR values than that of Viterbi algorithm.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimization of Large-Scale RTCP Feedback Reporting in Fixed and Mobile Networks 固定和移动网络中大规模RTCP反馈报告的优化
V. Novotny, D. Komosny
{"title":"Optimization of Large-Scale RTCP Feedback Reporting in Fixed and Mobile Networks","authors":"V. Novotny, D. Komosny","doi":"10.1109/ICWMC.2007.63","DOIUrl":"https://doi.org/10.1109/ICWMC.2007.63","url":null,"abstract":"RTCP is the accompanying protocol to the RTP, which is very important for the feedback on the control of multimedia streaming services. The bandwidth for RTCP is related to the bandwidth available to the whole session and is limited to 5 %. This fact is a limiting factor for large scale media streaming services based on SSM because of bandwidth sharing among a large number of receivers. The paper describes the hierarchical structure of clients with summarisation nodes in wired and a mobile environment to assure that reporting interval does not exceed the maximum allowed value. Calculations and simulations are presented. The tree structure establishment process is designed.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信