2008 New Technologies, Mobility and Security最新文献

筛选
英文 中文
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks 基于voronoi的无线传感器网络目标跟踪工程
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.102
Manel Abdelkader, Mohamed Hamdi, N. Boudriga
{"title":"Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks","authors":"Manel Abdelkader, Mohamed Hamdi, N. Boudriga","doi":"10.1109/NTMS.2008.ECP.102","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.102","url":null,"abstract":"Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee an optimal event detection rate. This paper proposes a tracking framework based on Voronoi tessellations. Two mobility models are proposed to control the coverage degree according to target presence. The objective is to set a non-uniform coverage within the monitored zone to allow detecting the target by multiple sensor nodes. Moreover, we introduce an algorithm to discover redundant nodes (which do not provide additional information about target position). This algorithm is shown to be effective in reducing the energy consumption using an activity scheduling approach.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobility Support and Improving GPSR Routing Approach in Vehicular Ad Hoc Networks 车载Ad Hoc网络中的移动性支持和改进GPSR路由方法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.64
N. Brahmi, M. Boussedjra, J. Mouzna
{"title":"Mobility Support and Improving GPSR Routing Approach in Vehicular Ad Hoc Networks","authors":"N. Brahmi, M. Boussedjra, J. Mouzna","doi":"10.1109/NTMS.2008.ECP.64","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.64","url":null,"abstract":"This paper gives an overview of the current research that we are carrying out on intelligent transportation system (ITS). Through our work, we intend to propose hybrid architecture for vehicular communication providing safety and non-safety services for mobile users. The proposed architecture will use the existing wireless technologies to assure the transfer of security messages in the vehicular network. The main focus would be on designing reliable routing protocol and to ensure an effective mobility management scheme in the vehicular environment.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets 基于时间Petri网的无线多跳传感器网络中一种新型节能跨层MAC协议的形式化建模与验证
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.47
Kechar Bouabdellah, L. Sekhri
{"title":"Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets","authors":"Kechar Bouabdellah, L. Sekhri","doi":"10.1109/NTMS.2008.ECP.47","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.47","url":null,"abstract":"Technological Advances in microelectronic and wireless communication fields has facilitated the development of smart and more efficient sensors that communicate wirelessly to form a so called Wireless Sensor Networks (WSN). Among the main research objectives in WSN field is the development of protocols and algorithms allowing minimal energy consumption. Most proposed solutions are based on layered design approach in which the designing optimal strategies are focused on a single layer only. Recently, other works tend to exploit together many layers by using interaction or unification strategy in order to optimize energy consumption. In this paper, we propose a cross-layer medium access control (CL-MAC) protocol using two adjacent layers to decrease considerably the energy consumption and to improve the latency in WSN. The basic idea behind our proposal is to wake-up only nodes included into a routing path from the source node to the base station (Sink) by exploiting routing information while other nodes leave maintained as long time as possible in a sleep mode. We focus essentially on the formal modelling of CL-MAC by using time Petri net and the formal validation of its properties by employing TiNA tool. The preliminary results demonstrate that CL-MAC is perfectly alive, bounded and reversible.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
WMTP - A Modular WSN Transport Protocol: The Fairness Module WMTP -模块化WSN传输协议:公平性模块
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.103
Luís D. Pedrosa, R. Rocha
{"title":"WMTP - A Modular WSN Transport Protocol: The Fairness Module","authors":"Luís D. Pedrosa, R. Rocha","doi":"10.1109/NTMS.2008.ECP.103","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.103","url":null,"abstract":"A new modular transport layer protocol for wireless sensor networks (WSNs) is proposed: WMTP - Wireless Modular Transport Protocol. This protocol not only allows the simultaneous use of all the main features commonly found in WSN transport protocols, namely congestion-control, fairness, and reliability, but also does so in a modular fashion. This way, the application layer can choose to use exactly the features that it requires. Additionally, WMTP also provides a set of uncommon features such as throttling, flow-control, transport layer quality- of-service, and optional integration with service-discovery. Focusing specifically on the fairness feature, experimental results show that the network resources are appropriately divided whether a simple fairness semantic is used, or in the presence of weighted differentiation. Additionally, this feature is shown to operate with minimal energy cost, as the protocol overhead is less than 10%.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint Optimization of Node Cooperation and Energy Saving in Wireless Sensor Networks with Multiple Access Channel Setting 多址无线传感器网络节点协作与节能的联合优化
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.55
N. MirMotahhary, S. Fakoorian, Hamed Asadi, R. Khaniki, Z. Rahimkhani
{"title":"Joint Optimization of Node Cooperation and Energy Saving in Wireless Sensor Networks with Multiple Access Channel Setting","authors":"N. MirMotahhary, S. Fakoorian, Hamed Asadi, R. Khaniki, Z. Rahimkhani","doi":"10.1109/NTMS.2008.ECP.55","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.55","url":null,"abstract":"Two critical issues in wireless sensor networks are cooperation of nodes and the limited availability of energy within network nodes. A widely employed energy-saving technique is to place nodes in sleep mode, corresponding to low-power consumption as well as to reduced operational capabilities. This causes a node may try to maximize the benefits it gets from the network without participating to its services (e.g. without forwarding packets of other nodes). To conquer with this problem, node cooperation schemes have been investigated in the literature. Therefore, it is crucial to find the optimal trade-off between the amount of cooperation and the amount of energy saving. In this work, we develop an analytical model of a sensor network which not only stimulates nodes to cooperation but also tries to satisfy energy consumption. In our scheme, nodes may enter a sleep mode while active nodes in a relay zone (Vakil and Liang, 2006) are allowed to cooperate with the source. We use this model to investigate the system performance in terms of node cooperation, energy consumption, and network capacity. Furthermore, the proposed model enables us to investigate the trade-off existing between these performance metrics. Numerical results show that the proposed scheme is successful in increasing node cooperation while energy consumption is satisfied.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Analysis and Security Optimizations for the Context Transfer Protocol 上下文传输协议的安全性分析与安全性优化
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.87
F. Allard, J. Combes, R. López, A. Gómez-Skarmeta
{"title":"Security Analysis and Security Optimizations for the Context Transfer Protocol","authors":"F. Allard, J. Combes, R. López, A. Gómez-Skarmeta","doi":"10.1109/NTMS.2008.ECP.87","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.87","url":null,"abstract":"Protocol security dealing with mobility is strongly necessary since mobile nodes are more prone to attacks. The Context Transfer Protocol allows applications running on mobile nodes to operate with minimal disruption by transferring contexts between access routers. In this paper, after a practical study using the AVISPA tool and a more conceptual one, we will show that this protocol does not work in a secure way. We will then propose a first solution to fix the security flaws. However, this solution decreases the context transfer efficiency. Hence, we will finally propose a second solution based on Cryptographically Generated Addresses that guarantees the same security level than the first one and is as efficient as the original CXTP specification.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism 具有二进制退退机制的饱和802.16网络性能评估
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.77
H. Vu, Sammy Chan
{"title":"Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism","authors":"H. Vu, Sammy Chan","doi":"10.1109/NTMS.2008.ECP.77","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.77","url":null,"abstract":"We propose in this paper an analytical model to evaluate the average packet delay and its standard deviation in a saturated IEEE 802.16 network with the binary exponential backoff mechanism. In particular, we develop a simple fixed point analysis to approximate the probability that a bandwidth request is unsuccessful in such a network. A closed form expression for the mean and standard deviation of the delay are then derived from the model as a function of the system parameters. The accuracy of the analytical model is evaluated by comparing with simulation results over a wide range of operating conditions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128900664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Dynamic Mobility Management Scheme Designed for Flat IP Architectures 面向平面IP架构的分布式动态移动管理方案
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.8
P. Bertin, S. Bonjour, J. Bonnin
{"title":"A Distributed Dynamic Mobility Management Scheme Designed for Flat IP Architectures","authors":"P. Bertin, S. Bonjour, J. Bonnin","doi":"10.1109/NTMS.2008.ECP.8","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.8","url":null,"abstract":"Current mobility management approaches are highly centralized and hierarchical. They make use of centralized anchors located in core networks, responsible for forwarding traffic to/from mobile nodes' location. Emerging networks standards developed for new broadband cellular radio interfaces are use flat architecture where control functions are deployed in network edges such as evolved base stations. In order to better fit to such distributed logic while optimizing handover efficiency and minimizing traffic encapsulation, we propose a new scheme designed for mobility management in flat architectures. Our scheme dynamically anchors mobile nodes' traffic in access nodes, depending on their location when sessions are set up. A first estimation shows that we can obtain low handover delays, promising for future adoption and development of our distributed and dynamic approach.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service 在VoIP业务上部署电信业务基础设施安全保障监控框架
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.38
Moussa Ouedraogo, D. Khadraoui, Benoît De Rémont, E. Dubois, H. Mouratidis
{"title":"Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service","authors":"Moussa Ouedraogo, D. Khadraoui, Benoît De Rémont, E. Dubois, H. Mouratidis","doi":"10.1109/NTMS.2008.ECP.38","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.38","url":null,"abstract":"In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing stakeholders with quantifiable evidences that the countermeasures deployed on the system are operating adequately is an important step towards better control of security failures for network administrators on one hand, and an increase in end users' trust in using these systems on the other. It is in that perspective that BUGYO, a methodology to assess the security of telecommunication networks and services in terms of assurance levels, was proposed to address the shortcomings of existing security assurance and risks management methodologies in measuring, documenting and maintaining security assurance of telecommunication services. In this paper, we provide an overview of the BUGYO methodology and we demonstrate its applicability (mainly with respect to the specification of assurance metrics) on a VoIP service infrastructure based on open source components.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance Evaluation of the Location-Based Protocol DREAM for Large Mobile Ad Hoc Networks 大型移动自组织网络中基于位置的协议DREAM的性能评价
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.78
M. Bakhouya, N. Cottin
{"title":"Performance Evaluation of the Location-Based Protocol DREAM for Large Mobile Ad Hoc Networks","authors":"M. Bakhouya, N. Cottin","doi":"10.1109/NTMS.2008.ECP.78","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.78","url":null,"abstract":"Position-based routing protocols were recently proposed as a solution to non-scalable topology-based routing protocols for large scale mobile ad hoc networks. In these position-based routing protocols, nodes may not maintain explicit routes. Each node needs only to know its own position and the position of its one-hop neighbors to forward packets. In this paper, a performance evaluation of the position-based routing protocol DREAM for large scale ad hoc networks is presented. Several performance metrics such as the control load and the average latency are evaluated using ns2 for up to 500 nodes generated according to the realistic mobility model RealMobgen.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116569647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信