Catálogo de publicaciones - libros

Compartir en
redes sociales


Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings

Hongke Zhang ; Stephan Olariu ; Jiannong Cao ; David B. Johnson (eds.)

En conferencia: 3º International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) . Beijing, China . December 12, 2007 - December 14, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-77023-7

ISBN electrónico

978-3-540-77024-4

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Area Localization Algorithm for Mobile Nodes in Wireless Sensor Networks Based on Support Vector Machines

Bin Yang; Jianhong Yang; Jinwu Xu; Debin Yang

Many applications in wireless sensor networks require sensor nodes to obtain their absolute or relative positions. Although various localization algorithms have been proposed recently, most of them require nodes to be equipped with range measurement hardware to obtain distance information. In this paper, an area localization method based on Support Vector Machines (SVM) for mobile nodes in wireless sensor networks is presented. Area localization is introduced as an evaluation metric. The area localization procedure contains two phases. Firstly, the RF-based method is used to determine whether the nodes have moved, which only utilizes the value change of RSSI value rather than range measurement. Secondly, connectivity information and SVM algorithm are used for area localization of mobile nodes. The area localization is introduced to trade off the accuracy and precision. And area localization, as a new metric, is used to evaluate our method. The simulation experiments achieve good results.

- Self-organization and Synchronization | Pp. 561-571

A Dual-Token-Based Fault Tolerant Mutual Exclusion Algorithm for MANETs

Weigang Wu; Jiannong Cao; Michel Raynal

Most existing mutual exclusion algorithms for mobile ad hoc networks (MANETs) adopt a token-based approach. In traditional wired networks, timeout-based mechanisms are commonly used to detect token losses. However, in MANETs, it is difficult to set a proper timeout value due to the network dynamics. In this paper, we propose a dual-token-based mutual exclusion algorithm, which can tolerate token losses without using timeout. Two tokens are concurrently circulated in the system to monitor each other by using sequence numbers. If one token is lost, the other token can detect the loss and regenerate a new token. Simulations have been carried out to evaluate the effectiveness and performance of the proposed algorithm in comparison with the timeout-based approach. The results show that the timeout-based algorithm may falsely claim the loss of a token, thus cannot guarantee the correctness of mutual exclusion algorithms. On the contrary, our proposed algorithm can avoid false detection of token losses and satisfy all the correctness requirements of mutual exclusion, though it costs a bit more messages and longer time.

- Self-organization and Synchronization | Pp. 572-583

Study of a Cost-Effective Localization Algorithm in Wireless Sensor Networks

Xin Li; Bei Hua; Yan Guo

Most of the current RSS (Received Signal Strength)-based localization algorithms in Wireless Sensor Networks (WSNs) rely on isotropic radio propagation model to infer the distance between a pair of nodes from received signal strength, which however has been proved to be quite unreliable in recent research work. Performance analysis is important to evaluate the applicability of a localization algorithm, however little work has been done on evaluating the existing localization algorithms in simulated realistic settings. This paper firstly presents the motivation and detailed implementation of a proposed Link-State Based Annulus (LSBA) localization algorithm, and then gives a panorama of performance comparison among LSBA and other four localization algorithms in terms of estimation error, convergence speed, computational complexity and communication cost in the simulated realistic environment. Simulation results show that LSBA achieves the best tradeoff among all the four metrics in WSNs with moderate number of anchors, and has good adaptability to irregular node deployment as well.

- Self-organization and Synchronization | Pp. 584-595

Research on Clustering Strategy for Wireless Sensor Network Based on Fuzzy Theory

Wei Zhenhua; Hou Xiaodong; Zhou Hong; Liu Chang’an

In wireless sensor network applications, effective clustering algorithm can reduce energy consumption, which can increase network scalability and lifetime. In most of traditional clustering methods, clusters do not form until their cluster heads are selected and these algorithms are usually running under the single data transmission mode. A clustering strategy for WSNs based on Fuzzy Cluster Mean (FCM) is proposed in this paper. It is a new clustering mechanism of generating the clusters first and then selecting the cluster head(CH). This strategy based on FCM has good characteristics of clustering quick, reducing energy consumption and being applied in different data transmission modes. The correctness and feasibility is validated in simulations. It is shown that energy consumption is better than the similar clustering algorithms. When different selection modes of CH are selected in this strategy, the clustering strategy based on FCM shows the best efficiency in two data transmission modes.

- Self-organization and Synchronization | Pp. 596-604

Performance Analysis of the Energy Fairness Cooperation Enforcement Mechanism (EFCEM) in Ad Hoc Networks

Wu Hao; Ding Yi-ming; Li Cheng-shu

Mobile ad hoc networks must operate independent of fixed or centralized network management infrastructure, the communication between nodes rely on the node’s cooperation, so nodes’ selfish behavior to save the battery cost for their own communication cannot be neglect. However, general cooperation enforcement mechanisms do not consider node battery, so hotspot node issue may exist; even badly lead to network separation. This paper proposes an Energy Fairness Cooperation Enforcement Mechanism (EFCEM) in ad hoc networks. Theoretical analysis and numerical simulation results show that the EFCEM protocol, comparing with the traditional reputation mechanisms, can prolong networks existence time and improve network throughput, but at the cost of a little more packets delay.

- Self-organization and Synchronization | Pp. 605-615

Analysis of Higher Order Voronoi Diagram for Fuzzy Information Coverage

Weixin Xie; Rui Wang; Wenming Cao

Coverage is one of the most important issues in sensor networks. For random sensor deployment, one would like to know whether the deployed sensors can cover the whole field sufficiently. In this paper, we attempt to find a set of critical points in a sensor field so as to answer the yes/no question of complete coverage only by checking whether these points are covered, which is based on a new model of fuzzy information coverage. The higher order Voronoi diagram is analyzed and a sufficient condition is provided for a sensor field which is completely fuzzy information covered by a given set of sensors. The corresponding algorithm in (KN+NlogN) runtime is also presented.

- Deployment and Application | Pp. 616-622

Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database

Song Han; Tharam S. Dillon; Elizabeth Chang

RFID, as an emerging technology, has very huge potential in today’s social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol. RFID mutual authentication is used to ensure that only an authorized RFID reader can access to the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. This paper will propose an anonymous mutual authentication protocol for RFID tag and reader. RFID tag is anonymous to RFID reader so that privacy can be preserved. In addition, mutual authentication does not need to rely on a back-end database.

- Deployment and Application | Pp. 623-632

ISMS-MANET: An Identifiers Separating and Mapping Scheme Based Internet Access Solution for Mobile Ad-Hoc Networks

Ping Dong; Hongke Zhang; Deyun Gao; Xiaohua Chen

Providing easy access to the Internet is a prerequisite for successful deployment of Mobile Ad-hoc Networks (MANET). This paper proposes an Identifiers Separating and Mapping Scheme (ISMS) based Internet access solution for MANET, called ISMS-MANET. Firstly, ISMS, which is a candidate for the future Internet architecture, is briefly described. Then, how the Ad hoc On-Demand Distance Vector (AODV) routing protocol can be used for connecting a MANET to the ISMS based Internet is discussed. In ISMS-MANET, the Access Router (AR) implements AODV protocol and works like a normal MANET node. The node in the MANET relies on the Route Reply message of AODV to find the AR. A prototype system is implemented. Performance analysis shows that ISMS-MANET has much faster handover and lower packet processing delay than the Mobile-IP based solution.

- Deployment and Application | Pp. 633-644

Using Packet Combination in Multi-query Optimization for Data Collection in Sensor Networks

Jun-Zhao Sun

In sensor networks, queries need to be jointly designed, in order to minimize the power consumption and maximize the lifetime. Data reduction techniques can be employed to decrease the size of data to be transferred in the network, and therefore save energy of sensor nodes. This paper presents a novel method for optimizing multi-query in sensor networks. Our approach is, by using packet combination techniques, to reduce the data size of multiple simultaneous queries, so that the energy for data transmission can be saved to the best extent. A delay item is specified together with the query by the application. Then an optimal query plan can be obtained by studying the best time of sending local data to sink that can lead to the minimum cost. Algorithm is described in detail. Performance analysis is performed to validate the effectiveness of the proposed method.

- Deployment and Application | Pp. 645-656

Relative Positions Within Small Teams of Mobile Units

Hongbin Li; Luis Almeida; Zhi Wang; Youxian Sun

It is common that a small group of autonomous mobile units requires location information of each other, but it is often not applicable to build infrastructure for location service. Hence, mobile units use RF signals to determine their relative positions within the group. Several techniques have been proposed for localization, but none of them consider both units mobility and anchor unavailability. In this paper we develop a propagation scheme for spreading the signal strength information through the network, and filtering techniques are employed to process the noisy signal. We use Floyd-Warshall algorithm to generate pairwise signal distance of each pair of units. Then Multidimensional Scaling technique is used to generate relative position from pairwise distances. Due to anchor unavailability, relative positions are adjusted by certain rules to reflect the continuous mobility. We verify our methods in MICAz platform. Experimental results show that we can obtain smooth relative positions under mobility and manage moving patterns of mobile units.

- Deployment and Application | Pp. 657-671