Please wait a minute...
[an error occurred while processing this directive]
[an error occurred while processing this directive]
   清华大学学报自然科学版(英文版)
  2011年, 第16卷, 第5期 刊出日期:2011-05-20 上一期    下一期
全选: 合并摘要 显示图片
论文
Guest Editorial: Special Issue on Wireless Mobile Computing and Networking 收藏
清华大学学报自然科学版(英文版). 2011, (5): 449-450.   DOI: 10.1016/S1007-0214(11)70064-5
摘要 ( 86 )  
相关文章 | 计量指标
Fault Tolerant Data Aggregation Scheduling with Local Information in Wireless Sensor Networks 收藏
清华大学学报自然科学版(英文版). 2011, (5): 451-463.   DOI: 10.1016/S1007-0214(11)70065-7
摘要 ( 133 )  
We study the problem of efficient data aggregation in unreliable wireless sensor networks by designing a fault tolerant data aggregation protocol. A fault tolerant data aggregation protocol consists of two parts: basic aggregation scheduling and amendment strategies. On default, data is aggregated according to the basic aggregation scheduling strategy. The amendment strategy will start automatically when a middle sensor node is out of service. We focus our attention on the amendment strategies and assume that the network adopts a connected dominating set (CDS) based aggregation scheduling as its basic aggregation scheduling strategy. The amendment scheme includes localized aggregation tree repairing algorithms and distributed rescheduling algorithms. The former are used to find a new aggregation tree for every child of the corrupted node, whereas the latter are used to achieve interference free data aggregation scheduling after the amendment. These amendment strategies impact only a very limited number of nodes near the corrupted node and the amendment process is transparent to all the other nodes. Theoretical analyses and simulations show that the scheme greatly improves the efficiency of the data aggregation operation by reducing both message and time costs compared to rebuilding the aggregation tree and rescheduling the entire network.
相关文章 | 计量指标
Reliable and Energy Efficient Target Coverage for Wireless Sensor Networks 收藏
清华大学学报自然科学版(英文版). 2011, (5): 464-474.   DOI: 10.1016/S1007-0214(11)70066-9
摘要 ( 166 )  
A critical aspect of applications with Wireless Sensor Networks (WSNs) is network lifetime. Power-constrained WSNs are usable as long as they can communicate sense data to a processing node. Poor communication links and hazardous environments make the WSNs unreliable. Existing schemes assume that the state of a sensor covering targets is binary: success (covers the targets) or failure (cannot cover the targets). However, in real WSNs, a sensor covers targets with a certain probability. To improve WSNs' reliability, we should consider that a sensor covers targets with users' satisfied probability. To solve this problem, this paper first introduces a failure probability into the target coverage problem to improve and control the system reliability. Furthermore, we model the solution as the α-Reliable Maximum Sensor Covers (α-RMSC) problem and design a heuristic greedy algorithm that efficiently computes the maximal number of α-Reliable sensor covers. To efficiently extend the WSNs lifetime with users' pre-defined failure probability requirements, only the sensors from the current active sensor cover are responsible for monitoring all targets, while all other sensors are in a low-energy sleep mode. Simulation results validate the performance of this algorithm, in which users can precisely control the system reliability without sacrificing much energy consumption.
相关文章 | 计量指标
Interference-Aware Multipath Routing Protocol for QoS Improvement in Event-Driven Wireless Sensor Networks 收藏
清华大学学报自然科学版(英文版). 2011, (5): 475-490.   DOI: 10.1016/S1007-0214(11)70067-0
摘要 ( 240 )  
The existing multipath routing protocols for wireless sensor networks demonstrate the efficacy of traffic distribution over multiple paths to fulfill the Quality of Service (QoS) requirements of different applications. However, the performance of these protocols is highly affected by the characteristics of the wireless channel and may be even inferior to the performance of single-path approaches. Specifically, when multiple adjacent paths are being used concurrently, the broadcast nature of wireless channels results in interpath interference which significantly degrades end-to-end throughput. In this paper, we propose a Low-Interference Energy-efficient Multipath Routing protocol (LIEMRO) to improve the QoS requirements of event-driven applications. In addition, in order to optimize resource utilization over the established paths, LIEMRO employs a quality-based load balancing algorithm to regulate the amount of traffic injected into the paths. The performance gain of LIEMRO compared to the ETX-based single-path routing protocol is 85%, 80%, and 25% in terms of data delivery ratio, end-to-end throughput, and network lifetime, respectively. Furthermore, the end-to-end latency is improved more than 60%.
相关文章 | 计量指标
LiveWeb: A Sensorweb Portal for Sensing the World in Real-Time 收藏
清华大学学报自然科学版(英文版). 2011, (5): 491-504.   DOI: 10.1016/S1007-0214(11)70068-2
摘要 ( 140 )  
A state-of-the-art sensorweb is a global observation system for varied sensory phenomena from the physical world and the cyber world. This paper presents the architecture, design, and application of a sensorweb service portal called the LiveWeb. This portal has been published on the Internet and is used by researchers, students, and also other communities. This system has been used to represent and monitor real-time physical sensor data and cyber activities from ubiquitous sources. LiveWeb meets its goal of providing an efficient and robust sensor information oriented web service, enabled with real-time data representation and notification. Living in the current world with the immense magnitude of information, it is important to keep different communities updated and informed with their context specific data. There are search engines available in the Internet to find relatively static items, but not to observe the events in real-time. In addition, mostly the sensed data and events have meaning only when accompanied with corresponding geographic information. LiveWeb is an effective and efficient sensorweb service, that tries to fulfill the aforementioned requirements. The LiveWeb system consists of three main components: (a) special features of a PHP web application, (b) a Java background processing program, and (c) a database. It is a robust system and is currently running efficiently under the environment of Ubuntu 6.10, Apache 2.0, PHP 5.0, JAVA 1.60, and MySQL 1.6.
相关文章 | 计量指标
Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding 收藏
清华大学学报自然科学版(英文版). 2011, (5): 505-519.   DOI: 10.1016/S1007-0214(11)70069-4
摘要 ( 97 )  
Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization.
相关文章 | 计量指标
Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing 收藏
清华大学学报自然科学版(英文版). 2011, (5): 520-528.   DOI: 10.1016/S1007-0214(11)70070-0
摘要 ( 196 )  
Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers. This paradigm empowers users to pervasively access a large volume of storage resources with portable devices in a distributed and cooperative manner. During the period between uploading and downloading files (data), the privacy and integrity of files need to be guaranteed. To this end, a family of schemes are proposed for different situations. All schemes are lightweight in terms of computational overhead, resilient to storage compromise on mobile devices, and do not assume that trusted cloud servers are present. Corresponding algorithms are proposed in detail for guiding off-the-shelf implementation. The evaluation of security and performance is also extensively analyzed, justifying the applicability of the proposed schemes.
相关文章 | 计量指标
LaConf: A Localized Address Autoconfiguration Scheme for Wireless Ad Hoc Networks 收藏
清华大学学报自然科学版(英文版). 2011, (5): 529-538.   DOI: 10.1016/S1007-0214(11)70071-2
摘要 ( 186 )  
We propose a localized address autoconfiguration (LaConf) scheme for wireless ad hoc networks. Address allocation information is maintained on the network border nodes, called addressing agents (AAs), which are locally identified by a geographic routing protocol GFG (Greedy-FACE-Greedy). When a node joins the network, it acquires an address from a neighboring AA (if any exists) by local communication or from the head AA (a geographic extreme AA) by GFG-based multi-hop communication. A Geographic Hash Table (GHT) is adopted for duplicate address detection. Each address is hashed to a unique location in the network field, and the associated assignment information is stored along the face perimeter enclosing that location (in the planar graph). When a node receives an address assignment, it consults with the perimeter nodes around the hash location of the assigned address about any conflicts. AAs detect network partitions and merger locally according to neighborhood change and trigger AA re-selection and network re-configuration (if necessary). We propose to apply a Connected Dominating Set (CDS) to improve the performance. We also evaluate LaConf through simulation using different planar graphs.
相关文章 | 计量指标
Experimental Analysis of Link Estimation Methods in Low Power Wireless Networks 收藏
清华大学学报自然科学版(英文版). 2011, (5): 539-552.   DOI: 10.1016/S1007-0214(11)70072-4
摘要 ( 135 )  
Wireless sensor networks are envisioned to be an integral part of cyber-physical systems, yet wireless networks are inherently dynamic and come with various uncertainties. One such uncertainty is wireless communication itself which assumes complex spatial and temporal dynamics. For dependable and predictable performance, therefore, link estimation has become a basic element of wireless network routing. Several approaches using broadcast beacons and/or unicast MAC feedback have been proposed in the past years, but there is still no systematic characterization of the drawbacks and sources of errors in beacon-based link estimation in low-power wireless networks, which leads to ad hoc usage of beacons in routing. Using a testbed of 98 XSM motes (an enhanced version of MICA2 motes), we characterize the negative impact that link layer retransmission and traffic-induced interference have on the accuracy of beacon-based link estimation, and we show that data-driven link estimation and routing achieve higher event reliability (e.g., by up to 18.75%) and transmission efficiency (e.g., by up to a factor of 1.96) than beacon-based approaches. These findings provide solid evidence for the necessity of data-driven link estimation and demonstrate the importance of addressing the drawbacks of beacon-based link estimation when designing protocols for low-power wireless networks of cyber-physical systems.
相关文章 | 计量指标
Multi-Axis Projection Based Giant Component Formation in Random Unit-Disk Graphs 收藏
清华大学学报自然科学版(英文版). 2011, (5): 553-558.   DOI: 10.1016/S1007-0214(11)70073-6
摘要 ( 103 )  
This paper proposes a multi-axis projection (MAP) based giant component formation strategy via the Maximal Independent Set (MIS) in a random unit-disk graph. We focus on the problem of virtual backbone construction in wireless ad hoc and sensor networks, where the coverage areas of the nodes are disks with identical radii. In the simulation, we show that the MAP-based giant component has the ability to connect most nodes and serves as a backbone in the network. The algorithm is localized and may play an important role in efficiently constructing a virtual backbone for ad hoc and sensor networks.
相关文章 | 计量指标
版权所有 © 《清华大学学报自然科学版(英文版)》编辑部


本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn