The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most existing connectivity-based localization algorithms require high node density which is unavailable in many large-scale sparse mobile networks. By analyzing large datasets of real user traces from Dartmouth and MIT, we observe that user mobility exhibits high spatiotemporal regularity and, more importantly, that user mobility is strongly correlated with the user's social encounters (including...
Presents the front cover or splash screen of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012) proceedings record.
Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying...
Radio tomographic imaging (RTI) is an emerging device-free localization (DFL) technology enabling the localization of people and other objects without requiring them to carry any electronic device. Instead, the RF attenuation field of the deployment area of a wireless network is estimated using the changes in received signal strength (RSS) measured on links of the network. This paper presents the...
Wireless sensor networks (WSNs) are used for the monitoring of physical and environmental phenomena, and applicable in a range of different domains (e.g., health care, military, critical infrastructure). When using WSNs in a variety of real-world applications, security is a vital problem that should be considered by developers. As the development of security applications (SAs) for WSNs require meticulous...
Access card authentication is critical and essential for many modern access control systems, which have been widely deployed in various government, commercial and residential environments. However, due to the static identification information exchange among the access cards and access control clients, it is very challenging to fight against access control system breaches due to reasons such as loss,...
In contrast to conventional static fixed-width channel allocation, on-demand dynamic variable-width channel allocation has shown that it can effectively improve the fairness, throughput, and spectrum efficiency of wireless networks. Air-time utilization (the percentage of time spent on transmissions) is often used to characterize the spectrum demand of networks. The higher the airtime utilization...
The Radio Frequency Identification (RFID) technology has been widely applied to labeling moving objects. In some RFID application scenarios, e.g., product checking on conveyor belt, the tags labeled on the products need to be identified and accessed before moving out of the reader's probing range. Due to the uncertainty of ALOHA protocol and unreliability of wireless links, passing tags will suffer...
Source-location privacy became one of major issues due to the open nature of wireless sensor networks. The adversary can eavesdrop and trace the message movements so as to capture the source. In the paper, first we propose Credit routing to provide the source-location privacy protection. Credit routing is able to route the message within the assigned credit at each message and randomize the routing...
This paper addresses the problem of anti-eavesdropping in wireless network physical layer. The main contribution of this paper is twofold. First, we propose a novel concept of artificial fading that is produced by double-beam switching of smart antenna array to intentionally corrupt unwanted wireless communication links. Second, we develop a physical layer anti-eavesdropping scheme to minimize the...
The use of asynchronous duty cycling at the MAC layer affords substantial energy savings in wireless networks. This technique is widely used in sensor networks and other types of wireless networks such as ad hoc networks. With asynchronous duty cycling, each node switches alternately between sleeping and active states; each node waking up asynchronously reduces network contention and wireless collisions...
TDMA MAC protocols suffer from two draw-backs that have reduced its practical appeal, especially for infrastructure-less wireless networks: the need for time synchronization, and the use of Jrames. While there has been extensive research towards achieving the required time synchronization, the frames are assumed to be inherent in TDMA. In this paper we present a framework for frameless TDMA based...
Due to advances in low power micro-sensor technology, energy harvesting techniques, we can now build large scale solar-powered sensor networks to support long-running operations. Solar powered sensors often harvest variable amounts of energy in different weather conditions. Then a primary requirement for an efficient and a long-running solar-powered sensor system is to adapt to changing environment...
We consider the problem of efficient and fast identification of mobile tags in RFID networks. So far only a few works have addressed identification of mobile tags, and in very specific scenarios (i.e., tags placed on a moving conveyor). In this paper we address more general scenarios, involving tags that are free to move and may stay in the reader range for very short time (e.g., a few seconds), making...
Visible light communications (VLC) are gaining popularity and may provide an alternative means of communications in indoor settings. However, to date, there is very little research on the deployment or higher layer protocol design for VLC. In this paper, we first perform channel measurements using a physical layer testbed in the visible light band to understand its physical layer characteristics....
The increasing demand of the mobile applications for processing power, storage space and energy saving have led them in adapting the cloud. To ease the offloading of these resource-intensive activities to the cloud, we have developed the Mobile Cloud Middleware (MCM), which also helps in combining services from multiple clouds. While MCM is shown to be horizontally scalable, the dynamic loads of telecommunication...
Driven by advances in the signal processing and antenna technology, it has become possible for wireless nodes to simultaneously transmit and receive a packet through self-interference cancellation using multiple antennas. This is known as a full-duplex communication. In this paper, we propose a MAC protocol with immediate acknowledgement (ACK) for single-channel full-duplex wireless networks. The...
This poster presents the QoS Oriented Opportunistic Routing (QOR) protocol, a novel opportunistic routing protocol for energy constrained Wireless Sensor Networks. QOR builds a joint routing structure and addressing scheme and proposes a cascading forwarding scheme that guarantees reliable, replication-free data transmissions and collision-free acknowledgements even in presence of long-range asymmetric...
We investigate efficient channel learning and opportunity utilization problem in cognitive radio networks (CRN). We find that the sensing order of multiple channels and channel accessing policy play a critical role in designing effective and efficient scheme to maximize the throughput. Leveraging this important finding, we propose a near optimal online channel access policy. We prove that, our policy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.