Ju-Hee Lee, Jin-Woo Song, Yongjun Lee, Sung-Bong Yang
{"title":"An Energy-Effective Routing Protocol for Mobile P2P Systems","authors":"Ju-Hee Lee, Jin-Woo Song, Yongjun Lee, Sung-Bong Yang","doi":"10.1109/ISWPC.2009.4800567","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800567","url":null,"abstract":"In the mobile environment, effective use of limited energy of mobile devices is ever required. Especially, in a mobile peer-to-peer (P2P) system, if a mobile device uses all its energy up, it can no longer participate in the system. Furthermore, as the number of peers without energy increases, so does the file search failure rate of the system. In this paper we present an energy-effective routing protocol in a double-layered P2P system that consists of peers in the upper level, called super peers, and other peers in the lower level, called subpeers. The double-layered system allows file searches with much less message traffics compared with a `single-layered' P2P system by forcing the file searches to be taken among super peers and hence can avoid flooding in the entire network. We introduce two schemes to improve the average lifetime of a network. Functionality and performance were evaluated through various experiments, and the results showed that the protocol combining the proposed schemes improved the average network lifetime by up to 146%","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Data Transfer in Delay-sensitive and Energy-aware WSNs Using the Scalable Encryption Algorithm","authors":"N. Bandirmali, I. Erturk, C. Çeken","doi":"10.1109/ISWPC.2009.4800606","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800606","url":null,"abstract":"Due to very sensitive and crucial nature of the collected data, any Wireless Sensor Network (WSN) has to handle efficiently securing it as well as to employ energy-aware and delay-sensitive algorithms in its all layers from application to the physical. These key topics strictly related to each other are of high importance for building and maintaining reliable and long-lasting WSN applications. However, almost none of the researches have been previously focused on them together, prompting the idea and the presented work to integrate an energy-aware and delay-sensitive centralized MAC (e.g., the EDCMAC) protocol for WSNs and contemporary encryption methods. In the simulation studies, superiority of using the SEA to the traditional AES and Skipjack has been concluded as providing much more protected data transfer and improving life-time and delay performance of the WSN applications.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Real-Time GPS by incorporating TelegraphCQ in Jamdroid Architecture","authors":"M. Qadeer, N. Akhtar, F. Khan, Etienne Baratte","doi":"10.1109/ISWPC.2009.4800587","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800587","url":null,"abstract":"Data Stream Management System is a new class of stream handling with SQL-like queries & robustness at relatively high streams of data. TelegraphCQ is an open source DSMS tool developed towards handling live streams of data. Jamdroid, on the other hand, is a new collaborative project, developed on Android platform, that gathers road traffic reports from all its end-users, compiles the data and reports back to the navigation software of the users. It involves a data analysis algorithm running on the user device, and Internet servers that retrieve the data from the user, merge them, and send them back to the community. Such a system is meant to be accessed by a large number of users, and has to be fast-responsive enough to deal with all the requests; hence, provisions must be made for effective live stream handling. We will see how such a system can gain immensely by incorporating Data Stream Management System, using open-source TelegraphCQ, for data stream processing & querying.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Drieberg, F. Zheng, R. Ahmad, S. Ólafsson, M. Fitch
{"title":"Effectiveness of Asynchronous Channel Assignment Scheme in Heterogeneous WLANs","authors":"M. Drieberg, F. Zheng, R. Ahmad, S. Ólafsson, M. Fitch","doi":"10.1109/ISWPC.2009.4800581","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800581","url":null,"abstract":"Due to their popularity, dense deployments of wireless local area networks (WLANs) are becoming a common feature of many cities around the world. However, with only a limited number of channels available, the problem of increased interference can severely degrade the performance of WLANs if an effective channel assignment scheme is not employed. Previous studies on channel assignment in WLANs almost always assume that all access points (AP) employ the same channel assignment scheme which is clearly unrealistic. On the other hand, to the best of our knowledge, the interaction between different channel assignment schemes has also not been studied before. Therefore, in this paper, we investigate the effectiveness of our earlier proposed asynchronous channel assignment scheme in these heterogeneous WLANs scenarios. Simulation results show that our proposed scheme is still able to provide robust performance gains even in these scenarios.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SER Analysis and Power Allocation of OSTBC-OFDM With Channel Estimation Error","authors":"H. Maleki, S. Nader-Esfahani","doi":"10.1109/ISWPC.2009.4800608","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800608","url":null,"abstract":"In this paper we consider a MIMO-OFDM system, with orthogonal space time block code (OSTBC), under the condition of channel estimation error. First we derive a simple closed-form formula for the symbol error rate, assuming a Gaussian channel estimation error. Then, we present an adaptive power allocation, across both the time slots and subcarriers, to minimize the symbol error rate. Our analysis is based on number of transmit and receive antenna, the code rate of OSTBC, number of subcarriers and a parameter determining Gaussian channel estimation error. Simulation results confirm the accuracy of our SER expression and its improvement by our proposed adaptive power allocation method.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121462411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FMIPv6 based Secure Binding Update Authentication in Wireless Vehicular Networks","authors":"Song-Hee Lee, Jin-Young Choi, Nam-Sup Park","doi":"10.1109/ISWPC.2009.4800584","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800584","url":null,"abstract":"In this paper, we propose a secure binding update authentication scheme in FMIPv6 for wireless vehicular networks. The scheme guarantees mutual authentication, secrecy, and integrity based on pre-authentication. We analyze the security of the binding update authentication scheme and the security requirements using AVISPA Tool that supports a rigorous analysis of security.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid approach for Robust Traffic Engineering","authors":"H. Agrawal, A. Jennings, Q. D. Bui","doi":"10.1109/ISWPC.2009.4800552","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800552","url":null,"abstract":"Phenomenal growth of Internet applications in recent years have made it difficult to forecast traffic patterns. Daily and weekly Internet traffic pattern shows that network is vulnerable to malicious attacks, flash crowds and distributed denial of service attacks (DDoS). In this paper we present a Robust Routing Technique (RRT) under dynamic traffic demand condition. Our simulation results are compared with OSPF-TE. Key feature of RRT is its convergence to generate the solution. It converges quickly to produce the simulation result on the family of topologies we consider in this paper. We are aiming a hybrid approach by combining best of proactive and reactive routing approaches in the RRT.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Networks for Voice Capture in Ubiquitous Home Environments","authors":"Luis E. Palafox, J. A. García-Macías","doi":"10.1109/ISWPC.2009.4800614","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800614","url":null,"abstract":"In this paper we introduce a voice capture application using a wireless sensor network; our main contribution is the integration of a novel capture technique specifically designed for hierarchical wireless sensor networks. Furthermore, we show the challenges involved in the implementation of our experimental prototype which is oriented towards a secure ubiquitous home environment but could be extended to other similar scenarios. We performed a series of experiments on our prototype implementation, the results of those experiments showed that our approach consumes less energy than the traditional capture and send approach. Additionally, our technique provides basic security services such as authentication and confidentiality for control messages without incurring in additional energy consumption.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid-Based Energy-Efficient Routing from Multiple Sources to Multiple Mobile Sinks in Wireless Sensor Networks","authors":"Kisuk Kweon, Hojin Ghim, Jaeyoung Hong, H. Yoon","doi":"10.1109/ISWPC.2009.4800585","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800585","url":null,"abstract":"In this paper, we address the problem of packet transmission from multiple sources to multiple mobile sinks in the large-scale sensor network. Each mobile sink needs to periodically update its location information into the sensor network. Due to multiple mobile sinks, frequent location updates are needed and this causes enormous consumption of the limited battery power in the sensor node. Several routing protocols, such as TTDD and SEAD, suggest hierarchical approach for supporting mobile sinks. These approaches, however, build the grid structure or the tree per event which causes much power consumption as well, so they are not suitable for the sensor network where the event frequently happens. To effectively send the data to multiple mobile sinks and minimize the battery power consumption of sensors, we propose a Grid-Based Energy-Efficient Routing protocol(GBEER) which makes only one grid structure independent of the event. We adopt a Grid-Quorum solution to effectively advertise and request the data for mobile sinks. Simulation results show that GBEER outperforms TTDD in terms of total energy consumption with variation of the number of sinks and sources and mobile sinks' speeds.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Parameter Setting for End-to-End TCP Enhancement Schemes Over Mixed Wired/Wireless Networks","authors":"C. Cheung","doi":"10.1109/ISWPC.2009.4800580","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800580","url":null,"abstract":"Various transmission control protocol (TCP) enhancement schemes have been proposed to improve TCP performance over mixed wired/wireless networks. A general principle of these end-to-end TCP enhancement schemes is to distinguish wireless loss from congestion loss, and to take the cause of the loss into consideration when performing TCP congestion control. However, they do not consider the ratio of congestion losses to wireless losses which significantly affects their performance, mainly in terms of their throughputs. In this paper, a new approach has been developed to address this issue. To apply the approach into an end-to-end TCP enhancement scheme, the ratio of congestion losses to wireless losses are estimated and the parameters used in the scheme are adjusted to further improve its performance. The simulation experiments showed that Veno, a popular end-to-end TCP enhancement scheme, with the new approach always outperformed the original Veno in terms of throughput and fairness, and their differences could be more than two times better.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}