A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2003; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks
[chapter]
2002
Lecture Notes in Computer Science
In this paper we propose Resilient Data-Centric Storage (R-DCS) as a method to achieve scalability and resilience by replicating data at strategic locations in the sensor network. ...
In data-centric storage, a recently proposed data dissemination framework, all event data is stored by type at designated nodes in the network and can later be retrieved by distributed mobile access points ...
Acknowledgements We would like to thank Sylvia Ratnasamy, Yin Li and Fang Yu for their help and guidance in the initial phases of the project and for making the source code of their DCS simulator available ...
doi:10.1007/3-540-36389-0_4
fatcat:yo6l73mafbfoveejbhema4lhvy
A Tentative Design of a Future Internet Networking Domain Landscape
[chapter]
2012
Lecture Notes in Computer Science
Several network research areas, such as peer-to-peer, autonomous, cognitive and ad hoc networking, have already demonstrated how to improve network performance and user experience. ...
This paper presents a tentative FI domain landscape populated by Internet computing and networking research areas. ...
We also wish to acknowledge our gratitude and appreciation to INRIA scientific leaders of project teams involved in FI related projects, namely: Denis Caromel and Franca Perrina (TEFIS), Walid Dabbous ...
doi:10.1007/978-3-642-30241-1_21
fatcat:kbdjaiqtr5cnrfroeea6mc2de4
Information-centric networking beyond baseline scenarios: research advances and implementation [Guest Editorial]
2014
IEEE Network
To date, the work in this area has centered on ICN for (largely static) content storage. ...
In the second article, Wu et al. propose a service-oriented ICN architecture called SOFIA. SOFIA decouples service processing and data transmission into a service layer and a network layer. ...
He has been the General Chair of ACM MobiHoc 2008, TPC Co-Chair of IEEE MASS 2009, Area-Chair of IEEE INFOCOM 2010, TPC Co-Chair of IEEE GLOBECOM 2010 -Ad Hoc and Sensor Networking Symposium, Panel Co-Chair ...
doi:10.1109/mnet.2014.6843225
fatcat:x6o3jhrexrfbdgbgontvisdlhi
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
2007
Ad hoc networks
Wireless sensor networks are often deployed in hostile environments and operated on an unattended mode. ...
In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. ...
Data centric mechanisms should be performed to aggregate redundant data in order to reduce the energy consumption and traffic load in wireless sensor networks. ...
doi:10.1016/j.adhoc.2006.05.011
fatcat:wwn2ucw2rvhjdoszgj3csh7ciq
2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25
2015
IEEE Transactions on Parallel and Distributed Systems
Adjustment in Wireless Ad Hoc and Sensor Networks. 146-155 Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks. ...
., +, TPDS June 2014 1533-1542 Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks. ...
on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks. ...
doi:10.1109/tpds.2014.2371591
fatcat:qxyljogalrbfficryqjowgv3je
Resilient dependable cyber-physical systems: a middleware perspective
2012
Journal of Internet Services and Applications
In this paper, we address the role of middleware in enabling robust and resilient cyber-physical systems (CPSs) of the future. ...
In particular, we will focus on how adaptation services can be used to improve dependability in instrumented cyber-physical systems based on the principles of "computational reflection." ...
Experiments using WiFi infrastructure networks for transmitting multimodal speech and video data demonstrated a significant drop in information quality even with limited network noise; exploiting ad hoc ...
doi:10.1007/s13174-011-0057-4
fatcat:qaolc4dtbbe55ccqkzmcvefsv4
Gossiping over storage systems is practical
2007
ACM SIGOPS Operating Systems Review
In the following sections, we examine fault-tolerant distributed storage systems in three different settings: widearea networks, wireless sensor networks, and mobile ad hoc networks. ...
and Mobile Ad hoc NETworks (MANETs) [18] . ...
doi:10.1145/1317379.1317391
fatcat:euuxh2xee5cirjjccgtaqj33l4
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
2014
IEEE Transactions on Mobile Computing
Index Terms-Unattended wireless sensor network (UWSN), distributed trust management, subjective logic • Y. Ren is with the ...
In this paper, we propose a trust management scheme for UWSNs to provide efficient and robust trust data storage and trust generation. ...
Zadorozhny's research was supported in part by the Research Council of Norway through the L. Eiriksson mobility program, project 209237. Y. Ren's research was ...
doi:10.1109/tmc.2013.22
fatcat:bve73e6u5zdr5oosch52dwjw7m
Multipath Routing in Ad Hoc Networks
[chapter]
2003
Mobile and Wireless Internet
In a mobile wireless network, multipath routing provides an effective way to recover from frequent network failures, balance load and energy resources among network nodes, and allow more secure and resilient ...
data transmission. ...
Multipath Routing in Ad Hoc Networks ...
doi:10.1007/978-1-4615-0225-8_10
fatcat:3qjkbkxjxveqzesirlawuzrqwm
Secured communications in cognitive radio networks
2018
Advances in Modelling and Analysis D
An energy-efficient probabilistic group-based key distribution scheme for a large-scale heterogeneous wireless sensor network is proposed in [9] . ...
An unconditionally secure probabilistic groupbased key pre-distribution scheme for a heterogeneous wireless sensor network is considered. ...
PROPOSED METHOD Routing in sensor networks is very challenging due to several characteristics that distinguish them from contemporary communication and wireless ad-hoc networks. ...
doi:10.18280/ama_d.230102
fatcat:2tkqukn6gvb7poufgwgcmyiut4
Securing Gateways within Clustered Power Centric Network of Nodes
2016
Mehran University Research Journal of Engineering and Technology
Innovations in computing and telecommunications have transformed the corporations from structured and manageable types to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless ...
Power Centric node network. ...
However, there
have been considerable researches done to embed security
in knowledge networks that are often termed as sensor
networks, such as MANET (Mobile Ad-hoc Networks),
wireless networks ...
doaj:02eb03794b6e4d51a23a4ac60967413e
fatcat:g7m5awuhmvekjnotmhhm3cjiga
Communication paradigms for sensor networks
2005
IEEE Communications Magazine
TOPICS IN AD HOC NETWORKS ...
While optical communication is several orders of magnitude cheaper energy-wise than RF [4], it is also very directional, which makes deployment of large populations of sensors nontrivial. ...
INTRODUCTION Sensor networks are in many ways similar to the much studied mobile ad hoc networks (MANETs), but at the same time have some important differences. ...
doi:10.1109/mcom.2005.1404605
fatcat:xvwq4niakfe73adot77oa3vsie
Security and privacy in emerging wireless networks [Invited Paper]
2010
IEEE wireless communications
Index Terms-wireless networks, security and privacy, sensor networks, vehicular networks, disruption-tolerant networks • In traditional (first-and/or last-hop) wireless networks, the high cost of setting ...
While, in the past, wireless communication (as well as mobility) was largely limited to first and last transmission hops, today's wireless networks are starting to offer purely wireless, often mobile, ...
In this paper, we consider security and privacy issues in certain emerging wireless networks: wireless sensor networks (WSNs), vehicular ad hoc networks (VANETs) and disruptiontolerant networks (DTNs). ...
doi:10.1109/mwc.2010.5601953
fatcat:cancsvqxijeifaqqjfyhh6zesq
Wireless Sensor Networks: Techniques for Detecting Faults using Artificial Intelligence
2019
International Journal for Research in Applied Science and Engineering Technology
Remote sensor systems (WSN) develop as an insurgency in all parts of our lives. WSNs have one of kind details of themselves that portray them uniquely in contrast to different systems. ...
The sensor hubs have diverse power and computational limitations. ...
, but MANET is usually performed by multiple independent entities. [4] 4) The sensor networks are data-centric, ie the queries in the sensor network are directed to nodes that have data that meet certain ...
doi:10.22214/ijraset.2019.4241
fatcat:rmhu5okzfnhzdi7fkbjhe5wccq
Current Trends in Wireless Sensor Network Design
2005
International Journal of Distributed Sensor Networks
Data-centric routing is eminently suited to perform operations such as data aggregation in sensor networks. 3. ...
Data-Centric Routing: In the data-centric paradigm, sensor nodes need not be identified by a unique ID. ...
[63] proposed data-centric storage as one possible approach to wide-area data dissemination and identified those circumstances where data-centric storage may be relevant. ...
doi:10.1080/15501320590901865
fatcat:v3tmptn4nnabph6c2eymkdwlee
« Previous
Showing results 1 — 15 out of 1,131 results