[show abstract][hide abstract] ABSTRACT: Service-oriented device anycasting using quality first search (DA-QFS) approach is proposed to coordinate various portable
devices for providing wireless personal area network (WPAN) services. We adopt a cross-layer design standing on not only the
lower (network and data link) layer’s point of view but also higher (application) layer’s point of view to provide quality
WPAN services. In DA-QFS the service profile (SP) of a WPAN service is well-represented by the proposed characterized task
graph (CTG). The proposed weighted device anycasting (WDA) process then takes connectivity, implicit distance, work degree,
and mobility as the criteria to select the most quality device according to the information embedded in CTG. The simulation
results on energy consumption, packet loss rate, average delay, and re-start time show that DA-QFS is an efficient approach,
especially in the environment with highly mobile devices and multiple users.
Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings; 01/2006
[show abstract][hide abstract] ABSTRACT: In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads (CHs) and member nodes according to their importance. When monitoring CHs, member nodes of a CH take turns to monitor this CH. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, CHs have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using CHs to monitor member nodes instead of using all the member nodes to monitor each other. Finally, simulations are performed and compared with LEACH, based on an ns2 LEACH CAD tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attack.
Wireless Communications and Networking Conference, 2005 IEEE; 04/2005