Tao Yang, Gjergji Mino, L. Barolli, A. Durresi, F. Xhafa
{"title":"A Simulation System for Multi-mobile Sinks in Wireless Sensor Networks Considering TwoRayGround and Shadowing Propagation Models","authors":"Tao Yang, Gjergji Mino, L. Barolli, A. Durresi, F. Xhafa","doi":"10.1109/BWCCA.2011.17","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.17","url":null,"abstract":"In this paper, we implement a simulation system for single and multi-mobile sinks in wireless sensor networks considering TwoRayGround and Shadowing propagation models, using DSR routing protocol. We investigate how the sensor network performs in these cases. We used the good put and consumed energy metrics for performance evaluation. From simulations, we have shown that the good put of multimobile sinks has the worst behavior for both Shadowing and TwoRayGround propagation models compared with single mobile sinks. Regarding the depletion, Shadowing model shows better performance than TwoRayGround model, especially in the case of multi-mobile sinks.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134622129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiro Iwashige, L. Barolli, Yuki Isayama, Ryo Nagao, Katsuki Hayashi
{"title":"Characteristics of Diffracted Waves: A Comparison Study for Different Wedge Shapes and Materials","authors":"Jiro Iwashige, L. Barolli, Yuki Isayama, Ryo Nagao, Katsuki Hayashi","doi":"10.1109/BWCCA.2011.79","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.79","url":null,"abstract":"In order to have an effective utilization of the radio wave resources, it is important to estimate propagation path in the urban area. In our previous work, we have examined the diffracted fields by two edges with an arbitrary angle in a horizontal plane. In this paper, we analyze the diffracted fields by one or two wedges and compare the effects that wedge shapes and materials give to the diffracted fields for horizontal and vertical polarized incidence. The numerical calculations are carried out for a wedge and two wedges, which are composed by various inner angles and different materials. We also discuss about the diffracted fields by a building rooftop and consider the effect of parapets added on the both sides of the building rooftop. The numerical results show that for one or two wedges, wedge shapes, materials and incident polarization don't give significant effect to diffracted fields, but the diffracted fields by a building rooftop are changed by the material and incident wave polarization.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131675220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Meng, Jiahong Wang, Eiichiro Kodama, T. Takata
{"title":"Enhancing Sensor Network Security by Reducing Radio-Wave Leakage","authors":"Nan Meng, Jiahong Wang, Eiichiro Kodama, T. Takata","doi":"10.1109/BWCCA.2011.57","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.57","url":null,"abstract":"Recently, the use of sensor networks has become common in various application areas involving military affairs, environmental protection, medical care, agriculture, and so forth. As a result, it becomes important to pay attention to the security issues on sensor networks so as to avoid information leakages. This paper proposes a routing-based approach against the radio-wave signal eavesdropping to enhance security of sensor networks. This is achieved by constructing a virtual network backbone for relaying packets securely. Simulation experimental results have confirmed the advantage of the new routing algorithm over existing approaches.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jau-Wu Huang, Chia-Mao Hung, Kai-Chao Yang, Jia-Shung Wang
{"title":"Probabilistic Target Coverage in Wireless Sensor Networks","authors":"Jau-Wu Huang, Chia-Mao Hung, Kai-Chao Yang, Jia-Shung Wang","doi":"10.1109/BWCCA.2011.54","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.54","url":null,"abstract":"The coverage problems have been studied in the recent years, most of them with limited detection capability therefore some pivotal sensors consume energy rapidly and there exist a large amount of partially unused sensors when the network lifetime terminated. We introduce an M-M (multiple sensors to multiple targets) probabilistic target coverage problem and its service solution for the wireless sensor networks (WSNs) in this paper to improve the utilization of randomly deployed sensors and to maximize the network lifetime as well. The intention of the M-M probabilistic target coverage problem is to detect/cover multiple targets by multiple sensors cooperatively and simultaneously, where each target is given a realistic detection probability threshold. We designed a heuristic algorithm to solve this problem. Simulation results show that the resulting network lifetime of our algorithm are longer than the target coverage approach, and our algorithm is more appropriate for the demand of the different observed target importance.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"58 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aniello Castiglione, G. Cattaneo, G. Maio, A. D. Santis
{"title":"Automatic, Selective and Secure Deletion of Digital Evidence","authors":"Aniello Castiglione, G. Cattaneo, G. Maio, A. D. Santis","doi":"10.1109/BWCCA.2011.64","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.64","url":null,"abstract":"The secure deletion of sensitive data can improve user privacy in many contexts and, in some extreme circumstances, keeping some information private can determine the life or death of a person. In fact, there are still several countries where freedom of expression is limited by authoritarian regimes, with dissidents being persecuted by their government. Recently, some countries have begun to make an effort to aid these people to communicate in a secure way, thus helping them to gain freedom. In this context, the present work can be a contribution in spreading the free use of Internet and, in general, digital devices. In countries where freedom of expression is persecuted, a dissident who would like to spread (illegal) information by means of the Internet should take into account the need to avoid as many traces as possible of his activity, in order to mislead eventual forensics investigations. In particular, this work introduces a methodology to delete a predetermined data set from a digital device in a secure and fast way, for example, with a single click of the mouse. All the actions required to remove the unwanted evidence can be performed by means of an automation, which is also able to remove traces about its execution and presence on the system. A post-mortem digital forensics analysis of the system will never reveal any information that may be referable to either the deleted data set or automation process.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Relational Compound Collaborative Filtering Recommendation System","authors":"Chiu-Ching Tuan, Chi-Fu Hung, Kuan-Wei Tseng","doi":"10.1109/BWCCA.2011.68","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.68","url":null,"abstract":"This paper presents a relational compound collaborative filtering (RCCF) recommendation system architecture, which integrated the behaviors associated mechanism and recommendation system to calculate the area associated values and the corresponding region of the recommended items rating, resulting in top-N list of the recommended item values. This system can avoid interested items in the MU¡¦s opposite direction and give higher weights value to the points of interest (POIs) in the predicted moving region in order to provide correct and real-time information and promote user satisfaction. We will use simulations to further verify the recommended accuracy and efficiency of the proposed RCCF recommendation system, but also look forward to apply on related mobile services.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Search Engine for an IaaS Based Cloud","authors":"Yuuta Ichikawa, M. Uehara","doi":"10.1109/BWCCA.2011.13","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.13","url":null,"abstract":"Cloud based online storage enables the storage of massive data. In these systems, a full text search engine is very important for finding documents. In this paper, we propose a distributed search engine suitable for searching a cloud. In our previous work, we developed a distributed search engine, the cooperative search engine (CSE). We now extend the CSE to search clouds. In a cloud, elasticity and reliability are important. We realize these by employing consistent hashing for distributed index files in the cloud. In this paper, we describe the improved CSE architecture and its implementation for a cloud search.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121099105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Milan Simek, Michael H. Fuchs, Lubomir Mraz, Patrik Moravek, Miroslav Botta
{"title":"Measurement of LowPAN Network Coexistence with Home Microwave Appliances in Laboratory and Home Environments","authors":"Milan Simek, Michael H. Fuchs, Lubomir Mraz, Patrik Moravek, Miroslav Botta","doi":"10.1109/BWCCA.2011.45","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.45","url":null,"abstract":"Due to a low installation cost of communication infrastructure, Low Power Wireless Area Networks (low PAN) presents an efficient solution for home and building automation. The low PANs operate in a microwave radio band that is often shared by several home appliances. Laptops, wireless routers, cordless phones and microwave ovens occupy the 2.4 GHz band without any channel allocation and thus interoperability with the low PAN systems presents a significant challenge. Therefore, we have performed several laboratory experiments to study the coexistence of low PAN devices with WiFi equipped laptop, WiFi router and microwave oven. The performance evaluation was based on a measurement of Packet Delivery Ratio (PDR) metric. Results shows that presence of the home appliances in the low PAN environment significantly affects the low PAN communication efficiency. Furthermore, we have deployed Zigbee based wireless network in the home environment to study the communication performance in area perturbed by common home radio interferences and obstacles. The lessons learned from network deployment are also presented within the paper.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment","authors":"Y. Lee, Sang-Soo Yeo, J. Park, L. Barolli","doi":"10.1109/BWCCA.2011.94","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.94","url":null,"abstract":"In this paper, We applied CCI canceller to remove multiple access interference in co-channel environment and improved performance of Impulse Radio UWB system. Also, we have evaluated the performance of UWB system with Truncated Type-II Hybrid ARQ scheme for achieving high quality data transmission.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Queue Management with the Stable Unit Average Calculation","authors":"Fumihiko Nakamura, T. Nakashima","doi":"10.1109/BWCCA.2011.92","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.92","url":null,"abstract":"The purpose of this research is to design a new queue management algorithm effectively controlling the heavy-tailed traffics. Among active queue managements (AQM), Random Early Detection (RED), has been widely used to improve the TCP throughput. The heavy-tailed traffic, however, generates the large fluctuation on the queue causing the degradation of fairness in terms of throughput and jitter performance. In this paper, we proposed the Stable time RED (ST-RED) to improve the fairness of throughput and jitter performance. ST-RED enables to stabilize the calculation timing for average queue length leading to suppress the queue fluctuations. We also implemented the ST-RED mechanism on the ns-2 simulator. As the results of simulation, we extracted the following features. Firstly, RED improves the throughput and reduce the overall load balance leading to the improvement of its fairness with all different alphas of the Pareto distribution. Secondly, ST-RED with 0.5 msec time interval slightly improves the throughput fairness for all traffics. In addition, our proposed method clearly improves the fairness of jitter on a large scale compared to the original RED.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}