Filters








1,131 Hits in 5.5 sec

Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks [chapter]

Abhishek Ghose, Jens Grossklags, John Chuang
2002 Lecture Notes in Computer Science  
In this paper we propose Resilient Data-Centric Storage (R-DCS) as a method to achieve scalability and resilience by replicating data at strategic locations in the sensor network.  ...  In data-centric storage, a recently proposed data dissemination framework, all event data is stored by type at designated nodes in the network and can later be retrieved by distributed mobile access points  ...  Acknowledgements We would like to thank Sylvia Ratnasamy, Yin Li and Fang Yu for their help and guidance in the initial phases of the project and for making the source code of their DCS simulator available  ... 
doi:10.1007/3-540-36389-0_4 fatcat:yo6l73mafbfoveejbhema4lhvy

A Tentative Design of a Future Internet Networking Domain Landscape [chapter]

Marc Pallot, Brigitte Trousse, Bernard Senach
2012 Lecture Notes in Computer Science  
Several network research areas, such as peer-to-peer, autonomous, cognitive and ad hoc networking, have already demonstrated how to improve network performance and user experience.  ...  This paper presents a tentative FI domain landscape populated by Internet computing and networking research areas.  ...  We also wish to acknowledge our gratitude and appreciation to INRIA scientific leaders of project teams involved in FI related projects, namely: Denis Caromel and Franca Perrina (TEFIS), Walid Dabbous  ... 
doi:10.1007/978-3-642-30241-1_21 fatcat:kbdjaiqtr5cnrfroeea6mc2de4

Information-centric networking beyond baseline scenarios: research advances and implementation [Guest Editorial]

2014 IEEE Network  
To date, the work in this area has centered on ICN for (largely static) content storage.  ...  In the second article, Wu et al. propose a service-oriented ICN architecture called SOFIA. SOFIA decouples service processing and data transmission into a service layer and a network layer.  ...  He has been the General Chair of ACM MobiHoc 2008, TPC Co-Chair of IEEE MASS 2009, Area-Chair of IEEE INFOCOM 2010, TPC Co-Chair of IEEE GLOBECOM 2010 -Ad Hoc and Sensor Networking Symposium, Panel Co-Chair  ... 
doi:10.1109/mnet.2014.6843225 fatcat:x6o3jhrexrfbdgbgontvisdlhi

An improved key distribution mechanism for large-scale hierarchical wireless sensor networks

Yi Cheng, Dharma P. Agrawal
2007 Ad hoc networks  
Wireless sensor networks are often deployed in hostile environments and operated on an unattended mode.  ...  In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes.  ...  Data centric mechanisms should be performed to aggregate redundant data in order to reduce the energy consumption and traffic load in wireless sensor networks.  ... 
doi:10.1016/j.adhoc.2006.05.011 fatcat:wwn2ucw2rvhjdoszgj3csh7ciq

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Adjustment in Wireless Ad Hoc and Sensor Networks. 146-155 Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks.  ...  ., +, TPDS June 2014 1533-1542 Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks.  ...  on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Resilient dependable cyber-physical systems: a middleware perspective

Grit Denker, Nikil Dutt, Sharad Mehrotra, Mark-Oliver Stehr, Carolyn Talcott, Nalini Venkatasubramanian
2012 Journal of Internet Services and Applications  
In this paper, we address the role of middleware in enabling robust and resilient cyber-physical systems (CPSs) of the future.  ...  In particular, we will focus on how adaptation services can be used to improve dependability in instrumented cyber-physical systems based on the principles of "computational reflection."  ...  Experiments using WiFi infrastructure networks for transmitting multimodal speech and video data demonstrated a significant drop in information quality even with limited network noise; exploiting ad hoc  ... 
doi:10.1007/s13174-011-0057-4 fatcat:qaolc4dtbbe55ccqkzmcvefsv4

Gossiping over storage systems is practical

Hakim Weatherspoon, Hugo Miranda, Konrad Iwanicki, Ali Ghodsi, Yann Busnel
2007 ACM SIGOPS Operating Systems Review  
In the following sections, we examine fault-tolerant distributed storage systems in three different settings: widearea networks, wireless sensor networks, and mobile ad hoc networks.  ...  and Mobile Ad hoc NETworks (MANETs) [18] .  ... 
doi:10.1145/1317379.1317391 fatcat:euuxh2xee5cirjjccgtaqj33l4

A Novel Approach to Trust Management in Unattended Wireless Sensor Networks

Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li
2014 IEEE Transactions on Mobile Computing  
Index Terms-Unattended wireless sensor network (UWSN), distributed trust management, subjective logic • Y. Ren is with the  ...  In this paper, we propose a trust management scheme for UWSNs to provide efficient and robust trust data storage and trust generation.  ...  Zadorozhny's research was supported in part by the Research Council of Norway through the L. Eiriksson mobility program, project 209237. Y. Ren's research was  ... 
doi:10.1109/tmc.2013.22 fatcat:bve73e6u5zdr5oosch52dwjw7m

Multipath Routing in Ad Hoc Networks [chapter]

An-I Andy Wang, Geoffrey H. Kuenning, Peter Reiher
2003 Mobile and Wireless Internet  
In a mobile wireless network, multipath routing provides an effective way to recover from frequent network failures, balance load and energy resources among network nodes, and allow more secure and resilient  ...  data transmission.  ...  Multipath Routing in Ad Hoc Networks  ... 
doi:10.1007/978-1-4615-0225-8_10 fatcat:3qjkbkxjxveqzesirlawuzrqwm

Secured communications in cognitive radio networks

T. Perarasi, G. Nagarajan
2018 Advances in Modelling and Analysis D  
An energy-efficient probabilistic group-based key distribution scheme for a large-scale heterogeneous wireless sensor network is proposed in [9] .  ...  An unconditionally secure probabilistic groupbased key pre-distribution scheme for a heterogeneous wireless sensor network is considered.  ...  PROPOSED METHOD Routing in sensor networks is very challenging due to several characteristics that distinguish them from contemporary communication and wireless ad-hoc networks.  ... 
doi:10.18280/ama_d.230102 fatcat:2tkqukn6gvb7poufgwgcmyiut4

Securing Gateways within Clustered Power Centric Network of Nodes

Qaisar Javaid, Muhammad Daud Awan, Syed Hasnain A. Naqvi
2016 Mehran University Research Journal of Engineering and Technology  
Innovations in computing and telecommunications have transformed the corporations from structured and manageable types to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless  ...  Power Centric node network.  ...  However, there have been considerable researches done to embed security in knowledge networks that are often termed as sensor networks, such as MANET (Mobile Ad-hoc Networks), wireless networks  ... 
doaj:02eb03794b6e4d51a23a4ac60967413e fatcat:g7m5awuhmvekjnotmhhm3cjiga

Communication paradigms for sensor networks

D. Niculescu
2005 IEEE Communications Magazine  
TOPICS IN AD HOC NETWORKS  ...  While optical communication is several orders of magnitude cheaper energy-wise than RF [4], it is also very directional, which makes deployment of large populations of sensors nontrivial.  ...  INTRODUCTION Sensor networks are in many ways similar to the much studied mobile ad hoc networks (MANETs), but at the same time have some important differences.  ... 
doi:10.1109/mcom.2005.1404605 fatcat:xvwq4niakfe73adot77oa3vsie

Security and privacy in emerging wireless networks [Invited Paper]

Di Ma, Gene Tsudik
2010 IEEE wireless communications  
Index Terms-wireless networks, security and privacy, sensor networks, vehicular networks, disruption-tolerant networksIn traditional (first-and/or last-hop) wireless networks, the high cost of setting  ...  While, in the past, wireless communication (as well as mobility) was largely limited to first and last transmission hops, today's wireless networks are starting to offer purely wireless, often mobile,  ...  In this paper, we consider security and privacy issues in certain emerging wireless networks: wireless sensor networks (WSNs), vehicular ad hoc networks (VANETs) and disruptiontolerant networks (DTNs).  ... 
doi:10.1109/mwc.2010.5601953 fatcat:cancsvqxijeifaqqjfyhh6zesq

Wireless Sensor Networks: Techniques for Detecting Faults using Artificial Intelligence

Mohammed Bakhtawar Ahmed
2019 International Journal for Research in Applied Science and Engineering Technology  
Remote sensor systems (WSN) develop as an insurgency in all parts of our lives. WSNs have one of kind details of themselves that portray them uniquely in contrast to different systems.  ...  The sensor hubs have diverse power and computational limitations.  ...  , but MANET is usually performed by multiple independent entities. [4] 4) The sensor networks are data-centric, ie the queries in the sensor network are directed to nodes that have data that meet certain  ... 
doi:10.22214/ijraset.2019.4241 fatcat:rmhu5okzfnhzdi7fkbjhe5wccq

Current Trends in Wireless Sensor Network Design

Neha Jain, Dharma P. Agrawal
2005 International Journal of Distributed Sensor Networks  
Data-centric routing is eminently suited to perform operations such as data aggregation in sensor networks. 3.  ...  Data-Centric Routing: In the data-centric paradigm, sensor nodes need not be identified by a unique ID.  ...  [63] proposed data-centric storage as one possible approach to wide-area data dissemination and identified those circumstances where data-centric storage may be relevant.  ... 
doi:10.1080/15501320590901865 fatcat:v3tmptn4nnabph6c2eymkdwlee
« Previous Showing results 1 — 15 out of 1,131 results