{"title":"Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks","authors":"Manel Abdelkader, Mohamed Hamdi, N. Boudriga","doi":"10.1109/NTMS.2008.ECP.102","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.102","url":null,"abstract":"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee an optimal event detection rate. This paper proposes a tracking framework based on Voronoi tessellations. Two mobility models are proposed to control the coverage degree according to target presence. The objective is to set a non-uniform coverage within the monitored zone to allow detecting the target by multiple sensor nodes. Moreover, we introduce an algorithm to discover redundant nodes (which do not provide additional information about target position). This algorithm is shown to be effective in reducing the energy consumption using an activity scheduling approach.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Support and Improving GPSR Routing Approach in Vehicular Ad Hoc Networks","authors":"N. Brahmi, M. Boussedjra, J. Mouzna","doi":"10.1109/NTMS.2008.ECP.64","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.64","url":null,"abstract":"This paper gives an overview of the current research that we are carrying out on intelligent transportation system (ITS). Through our work, we intend to propose hybrid architecture for vehicular communication providing safety and non-safety services for mobile users. The proposed architecture will use the existing wireless technologies to assure the transfer of security messages in the vehicular network. The main focus would be on designing reliable routing protocol and to ensure an effective mobility management scheme in the vehicular environment.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets","authors":"Kechar Bouabdellah, L. Sekhri","doi":"10.1109/NTMS.2008.ECP.47","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.47","url":null,"abstract":"Technological Advances in microelectronic and wireless communication fields has facilitated the development of smart and more efficient sensors that communicate wirelessly to form a so called Wireless Sensor Networks (WSN). Among the main research objectives in WSN field is the development of protocols and algorithms allowing minimal energy consumption. Most proposed solutions are based on layered design approach in which the designing optimal strategies are focused on a single layer only. Recently, other works tend to exploit together many layers by using interaction or unification strategy in order to optimize energy consumption. In this paper, we propose a cross-layer medium access control (CL-MAC) protocol using two adjacent layers to decrease considerably the energy consumption and to improve the latency in WSN. The basic idea behind our proposal is to wake-up only nodes included into a routing path from the source node to the base station (Sink) by exploiting routing information while other nodes leave maintained as long time as possible in a sleep mode. We focus essentially on the formal modelling of CL-MAC by using time Petri net and the formal validation of its properties by employing TiNA tool. The preliminary results demonstrate that CL-MAC is perfectly alive, bounded and reversible.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WMTP - A Modular WSN Transport Protocol: The Fairness Module","authors":"Luís D. Pedrosa, R. Rocha","doi":"10.1109/NTMS.2008.ECP.103","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.103","url":null,"abstract":"A new modular transport layer protocol for wireless sensor networks (WSNs) is proposed: WMTP - Wireless Modular Transport Protocol. This protocol not only allows the simultaneous use of all the main features commonly found in WSN transport protocols, namely congestion-control, fairness, and reliability, but also does so in a modular fashion. This way, the application layer can choose to use exactly the features that it requires. Additionally, WMTP also provides a set of uncommon features such as throttling, flow-control, transport layer quality- of-service, and optional integration with service-discovery. Focusing specifically on the fairness feature, experimental results show that the network resources are appropriately divided whether a simple fairness semantic is used, or in the presence of weighted differentiation. Additionally, this feature is shown to operate with minimal energy cost, as the protocol overhead is less than 10%.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. MirMotahhary, S. Fakoorian, Hamed Asadi, R. Khaniki, Z. Rahimkhani
{"title":"Joint Optimization of Node Cooperation and Energy Saving in Wireless Sensor Networks with Multiple Access Channel Setting","authors":"N. MirMotahhary, S. Fakoorian, Hamed Asadi, R. Khaniki, Z. Rahimkhani","doi":"10.1109/NTMS.2008.ECP.55","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.55","url":null,"abstract":"Two critical issues in wireless sensor networks are cooperation of nodes and the limited availability of energy within network nodes. A widely employed energy-saving technique is to place nodes in sleep mode, corresponding to low-power consumption as well as to reduced operational capabilities. This causes a node may try to maximize the benefits it gets from the network without participating to its services (e.g. without forwarding packets of other nodes). To conquer with this problem, node cooperation schemes have been investigated in the literature. Therefore, it is crucial to find the optimal trade-off between the amount of cooperation and the amount of energy saving. In this work, we develop an analytical model of a sensor network which not only stimulates nodes to cooperation but also tries to satisfy energy consumption. In our scheme, nodes may enter a sleep mode while active nodes in a relay zone (Vakil and Liang, 2006) are allowed to cooperate with the source. We use this model to investigate the system performance in terms of node cooperation, energy consumption, and network capacity. Furthermore, the proposed model enables us to investigate the trade-off existing between these performance metrics. Numerical results show that the proposed scheme is successful in increasing node cooperation while energy consumption is satisfied.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis and Security Optimizations for the Context Transfer Protocol","authors":"F. Allard, J. Combes, R. López, A. Gómez-Skarmeta","doi":"10.1109/NTMS.2008.ECP.87","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.87","url":null,"abstract":"Protocol security dealing with mobility is strongly necessary since mobile nodes are more prone to attacks. The Context Transfer Protocol allows applications running on mobile nodes to operate with minimal disruption by transferring contexts between access routers. In this paper, after a practical study using the AVISPA tool and a more conceptual one, we will show that this protocol does not work in a secure way. We will then propose a first solution to fix the security flaws. However, this solution decreases the context transfer efficiency. Hence, we will finally propose a second solution based on Cryptographically Generated Addresses that guarantees the same security level than the first one and is as efficient as the original CXTP specification.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism","authors":"H. Vu, Sammy Chan","doi":"10.1109/NTMS.2008.ECP.77","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.77","url":null,"abstract":"We propose in this paper an analytical model to evaluate the average packet delay and its standard deviation in a saturated IEEE 802.16 network with the binary exponential backoff mechanism. In particular, we develop a simple fixed point analysis to approximate the probability that a bandwidth request is unsuccessful in such a network. A closed form expression for the mean and standard deviation of the delay are then derived from the model as a function of the system parameters. The accuracy of the analytical model is evaluated by comparing with simulation results over a wide range of operating conditions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128900664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Dynamic Mobility Management Scheme Designed for Flat IP Architectures","authors":"P. Bertin, S. Bonjour, J. Bonnin","doi":"10.1109/NTMS.2008.ECP.8","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.8","url":null,"abstract":"Current mobility management approaches are highly centralized and hierarchical. They make use of centralized anchors located in core networks, responsible for forwarding traffic to/from mobile nodes' location. Emerging networks standards developed for new broadband cellular radio interfaces are use flat architecture where control functions are deployed in network edges such as evolved base stations. In order to better fit to such distributed logic while optimizing handover efficiency and minimizing traffic encapsulation, we propose a new scheme designed for mobility management in flat architectures. Our scheme dynamically anchors mobile nodes' traffic in access nodes, depending on their location when sessions are set up. A first estimation shows that we can obtain low handover delays, promising for future adoption and development of our distributed and dynamic approach.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moussa Ouedraogo, D. Khadraoui, Benoît De Rémont, E. Dubois, H. Mouratidis
{"title":"Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service","authors":"Moussa Ouedraogo, D. Khadraoui, Benoît De Rémont, E. Dubois, H. Mouratidis","doi":"10.1109/NTMS.2008.ECP.38","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.38","url":null,"abstract":"In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing stakeholders with quantifiable evidences that the countermeasures deployed on the system are operating adequately is an important step towards better control of security failures for network administrators on one hand, and an increase in end users' trust in using these systems on the other. It is in that perspective that BUGYO, a methodology to assess the security of telecommunication networks and services in terms of assurance levels, was proposed to address the shortcomings of existing security assurance and risks management methodologies in measuring, documenting and maintaining security assurance of telecommunication services. In this paper, we provide an overview of the BUGYO methodology and we demonstrate its applicability (mainly with respect to the specification of assurance metrics) on a VoIP service infrastructure based on open source components.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of the Location-Based Protocol DREAM for Large Mobile Ad Hoc Networks","authors":"M. Bakhouya, N. Cottin","doi":"10.1109/NTMS.2008.ECP.78","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.78","url":null,"abstract":"Position-based routing protocols were recently proposed as a solution to non-scalable topology-based routing protocols for large scale mobile ad hoc networks. In these position-based routing protocols, nodes may not maintain explicit routes. Each node needs only to know its own position and the position of its one-hop neighbors to forward packets. In this paper, a performance evaluation of the position-based routing protocol DREAM for large scale ad hoc networks is presented. Several performance metrics such as the control load and the average latency are evaluated using ns2 for up to 500 nodes generated according to the realistic mobility model RealMobgen.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116569647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}