By Topic

Mobile Ad-hoc and Sensor Networks, 2008. MSN 2008. The 4th International Conference on

Date 10-12 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • A Welcome from the Technical Program Chairs

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Connectivity in Multi-radio Multi-channel Wireless Mesh Networks

    Publication Year: 2008, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Wireless mesh networks are emerging as a favorable technology for last-mile Internet access. Nodes in WMNs can be equipped with multiple radios which work in different channels to increase the available bandwidth. In this work, we present an analytical model for almost surely k-connectivity of WMNs with multi-radio multi-channel in two-dimensional case through a random uniform distribution and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks

    Publication Year: 2008, Page(s):9 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared radio communication channel. We consider two randomized leader election protocols the first one is due to Nakanoand Olariu (2000); the second one is due to Cai, Lu and Wang (2003) and propose combinations which give us an improvement of both of them. We show that with discrete starting poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks

    Publication Year: 2008, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Wireless sensor networks are widely used for monitoring applications. The monitored area and the intrusion object are mostly three dimensional. In this paper, we are particularly interested in a sensor network used for monitoring a field to detect intrusion objects such as submarine in some sea area, or goods on shelves in warehouse. In these applications, sensors float in different depth of water... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks

    Publication Year: 2008, Page(s):23 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Although topology control has been extensively studied for stationary sensor networks, few theoretical results on topology control for mobile sensor networks (MSN) have been reported yet. In this paper, we propose two O(n3) time topology control algorithms, centralized and distributed versions respectively, under a variant rate mobile network model (VRMN). In VRMN each sensor node may m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hector is an Energy Efficient Tree-Based Optimized Routing Protocol for Wireless Networks

    Publication Year: 2008, Page(s):31 - 38
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    This paper considers the problem of designing power efficient routing with guaranteed delivery for sensor networks with known distances between neighbors but unknown geographic locations. We propose Hector, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other is based on hop distances t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-channel and Power Controlled Based AODV for Throughput Improvement in Multi-hop Ad Hoc Networks

    Publication Year: 2008, Page(s):39 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    We propose a solution which aims at improving the throughput in multi-hop ad hoc networks. This solution equips nodes with multiple radio interfaces and dedicates a separate radio channel to each. It firstly assigns channels to transmission links so as nodes receive and emit data simultaneously. Then it enhances the routing protocol so that it takes into account both the channel diversity and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Opportunistic Data Retrievals in Challenged Environments

    Publication Year: 2008, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption tolerant network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Several DTN routing schemes have been proposed. However, very few work has been done on providing informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signature Scheme with Arbitrary Length Message Recovery in CPK

    Publication Year: 2008, Page(s):55 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Digital signature with message recovery is regard as a useful method to shorten signature. This paper presents an identity-based signature scheme with message recovery, which applies to the Combined Public Key System. The scheme is provable secure against existential forgery against adaptively chosen message and ID attacks in the random oracle model under the elliptic curve discrete logarithm assu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID and Information Security in Supply Chains

    Publication Year: 2008, Page(s):59 - 62
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context whe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMNDP: A Practical and Provably Secure Multi-path Source Routing

    Publication Year: 2008, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    A few of existing multi-path routing protocols also address security issues. In this paper, a concept of plausible-route set is presented. Based on this notion, a definition of security for multiple node-disjoint paths secure source routing protocol is proposed and developed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Deployment Strategy for Collaborative Target Detection with Guaranteed Accuracy

    Publication Year: 2008, Page(s):68 - 71
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Sensor deployment is a key issue in target detection. While a lot of works have been done to achieve "physical coverage'', few work addresses meeting high detection accuracy presented as a specific high detection probability and a low false alarm rate. In this paper, we employ a data-fusion based collaborative detection scheme for achieving guaranteed accuracy in sensor deployment. A "density firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectivity Based Greedy Algorithm with Multipoint Relaying for Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):72 - 76
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    It is proved that multipoint relaying (MPR) is an efficient strategy for on-the-fly broadcasting in mobile ad hoc networks . Upon receiving a flooding packet, each relaying node designated by the packet selects nodes from its neighbors for next packet relay. All the selected relaying nodes finally form a connected dominating set (CDS) for the network. However, computing a minimum size CDS is NP ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Gossip-Enabled Spatial Index for Moving Object Management over Wireless Sensor Networks

    Publication Year: 2008, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    More and more users or applications showed high interest in obtaining moving object locations from a wireless sensor network. However, a moving object usually updates its location very frequently, and thus, a great number of messages for updating the locations in the wireless sensor networks are incurred. In this paper, we propose an index structure, called the gossip-enabled spatial index tree (G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Interdomain Multicast Delivery in Disruption Tolerant Networks

    Publication Year: 2008, Page(s):81 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption tolerant network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. In the past, we have proposed two intradomain multicast routing schemes, namely the context-aware multicast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Protocol Using Bloom Filters for Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):89 - 94
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (829 KB) | HTML iconHTML

    We propose a novel routing protocol for mobile ad hoc networks, which uses bloom filters and the topology information about neighbor nodes. A bloom filter is often used as a content discovery method. In this case, content's ID is hashed to one value and a bloom filter is generated from the value. In our proposed protocol, node ID is hashed to one value, and a bloom filter is generated from such va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference-Aware QoS Routing in Wireless Mesh Networks

    Publication Year: 2008, Page(s):95 - 98
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Wireless interference can make a significant impact on the performance of a wireless network. The paper studies TDMA-based timeslot allocation to schedule links efficiently under RTS/CTS interference model of wireless networks, and presents an efficient centralized timeslot assignment algorithm. In addition, the paper presents an effective heuristic algorithm for calculating end-to-end bandwidth o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-metric QoS Routing Method for Ad Hoc Network

    Publication Year: 2008, Page(s):99 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    A multimetric QoS routing protocol (MQOLSR) is proposed in this paper, which providing different QoS for different applications flow in an ad hoc network. The protocol, which integrates QoS measurement and packet forwarding, expands the topology discovery and routing computing mechanism of the OLSR protocol. It can provide different routing and forwarding service according to different application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.