Suchen und Finden
Mehr zum Inhalt
Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecomm. Eng. Vol 28 - First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers
Preface
5
Organization
6
Table of Contents
10
1st ICST International Conference on Ad Hoc Networks
16
Supporting Proactive Application Event Notification to Improve Sensor Network Performance
17
Introduction
17
Goals and Challenges of WSN Architectures and Middleware Support
19
Related Work
19
On Existing Architectures
20
On Existing Middleware
20
X-Lisa, an Architecture for Cross-Layer Information Sharing
21
Information Sharing Structures
21
Event Signaling
22
Information Exchange
22
Important Services
22
Middleware Support
22
General Ideas
22
Integration into an Information-Sharing Architecture
23
Composite Query Registration and Deregistration
25
Interest Registration and Deregistration
26
Query Notification
26
Evaluation of Middleware Support
27
Health Monitoring Test Scenario
27
Simulation Results
29
Conclusions and Future Work
30
References
31
An Energy-Efficient Cluster-Head Selection Protocol for Energy-Constrained Wireless Sensor Networks
33
Introduction
33
Related Work
35
ECHS Protocol
37
Two-Phase Cluster Set-Up Period
38
Steady State Period
41
Simulations
42
Conclusion
45
References
45
Optimization of Cluster Heads for Energy Efficiency in Large-Scale Wireless Sensor Networks
47
Introduction
47
Related Work
49
Cost Model and Problem Formulation
50
Energy Consumption Model
50
Problem Formulation
51
Optimizing Number and Location of CHs
52
Analytical Derivation for Uniform Distribution
52
Algorithm Design for General Distribution
54
Performance Evaluation
55
Implementation and Experimental Settings
55
Case Study for Uniform Distribution
55
Case Study for General Distribution
57
Conclusion and Future Work
60
References
61
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
63
Introduction
63
Current Practice for Clustering Algorithms
64
State of the Art Clustering Protocols
65
Evaluation Methodologies for Clustering Algorithms
67
Related Efforts in Clustering Analysis
68
Defining the Optimal Cluster
69
Identifying the Optimal Cluster
70
Cluster Size C
71
Number of Base Stations M
72
Position of the Cluster Head PCH
73
In-Network Processing IN
74
Node Density N/A2
75
Conclusions and Future Work
75
References
76
A Parallel Paths Communication Technique for Energy Efficient Wireless Sensor Networks
78
Introduction
78
Network Model and Problem Definition
80
A Parallel Path Communication Technique
82
Algorithm Description
82
Forming Gradient Bands
82
Group Leader Election
83
Communication Network Setup Phase
84
Properties of the Parallel Path Technique
84
Simulation Setup
87
Performance Comparison
88
Conclusion
91
References
91
Scalable Max-Min Fairness in Wireless Ad Hoc Networks
93
Introduction
93
The Macro Model
94
Applying the Macro Model to Max-Min Fairness
95
Comparison of Three Methods
98
Experiment Model
98
Node-Path Model
98
Estimation Model
99
Simulation Results
99
600-Node and 20-Flow
99
600-Node and Different-Flow
102
1000-Node and 100-Flow
103
Time Square
104
Conclusions and Future Work
106
References
106
Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networks
108
Introduction
108
Joint Transmission Scheduling and Power Control Problem Formulation
110
Tabu Search-Based Heuristic Algorithm
113
Simulations and Results
118
Conclusions
122
References
122
QoS over Real-Time Wireless Multi-hop Protocol
124
Introduction
124
Related Work
125
RT-WMP Overview
126
Protocol Operations.
127
The Link Quality Matrix.
127
Error Handling in RT-WMP.
128
Worst-Case in RT-WMP.
128
System Overview
129
Available Time
129
Protocol Operations
130
The RT-WMP QoS Extension Details
131
Frame Header Modification
131
Phases of the Protocol
132
The Message Selection Phase.
132
The QoS Authorization Phase.
132
The QoS Message Phase.
133
Message Priority Policy
133
Flow Admission Control
134
Available Resource Estimation
134
Principle of Operations.
135
Evaluation
137
Available Time
137
RT-WMP Traffic Impact
138
Fairness
138
End-to-End Delay
139
Multi-hop Transmission
139
PDR Evaluation
140
Real Scenario Experiments
140
Conclusions
141
References
142
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
143
Related Previous Work
143
Enhanced Network Coding for Operation on Data of Arbitrary Size
144
Generations: Optimized Packet Combination
146
Analysis of Relationship between Different Figures of Merit
147
Numerical Results
149
Generation Size and File Size
150
Quality of Service (QoS) Requirements
151
Comparison of NC-MG-m2m File Sharing with Replicate-and-Forward m2m Data Dissemination
153
Summary
155
References
156
Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach
158
Introduction
158
Self-organisation
159
Self-organising Networking Systems
160
Self-organising Algorithms in Networking Systems
160
Cross-Layer Design
161
What Is the Cross-Layer Approach?
162
Cross-Layering in Self-organisation
162
Related Study
163
Demonstration of the Enhancement
163
Simulation and Results
164
Conclusions
170
References
171
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs
174
Introduction
174
Problem Statement
176
Preliminaries
177
Bilinear Maps
177
Bloom Filter
178
Our Solutions - SPECS
178
Initial Handshaking
179
Message Signing
180
Batch Verification
180
Real Identity Tracking
182
Group Key Generation
183
Group Message Signing and Verification
184
Analysis
184
Security Analysis
184
Analysis on Bloom Filter Approach
185
Simulation Results
186
Simulation Models
186
Simulation Results
187
Conclusions
188
References
189
Security and Privacy in a Sensor-Based Search and Rescue System
190
Introduction
190
SenSearch: A Brief Overview
191
Threat Model
192
Security and Privacy Framework
194
System Constraints
194
Design Overview
195
AP-Node Authentication and Initial Setup
196
Node-Node Authentication and Record Exchanges
200
Implementation and Performance
201
Performance: Cryptographic Operations
201
Performance: AP-Node Authentication and Initial Setup
202
Performance: Node-Node Authentication
203
Security Overhead
203
Power Consumption
204
Conclusion
204
References
204
Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks
206
Introduction
206
LPN Problem and HB-Family
207
LPN Problem
208
HB-Family Authentication
208
Proposed Mutual Authentication Protocols
210
Protocols Description
210
Protocol Parameters
211
Performance
213
Security Analysis
214
Threat Model
214
Security Properties
215
Application Scenarios
217
Conclusion and Further Work
219
References
219
Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
222
Introduction
222
Related Work
223
Our Contribution
224
Definitions and Models
225
Communication Model
226
Adversary Model
227
Intrusion Detection System
227
Intrusion Detection Nodes
227
Detecting Wormholes
227
FMC Validation.
228
Active Wormholes.
229
Passive Wormholes.
229
Distinguishing Active from Passive Wormholes.
230
False Alarms
231
Response to Wormholes
233
Simulation
234
Connectivity of Sensor Nodes
234
ID Nodes Density
235
Effect of Wormhole Length on Detection
235
Conclusions and Future Work
236
References
237
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
238
Introduction
238
Our Contributions
239
Related Work
240
Intrusion Detection in MANETs
241
Evolutionary Computation Techniques in Intrusion Detection
242
Genetic Programming
242
Multi-Objective Optimisation (MOO)
245
Power-Aware Intrusion Detection in MANETs
245
Experimental Results
247
Conclusions and Future Work
250
The Features
253
DHT-Based Detection of Node Clone in Wireless Sensor Networks
254
Introduction
254
Previous Protocols
255
Centralized Detection
255
Distributed Detection
256
Goals and Models
257
Security Goals and Performance Metrics
257
Network Model
257
Adversary Model
258
Proposed Protocol
259
Distributed Hash Table
259
Protocol Details
260
Analysis
262
Communication Cost
262
Storage Cost and Number of Witnesses
262
Security Analysis
263
Simulations
264
Settings
264
Protocol Performance
265
Resilience against Message-Discarding by Clones
266
Conclusion and Future Work
267
References
267
Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs
270
Introduction
270
Connectivity-Aware Minimum-Delay Geographic Routing
272
Assumptions and System Model
272
CMGR Protocol Operations
272
Route Selection Logic
273
Vehicle Tracking Mechanism in CMGR
274
Performance Evaluations
274
Simulation Settings
274
Simulation Results
275
Conclusion
279
References
280
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
282
Introduction
282
The Nature of Unidirectional Links
283
Impact on the Routing Layer
285
The Buckshot Routing Protocol
287
Lossy or Unidirectional Links
288
Evaluation
288
OMNeT++
288
TMote Sky
292
Related Work
294
Conclusion and Future Work
295
References
296
Enhanced Route-Split Routing Tolerant to Multiple Concurrent Link Failure for Mobile Ad Hoc Networks
298
Introduction
298
RSR (Route-Split Routing)
299
Outline of RSR
299
Route Creation
300
Route Maintenance
301
Resiliency to Simultaneous Failure of RSR
302
Enhanced RSR
302
Proposal Mechanism 1
303
Proposal Mechanism 2
303
Proposal Mechanism 3
305
Simulation Evaluation
306
Simulation Environment
306
Simulation Results and Observations
308
Conclusion
312
References
313
A Simulation-Based Performance Analysis of VariousMultipath Routing Techniques in ZigBee Sensor Networks
314
Introduction
314
Multipath Routing
315
Multipath Formation Strategies
316
Multipath Usage Strategies
316
Benefits of Multipath Routing
317
The Challenges of Multipath Routing in the Wireless Domain
318
ZigBee Wireless Sensor Networks
318
ZigBee Network Topology
319
The ZigBee Stack
319
Simulations
320
Implemented Multipath Algorithms
321
Parameters
322
Metrics
323
Results
323
Per-Hop Packet Loss
328
Conclusion and Future Work
328
References
329
Centralized Routing and Scheduling Using Multi-Channel System Single Transceiver in 802.16d
330
Introduction
330
System Design Algorithms
331
Routing Path Construction Algorithm
332
Channel Assignment Algorithm for Multi-Channel System
333
Collision Free Centralized Scheduling Algorithm
334
Cross-Layer Design
336
Simulations
337
Performance Metrics
337
Simulation Setup
338
Results and Discussions
339
Conclusions
344
References
345
Contact Time in Random Walk and Random Waypoint: Dichotomy in Tail Distribution
347
Introduction
347
Model Analysis
349
Model Settings and Assumptions
349
Random Walk with Infinite Flight Lengths
350
Tail Behavior of Contact Time Distribution
352
Random Walk with Finite Flight Lengths
354
Validation
357
Infinite Flight Lengths without Pause
357
Finite Flight Lengths without Pause
358
Conclusion and Future Work
361
References
361
Throughput Analysis of IEEE 802.11 DCF in the Presence of Transmission Errors
363
Introduction
363
IEEE 802.11 Distributed Coordination Function (DCF)
364
Transmission Errors
366
System Performance Analysis
368
Network Model Assumptions
368
Transmission Probability
368
The Throughput
372
Analysis Results
374
Conclusion
377
References
377
Effects of Unintentional Denial of Service (DOS) Due to Push-to-Talk (PTT) Delays on Performance of CSMA/CA Based Adhoc Land Mobile Radio (LMR) Networks
379
Introduction
379
Push-To-Talk (PTT) Delays
381
CSMA/CA Implementation for the Medium Access Layer (MAC)
382
Unintentional Denial of Service (DOS) Due to RTSI Delays
382
Simulation
386
Conclusions
388
References
389
Achievable Region in Slotted ALOHA Throughput for One-Relay Two-Hop Wireless Network Coding
390
Introduction
390
Previous Work
392
System Description
392
Achievable Region of Direct Communication Systems
394
Achievable Region of Non-NC Systems
395
Achievable Region of NC Systems
399
Conclusion
404
References
405
Exact Models for the $k$-Connected Minimum Energy Problem
406
Introduction
406
The Homogeneous Minimum Energy Problem
408
Exact 1-Connected Models
409
Literature Review
409
A New Model
412
Exact k-Connected Models
412
Numerical Results
414
Computational Complexity
418
Discussion
418
References
419
Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs
421
Introduction
421
Comparison of DCF and EDCA
423
Contention Window Based Priority
423
Arbitrary Interframe Space
423
Transmission Opportunity Limit
424
Average Conditional Collision Probability
424
Normal Contention Markov Backoff Process
424
Average Conditional Probability
425
Throughput Analysis
427
Model Validation
429
Conclusions
434
References
434
Cooperative Localization in GPS-Limited Urban Environments
436
Introduction
436
Related Work
437
Cooperative Localization
438
Sensor Evaluation and Error Models
441
Simulation Results
444
Simple Averaging: 300-Meter Maximum Range
444
Simple Averaging: 100-Meter Range
445
Simple Averaging: 15-Meter Range
446
Distribution of Error
446
Selective Averaging
447
Filtered Trilateration
448
Future Work
450
Conclusion
450
References
451
Tracking a Vehicle Moving in a Wireless Sensor Network
452
Introduction
452
Mote Topology and Communication
453
Hot Motes and Network Resolution
455
Hot Mote
455
Updating the Target Location over Time
456
Test Bed Experiment
457
Conclusions
462
References
463
Improved Topology Control Algorithms for Simple Mobile Networks
464
Introduction
464
Related Work
466
Preliminaries
467
Graph Definitions
467
Voronoi Diagram and Delaunay Triangulation
468
Decision Version of SMN
470
Optimization Version of SMN
472
Running Times
473
An Approximation Algorithm for SMN
475
Simulation Results
477
Conclusions and Future Work
478
References
479
Reliable Coverage Area Based Link Expiration Time (LET) Routing Metric for Mobile Ad Hoc Networks
480
Introduction
480
Related Work
481
AODV Overview
481
Coverage Area Analysis
482
Link Expiration Time
483
Proposed Routing Metric Description
483
Simulation Environment and Results
486
Conclusions
489
References
489
Constructing Minimum Relay Connected Sensor Coverin Heterogeneous Wireless Sensor Networks
491
Introduction
491
Related Work
493
Problem Formulation
494
Theoretical Analysis
495
Full Coverage
495
Relay Connectivity
497
Distributed Algorithm
498
MSC Construction
498
Relay Connectivity Reinforcement
500
Performance Evaluation
501
Conclusions
505
References
505
Experimentation Made Easy
507
Introduction
507
DES-Testbed
509
DES-TBMS
510
Architecture of DES-TBMS
510
DES-Cript
511
DES-Exp
512
DES-Mon
513
DES-Eval
513
DES-Vis
514
Experiment Workflow
514
Evaluation
516
Contributions of DES-TBMS
516
Limitations
516
Related Work
517
Testbeds
517
Simulation Environments
518
Conclusions and Future Work
518
References
519
Enhancing Learning Using Modular Wireless Sensor Networking (WSN) Hands-On Experiments
520
Introduction
520
Wireless Sensor Networks Platform Experiments
521
Experiment 1 – Basic Target Detection
522
Experiment 2 – Local, Selected and Consensus Decision on Target Detection
525
Experiment 3 – Motion Tracking
529
Assessment Survey and Evaluation
531
Assessment Survey
531
Results of the Survey
532
Conclusive Assessments
533
Conclusions
534
References
535
Appendix
536
Sensor Network in the Wireless UHF Band
537
Introduction
537
Data Acquisition System
538
Data from Sensors
539
Global Data Management
541
The State-of-the-Art and the Implemented Network
541
The Wireless Sensor Network (WSN)
543
Implementation of the WSN in the UHF Band
544
Future Developments
548
Conclusions
548
References
549
VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network
551
Introduction
551
Testbed Configuration and Network Operations
552
The ASNC Scheme
554
Testbed Implementation
555
Hardware Setup
555
Software Setup
555
Mobile Scenarios and Their Measurements
557
Measurements and Observations
557
Verification of Simulations
560
Conclusion
561
References
561
Relay Implementation in WiMAX System Level Simulator
563
Introduction
563
Characteristics of the Relay
564
System Model Architecture
565
Cellular Layout
565
System Model
565
Relay Selection
567
Effective SINR-Based Relay Selection Algorithm
567
Path Loss-Based Relay Selection Algorithm
568
Simulation Results
569
Conclusion
574
References
574
MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling
575
Introduction
575
Related Work
576
The MeshMAC
579
Distributed Beacon Scheduling Specification
579
Mesh Data Transfer
580
MeshMAC Operation
581
Evaluation
582
Distributed Beacon Scheduling
583
Multipath Mesh Networking
585
Energy Efficiency
587
Conclusions
588
References
589
Compressing MAC Headers on Shared Wireless Media
590
Introduction
590
MAC Header Compression
594
Compression
594
Decompression
595
Compressing 802.11 Headers
599
Data Frames
600
ACK Frames
601
Experimental Results
602
Label Conflicts
602
Performance
603
Conclusions
604
References
605
An RTS Based Data Channel Reservations and Access Scheme in Multi-Channel Systems
606
Introduction
606
Motivation
607
Related Work
607
System Model
609
Simulation Model and Numerical Results
611
Future Work
618
Conclusion
618
References
619
Building Intrusion Detection with a Wireless Sensor Network
621
Introduction
621
Related Work
622
Visual Sensor Networks
622
Event Classification
623
Anomaly Detection
624
Office Monitoring
624
System Design
625
ART Neural Networks
626
System-Wide Anomaly Detection
628
Anomaly Detection Performance
631
Office Occupancy Patterns
631
Computation at Desktop PC
631
Detection Performance of the Anomaly Detectors
632
Message Load
633
Reporting and Triggering Delay
634
Conclusions and Future Work
634
References
635
Passive and Active Analysis in DSR-Based Ad Hoc Networks
637
Introduction
637
Motivation, Previous Work, Contributions
638
Motivation
638
Previous Work
639
Contributions
640
Network Model
640
Intelligent Jamming
641
Classification Algorithm
643
Handling Fluctuating Congestion Window Sizes
645
Cross-Protocol Detection
645
Dynamic Mean Delay Calculation
646
Numerical Results
646
Active Network Analysis
647
Controlling the Network
648
Lomb Periodogram
650
Conclusion
651
References
651
An E-Hospital Security Architecture
653
Introduction
653
Background and Related Work
654
E-Hospital System
654
Related Cryptography
656
Security Goal of E-Hospital
657
Related Privacy Acts and Regulations
657
User Requirements
658
Security Goal of E-Hospital
658
Security Architecture of E-Hospital
659
Layered Design to Meet Security Goals
659
Secure Communication Channel by Identity-Based Cryptography
661
Secure Communication between End User and Backbone Network by Policy Based Cryptography
663
Database Security
664
Conclusion and Future Work
664
References
665
Cooperative Certificate Revocation List Distribution Methods in VANETs
666
Introduction
666
Overview of DSRC/WAVE
668
Overview of Network Coding versus Erasure Coding
669
Overview of Previous CRL Distribution Methods
670
Overview of Code Torrent
671
Using Code Torrent for CRL Distribution
672
Development of Methods to Reduce Channel Contention
672
Description of "Most Pieces Broadcast" (MPB) Method
672
Description of “Generation Per Channel" (GPC) Method
674
Simulation Setup
675
Simulation Results and Analysis
676
Conclusion
677
References
678
Distributed Channel Selection for Ad-Hoc Networks in the Presence of Jamming Sources
680
Introduction
680
Problem Definition
681
Performance Testbed
683
Implementation of Distributed Channel Selection
684
Homogeneous Scenarios
685
Heterogeneous Scenarios
687
Conclusion and Future Work
691
References
691
Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users
693
Introduction
693
Related Work
695
System Model and Problem Formulation
695
Random Access, Power Control and Link Capacity
695
Joint Random Access and Power Control Game
697
Existence of Nash Equilibrium
698
Distributed Algorithm
699
Conclusion and Future Work
703
References
703
Graph Marginalization for Rapid Assignment in Wide-Area Surveillance
705
Introduction
705
Decentralization of the Algorithm
706
The Sensor Network
708
Objects
709
Sensors
710
Objective
711
Probability That an Object Will Be Visible to a Sensor
711
Simulations
712
Data Structure
712
First Application
713
Second Application
715
Conclusion
716
References
717
Error Correction with the Implicit Encoding Capability of Random Network Coding
718
Introduction
718
Network Model
719
Random Network Coding
720
Error Correction in Random Network Coding: Traditional Method
722
Redundant Symbols
722
Redundant Packets
723
Error Correction in Random Network Coding: Proposed Method
724
Network Configurations
724
Example 3
726
Analysis
727
Probability of Decoding
728
Discussion of Complexity
729
Time Delay
729
Error Correcting Capability
729
Advantages
730
Conclusion
730
References
731
An End-to-End Loss Discrimination Scheme for Multimedia Transmission over Wireless IP Networks
732
Introduction
732
Theoretical Foundation of the WMPLD Algorithm
733
Implementation Aspects of WMPLD
734
Senders Behavior
734
Receivers Behavior
735
Simulation Results
736
Wireless Last Hop
737
Wireless Backbone
739
Conclusion
741
References
742
2009 International Workshop on Advanced Sensor Integration Technology
743
Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages
744
Introduction
744
Related Work
745
Semantic Adaptation
746
Information Representation
746
General Packet Structure
748
Network Protocol
749
Context Management
750
System General Operation
751
Prototype
752
Hardware Platform
752
Network Protocol
752
Software Implementation
753
Application Scenario
754
Prototype Analysis
755
Conclusions and Future Work
757
References
758
Performance Analysis of ZigBee Technology for Wireless Body Area Sensor Networks
760
Introduction
760
Architecture
762
System Architecture
762
WBASN Topology
764
ZigBee Network
765
Performance Evaluations
765
Simulation Setup
766
Average Reception Ratio and Throughput
767
Latency
769
Fairness
770
Mobility
771
Conclusion
772
References
773
Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor $Ad Hoc$ Networks
775
Introduction
775
Quality of Service
777
Previous Research on Quality of Service in Cross-Layer Models
777
Data Classes and Protocol Layers
777
Analytical Models of Cross-Layer Design
780
Statistical Properties of Packetized Traffic
781
Statistical Properties of QoS Classes
782
Energy-Efficient Routing
783
Routing Policies
783
Network Processes and Conditional Rates
784
Protocol Parameters and QoS Metrics
785
Cross-Layer Optimization
787
Energy-Constrained QoS Optimization
787
Recursive Optimality Conditions with Complete Network Observations
788
Optimality Conditions with Markov Assumptions
789
Explicit Solutions versus Closed-Form Solutions
789
Conclusions
791
References
791
Programmable Re-tasking of Wireless Sensor Networks Using WISEMAN
793
Introduction
793
Overview of WISEMAN
795
WISEMAN’s Architecture
795
WISEMAN’s Language Constructs
797
Migration Procedures and Agent Execution Flow
799
Code Migration Methodology
800
Agent Execution Flow
801
Performance Evaluations
803
Conclusions
805
References
806
Oxybuoy: Constructing a Real-Time Inexpensive Hypoxia Monitoring Platform
808
Introduction
808
Oxybuoy Architecture
810
Experiments
812
Conclusion
816
References
817
An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN
818
Introduction
818
Related Work
820
The Algorithm
821
Mapping Parameter for Traffic Load
821
The Balance Point
822
QoS Threshold
824
Control Threshold
825
Algorithm Description
825
Performance Evaluation
826
Simulation Setup
826
The Energy Consumption Efficiency of Single Application in the Network
827
The Energy Performance of Multiple Applications
828
Conclusion
829
References
830
An Integrated RFID and Sensor System for Emergency Handling in Underground Coal Mines Environments
831
Introduction
831
Related Works
833
Integrated RFID and Sensor System for Emergency Handling
835
Overview of Traditional Emergency Handling
835
The Proposed Emergency Handling Scheme
835
Conclusion
837
References
837
An Area-Based Overlay Architecture for Scalable Integration of Sensor Networks
838
Introduction
838
Related Work
839
System Overview
841
System Elements
841
Area Names
843
Sensor Types
844
Query Submission and Reception of Results
844
Maintenance of the Overlay
845
A Query Processor Joins the System
845
A Query Processor Leaves the System
846
A Query Processor Fails
846
Areas of Responsibility and Promotion of Query Processors
846
Examples
847
Query Processing
848
Query Forwarding and Multiplexing
848
Result Delivery and De-multiplexing
849
Query Cancellation
849
Evaluation
849
Conclusion
852
References
852
2009 International Workshop on Cross-Layer Design in Wireless Mobile Ad Hoc Networks
854
Outage Probability for ARQ Decode-and-Forward Relaying under Packet-Rate Fading
855
Introduction
855
System Model
856
Outage Performance Analysis
858
Direct ARQ Transmission Scheme
859
DF Cooperative ARQ Relay Scheme
859
Simulation Results
863
Conclusions
865
References
865
Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks
867
Introduction
867
System Model
869
Prioritized Queuing
869
Distributed Spectrum Sharing and Medium Access Control for Video Streaming
870
Spectrum Sharing Principle
871
Spectrum Utility
872
Dynamic Spectrum Allocation
873
Delay Estimation
874
Proposed Cross-Layer Control Scheme
875
Performance Evaluation
876
Conclusions
878
References
878
The Cognitive Radio Channel: From Spectrum Sensing to Message Cribbing
880
Introduction
880
Channel Model
882
Capacity Lower Bounds
883
b21+P2
884
1b2<1+P2
884
b2<1
888
Capacity Outer Bounds
890
Conclusion and Discussions
894
References
894
AM-AOMDV: Adaptive Multi-metric Ad-HocOn-Dem and Multipath Distance Vector Routing
896
Introduction
896
Adaptive Multi-metric AOMDV Routing Scheme
897
Multiple Routing Metrics
897
Route Setup Stage
898
Data Transmission Using Local Path Update
898
Enhanced Link Layer Failure Handling
899
Route Maintenance
899
Simulation and Discussion
900
Simulation Scenario
900
Varying Average Node Speed
901
Varying Number of Connections
903
Varying Packet Rates
905
Conclusion
906
References
907
A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas
908
Introduction
908
Routing
908
MAC
909
Proposed Solution
910
The Scheduling Algorithm
911
Expected Latencies
913
Linear Topology
914
Intra-cluster, One Branch
914
Intra-cluster, Two Branches
915
Neighboring Clusters, One Branch Each
916
Neighboring Clusters, Two Branches Each
917
Many Clusters, One Branch in Each End Cluster
917
Many Clusters, Two Branches in Each End Cluster
917
Summary of Analysis
918
Simulation Results
918
Static, Linear
918
Non-linear, Static Case
919
Mobile Case
921
Conclusion
923
References
924
Author Index
925
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.