{"title":"Sensor Networks with Decentralized Binary Detection: Clustering and Lifetime","authors":"G. Ferrari, M. Martalò","doi":"10.1109/SAHCN.2006.288525","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288525","url":null,"abstract":"In this paper, we analyze the lifetime of clustered sensor networks with decentralized binary detection under a physical layer quality of service (QoS) constraint, given by the maximum tolerable probability of decision error at the access point (AP). In order to properly model the network behavior, we consider four different distributions (exponential, uniform, Rayleigh, and lognormal) for the single sensors' lifetime. We show the benefits, in terms of longer network lifetime, of adaptive reclustering. On the other hand, absence of reclustering leads to a shorter network lifetime, and we show the impact of various clustering configurations under different QoS conditions. Our results show that the organization of sensors in a few big clusters is the winning strategy to maximize the network lifetime","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"27 1","pages":"645-650"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88160426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Metrics for Adaptive Routing","authors":"L. Qin, T. Kunz","doi":"10.1109/SAHCN.2006.288564","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288564","url":null,"abstract":"Most existing mobile ad hoc routing protocols preset the parameters for the nodes based on some assumed network conditions. Because of the dynamic characteristics of a MANET, network conditions are changing at different points of time. Adaptively adjusting routing behavior by individual nodes will improve the routing protocol performance. In this paper, we mainly focus on the node mobility, and show the correlation between overall performance and node mobility level with simulation results for three different mobility models. We also study the effect of the mobility from point of view of individual nodes. Finally we propose the number of link breakages as a mobility metric, which is mobility model independent, that nodes can use it to monitor the environment changes","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"29 1","pages":"803-808"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82836151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology Discovering Mechanism for Power Saving in Ad-hoc Wireless Networks","authors":"A. Zabian","doi":"10.1109/SAHCN.2006.288581","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288581","url":null,"abstract":"Power saving is an important issue in ad-hoc wireless networks, where no centralized communication is issued. Each node works as router to the others to allow the network connectivity. So, each node consumes parts of its energy in a forwarding others packets. In this paper we propose a self adjustment power saving mechanism for routing in ad-hoc wireless networks that results in significant power saving for all the network. Our mechanism is based on TDA (topology discovering algorithm) in which each node knows who are the active nodes in a fraction of the network. By determined simulation experiments, our simulation results show that in a topology like that constructed by TDA, the power consumption in routing is independent on the network size and is related only to the height of the tree built by the algorithm and to the packet size","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"33 1","pages":"910-915"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78809290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Services in Wireless Sensor Networks Using Sparse Random Coding","authors":"F. Delgosha, Erman Ayday, K. Chan, F. Fekri","doi":"10.1109/SAHCN.2006.288407","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288407","url":null,"abstract":"The task of providing security services for wireless sensor networks is not trivial due to the resource constraints of the sensor nodes. An adversary may launch a wide range of attacks including eavesdropping, message forgery, packet dropping, and noise injection. In this paper, we propose random coding security (RCS) that provides protection against all the aforementioned attacks. For this purpose, the proposed protocol makes extensive use of node collaboration and data redundancy. Moreover, using location information, we both localize adversarial activities to the area under attack and enhance routing the data toward the sink. The objectives of using the novel idea of sparse random coding in RCS are twofold. First, every node generates correlated data by calculating random linear combinations of the received packets. Hence, the availability of the data at the receiver is guaranteed with a high probability. The second advantage is the feasibility of implementing the RCS in the real case scenario in which the communication media between the sensors is usually modeled as the erasure channel. The existing protocols cannot be trivially modified to suit this realistic situation. In the overall, RCS provides many security services with computation and communication overheads comparable with other schemes","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"57 1","pages":"40-49"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77037085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering Ad Hoc Networks: Schemes and Classifications","authors":"D. Wei, A. Chan","doi":"10.1109/SAHCN.2006.288583","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288583","url":null,"abstract":"Many clustering schemes have been proposed for different ad hoc networks and play an important role in self organizing them. A systematic classification of these clustering schemes enables one to better understand and make improvements. This paper surveys clustering schemes and classifies them into ad hoc sensor network clustering schemes and mobile ad hoc network clustering schemes. In sensor networks, the energy stored in the network nodes is limited and usually infeasible to recharge; the clustering schemes for these networks therefore aim at maximizing the energy efficiency. In mobile ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the increase of the overhead message in topology maintenance; the clustering schemes for mobile ad hoc networks therefore aim at handling topology maintenance, managing node movement or reducing overhead","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"37 1","pages":"920-926"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73750393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Worst-Case Coverage of Directional Field-of-View Sensor Networks","authors":"Jacob Adriaens, S. Megerian, M. Potkonjak","doi":"10.1109/SAHCN.2006.288438","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288438","url":null,"abstract":"Sensor coverage is a fundamental sensor networking design and use issue that in general tries to answer the questions about the quality of sensing (surveillance) that a particular sensor network provides. Although isotropic sensor models and coverage formulations have been studied and analyzed in great depth recently, the obtained results do not easily extend to, and address the coverage of directional and field-of-view sensors such as imagers and video cameras. In this paper, we present an optimal polynomial time algorithm for computing the worst-case breach coverage in sensor networks that are comprised of directional \"field-of-view\" (FOV) sensors. Given a region covered by video cameras, a direct application of the presented algorithm is to compute \"breach\", which is defined as the maximal distance that any hostile target can maintain from the sensors while traversing through the region. Breach translates to \"worst-case coverage\" by assuming that in general, targets are more likely to be detected and observed when they are closer to the sensors (while in the field of view). The approach is amenable to the inclusion of any sensor detection model that is either independent of, or inversely proportional to distance from the targets. Although for the sake of discussion we mainly focus on square fields and model the sensor FOV as an isosceles triangle, we also discuss how the algorithm can trivially be extended to deal with arbitrary polygonal field boundaries and sensor FOVs, even in the presence of rigid obstacles. We also present several simulation-based studies of the scaling issues in such coverage problems and analyze the statistical properties of breach and its sensitivity to node density, locations, and orientations. A simple grid-based approximation approach is also analyzed for comparison and validation of the implementation","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"3 1","pages":"336-345"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74976411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the Computational Cost of Bayesian Indoor Positioning Systems","authors":"Konstantinos Kleisouris, R. Martin","doi":"10.1109/SAHCN.2006.288512","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288512","url":null,"abstract":"In this work we show how to reduce the computational cost of using Bayesian networks for localization. We investigate a range of Monte Carlo sampling strategies, including Gibbs and Metropolis. We found that for our Gibbs samplers, most of the time is spent in slice sampling. Moreover, our results show that although uniform sampling over the entire domain suffers occasional rejections, it has a much lower overall computational cost than approaches that carefully avoid rejections. The key reason for this efficiency is the flatness of the full conditionals in our localization networks. Our sampling technique is also attractive because it does not require extensive tuning to achieve good performance, unlike the Metropolis samplers. We demonstrate that our whole domain sampling technique converges accurately with low latency. On commodity hardware our sampler localizes up to 10 points in less than half a second, which is over 10 times faster than a common general-purpose Bayesian sampler. Our sampler also scales well, localizing 51 objects with no location information in the training set in less than 6 seconds. Finally, we present an analytic model that describes the number of evaluations per variable using slice sampling. The model allows us to analytically determine how flat a distribution should be so that whole domain sampling is computationally more efficient when compared to other methods","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"91 1","pages":"555-564"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73651512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ece Gelal, G. Jakllari, S. Krishnamurthy, N. Young
{"title":"Topology Control to Simultaneously Achieve Near-Optimal Node Degree and Low Path Stretch in Ad hoc Networks","authors":"Ece Gelal, G. Jakllari, S. Krishnamurthy, N. Young","doi":"10.1109/SAHCN.2006.288499","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288499","url":null,"abstract":"Our objective in this paper is to design topology control algorithms such that (i) nodes have low degree and (ii) paths in the network have few hops. Low node degree is desirable in networks equipped with smart antennas and to reduce access contention. Short paths are desirable for minimizing communication delays and for better robustness to channel impairments and to mobility. Given any arbitrary unit-disc graph G representing all feasible links, our algorithms find a sparse subgraph G' having a maximum node degree of six and, for each pair of vertices u, v, having hopsG'(u, v) = O(hopsG(u,v) + logDelta), where Delta is the maximum node degree in G and hops G(u, v) denotes the shortest path length from u to v in G. This result is near-optimal: (i) there is a connected UDG G in which no connected subgraph has degree less than five, and (ii) for any graph G, any bounded-degree subgraph G' must have hopsG'(u, v) = Omega(hopsG(u, v) + logDelta) for some u, v. Our distributed algorithm scales, preserves link symmetry, does not need node synchronization, and requires only O(n) messages. We perform extensive simulations that quantify the performance of our algorithm in realistic scenarios","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"30 1","pages":"431-439"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82811246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Hybrid Multi Routing Protocol For Ad Hoc Wireless Network","authors":"Chaorong Peng, Chang Wen Chen","doi":"10.1109/SAHCN.2006.288565","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288565","url":null,"abstract":"Dynamic hybrid multi routing protocol (DHMRP) is proposed to overcome re-discovered route path to be reply path in traditional routing protocol. The protocol utilizes the reply path based on the hybrid clustering hierarchical establishment of multi routing path to gain an automatic monitoring and repairing broken links in ad hoc networks. And due to reply path and multi routing path shall exist separately in network to gain mitigation traffic \"bottlenecks\" of ClusterHeads so that improving clusters stability. Performance comparison of DHMRP with AOMDV using Glomosim simulation shows that DHMRP is able to achieve a lower data delay and route discovery ratio and higher packets deliver ratio","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"580 1","pages":"809-816"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85316234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth Consumption for Providing Fair Internet Access in Wireless Mesh Networks","authors":"T. Scherer, T. Engel","doi":"10.1109/SAHCN.2006.288555","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288555","url":null,"abstract":"The contribution of this work is to examine the performance of WMNs concerning bandwidth. Here, we provide a lower bound for bandwidth utilization in mesh networks. We analyze how much bandwidth may be provided to all mesh nodes if they communicate over one wireless communication channel and use the same gateway to the Internet. Even in such a scenario where devices compete on the access to the wireless channel it is possible to operate without bandwidth loss and share this bandwidth uniformly over the set of mesh nodes. This is achievable by optimizing spatial reuse. Here, this is achieved by scheduling channel access using time slots. Of course, this is not possible for every network topology. We measure the fraction of topologies that may operate with a uniformly shared maximum bandwidth","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"75 1","pages":"746-750"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81351335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}