Q2S and Security for Wireless and Mobile Networks最新文献

筛选
英文 中文
A pragmatic testing approach for wireless sensor networks 一个实用的无线传感器网络测试方法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2010-10-20 DOI: 10.1145/1868630.1868641
C. Ramassamy, H. Fouchal, P. Hunel, Nicolas Vidot
{"title":"A pragmatic testing approach for wireless sensor networks","authors":"C. Ramassamy, H. Fouchal, P. Hunel, Nicolas Vidot","doi":"10.1145/1868630.1868641","DOIUrl":"https://doi.org/10.1145/1868630.1868641","url":null,"abstract":"Applications over wireless sensor networks are growing quickly. Traditional software development tools are not well adapted to this technology. In particular, adequate testing methodologies are required. Many issues have not been formally addressed as energy-conservation, congestion control, reliability data dissemination, security. In this paper, we present a pragmatic approach to detect some kind of anomalies based on defined scenarios on wireless sensor networks. A scenario is considered as a set of events which should happen on the network in an ordered way. We discuss a formal architecture able to perform these scenarios over the wireless sensor networks and to raise alarms if necessary. This methodology has been implemented on a prototype and has been experimented with various examples. This contribution is a first attempt for a formal testing methodology for wireless sensor networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security features of a generic sensor data acquisition system 一种通用传感器数据采集系统的安全特性
Q2S and Security for Wireless and Mobile Networks Pub Date : 2010-10-20 DOI: 10.1145/1868630.1868644
Christian Probst, A. Veichtlbauer
{"title":"Security features of a generic sensor data acquisition system","authors":"Christian Probst, A. Veichtlbauer","doi":"10.1145/1868630.1868644","DOIUrl":"https://doi.org/10.1145/1868630.1868644","url":null,"abstract":"In building automation IP based network infrastructures aim to reduce facility management costs remarkably by allowing multiple applications to use the one communication network at the same time. This open approach requires a secure and confidential interaction between sensors and users. Data encryption is a suitable solution to ensure this secure transmission inside IP computer networks. The evaluation of different cryptographic methods has shown that RSA and AES fulfill the requirements for a secure communication. This paper presents the concepts for the registration process, the communication between users and sensors and the update process of new sensors and outlines the tests in order to validate the functionality of the concept.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks Diff-MAC:用于无线多媒体传感器网络的具有差异化服务和混合优先级的qos感知MAC协议
Q2S and Security for Wireless and Mobile Networks Pub Date : 2010-10-20 DOI: 10.1145/1868630.1868642
M. Yigitel, Özlem Durmaz Incel, Cem Ersoy
{"title":"Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks","authors":"M. Yigitel, Özlem Durmaz Incel, Cem Ersoy","doi":"10.1145/1868630.1868642","DOIUrl":"https://doi.org/10.1145/1868630.1868642","url":null,"abstract":"Popularity of Wireless Sensor Networks (WSNs) combined with the multimedia requirements of new applications have enabled Wireless Multimedia Sensor Networks (WMSNs) which commonly carry heterogeneous traffic. In order to deliver multiple types of traffic with different requirements in highly resource constrained sensor networks, Quality of Service (QoS) provisioning becomes unavoidable. In this work, we propose Diff-MAC; a QoS-aware and priority-based MAC protocol for WMSNs. Diff-MAC aims to increase the utilization of the channel with effective service differentiation mechanisms while providing fair and fast delivery of the QoS-constrained data. Performance evaluation results of Diff-MAC, obtained through extensive simulations, show significant improvements, in terms of latency, data delivery and energy efficiency, compared to two other existing protocols.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Delay QoS provisioning in cognitive radio systems using adaptive modulation 基于自适应调制的认知无线电系统延迟QoS配置
Q2S and Security for Wireless and Mobile Networks Pub Date : 2010-10-20 DOI: 10.1145/1868630.1868639
Mohsen Karimzadeh Kiskani, B. Khalaj, Shahin Vakilinia
{"title":"Delay QoS provisioning in cognitive radio systems using adaptive modulation","authors":"Mohsen Karimzadeh Kiskani, B. Khalaj, Shahin Vakilinia","doi":"10.1145/1868630.1868639","DOIUrl":"https://doi.org/10.1145/1868630.1868639","url":null,"abstract":"The spectrum of licensees can be shared by some secondary users in cognitive radio systems. However, the secondary transmitters are limited by an interference threshold constraint which is imposed by the primary receivers in order to ensure primary users' reliable communication. In this paper, we assume that a number of secondary transmitters are trying to transmit their data to some secondary receivers in the presence of primary transmitters and receivers and, therefore, their inflicted interference at the primary receivers should be less than a specific threshold. We consider the delay quality of service and use the idea of effective capacity to guarantee a desired delay quality of service for every secondary link. By maximizing the sum of effective capacities of the secondary links we propose adaptive modulation schemes to support the desired quality of service. Two different optimal (continuous) and suboptimal (discrete) schemes are proposed and the rate and power allocation is obtained for each scheme. The performance of these two schemes is also compared.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Private logical neighborhoods for wireless ad hoc networks 用于无线自组织网络的私有逻辑邻域
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641959
K. Sivakumar, M. Ramkumar
{"title":"Private logical neighborhoods for wireless ad hoc networks","authors":"K. Sivakumar, M. Ramkumar","doi":"10.1145/1641944.1641959","DOIUrl":"https://doi.org/10.1145/1641944.1641959","url":null,"abstract":"In wired networks routers are aware of all other routers to which they are directly connected. In contrast, in mobile ad hoc networks (MANETs) a mobile router (node) will not be aware of all nodes within its transmission range. While many MANET routing protocols have been proposed in the literature, only few of them mandate proactive neighborhood discovery protocols like the Internet message encapsulation protocol (IMEP), for identifying all neighbors within a reliable delivery neighborhood (RDN). We argue why it is especially important for secure routing protocols, which have the additional constraint of the need to \"live with\" non cooperative nodes, to go beyond simply mandating an RDN, by mandating a private logical neighborhood (PLN).","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125860130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
REALISM: rendering anonymity and lightweight security with mobility in wireless ad hoc and mesh networks 现实性:在无线自组织和网状网络中呈现匿名性和轻量级安全性
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641964
Sadeq Ali Makram, Fahad Samad
{"title":"REALISM: rendering anonymity and lightweight security with mobility in wireless ad hoc and mesh networks","authors":"Sadeq Ali Makram, Fahad Samad","doi":"10.1145/1641944.1641964","DOIUrl":"https://doi.org/10.1145/1641944.1641964","url":null,"abstract":"The threat of possible malicious activities that can be executed by adversaries impedes the rapid deployment of wireless networks. Researchers and scientists have rendered various mechanisms in order to preclude or at least mitigate such activities. Many of these strategies necessitate or presume the presence of a trusted authority to actualize their implementation. This, of course, in the wireless networks is quite unmanageable and requires extra messages and management overhead. In this paper, we present a secure and anonymity-friendly mechanism for wireless ad hoc and mesh networks. This approach provides a secure connection establishment based on neighborhood trust. Moreover, it preserves anonymity of any two communication parties using exceedingly lightweight security scheme. In addition, it also offers seamless secure connectivity to mobile nodes. Our proposed solution applies to both mesh and ad hoc networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A cluster-based scheduling for object detection in wireless multimedia sensor networks 无线多媒体传感器网络中基于集群的目标检测调度
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641955
Mohammad Alaei, J. Barceló-Ordinas
{"title":"A cluster-based scheduling for object detection in wireless multimedia sensor networks","authors":"Mohammad Alaei, J. Barceló-Ordinas","doi":"10.1145/1641944.1641955","DOIUrl":"https://doi.org/10.1145/1641944.1641955","url":null,"abstract":"Network lifetime is always an important topic in wireless sensor networks. The case of Wireless Multimedia Sensor Networks present additional features such as the fact of transmitting multimedia rich data or the fact of having directional sensing areas. This paper presents a scheduling scheme for clustered nodes according to overlapped Field of View (FoV) regions. This approach schedules nodes applying coordination and collaborations among members of clusters to sense the environment while each cluster covers a specific region defined by the degree of overlapping FoV. The objective of this mechanism is to increase power conservation by avoiding similar sensing and redundant processing. Evaluation shows that the proposed scheduling reduces the average energy consumption and thus improves network lifetime.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distributed key management for wireless sensor networks 无线传感器网络的分布式密钥管理
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641950
Kuldeep, G. R. Murthy
{"title":"Distributed key management for wireless sensor networks","authors":"Kuldeep, G. R. Murthy","doi":"10.1145/1641944.1641950","DOIUrl":"https://doi.org/10.1145/1641944.1641950","url":null,"abstract":"The recent research in sensor networks has led to a number of security schemes. The main requirement of wireless sensor networks is not only security but energy efficient security due to resource constrained nature of sensor nodes. We have developed an energy and storage efficient key distribution scheme using leveling and sectoring. In this scheme, node communicates with their neighbors to setup pair wise keys without any central authority. Proposed protocol is fully distributed and uses negligible communication for key setups between different nodes. Distributed nature of this protocol makes it more faults tolerant. Pair wise keys are different for each pair of nodes, so a small part of network is affected due to node compromise attacks. It is fully developed in TinyOS-2.x and tested in avrora emulator. We are also planning to add code of this key management protocol in TinyOS-2.x contributory section. Use of level and sector also solves problem of localization.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the QoS tree construction in WiMAX mesh networks based on genetic algorithm approach 基于遗传算法的WiMAX网状网络QoS树构建研究
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641946
S. Bastani, S. Yousefi, M. Mazoochi, A. Ghiamatyoun
{"title":"On the QoS tree construction in WiMAX mesh networks based on genetic algorithm approach","authors":"S. Bastani, S. Yousefi, M. Mazoochi, A. Ghiamatyoun","doi":"10.1145/1641944.1641946","DOIUrl":"https://doi.org/10.1145/1641944.1641946","url":null,"abstract":"We study the influence of tree's depth and nodes' fan-out on the performance of WiMax mesh networks. For a given tree topology, we first analytically obtain per-node delay and per-node throughput. Then among plenty of tree topologies, extractable from a given network's graph, we search feasible trees which fulfil some per-node and network QoS requirements. Since the searching space is potentially very huge, we use a genetic algorithm in order to explore enough good delay and throughput trade-off. We use the Pruefer code tree representation followed by novel genetic operators. Moreover, by using proper fitness functions, we are able to investigate any desired delay and throughput trade-off in a unified framework. Employing genetic algorithm approach leads to the exploration of extremely wide search space in a reasonably short time, which results in overall scalability and accuracy of the proposed tree exploration algorithm. Due to fast convergence, the proposed genetic algorithm is a good candidate to be implemented in a real-life Base Station (BS) in order to construct adaptive tree topologies based on nodes' traffic demand.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust dynamic user authentication scheme for wireless sensor networks 无线传感器网络鲁棒动态用户认证方案
Q2S and Security for Wireless and Mobile Networks Pub Date : 2009-10-28 DOI: 10.1145/1641944.1641962
B. Vaidya, J. Silva, J. Rodrigues
{"title":"Robust dynamic user authentication scheme for wireless sensor networks","authors":"B. Vaidya, J. Silva, J. Rodrigues","doi":"10.1145/1641944.1641962","DOIUrl":"https://doi.org/10.1145/1641944.1641962","url":null,"abstract":"In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For instance, WSNs can be deployed in insecure and unattended environments. In this regard, user authentication is a critical issue for WSNs. In this paper, we propose a user authentication protocol in WSNs, which is variation of strong-password based solution proposed by Wong et al. The proposed protocol is evaluated and compared with the previous schemes.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信