2014 International Conference on Advanced Networking Distributed Systems and Applications最新文献

筛选
英文 中文
Regression Analysis for Energy and Lifetime Prediction in Large Wireless Sensor Networks 大型无线传感器网络能量和寿命预测的回归分析
Foudil Mir, A. Bounceur, F. Meziane
{"title":"Regression Analysis for Energy and Lifetime Prediction in Large Wireless Sensor Networks","authors":"Foudil Mir, A. Bounceur, F. Meziane","doi":"10.1109/INDS.2014.8","DOIUrl":"https://doi.org/10.1109/INDS.2014.8","url":null,"abstract":"Wireless communication technologies are used to collect information from sensitive, hostile and inaccessible environments. They are used in both military and civil applications that include environmental, medical, military and industrial fields. Routing data to a processing center or a base station requires mechanisms for energy conservation at the end of the prolonged lifetime of the network. The simulation in this case is very constrained by the high density of the network. Existing tools cannot simulate large networks with millions of sensors. In this paper, we propose a new method using statistical regression analysis in order to predict the energy consumption and the lifetime of a wireless sensor network with hundreds or thousands of sensors by simulating smaller networks. We have validated the proposed method using a Revised LEACH protocol. Indeed, this method can be used for other protocols and other kind of simulations with the purpose of evaluating a specific parameter.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Dynamic Offer/Answer Mechanism Encompassing TCP Variants in Heterogeneous Environments 异构环境中包含TCP变体的动态提供/应答机制
Antoine Fressancourt, M. Gagnaire
{"title":"A Dynamic Offer/Answer Mechanism Encompassing TCP Variants in Heterogeneous Environments","authors":"Antoine Fressancourt, M. Gagnaire","doi":"10.1109/INDS.2014.9","DOIUrl":"https://doi.org/10.1109/INDS.2014.9","url":null,"abstract":"The Transmission Control Protocol (TCP) has evolved from its initial form defined in RFC 793 in 1981 to cope with the evolution of IP networks in general and of the Internet in particular. Over the years, several factors have led to the design of successive TCP variants: the increasing disparity of end hosts, the variety of data links characteristics (Optical, wireless cellular or satellite), the increase of the delay-bandwidth product in data networks or the use of multiple paths at the same time. In this context, some TCP variants tune the congestion control and avoidance mechanisms to adapt them to specific situations while others make use of TCP options. In practice, such enhanced versions of TCP can be unusable because of the presence of intermediate elements such as firewalls along the path between the two end hosts. Such elements can indeed filter some TCP options or tamper with the way congestion is managed, introducing then unacceptable jitter in the IP flows. In such cases, most TCP variants are designed to fallback to a generic form of TCP. In many situations, this generic TCP version is not the best fit, while another TCP variant could be used to deal with this transient problem. To address this issue, we introduce an original offer/answer (O/A) mechanism allowing end hosts to identify dynamically a suitable TCP variant able to satisfy the specific constraints of each type of packet flows.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122064620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks 无线传感器网络中有效的隐藏数据聚合与验证
Merad Boudia Omar Rafik, F. Mohammed
{"title":"Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks","authors":"Merad Boudia Omar Rafik, F. Mohammed","doi":"10.1109/INDS.2014.21","DOIUrl":"https://doi.org/10.1109/INDS.2014.21","url":null,"abstract":"The detection of false data injection and impersonation attacks is one of the major concern in Wireless Sensor Networks (WSNs). In order to provide security, there is either the end-to-end approach or the hop-by-hop approach. In the former, the detection of these attacks can only be performed at the base station, a detection that can lead to a significant loss of legitimate data. Since the base station is the only place where verification is done, any malicious activities during the data aggregation process can only be detected after the reception of the aggregate, which not only is inefficient but also leads to a considerable data loss rate. In this paper, we present a scheme that provides the end-to-end privacy and allows early detection of the attack through a hop-by-hop verification, thus reducing the need to rely entirely on base station for verification. Based on an enhanced and SPA-secure version of Tiny ECC, our solution is implemented on MicaZ and TelosB motes. Through simulation and experimental results, we show the applicability of our scheme for WSNs.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Target Tracking in VANETs Using V2I and V2V Communication 基于V2I和V2V通信的vanet目标跟踪
Derder Abdessamed, M. Samira
{"title":"Target Tracking in VANETs Using V2I and V2V Communication","authors":"Derder Abdessamed, M. Samira","doi":"10.1109/INDS.2014.11","DOIUrl":"https://doi.org/10.1109/INDS.2014.11","url":null,"abstract":"Technological progress of wireless networks resulted in the appearance of vehicular ad hoc networks (VANETs). The exploitation of VANETs comes within the scope of developing intelligent transportation systems (ITS). This is possible through several types of applications designed for VANETs. In order to implement certain applications, it is necessary to be able to track vehicles on roads. An existing vehicle tracking system is based only on Road Side Units (RSUs) using Vehicle to Infrastructure (V2I) communication. In this paper, in addition to V2I communication, we propose an approach that includes participating vehicles in the process of tracking by using Vehicle to Vehicle (V2V) communication. This allows the sought vehicle to be tracked in areas not covered by RSUs.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multi-actuators Based Anycast Routing Protocol for Wireless Sensor and Actuator Networks 基于多致动器的无线传感器与致动器网络任播路由协议
S. Yahiaoui, Mawloud Omar, A. Bouabdallah, Y. Challal
{"title":"Multi-actuators Based Anycast Routing Protocol for Wireless Sensor and Actuator Networks","authors":"S. Yahiaoui, Mawloud Omar, A. Bouabdallah, Y. Challal","doi":"10.1109/INDS.2014.13","DOIUrl":"https://doi.org/10.1109/INDS.2014.13","url":null,"abstract":"In wireless sensor and actuator networks (WSANs), whenever an event occurs in the physical world, sensors gather this information and forward it to actuators which are responsible for taking prompt decisions and react accordingly. To ensure an efficient action, an any cast routing mechanism is trivial, a sensor node wishes to report event information to any actuators in the network and one of them is selected to react in the area of interest. In this paper, we propose a multi-actuators based any cast routing protocol for wireless sensor and actuator networks which guarantees a minimum communication delay and consumed energy. We perform an overall evaluation of our proposed approach through simulations. The obtained results show out performance of our approach while providing effective gain in terms of communication delay and consumed energy.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123021614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks 保护无线传感器网络免受节点复制攻击的MCD协议
Khedim Farah, Labraoui Nabila
{"title":"The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks","authors":"Khedim Farah, Labraoui Nabila","doi":"10.1109/INDS.2014.18","DOIUrl":"https://doi.org/10.1109/INDS.2014.18","url":null,"abstract":"Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called \"clone attack\" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an \"ideal solution\" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs 一种实用的vanet中位置隐私的假名更改策略
Abdelwahab Boualouache, S. Moussaoui
{"title":"S2SI: A Practical Pseudonym Changing Strategy for Location Privacy in VANETs","authors":"Abdelwahab Boualouache, S. Moussaoui","doi":"10.1109/INDS.2014.20","DOIUrl":"https://doi.org/10.1109/INDS.2014.20","url":null,"abstract":"Location privacy remains an open issue in VANETs. Although, frequently pseudonym changing is commonly accepted as solution to protect privacy in VANETs, many studies have been shown its weakness to provide the required level of privacy protection. In this paper, we propose a practical pseudonym changing strategy, called Silence & Swap at Signalized Intersection (S2SI). S2SI consists of two protocols, one for creating of safe silent mix zones and another for exchanging pseudonyms between vehicles under the control of RSUs within these zones. We evaluate the provided privacy protection of our strategy by developing anonymity set analytic model and by performing a simulative study of the strategy using the entropy of vehicles' anonymity set as the primary metric.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115218646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信