By Topic

Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on

Date 22-27 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 78
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (2354 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (198 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xi - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Committee

    Page(s): xiii - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • list-reviewer

    Page(s): xvii - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Testbed Environment for Wireless Sensor and Actuator Networks

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (994 KB) |  | HTML iconHTML  

    The Wireless Sensor and Actuator Networks (WSAN's), defines collaborative operations between the sensors and the actuators, enabling distributed sensing of a physical phenomenon. In this paper, an integrated testbed consisted of wireless sensor network, server station and robot system is proposed. Our main contribution is in the design and development of the server and actuator tier software modules and the communication protocols between them. We provide new applications where actuators are part of the network and perform actions based on the information gathered by sensors. We describe some test scenarios for the potential use of the system. We envision that WSANs will be an integral part of the systems such as battlefield surveillance, nuclear, biological or chemical attack detection, home automation, and environmental monitoring. Our platform offers reusability, modularity and simplicity to the user. Furthermore, it is designed with cheap and off- the- shelf components. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication and Anti-replay Security Protocol for Wireless Sensor Networks

    Page(s): 7 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1040 KB) |  | HTML iconHTML  

    Wireless Sensor Networks are used in domains such as medical monitoring, homeland security, industrial automation and military applications, therefore it is very critical to protect the network against malicious attacks. This paper presents a new security protocol that provides conversation authentication, integrity, intrusion prevention and anti-replay protection. The protocol uses two methods in order to meet these requirements: the last MAC method and an authentication handshake. The protocol has been implemented in TinyOS in two layers of the communication stack: the MAC and Authentication layer. The MAC layer is the implementation of the last MAC method and the Authentication layer generates and verifies the four messages exchanged during the authentication handshake. Authentication and Anti-replay Security Protocol has been tested with TOSSIM in various attack scenarios and has proved that it is able to reject malicious attempts to communicate with the network nodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Network Management for Healthcare Applications

    Page(s): 14 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (951 KB) |  | HTML iconHTML  

    Telemedicine can be implemented using a sensor network that carries users' biometric information collected by tiny intelligent sensors attached to the human body. We propose a communication system that can be used for telemedicine to improve the Quality of Life of individuals, which uses a sensor network and a sensor database with mutual authentication to ensure security. Finally, this paper describes the priority control mechanism and experiments using it and clarifies the real-time performance of the proposed communication sensor network system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Evaluation of PMCMTP for Large-Scale Wireless Sensor Networks

    Page(s): 21 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1532 KB) |  | HTML iconHTML  

    One of the major concerns in wireless sensor networks (WSNs) is improving the network lifetime. This paper addresses the problem of energy saving in an IEEE 802.15.4a large-scale full mesh WSNs based on UWB technology. It presents a network architecture to facilitate resource sharing and to ensure load and energy balancing. With a particular focus on medium access control (MAC) protocols, we propose a multi-channel MAC protocol, Prioritized Multi-Channel Multi-Time slot MAC protocol (PMCMTP), that due to its intelligent management of spectrum resource and time slots, can simultaneously improve energy efficiency and network quality-of-service (QoS). To prove energy efficiency and QoS support of PMCMTP, we implement it in a discrete-time simulator built in JAVA. Simulations results show that PMCMTP succeeds to save energy and to enhance network QoS with a low overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol

    Page(s): 31 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming an important new path of research and attempts to counter these attacks. However, even if research finds solutions to counter known attacks, we show in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol. It is possible to hide data in PHY and MAC layers with steganographic techniques. In this article, we explain what steganography is, how we can use it in the layers of 802.15.4 protocol, how an attacker can do an attack and what we can do to detect this kind of threat. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion-Aware Routing in Wireless Sensor Networks

    Page(s): 37 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    In Wireless Sensor Networks, nodes collaborate to perform a single task or a set of related tasks. Data generated by sensors is very often correlated. Data/decision fusion has been proposed to avoid redundant data occupying network bandwidth and consuming energy. In military setting, this suppression is required also to defeat cryptanalysis efforts by adversaries. However, in most existing routing algorithms, fusion is incidental. We argue that a coupling between the two can result in early fusion thereby suppression of redundant transmission and better energy conservation. This study proposes a CDMA-based cross-layer design framework that enables early fusion in an energy-efficient, deterministic and scalable manner with upper bound on delivery time. The algorithm also allows time-series measurement history to be maintained, as required by many fusion techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness of Receiver-Driven Multi-hop Wireless Network with Soft-State Connectivity Management

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    Energy saving and ensuring robust data collection are the big subjects in realization of wireless sensor networks. In the intermittent receiver-driven data transmission (IRDT) protocol, which aims to save energy and get high reliability, communication between nodes commences when multiple receiver nodes transmit their own IDs intermittently and a sender node receives them. In this paper, we focused on the analogy between this periodic ID-transmission and a periodic message in the soft-state management. Soft state is often considered to have robustness against failures, therefore, we introduce it to IRDT for constructing a robust network. We propose a soft-state management of routing tables in IRDT, where each node uses the periodic ID-transmission not only for communication but also for update of a routing table. By computer simulation, we show that IRDT can achieve a 43.5% improvement in robustness against a sink node failure. Moreover, we show that the receiver-driven asynchronous intermittent transmission protocol suits for the soft-state management through comparison with the sender-driven asynchronous intermittent transmission protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Sensor Networks for VRU eSafety

    Page(s): 52 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (556 KB) |  | HTML iconHTML  

    Based on the experience from two predecessor projects, a novel architecture for the detection of vulnerable road users (VRU) is developed. It combines communication and localization, following the function principle of a secondary surveillance radar. Challenges are in the accuracy, the scalability, the bandwidth availability and the limited cost and complexity of the devices. This paper describes the objective of the overall project, the architectural approach of the wireless protocol and the design flow, which has been chosen for the development and is still in progress. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of IEEE 802.15.4 MAC in Beacon-Enabled Tree-Topology Wireless Sensor Networks

    Page(s): 58 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3725 KB) |  | HTML iconHTML  

    We investigate the performance of IEEE 802.15.4 MAC (Medium Access Control) sublayer in beacon-enabled tree-topology Wireless Sensor Networks (WSNs). To our knowledge, current literature has mostly focused on relatively simpler star topology or non-beacon-enabled peer-to-peer networks. In our work, we first respectively evaluate the impact of different traffic loads from the source nodes in each depth. Then we investigate the network performance with respect to different beacon orders. In both scenarios, the effects of different number of hops between source nodes and the sink are evaluated. NS-2 simulation results reveal that the traffic loads play a more important role than beacon orders. Furthermore higher depths (hops) severely affect the network performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Data Collection and Lifetime Improvement in Wireless Sensor Networks through Data Imputation

    Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    In this paper, a data imputation method, which can achieve robust data collection and also extend network lifetime for Wireless Sensor Networks, is proposed. Due to the lossy nature of the wireless medium, it is common for packets to be lost. In order to provide some reliability for the application layer, a data imputation method which predicts the data values contained in missing packets is proposed. The method is able to maximize the use of both temporal and spatial predictors. The proposed imputation method improves accuracy by up to 73% when compared with a previously proposed imputation method. The method can also be used to reduce the number of retransmissions in the network by up to 12% at the cost of a small increase in error, thus increasing the network lifetime of the wireless sensor network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CUPID - Communication Pattern Informed Duty Cycling in Sensor Networks

    Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Now that sensor networks are gradually deployed in commercial settings, they must live up to many expectations, particularly offering both years of unattended operation and low-delay event reporting. However, experiences from real-world trials have shown that decent trade-offs between these two conflicting goals are hard to find. In this paper, we show how staggered wake-ups achieve this. We call this low-delay and low-power duty cycle management scheme CUPID because its parameterization is based on the expected communication patterns in the network, duty-cycle and latency requirements. We show by simulations and real-world experiments with more than 150 nodes that our scheme significantly reduces the packet delay for low-duty cycle settings, especially in large networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Obstacle Handling in Context-Aware Multilayer Hierarchical Protocol for Wireless Sensor Networks

    Page(s): 76 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (419 KB) |  | HTML iconHTML  

    Application diversities of Wireless Sensor Networks (WSN) emphasize on consideration of all potential factors including obstacle appearance. However, most reputed protocols of WSN has no or little concerned with this issue. In this paper, simple obstacle detection techniques and their solutions for context aware hierarchical protocols are proposed. These techniques enrich the functionality and deployment ability of the network to a next higher level. Performance evaluation shows effective conjunction of the proposed techniques with the example protocol and durable functionality during obstacle emergence period. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ENS: An Energy Harvesting Wireless Sensor Network Platform

    Page(s): 83 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1679 KB) |  | HTML iconHTML  

    We present the Energy Neutral Speck (ENS) wireless sensor network platform. The ENS is a mote like platform powered by combination of photo-voltaic and battery power supplies. The design and implementation of the platform are described including the hardware, firmware and operating system along with the architecture and implementation of a software framework for interfacing with the network and visualisation and storage of sensor data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Mobile Event Movement on the Performance of Wireless Sensor Networks

    Page(s): 88 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (669 KB) |  | HTML iconHTML  

    In this paper, we investigate how the sensor network performs in the case when the event moves with special movement path. We compare the simulation results for four scenarios: when the event is stationary, moving randomly, moving with simple 4 path and boids path. The simulation results have shown that for the case when event is moving randomly the performance is the worst in the four scenarios. The characteristic of goodput decreases with the increase of number of sensor nodes. In the case of boids model, the gooput is unstable when the Tr is lower than 10 pps. The consumed energy characteristic increases with the increase of Tr. Simulation results show that the consumed energy of random movement is the worst among four scenarios. The consumed energy of boids model is the lowest in four cases. This shows that the event movement with boids model can decrease the consumed energy in the large scale WSNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Energy Consumption of Wireless Sensor Networks by SystemC

    Page(s): 94 - 98
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    Energy consumption is one of the most important metrics in wireless sensor networks because of the limited power supply in sensor nodes. Many efforts have been taken to reduce the energy consumption of the hardware, software, communication protocols and applications. Simulation is widely used to evaluate the performance of these new designs. Thus, it is necessary to accurately model the energy consumption during the simulation of WSN. In this paper, an energy model for WSN is proposed. It has been implemented in IDEA1, a simulator for WSN developed by SystemC and C++. It enables the energy estimation of both the hardware components of an individual node and the whole sensor network. It can be easily calibrated to different types of node if the electrical characteristics of the hardware components are available. An application based on IEEE 802.15.4 and MICAz motes is studied to demonstrate the capability of the energy model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiSe-Nodes: A Family of Node Prototypes for Wireless Sensor Networks

    Page(s): 99 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    A Wireless sensor network (WSN) consists of a potentially large number of sensor nodes with wireless-communication capabilities that work collaboratively to achieve a common goal. While every WSN application has specific requirements, there are some common basic services that any WSN must offer in order to support applications. There are available commercial WSN nodes offering such basic services, but they are still very expensive. So, we ask ourselves if it is possible to build a WSN node keeping low costs, while at the same time implementing these basic services: the answer is yes. We built sensor nodes and we call them WiSe-Nodes. In this paper we present the architecture of our WiSe-Nodes as well as the details about their hardware modules. We present also an hybrid MAC-routing protocol called WASP that implements the basic services of a WSN. Finally, as a tool for the WSN developers we introduce our simulator YAWSS that provides a controlled test environment where new WSN protocols can be tested and executed before implementing them in hardware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicular Networks in a Computerized City Using Safe Mobile

    Page(s): 105 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (476 KB) |  | HTML iconHTML  

    The paper is aimed to describe innovative assets tracking applications using Safe Mobile remote control units, based on S4I development platform. The wireless monitoring system enables different types of vehicular units to communicate with each other. Also, the units are able to contact and to be contacted by a central dispatch entity. Client or web-hosted applications, hosted on central servers, in the cloud, can be accessed by the end user both for receiving real-time data from the monitored units and sending out the commands. The system brings major achievements to the wireless communication in vehicular networks, the most important one being the reduction of the amount of time in which an emergency situation is identified and resolved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.