Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecomm. Eng. Vol 28 - First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers

von: Hua Zhu, Scott F. Midkiff, Shiwen Mao, Jun Zheng

Springer-Verlag, 2010

ISBN: 9783642117237 , 915 Seiten

Format: PDF

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's

Preis: 110,21 EUR

Mehr zum Inhalt

Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecomm. Eng. Vol 28 - First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers


 

Preface

5

Organization

6

Table of Contents

10

1st ICST International Conference on Ad Hoc Networks

16

Supporting Proactive Application Event Notification to Improve Sensor Network Performance

17

Introduction

17

Goals and Challenges of WSN Architectures and Middleware Support

19

Related Work

19

On Existing Architectures

20

On Existing Middleware

20

X-Lisa, an Architecture for Cross-Layer Information Sharing

21

Information Sharing Structures

21

Event Signaling

22

Information Exchange

22

Important Services

22

Middleware Support

22

General Ideas

22

Integration into an Information-Sharing Architecture

23

Composite Query Registration and Deregistration

25

Interest Registration and Deregistration

26

Query Notification

26

Evaluation of Middleware Support

27

Health Monitoring Test Scenario

27

Simulation Results

29

Conclusions and Future Work

30

References

31

An Energy-Efficient Cluster-Head Selection Protocol for Energy-Constrained Wireless Sensor Networks

33

Introduction

33

Related Work

35

ECHS Protocol

37

Two-Phase Cluster Set-Up Period

38

Steady State Period

41

Simulations

42

Conclusion

45

References

45

Optimization of Cluster Heads for Energy Efficiency in Large-Scale Wireless Sensor Networks

47

Introduction

47

Related Work

49

Cost Model and Problem Formulation

50

Energy Consumption Model

50

Problem Formulation

51

Optimizing Number and Location of CHs

52

Analytical Derivation for Uniform Distribution

52

Algorithm Design for General Distribution

54

Performance Evaluation

55

Implementation and Experimental Settings

55

Case Study for Uniform Distribution

55

Case Study for General Distribution

57

Conclusion and Future Work

60

References

61

Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis

63

Introduction

63

Current Practice for Clustering Algorithms

64

State of the Art Clustering Protocols

65

Evaluation Methodologies for Clustering Algorithms

67

Related Efforts in Clustering Analysis

68

Defining the Optimal Cluster

69

Identifying the Optimal Cluster

70

Cluster Size C

71

Number of Base Stations M

72

Position of the Cluster Head PCH

73

In-Network Processing IN

74

Node Density N/A2

75

Conclusions and Future Work

75

References

76

A Parallel Paths Communication Technique for Energy Efficient Wireless Sensor Networks

78

Introduction

78

Network Model and Problem Definition

80

A Parallel Path Communication Technique

82

Algorithm Description

82

Forming Gradient Bands

82

Group Leader Election

83

Communication Network Setup Phase

84

Properties of the Parallel Path Technique

84

Simulation Setup

87

Performance Comparison

88

Conclusion

91

References

91

Scalable Max-Min Fairness in Wireless Ad Hoc Networks

93

Introduction

93

The Macro Model

94

Applying the Macro Model to Max-Min Fairness

95

Comparison of Three Methods

98

Experiment Model

98

Node-Path Model

98

Estimation Model

99

Simulation Results

99

600-Node and 20-Flow

99

600-Node and Different-Flow

102

1000-Node and 100-Flow

103

Time Square

104

Conclusions and Future Work

106

References

106

Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networks

108

Introduction

108

Joint Transmission Scheduling and Power Control Problem Formulation

110

Tabu Search-Based Heuristic Algorithm

113

Simulations and Results

118

Conclusions

122

References

122

QoS over Real-Time Wireless Multi-hop Protocol

124

Introduction

124

Related Work

125

RT-WMP Overview

126

Protocol Operations.

127

The Link Quality Matrix.

127

Error Handling in RT-WMP.

128

Worst-Case in RT-WMP.

128

System Overview

129

Available Time

129

Protocol Operations

130

The RT-WMP QoS Extension Details

131

Frame Header Modification

131

Phases of the Protocol

132

The Message Selection Phase.

132

The QoS Authorization Phase.

132

The QoS Message Phase.

133

Message Priority Policy

133

Flow Admission Control

134

Available Resource Estimation

134

Principle of Operations.

135

Evaluation

137

Available Time

137

RT-WMP Traffic Impact

138

Fairness

138

End-to-End Delay

139

Multi-hop Transmission

139

PDR Evaluation

140

Real Scenario Experiments

140

Conclusions

141

References

142

Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations

143

Related Previous Work

143

Enhanced Network Coding for Operation on Data of Arbitrary Size

144

Generations: Optimized Packet Combination

146

Analysis of Relationship between Different Figures of Merit

147

Numerical Results

149

Generation Size and File Size

150

Quality of Service (QoS) Requirements

151

Comparison of NC-MG-m2m File Sharing with Replicate-and-Forward m2m Data Dissemination

153

Summary

155

References

156

Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach

158

Introduction

158

Self-organisation

159

Self-organising Networking Systems

160

Self-organising Algorithms in Networking Systems

160

Cross-Layer Design

161

What Is the Cross-Layer Approach?

162

Cross-Layering in Self-organisation

162

Related Study

163

Demonstration of the Enhancement

163

Simulation and Results

164

Conclusions

170

References

171

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

174

Introduction

174

Problem Statement

176

Preliminaries

177

Bilinear Maps

177

Bloom Filter

178

Our Solutions - SPECS

178

Initial Handshaking

179

Message Signing

180

Batch Verification

180

Real Identity Tracking

182

Group Key Generation

183

Group Message Signing and Verification

184

Analysis

184

Security Analysis

184

Analysis on Bloom Filter Approach

185

Simulation Results

186

Simulation Models

186

Simulation Results

187

Conclusions

188

References

189

Security and Privacy in a Sensor-Based Search and Rescue System

190

Introduction

190

SenSearch: A Brief Overview

191

Threat Model

192

Security and Privacy Framework

194

System Constraints

194

Design Overview

195

AP-Node Authentication and Initial Setup

196

Node-Node Authentication and Record Exchanges

200

Implementation and Performance

201

Performance: Cryptographic Operations

201

Performance: AP-Node Authentication and Initial Setup

202

Performance: Node-Node Authentication

203

Security Overhead

203

Power Consumption

204

Conclusion

204

References

204

Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks

206

Introduction

206

LPN Problem and HB-Family

207

LPN Problem

208

HB-Family Authentication

208

Proposed Mutual Authentication Protocols

210

Protocols Description

210

Protocol Parameters

211

Performance

213

Security Analysis

214

Threat Model

214

Security Properties

215

Application Scenarios

217

Conclusion and Further Work

219

References

219

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

222

Introduction

222

Related Work

223

Our Contribution

224

Definitions and Models

225

Communication Model

226

Adversary Model

227

Intrusion Detection System

227

Intrusion Detection Nodes

227

Detecting Wormholes

227

FMC Validation.

228

Active Wormholes.

229

Passive Wormholes.

229

Distinguishing Active from Passive Wormholes.

230

False Alarms

231

Response to Wormholes

233

Simulation

234

Connectivity of Sensor Nodes

234

ID Nodes Density

235

Effect of Wormhole Length on Detection

235

Conclusions and Future Work

236

References

237

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

238

Introduction

238

Our Contributions

239

Related Work

240

Intrusion Detection in MANETs

241

Evolutionary Computation Techniques in Intrusion Detection

242

Genetic Programming

242

Multi-Objective Optimisation (MOO)

245

Power-Aware Intrusion Detection in MANETs

245

Experimental Results

247

Conclusions and Future Work

250

The Features

253

DHT-Based Detection of Node Clone in Wireless Sensor Networks

254

Introduction

254

Previous Protocols

255

Centralized Detection

255

Distributed Detection

256

Goals and Models

257

Security Goals and Performance Metrics

257

Network Model

257

Adversary Model

258

Proposed Protocol

259

Distributed Hash Table

259

Protocol Details

260

Analysis

262

Communication Cost

262

Storage Cost and Number of Witnesses

262

Security Analysis

263

Simulations

264

Settings

264

Protocol Performance

265

Resilience against Message-Discarding by Clones

266

Conclusion and Future Work

267

References

267

Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs

270

Introduction

270

Connectivity-Aware Minimum-Delay Geographic Routing

272

Assumptions and System Model

272

CMGR Protocol Operations

272

Route Selection Logic

273

Vehicle Tracking Mechanism in CMGR

274

Performance Evaluations

274

Simulation Settings

274

Simulation Results

275

Conclusion

279

References

280

Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks

282

Introduction

282

The Nature of Unidirectional Links

283

Impact on the Routing Layer

285

The Buckshot Routing Protocol

287

Lossy or Unidirectional Links

288

Evaluation

288

OMNeT++

288

TMote Sky

292

Related Work

294

Conclusion and Future Work

295

References

296

Enhanced Route-Split Routing Tolerant to Multiple Concurrent Link Failure for Mobile Ad Hoc Networks

298

Introduction

298

RSR (Route-Split Routing)

299

Outline of RSR

299

Route Creation

300

Route Maintenance

301

Resiliency to Simultaneous Failure of RSR

302

Enhanced RSR

302

Proposal Mechanism 1

303

Proposal Mechanism 2

303

Proposal Mechanism 3

305

Simulation Evaluation

306

Simulation Environment

306

Simulation Results and Observations

308

Conclusion

312

References

313

A Simulation-Based Performance Analysis of VariousMultipath Routing Techniques in ZigBee Sensor Networks

314

Introduction

314

Multipath Routing

315

Multipath Formation Strategies

316

Multipath Usage Strategies

316

Benefits of Multipath Routing

317

The Challenges of Multipath Routing in the Wireless Domain

318

ZigBee Wireless Sensor Networks

318

ZigBee Network Topology

319

The ZigBee Stack

319

Simulations

320

Implemented Multipath Algorithms

321

Parameters

322

Metrics

323

Results

323

Per-Hop Packet Loss

328

Conclusion and Future Work

328

References

329

Centralized Routing and Scheduling Using Multi-Channel System Single Transceiver in 802.16d

330

Introduction

330

System Design Algorithms

331

Routing Path Construction Algorithm

332

Channel Assignment Algorithm for Multi-Channel System

333

Collision Free Centralized Scheduling Algorithm

334

Cross-Layer Design

336

Simulations

337

Performance Metrics

337

Simulation Setup

338

Results and Discussions

339

Conclusions

344

References

345

Contact Time in Random Walk and Random Waypoint: Dichotomy in Tail Distribution

347

Introduction

347

Model Analysis

349

Model Settings and Assumptions

349

Random Walk with Infinite Flight Lengths

350

Tail Behavior of Contact Time Distribution

352

Random Walk with Finite Flight Lengths

354

Validation

357

Infinite Flight Lengths without Pause

357

Finite Flight Lengths without Pause

358

Conclusion and Future Work

361

References

361

Throughput Analysis of IEEE 802.11 DCF in the Presence of Transmission Errors

363

Introduction

363

IEEE 802.11 Distributed Coordination Function (DCF)

364

Transmission Errors

366

System Performance Analysis

368

Network Model Assumptions

368

Transmission Probability

368

The Throughput

372

Analysis Results

374

Conclusion

377

References

377

Effects of Unintentional Denial of Service (DOS) Due to Push-to-Talk (PTT) Delays on Performance of CSMA/CA Based Adhoc Land Mobile Radio (LMR) Networks

379

Introduction

379

Push-To-Talk (PTT) Delays

381

CSMA/CA Implementation for the Medium Access Layer (MAC)

382

Unintentional Denial of Service (DOS) Due to RTSI Delays

382

Simulation

386

Conclusions

388

References

389

Achievable Region in Slotted ALOHA Throughput for One-Relay Two-Hop Wireless Network Coding

390

Introduction

390

Previous Work

392

System Description

392

Achievable Region of Direct Communication Systems

394

Achievable Region of Non-NC Systems

395

Achievable Region of NC Systems

399

Conclusion

404

References

405

Exact Models for the $k$-Connected Minimum Energy Problem

406

Introduction

406

The Homogeneous Minimum Energy Problem

408

Exact 1-Connected Models

409

Literature Review

409

A New Model

412

Exact k-Connected Models

412

Numerical Results

414

Computational Complexity

418

Discussion

418

References

419

Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs

421

Introduction

421

Comparison of DCF and EDCA

423

Contention Window Based Priority

423

Arbitrary Interframe Space

423

Transmission Opportunity Limit

424

Average Conditional Collision Probability

424

Normal Contention Markov Backoff Process

424

Average Conditional Probability

425

Throughput Analysis

427

Model Validation

429

Conclusions

434

References

434

Cooperative Localization in GPS-Limited Urban Environments

436

Introduction

436

Related Work

437

Cooperative Localization

438

Sensor Evaluation and Error Models

441

Simulation Results

444

Simple Averaging: 300-Meter Maximum Range

444

Simple Averaging: 100-Meter Range

445

Simple Averaging: 15-Meter Range

446

Distribution of Error

446

Selective Averaging

447

Filtered Trilateration

448

Future Work

450

Conclusion

450

References

451

Tracking a Vehicle Moving in a Wireless Sensor Network

452

Introduction

452

Mote Topology and Communication

453

Hot Motes and Network Resolution

455

Hot Mote

455

Updating the Target Location over Time

456

Test Bed Experiment

457

Conclusions

462

References

463

Improved Topology Control Algorithms for Simple Mobile Networks

464

Introduction

464

Related Work

466

Preliminaries

467

Graph Definitions

467

Voronoi Diagram and Delaunay Triangulation

468

Decision Version of SMN

470

Optimization Version of SMN

472

Running Times

473

An Approximation Algorithm for SMN

475

Simulation Results

477

Conclusions and Future Work

478

References

479

Reliable Coverage Area Based Link Expiration Time (LET) Routing Metric for Mobile Ad Hoc Networks

480

Introduction

480

Related Work

481

AODV Overview

481

Coverage Area Analysis

482

Link Expiration Time

483

Proposed Routing Metric Description

483

Simulation Environment and Results

486

Conclusions

489

References

489

Constructing Minimum Relay Connected Sensor Coverin Heterogeneous Wireless Sensor Networks

491

Introduction

491

Related Work

493

Problem Formulation

494

Theoretical Analysis

495

Full Coverage

495

Relay Connectivity

497

Distributed Algorithm

498

MSC Construction

498

Relay Connectivity Reinforcement

500

Performance Evaluation

501

Conclusions

505

References

505

Experimentation Made Easy

507

Introduction

507

DES-Testbed

509

DES-TBMS

510

Architecture of DES-TBMS

510

DES-Cript

511

DES-Exp

512

DES-Mon

513

DES-Eval

513

DES-Vis

514

Experiment Workflow

514

Evaluation

516

Contributions of DES-TBMS

516

Limitations

516

Related Work

517

Testbeds

517

Simulation Environments

518

Conclusions and Future Work

518

References

519

Enhancing Learning Using Modular Wireless Sensor Networking (WSN) Hands-On Experiments

520

Introduction

520

Wireless Sensor Networks Platform Experiments

521

Experiment 1 – Basic Target Detection

522

Experiment 2 – Local, Selected and Consensus Decision on Target Detection

525

Experiment 3 – Motion Tracking

529

Assessment Survey and Evaluation

531

Assessment Survey

531

Results of the Survey

532

Conclusive Assessments

533

Conclusions

534

References

535

Appendix

536

Sensor Network in the Wireless UHF Band

537

Introduction

537

Data Acquisition System

538

Data from Sensors

539

Global Data Management

541

The State-of-the-Art and the Implemented Network

541

The Wireless Sensor Network (WSN)

543

Implementation of the WSN in the UHF Band

544

Future Developments

548

Conclusions

548

References

549

VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network

551

Introduction

551

Testbed Configuration and Network Operations

552

The ASNC Scheme

554

Testbed Implementation

555

Hardware Setup

555

Software Setup

555

Mobile Scenarios and Their Measurements

557

Measurements and Observations

557

Verification of Simulations

560

Conclusion

561

References

561

Relay Implementation in WiMAX System Level Simulator

563

Introduction

563

Characteristics of the Relay

564

System Model Architecture

565

Cellular Layout

565

System Model

565

Relay Selection

567

Effective SINR-Based Relay Selection Algorithm

567

Path Loss-Based Relay Selection Algorithm

568

Simulation Results

569

Conclusion

574

References

574

MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling

575

Introduction

575

Related Work

576

The MeshMAC

579

Distributed Beacon Scheduling Specification

579

Mesh Data Transfer

580

MeshMAC Operation

581

Evaluation

582

Distributed Beacon Scheduling

583

Multipath Mesh Networking

585

Energy Efficiency

587

Conclusions

588

References

589

Compressing MAC Headers on Shared Wireless Media

590

Introduction

590

MAC Header Compression

594

Compression

594

Decompression

595

Compressing 802.11 Headers

599

Data Frames

600

ACK Frames

601

Experimental Results

602

Label Conflicts

602

Performance

603

Conclusions

604

References

605

An RTS Based Data Channel Reservations and Access Scheme in Multi-Channel Systems

606

Introduction

606

Motivation

607

Related Work

607

System Model

609

Simulation Model and Numerical Results

611

Future Work

618

Conclusion

618

References

619

Building Intrusion Detection with a Wireless Sensor Network

621

Introduction

621

Related Work

622

Visual Sensor Networks

622

Event Classification

623

Anomaly Detection

624

Office Monitoring

624

System Design

625

ART Neural Networks

626

System-Wide Anomaly Detection

628

Anomaly Detection Performance

631

Office Occupancy Patterns

631

Computation at Desktop PC

631

Detection Performance of the Anomaly Detectors

632

Message Load

633

Reporting and Triggering Delay

634

Conclusions and Future Work

634

References

635

Passive and Active Analysis in DSR-Based Ad Hoc Networks

637

Introduction

637

Motivation, Previous Work, Contributions

638

Motivation

638

Previous Work

639

Contributions

640

Network Model

640

Intelligent Jamming

641

Classification Algorithm

643

Handling Fluctuating Congestion Window Sizes

645

Cross-Protocol Detection

645

Dynamic Mean Delay Calculation

646

Numerical Results

646

Active Network Analysis

647

Controlling the Network

648

Lomb Periodogram

650

Conclusion

651

References

651

An E-Hospital Security Architecture

653

Introduction

653

Background and Related Work

654

E-Hospital System

654

Related Cryptography

656

Security Goal of E-Hospital

657

Related Privacy Acts and Regulations

657

User Requirements

658

Security Goal of E-Hospital

658

Security Architecture of E-Hospital

659

Layered Design to Meet Security Goals

659

Secure Communication Channel by Identity-Based Cryptography

661

Secure Communication between End User and Backbone Network by Policy Based Cryptography

663

Database Security

664

Conclusion and Future Work

664

References

665

Cooperative Certificate Revocation List Distribution Methods in VANETs

666

Introduction

666

Overview of DSRC/WAVE

668

Overview of Network Coding versus Erasure Coding

669

Overview of Previous CRL Distribution Methods

670

Overview of Code Torrent

671

Using Code Torrent for CRL Distribution

672

Development of Methods to Reduce Channel Contention

672

Description of "Most Pieces Broadcast" (MPB) Method

672

Description of “Generation Per Channel" (GPC) Method

674

Simulation Setup

675

Simulation Results and Analysis

676

Conclusion

677

References

678

Distributed Channel Selection for Ad-Hoc Networks in the Presence of Jamming Sources

680

Introduction

680

Problem Definition

681

Performance Testbed

683

Implementation of Distributed Channel Selection

684

Homogeneous Scenarios

685

Heterogeneous Scenarios

687

Conclusion and Future Work

691

References

691

Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

693

Introduction

693

Related Work

695

System Model and Problem Formulation

695

Random Access, Power Control and Link Capacity

695

Joint Random Access and Power Control Game

697

Existence of Nash Equilibrium

698

Distributed Algorithm

699

Conclusion and Future Work

703

References

703

Graph Marginalization for Rapid Assignment in Wide-Area Surveillance

705

Introduction

705

Decentralization of the Algorithm

706

The Sensor Network

708

Objects

709

Sensors

710

Objective

711

Probability That an Object Will Be Visible to a Sensor

711

Simulations

712

Data Structure

712

First Application

713

Second Application

715

Conclusion

716

References

717

Error Correction with the Implicit Encoding Capability of Random Network Coding

718

Introduction

718

Network Model

719

Random Network Coding

720

Error Correction in Random Network Coding: Traditional Method

722

Redundant Symbols

722

Redundant Packets

723

Error Correction in Random Network Coding: Proposed Method

724

Network Configurations

724

Example 3

726

Analysis

727

Probability of Decoding

728

Discussion of Complexity

729

Time Delay

729

Error Correcting Capability

729

Advantages

730

Conclusion

730

References

731

An End-to-End Loss Discrimination Scheme for Multimedia Transmission over Wireless IP Networks

732

Introduction

732

Theoretical Foundation of the WMPLD Algorithm

733

Implementation Aspects of WMPLD

734

Senders Behavior

734

Receivers Behavior

735

Simulation Results

736

Wireless Last Hop

737

Wireless Backbone

739

Conclusion

741

References

742

2009 International Workshop on Advanced Sensor Integration Technology

743

Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages

744

Introduction

744

Related Work

745

Semantic Adaptation

746

Information Representation

746

General Packet Structure

748

Network Protocol

749

Context Management

750

System General Operation

751

Prototype

752

Hardware Platform

752

Network Protocol

752

Software Implementation

753

Application Scenario

754

Prototype Analysis

755

Conclusions and Future Work

757

References

758

Performance Analysis of ZigBee Technology for Wireless Body Area Sensor Networks

760

Introduction

760

Architecture

762

System Architecture

762

WBASN Topology

764

ZigBee Network

765

Performance Evaluations

765

Simulation Setup

766

Average Reception Ratio and Throughput

767

Latency

769

Fairness

770

Mobility

771

Conclusion

772

References

773

Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor $Ad Hoc$ Networks

775

Introduction

775

Quality of Service

777

Previous Research on Quality of Service in Cross-Layer Models

777

Data Classes and Protocol Layers

777

Analytical Models of Cross-Layer Design

780

Statistical Properties of Packetized Traffic

781

Statistical Properties of QoS Classes

782

Energy-Efficient Routing

783

Routing Policies

783

Network Processes and Conditional Rates

784

Protocol Parameters and QoS Metrics

785

Cross-Layer Optimization

787

Energy-Constrained QoS Optimization

787

Recursive Optimality Conditions with Complete Network Observations

788

Optimality Conditions with Markov Assumptions

789

Explicit Solutions versus Closed-Form Solutions

789

Conclusions

791

References

791

Programmable Re-tasking of Wireless Sensor Networks Using WISEMAN

793

Introduction

793

Overview of WISEMAN

795

WISEMAN’s Architecture

795

WISEMAN’s Language Constructs

797

Migration Procedures and Agent Execution Flow

799

Code Migration Methodology

800

Agent Execution Flow

801

Performance Evaluations

803

Conclusions

805

References

806

Oxybuoy: Constructing a Real-Time Inexpensive Hypoxia Monitoring Platform

808

Introduction

808

Oxybuoy Architecture

810

Experiments

812

Conclusion

816

References

817

An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN

818

Introduction

818

Related Work

820

The Algorithm

821

Mapping Parameter for Traffic Load

821

The Balance Point

822

QoS Threshold

824

Control Threshold

825

Algorithm Description

825

Performance Evaluation

826

Simulation Setup

826

The Energy Consumption Efficiency of Single Application in the Network

827

The Energy Performance of Multiple Applications

828

Conclusion

829

References

830

An Integrated RFID and Sensor System for Emergency Handling in Underground Coal Mines Environments

831

Introduction

831

Related Works

833

Integrated RFID and Sensor System for Emergency Handling

835

Overview of Traditional Emergency Handling

835

The Proposed Emergency Handling Scheme

835

Conclusion

837

References

837

An Area-Based Overlay Architecture for Scalable Integration of Sensor Networks

838

Introduction

838

Related Work

839

System Overview

841

System Elements

841

Area Names

843

Sensor Types

844

Query Submission and Reception of Results

844

Maintenance of the Overlay

845

A Query Processor Joins the System

845

A Query Processor Leaves the System

846

A Query Processor Fails

846

Areas of Responsibility and Promotion of Query Processors

846

Examples

847

Query Processing

848

Query Forwarding and Multiplexing

848

Result Delivery and De-multiplexing

849

Query Cancellation

849

Evaluation

849

Conclusion

852

References

852

2009 International Workshop on Cross-Layer Design in Wireless Mobile Ad Hoc Networks

854

Outage Probability for ARQ Decode-and-Forward Relaying under Packet-Rate Fading

855

Introduction

855

System Model

856

Outage Performance Analysis

858

Direct ARQ Transmission Scheme

859

DF Cooperative ARQ Relay Scheme

859

Simulation Results

863

Conclusions

865

References

865

Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks

867

Introduction

867

System Model

869

Prioritized Queuing

869

Distributed Spectrum Sharing and Medium Access Control for Video Streaming

870

Spectrum Sharing Principle

871

Spectrum Utility

872

Dynamic Spectrum Allocation

873

Delay Estimation

874

Proposed Cross-Layer Control Scheme

875

Performance Evaluation

876

Conclusions

878

References

878

The Cognitive Radio Channel: From Spectrum Sensing to Message Cribbing

880

Introduction

880

Channel Model

882

Capacity Lower Bounds

883

b21+P2

884

1b2<1+P2

884

b2<1

888

Capacity Outer Bounds

890

Conclusion and Discussions

894

References

894

AM-AOMDV: Adaptive Multi-metric Ad-HocOn-Dem and Multipath Distance Vector Routing

896

Introduction

896

Adaptive Multi-metric AOMDV Routing Scheme

897

Multiple Routing Metrics

897

Route Setup Stage

898

Data Transmission Using Local Path Update

898

Enhanced Link Layer Failure Handling

899

Route Maintenance

899

Simulation and Discussion

900

Simulation Scenario

900

Varying Average Node Speed

901

Varying Number of Connections

903

Varying Packet Rates

905

Conclusion

906

References

907

A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas

908

Introduction

908

Routing

908

MAC

909

Proposed Solution

910

The Scheduling Algorithm

911

Expected Latencies

913

Linear Topology

914

Intra-cluster, One Branch

914

Intra-cluster, Two Branches

915

Neighboring Clusters, One Branch Each

916

Neighboring Clusters, Two Branches Each

917

Many Clusters, One Branch in Each End Cluster

917

Many Clusters, Two Branches in Each End Cluster

917

Summary of Analysis

918

Simulation Results

918

Static, Linear

918

Non-linear, Static Case

919

Mobile Case

921

Conclusion

923

References

924

Author Index

925