2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

筛选
英文 中文
Optimal link scheduling for real-time traffic in wireless mesh networks in both per-flow and per-path frameworks 无线网状网络中按流和按径框架下实时流量的最优链路调度
P. Cappanera, L. Lenzini, Alessandro Lori, G. Stea, G. Vaglini
{"title":"Optimal link scheduling for real-time traffic in wireless mesh networks in both per-flow and per-path frameworks","authors":"P. Cappanera, L. Lenzini, Alessandro Lori, G. Stea, G. Vaglini","doi":"10.1109/WOWMOM.2010.5534919","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534919","url":null,"abstract":"In this paper we investigate link scheduling for Wireless Mesh Networks (WMNs) carrying real-time (i.e., delay-constrained) traffic. We show that the problem of computing a conflict-free link schedule with end-to-end delay constraints can be formulated as a mixed-integer non linear problem that can be optimally solved in reasonable time (i.e., minutes) for relatively large WMNs (up to 20–30 nodes). We use the above result to explore the schedulability region of a WMN with a given routing and input traffic, assessing whether and when aggregating flows which traverse the same path makes a given input flow set sched-ulable. Furthermore, we devise a heuristic solution strategy, which computes good suboptimal solutions within up to few seconds, thus being amenable for online admission control.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the maximum performance in opportunistic routing 论机会路由的最大性能
Llorenç Cerdà-Alabern, A. Darehshoorzadeh, V. Pla
{"title":"On the maximum performance in opportunistic routing","authors":"Llorenç Cerdà-Alabern, A. Darehshoorzadeh, V. Pla","doi":"10.1109/WOWMOM.2010.5534897","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534897","url":null,"abstract":"In recent years there has been a growing interest in Opportunistic Routing as a way to increase the capacity of wireless networks by exploiting its broadcast nature. By contrast to traditional uni-path routing, in opportunistic routing the nodes overhearing neighbor's transmissions can become candidates to forward the packets towards the destination. In this paper we address the question: What is the maximum performance that can be obtained using opportunistic routing? To answer this question we use an analytical model that allows to compute the optimal position of the nodes, such that the progress towards the destination is maximized. We use this model to compute bounds to the minimum expected number of transmissions that can be achieved in a network using opportunistic routing.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127593147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigating the impact of human activity on the performance of wireless networks — An experimental approach 研究人类活动对无线网络性能的影响。一种实验方法
Elyes Ben Hamida, G. Chelius
{"title":"Investigating the impact of human activity on the performance of wireless networks — An experimental approach","authors":"Elyes Ben Hamida, G. Chelius","doi":"10.1109/WOWMOM.2010.5534913","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534913","url":null,"abstract":"In this paper, we are interested in evaluating the performance of indoor wireless networks in LOS and NLOS conditions. We first provide a thorough analysis of received signal strength indicator (RSSI) measurements obtained in indoor experiments. We aim to better understand the temporal and spatial correlations of RSSI values. Moreover, we analyze in detail the stability of radio links over time. We show that human activity has a significant impact on the performance of wireless networks and that RSSI is not always a robust indicator for the radio link quality. Based on our results, we then propose a time-varying simulation model to reproduce the RSSI variability as observed in our experiments. We argue that this model results in more realistic and accurate RSSI values to be used in simulation.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Towards securing mintroute in wireless sensor networks 无线传感器网络的分钟安全研究
I. Hegazy, R. Safavi-Naini, C. Williamson
{"title":"Towards securing mintroute in wireless sensor networks","authors":"I. Hegazy, R. Safavi-Naini, C. Williamson","doi":"10.1109/WOWMOM.2010.5535004","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5535004","url":null,"abstract":"In a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute protocol to link quality attacks by a malicious node. We then propose a novel \"sequence number gap trick\" as a lightweight means to test for and detect the presence of a malicious attacker. The simulation results show that judicious use of the sequence number gap trick provides robust detection of malicious nodes, preserving the data delivery capabilities of the WSN.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance analysis of the IEEE 802.11 MAC protocol for DSRC with and without Retransmissions IEEE 802.11 MAC协议在重传和不重传情况下的DSRC性能分析
M. Hassan, H. Vu, T. Sakurai
{"title":"Performance analysis of the IEEE 802.11 MAC protocol for DSRC with and without Retransmissions","authors":"M. Hassan, H. Vu, T. Sakurai","doi":"10.1109/WOWMOM.2010.5534909","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534909","url":null,"abstract":"We develop an accurate analytical model for a dedicated short range communication (DSRC) network that uses the IEEE 802.11 distributed coordination function (DCF) MAC protocol, as adopted by the forthcoming IEEE 802.11p specification for DSRC. The specific focus is on broadcast vehicle-to-vehicle safety messages. We derive explicit expressions for the mean of the total packet delay and the packet delivery ratio (PDR) in an unsaturated network formed by moving vehicles on a highway. Our model is validated using extensive simulations and we show that our model yields better predictive accuracy than other existing models. The model is then used to investigate the performance of a modified DCF that uses a fixed number of sequential retransmissions to improve the reliability of packet delivery. We find that with sequential retransmissions, the PDR improves at low vehicle density (i.e. low traffic load), but degrades at heavy loads where higher collisions induced by the retransmissions outweighs the benefit of repeated attempts.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A signal combining technique based on channel shortening for cooperative sensor networks 基于信道缩短的协同传感器网络信号合并技术
S. I. Hussain, Mohamed-Slim Alouini, M. Hasna
{"title":"A signal combining technique based on channel shortening for cooperative sensor networks","authors":"S. I. Hussain, Mohamed-Slim Alouini, M. Hasna","doi":"10.1109/WOWMOM.2010.5534947","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534947","url":null,"abstract":"The cooperative relaying process needs proper coordination among the communicating and the relaying nodes. This coordination and the required capabilities may not be available in some wireless systems, e.g. wireless sensor networks where the nodes are equipped with very basic communication hardware. In this paper, we consider a scenario where the source node transmits its signal to the destination through multiple relays in an uncoordinated fashion. The destination can capture the multiple copies of the transmitted signal through a Rake receiver. We analyze a situation where the number of Rake fingers N is less than that of the relaying nodes L. In this case, the receiver can combine N strongest signals out of L. The remaining signals will be lost and act as interference to the desired signal components. To tackle this problem, we develop a novel signal combining technique based on channel shortening. This technique proposes a processing block before the Rake reception which compresses the energy of L signal components over N branches while keeping the noise level at its minimum. The proposed scheme saves the system resources and makes the received signal compatible to the available hardware. Simulation results show that it outperforms the selection combining scheme.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tradeoffs between security and communication performance in wireless mesh networks 无线网状网络中安全性与通信性能的权衡
Reza Curtmola, Jing Dong, C. Nita-Rotaru
{"title":"Tradeoffs between security and communication performance in wireless mesh networks","authors":"Reza Curtmola, Jing Dong, C. Nita-Rotaru","doi":"10.1109/WOWMOM.2010.5535005","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5535005","url":null,"abstract":"In the context of wireless mesh networks (WMNs), we ask the question whether a high level of security can be achieved while providing good communication performance. To answer this question, we examine two techniques designed and shown to improve throughput performance in WMNs: high-throughput routing and network coding. Although the advantages of using these techniques hold in a benign setting, it is not clear whether they can be preserved under an adversarial setting. We analyze these techniques and reveal a wide range of security vulnerabilities. We then investigate whether alternative schemes can be designed to be secure and still preserve most of the advantages achieved in benign settings.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132658320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
P2P overlay topology control in MANETs manet中P2P覆盖拓扑控制
Afzal Mawji, H. Hassanein
{"title":"P2P overlay topology control in MANETs","authors":"Afzal Mawji, H. Hassanein","doi":"10.1109/WOWMOM.2010.5534905","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534905","url":null,"abstract":"P2P applications are enormously popular on the Internet and their uses vary from file sharing to Voice-over-IP to gaming and more. Increasingly, users are moving toward wireless networked devices and wish to continue using P2P applications in these new environments. MANETs are expected to grow in use as wireless mesh and 4G networks increase in popularity. P2P and MANETs share some similarities, such as self-organization, dynamism, and resilience to failure, but it is necessary that P2P algorithms should take advantage of the realities of MANETs. In P2P networks, the overlay peers must form a topology of connections between themselves and this topology should reflect the underlying network in order to reduce delay and energy consumption. We study the results of a game-theoretic topology control algorithm which considers energy and distance between nodes in a P2P network running atop a MANET. We find that the minimum cost topologies are very highly connected and thus resilient, but in most cases the topologies do not stabilize even without peer mobility or churn.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achievement notification in a real-world achievement system 现实世界成就系统中的成就通知
Tonio Triebel, S. Schnaufer, W. Effelsberg
{"title":"Achievement notification in a real-world achievement system","authors":"Tonio Triebel, S. Schnaufer, W. Effelsberg","doi":"10.1109/WOWMOM.2010.5534943","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534943","url":null,"abstract":"We propose a global system for acquisition, maintenance and communication of achievements in the real-world. The main focus of the proposal lies on a context-aware notification service for achievements. Users of the system can browse the achievement web application and will only get notifications of users within the same context. The definition of context is based on the network infrastructure of the client accessing the system. Our server utilizes information derived from IP-routing traces to build the notification groups.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed storage in Disruption Tolerant Network 容中断网络中的分布式存储
Jingzhe Du, E. Kranakis, A. Nayak
{"title":"Distributed storage in Disruption Tolerant Network","authors":"Jingzhe Du, E. Kranakis, A. Nayak","doi":"10.1109/WOWMOM.2010.5534948","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534948","url":null,"abstract":"We describe a novel Distributed Storage protocol in Disruption (Delay) Tolerant Networks (DTN). Since DTNs can not guarantee the connectivity of the network all the time, distributed data storage and look up has to be performed in a store-and-forward way. In this work, we define local distributed location regions which are called cells to facilitate the data storage and look up process. Nodes in a cell have high probability of moving within their cells. Our protocol resorts to storing data items in cells which have hierarchical structure to reduce routing information storage at nodes. Multiple copies of a data item may be stored at nodes to counter the adverse impact of the nature of DTNs. The cells are relatively stable regions and as a result, data exchange overheads among nodes are reduced. Through experimentation, we show that the proposed distributed storage protocol achieves higher successful data storage ratios with lower delays and limited data item exchange requirements than other protocols in the literature.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133367190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信