CPSC 434/534: Topics in Networked Systems, Spring 2017
: Course Info
Abstract: Ubiquitous computing is the
method of enhancing computer use by making many computers available
throughout the physical environment, but making them effectively invisible
to the user. Since we started this work at Xerox PARC in 1988, a number of
researchers around the world have begun to work in the ubiquitous computing
framework. This paper explains what is new and different about the computer
science in ubiquitous computing. It starts with a brief overview of
ubiquitous computing, and then elaborates through a series of examples drawn
from various subdisciplines of computer science: hardware components (e.g.
chips), network protocols, interaction substrates (e.g. software for screens
and pens), applications, privacy, and computational methods. Ubiquitous
computing offers a framework for new and exciting research across the
spectrum of computer science.
Three issues: wireless networking,
mobility, and portability.
Abstract: A confusing array of new wireless 搖ntethered?communications
services, for voice and data, in real-time or delayed, interactive or
one-way, in-building or out-of-doors, are rapidly becoming available. In
this paper, we argue that despite the widely varying issues of engineering
that span the creation of these diverse wireless services, the unique
underlying aspect is that they must be able to adapt to a constantly
changing environment brought on by mobility. Mobile systems must be able
to detect their transmission environment and exploit knowledge about its
current situation, so-called 搒ituation awareness,?to improve the quality of
communications. Handoff in cellular phone systems is one example of
detection and reaction to the environment.
adaptability. By this we mean that systems must be location and
situation-aware, and must take advantage of this information to dynamically
configure themselves in a distributed fashion.
Abstract: This paper is an
answer to the question: "What is unique and conceptually different about
mobile computing?" The paper begins by describing a set of constraints
intrinsic to mobile computing, and examining the impact of these
constraints on the design of distributed systems. Next, it summarizes the
key results of the Coda and Odyssey systems. Finally, it describes the
research opportunities in five important topics relevant to mobile
computing: caching metrics, semantic callbacks and validators, resource
revocation, analysis of adaptation, and global estimation from local
Abstract: Nomadic computing and
communications is upon us. We are all nomads, but we lack the systems
support to assist us in our various forms of mobility. In this paper,
we discuss the vision of nomadicity, its technical challenges, and
approaches to the resolution of these challenges. One of the key
characteristics of this paradigm shift in the way we deal with the
information is that we face dramatic and sudden changes in
connectivity and latency. Our systems must be
``nomadically-enabled'' in that mechanisms must be developed that deal
with such changes in a natural and transparent fashion. Currently,
this is not the case in that our systems typically treat such changes
as exceptions or failures; this is unacceptable. Moreover, the
industry is producing ``piece parts'' that are populating our
desktops, briefcases and belt-hooks, but that do not interoperate with
each other, in general. We require innovative and system wide
solutions to overcome these problems. Such are the issues we address
in this paper.
Abstract: This paper
summarizes the results of the BARWAN project, which focused on
enabling truly useful mobile networking across an extremely wide
variety of real-world networks and mobile devices. We present the
overall architecture, summarize key results, and discuss four broad
lessons learned along the way. The architecture enables seamless
roaming in a single logical overlay network composed of many
heterogeneous (mostly wireless) physical networks, and provides
significantly better TCP performance for these networks. It also
provides complex scalable and highly available services to enable
powerful capabilities across a very wide range of mobile devices,
and mechanisms for automated discovery and configuration of
localized services. Four broad themes arose from the project: 1) the
power of dynamic adaptation as a generic solution to heterogeneity,
2) the importance of cross-layer information, such as the
exploitation of TCP semantics in the link layer, 3) the use of
agents in the infrastructure to enable new abilities and to hide new
problems from legacy servers and protocol stacks, and 4) the
importance of soft state for such agents for simplicity, ease of
fault recovery, and scalability.
- [IEEE00] "IEEE
Personal Communications: Smart Spaces and Environments,"
(Special Issue) 2000.
- [Sat01] "Pervasive
Computing: Vision and Challenges," M. Satyanarayanan, IEEE
Personal Communications, Vol. 8, No. 4, (Aug. 2001), pp. 10-17.
Abstract: This article
discusses the challenges in computer systems research posed by the
emerging field of pervasive computing. It first examines the
relationship of this new field to its predecessors: distributed
systems and mobile computing. It then identifies four new research
thrusts: effective use of smart spaces, invisibility, localized
scalability, and masking uneven conditioning. Next, it sketches a
couple of hypothetical pervasive computing scenarios, and uses
them to identify key capabilities missing from today抯 systems. The
article closes with a discussion of the research necessary to
develop these capabilities.
sensors-those that coordinate amongst themselves to achieve
a larger sensing task-will revolutionize information
gathering and processing both in urban environments and in
inhospitable terrain. The sheer numbers of these sensors and
the expected dynamics in these environments present unique
challenges in the design of unattended autonomous sensor
networks. These challenges lead us to hypothesize that
sensor network coordination applications may need to be
structured differently from traditional network
applications. In particular, we believe that localized
algorithms (in which simple local node behavior achieves a
desired global objective) may be necessary for sensor
network coordination. In this paper, we describe
localized algorithms, and then discuss directed diffusion, a
simple communication model for describing localized
- [Abe00] "Amorphous computing",
H. Abelson, et. al., Communications of the ACM,
43(5), pp. 74?2, May 2000.
Abstract: As new
fabrication and integration technologies reduce the cost
and size of micro-sensors and wireless interfaces, it
becomes feasible to deploy densely distributed wireless
networks of sensors and actuators. These systems promise
to revolutionize biological, earth, and environmental
monitoring applications, providing data at granularities
unrealizable by other means. In addition to the
challenges of miniaturization, new system architectures
and new network algorithms must be developed to
transform the vast quantity of raw sensor data into a
manageable stream of high-level data. To address this,
we propose a tiered system architecture in which data
collected at numerous, inexpensive sensor nodes is
altered by local processing on its way through to
larger, more capable and more expensive nodes. We
briefly describe Habitat monitoring as our motivating
application and introduce initial system building blocks
designed to support this application. The remainder of
the paper presents details of our
article addresses the challenges and opportunities of
instrumenting the physical world with pervasive networks
of sensor-rich, embedded computation. The authors
present a taxonomy of emerging systems and outline the
enabling technological developments.
with Weiss's vision.
future smart environments, wireless sensor networks
will play a key role in sensing, collecting, and
disseminating information about environmental
phenomena. Sensing applications represent a new
paradigm for network operation, one that has different
goals from more traditional wireless networks. This
paper examines this emerging field to classify
wireless micro-sensor networks according to different
communication functions, data delivery models, and
network dynamics. This taxonomy will aid in defining
appropriate communication infrastructures for
different sensor network application sub-spaces,
allowing network designers to choose the protocol
architecture that best matches the goals of their
application. In addition, this taxonomy will enable
new sensor network models to be defined for use in
further research in this area.
dynamic and lossy nature of wireless communication
poses major challenges to reliable, self-organizing
multihop networks. These non-ideal characteristics are
more problematic with the primitive, low-power radio
transceivers found in sensor networks, and raise new
issues that routing protocols must address. Link
connectivity statistics should be captured dynamically
through an efficient yet adaptive link estimator and
routing decisions should exploit such connectivity
statistics to achieve reliability. Link status and
routing information must be maintained in a
neighborhood table with constant space regardless of
cell density. We study and evaluate link estimator,
neighborhood table management, and reliable routing
protocol techniques. We focus on a many-to-one,
periodic data collection workload. We narrow the
design space through evaluations on large-scale,
high-level simulations to 50-node, in-depth empirical
experiments. The most effective solution uses a simple
time averaged EWMA estimator, frequency based table
management, and cost-based routing.
recent years, a wide variety of mobile computing
devices has emerged, including portables, palmtops,
and personal digit al assistants. Providing adequate
network connectivity for these devices will require a
new generation of wireless LAN technology. In this
paper we study media access protocols for a single
channel wireless LAN being developed at Xerox
Corporation抯 Palo Alto Research Center. We start with
the MACA media access protocol first proposed by Karn
 and later refined by Biba  which uses an
RTSCTS- DATA packet exchange and binary exponential
backoff. Using packet-level simulations, we examine
various performance and design issues in such
protocols, Our analysis leads to a new protocol,
MACAW, which uses an RTS-CTSDS- DATA-ACK message
exchange and includes a significantly different
Comments: used in 802.11. extend MACA.
and Reducing Energy Consumption of Network Interfaces
in Hand-Held Devices,? Mark Stemm and Randy H Katz,
IEICE Transactions on Communications, vol. E80-B, no.
8, pp. 1125?131, Aug. 1997.
Abstract: Next generation hand-held devices must
provide seamless connectivity while obeying stringent
power and size constrains. In this paper we examine
this issue from the point of view of the Network
Interface (NI). We measure the power usage of two
PDAs, the Apple Newton Messagepad and Sony Magic Link,
and four NIs, the Metricom Ricochet Wireless Modem,
the AT&T Wavelan operating at 915 MHz and 2.4 GHz, and
the IBM Infrared Wireless LAN Adapter. These
measurements clearly indicate that the power
drained by the network interface constitutes a large
fraction of the total power used by the PDA. We
then examine two classes of optimizations that can be
used to reduce network interface energy consumption on
these devices: transport-level strategies and
application-level strategies. Simulation
experiments of transport level strategies show that
the dominant cost comes not from the number of packets
sent or received by a particular transport protocol
but the amount of time that the NI is in an active but
idle state. Simulation experiments of
application-level strategies that significant energy.
Comment: reduce idle time is crucial.
capacity of wireless networks,'' P. Gupta and P.
R. Kumar, IEEE Transactions on Information Theory
, vol. IT-46, no. 2, pp. 388-404, March 2000.
- [WC01] "A
Transmission Control Scheme for Media Access in Sensor
Networks", Alec Woo and David Culler, Proceedings
of the ACM/IEEE International Conference on Mobile
Computing and Networking, Mobicom 2001, Rome, Italy.
study the problem of media access control in the novel
regime of sensor networks, where unique application
behavior and tight constraints in computation power,
storage, energy resources, and radio technology have
shaped this design space to be very different from
that found in traditional mobile computing regime.
Media access control in sensor networks must not only
be energy efficient but should also allow fair
bandwidth allocation to the infrastructure for all
nodes in a multihop network. We propose an adaptive
rate control mechanism aiming to support these two
goals and find that such a scheme is most effective in
achieving our fairness goal while being energy
efficient for both low and high duty cycle of network
COMMENT: 1) The
network tends to operate as a collective structure,
rather than supporting many independent point-to-point
flows. Traffic tends to be variable and highly
correlated. 2) The data that a networked sensor
generates for each sample, such as a temperature
value, is relatively small and, given the low
bandwidth of the radio, data packets are kept small
with a typical size around tens of bytes.
Abstract: This paper
proposes S-MAC, a medium-access control (MAC) protocol
designed for wireless sensor networks. Wireless sensor
networks use battery-operated computing and sensing
devices. A network of these devices will collaborate
for a common application such as environmental
monitoring. We expect sensor networks to be deployed
in an ad hoc fashion, with individual nodes remaining
largely inactive for long periods of time, but then
becoming suddenly active when something is detected.
These characteristics of sensor networks and
applications motivate a MAC that is different from
traditional wireless MACs such as IEEE 802.11 in
almost every way: energy conservation and
self-configuration are primary goals, while per-node
fairness and latency are less important. S-MAC uses
three novel techniques to reduce energy consumption
and support self-configuration. To reduce energy
consumption in listening to an idle channel,
nodes periodically sleep.
Neighboring nodes form virtual clusters to
auto-synchronize on sleep schedules. Inspired by
PAMAS, S-MAC also sets the radio to sleep during
transmissions of other nodes. Unlike PAMAS, it only
uses in-channel signaling. Finally, S-MAC applies
message passing to reduce contention latency for
sensor-network applications that require
store-and-forward processing as data move through the
network. We evaluate our implementation of S-MAC over
a sample sensor node, the Mote, developed at
University of California, Berkeley. The experiment
results show that, on a source node, an 802.11 like
MAC consumes 2? times more energy than S-MAC for
traffic load with messages sent every 1?0s.
Comment: divide into frames. use virtual clustering.
this paper we describe T-MAC, a contention-based
Medium Access Control protocol for wireless sensor
networks. Applications for these networks have some
characteristics (low message rate, insensitivity to
latency) that can be exploited to reduce energy
consumption by introducing an active/sleep duty cycle.
To handle load variations in time and location T-MAC
introduces an adaptive duty cycle in a novel way: by
dynamically ending the active part of it. This reduces
the amount of energy wasted on idle listening, in
which nodes wait for potentially incoming messages,
while still maintaining a reasonable throughput. We
discuss the design of T-MAC, and provide a head-to-
head comparison with classic CSMA (no duty cycle) and
S-MAC ( xed duty cycle) through extensive simulations.
Under homogeneous load, T-MAC and S-MAC achieve
similar reductions in energy consumption (up to 98 %)
compared to CSMA. In a sample scenario with variable
load, however, T-MAC outperforms S-MAC by a factor of
5. Preliminary energy-consumption measurements provide
insight into the internal workings of the T-MAC
Comment: improvement over the above S-MAC protocol by
adapting the duration of the active part.
Capacity improvement is one of the principal
challenges in wireless networking. We present a
link-layer protocol called Slotted Seeded Channel
Hopping, or SSCH, that increases the capacity of an
IEEE 802.11 network by utilizing frequency diversity.
SSCH can be implemented in software over an IEEE
802.11-compliant wireless card. Each node using SSCH
switches across channels in such a manner that nodes
desiring to communicate overlap, while disjoint
communications mostly do not overlap, and hence do not
interfere with each other. To achieve this, SSCH uses
a novel scheme for distributed rendezvous and
synchronization. Simulation results show that SSCH
significantly increases network capacity in several
multi-hop and single-hop wireless networking
Comment: see the
talk by Nitin Vaidya on multiple-channel wireless
- Cellular networks
overview of the GSM system," Javier
Phase 2+ General Packet Radio Service GPRS:
Architecture, Protocols, and Air Interface,"
Christian Bettstetter, et al.. IEEE Communication Survey. 1999.
Mode in Wireless Networks: Overview of Transition to
Third Generation," B. Sarikaya, IEEE
Communications Magazine , Vol. 38, No. 9 (Sep.
2000), pp. 164 -172
the Path to 3G," A. Chan, IEEE Potentials, Vol.
20, No. 4, Oct.-Nov. 2001, pp. 6-10.
3G Really Be the Next Big Wireless Technology?,"
L. Garber, Computer, Vol. 35, No. 1, Jan 2002, pp.
- Wireless LANs
LANs and Mobile Networking: Standards and Future
Directions," R. LaMaire, A. Krishna, P.
Bhagwat, J. Panian, IEEE Communications Magazine,
Vol. 34, No. 8, (Aug. 1996), pp. 86 -94.
802.11 Wireless Local Area Networks", B. Crow,
I. Widjaja, J. Kim, P. Sakai, IEEE Communications
Magazine, Volume: 35 Issue: 9 , Sept. 1997. More
material can be found at Breezecom Wireless
Communications by P. Brenner, "A Technical
Tutorial on the IEEE802.11 Protocol",
Technical Tutorial, and
the Wireless LANscape," L. Paulson, IEEE
Computer, Vol. 33, No. 10, (Oct. 2000), pp. 12-16.
802.11: Moving Closer to Practical Wireless LANs,"
W. Stallings, IT Professional, Vol. 3, No. 3,
May-June 2001, pp. 17-23
Analysis of the IEEE 802.11 Distributed
Coordination Function," Giuseppe Bianchi. In
Embedded Mobile Networking", Frazer Bennett,
David Clarke, Joseph B. Evans, Andy Hopper, Alan
Jones, and David Leask, IEEE Personal
Communications Magazine, Vol. 4, no. 5, pp.8-15
- "The Bluetooth
Radio System", Jaap C. Haartsen, IEEE Personal
Communications Magazine, Feb, 2000, pp. 28-36.
tutorial" by P. Bhagwat at Mobicom 2000.
Technology for Short-Range Wireless Applications,"
P. Bhagwat, IEEE Internet Computing, Vol. 5, No.
3, May-June 2001, pp. 96-103.
an Enabler for Personal Area Networking," P.
Johansson, M. Kazantzidis, R. Kapoor, and M.
Gerla, IEEE Network, Vol. 15, No. 5, Sept.-Oct.
2001, pp. 28-37.
Construction of Bluetooth Wireless Personal Area
Networks," Theodoros Salonidis, Pravin
Bhagwat, Leandros Tassiulas, and Richard LaMaire.
Under submission 2003.
- Sensors: Motes
Century Challenges: Mobile Networking for "Smart
Dust", J. M. Kahn, R. H. Katz, and K. S. J.
Pister. In International Conference on Mobile
Computing and Networks (MobiCOM '99), August 1999,
Large-scale networks of wireless sensors are
becoming an active topic of research. Advances in
hardware technology and engineering design have
led to dramatic reductions in size, power
consumption and cost for digital circuitry,
wireless communications and Micro
ElectroMechanical Systems (MEMS). This has enabled
very compact, autonomous and mobile nodes, each
containing one or more sensors, computation and
communication capabilities, and a power supply.
The missing ingredient is the networking and
applications layers needed to harness this
revolutionary capability into a complete system.
We review the key elements of the emergent
technology of Smart Dust?and outline the research
challenges they present to the mobile networking
and systems community, which must provide coherent
connectivity to large numbers of mobile network
nodes co-located within a small volume.
describe the hardware design of motes.
- Pister's view of
sensor networks in 2010.
"The Capacity of Wireless Networks," P. Gupta,
P.R. Kumar. IEEE Transactions on Information
Theory, pp. 388-404, vol. IT-46, no. 2, March
"Mobility Increases the Capacity of Wireless Adhoc
Networks" , M. Grossglauser and D. Tse. In
the Capacity of Hybrid Wireless Networks,"
Benyuan Liu, Zhen Liu, Don Towsley. In IEEE
Layer mMbility: an Architecture and Survey,"
P. Bhagwat, C. Perkins, S. Tripathi, IEEE
Personal Communications, Vol. 3, No. 3, (June
1996), pp. 54-64.
IP," C. Perkins, IEEE Communications
Magazine, Vol. 35, No. 5, (May 1997), pp. 84-99.
Mobility 4x4," S. Cheshire and M. Baker,
Proceedings of ACM SIGCOMM 1996.
mobile IP: an Approach and Implementation,"
A. Giovanardi, G. Mazzini, Proceedings of IEEE
GlobeCom'97, Vol. 3, (1997), pp. 1861-1865.
New Multicasting-Based Architecture for Internet
Host Mobility," J. Mysore and V. Bharghavan,
Proceedings of ACM MobiCom 1997.
Networking through Mobile IP," C. Perkins,
IEEE Internet Computing, Vol. 2, No. 1,
(Jan.-Feb. 1998), pp. 58-69.
Handoffs in Wireless Overlay Networks," Mark
Stemm and Randy H. Katz, ACM Mobile Networking
(MONET), Vol. 3, No. 4, (1998), pp. 335-350.
Network Support for Mobility," X. Zhao, C.
Castelluccia, and M. Baker, Proceedings of ACM
Portable Mobile IP Implementation," H.
Haverinen, A. Kuikka, T. Maattanen, Proceedings
of Local Computer Networks, 2000, pp. 155-162.
A Domain-based Approach for Supporting
Mobility in Wide-area Wireless Networks,"
R. Ramjee, T. La Porta, S. Thuel, K. Vardhan,
and S. Wang, Proceedings of ICNP 1999, pp.
Telecommunications-enhanced Mobile IP
Architecture for Fast Intradomain Mobility,"
S. Das, A. Misra, P. Agrawal, IEEE Personal
Communications, Vol. 7, No. 4, (Aug 2000), pp.
Access Network Infrastructure for
Next-generation Wireless Data Networks,"
R. Ramjee, T. La Porta, L. Salgarelli, S.
Thuel, K. Varadhan, L. Li, IEEE Personal
Communications, Vol. 7, No. 4, (Aug 2000), pp.
Internet Infrastructure for Cellular CDMA
Networks Using Mobile IP," P. McCann and
T. Hiller, IEEE Personal Communications, Vol.
7, No. 4, (Aug 2000), pp. 26-32.
Implementation, and Evaluation of Cellular IP,"
A. Campbell, J. Gomez, S. Kim, A. Valko, C.
Wan, Z. Turanyi, IEEE Personal Communications,
Vol. 7, No. 4, Aug 2000, pp. 42-49.
and Hierarchical Topology for Fast Handover in
Wireless IP Networks," A. Stephane, A.
Mihailovic, A. Aghvami, IEEE Communications
Magazine, Vol. 38, No. 11, (Nov 2000), pp.
of IP Micro-Mobility Protocols," A.
Campbell, J. Gomez, S. Kim, Z. Turanyi, C.
Wan, and A. Valko, IEEE Wireless
Communications Magazine, Vol. 9, No. 1,
Review of Current Routing Protocols for Ad
Hoc Mobile Wireless Networks," E.
Royer and C.-K. Toh, IEEE Personal
Communications, Vol. 6, No. 2, (Apr.
1999), pp. 46-55.
- [DSR] "Dynamic
Source Routing in Ad Hoc Wireless Networks",
D. Johnson and D. Maltz, Mobile Computing,
edited by T. Imielinski and H. Korth,
Chapter 5, pages 153-181, Kluwer Academic
- [AODV] "Ad
hoc On-Demand Distance Vector Routing,"
C. Perkins and E. Royer, Proceedings of
the 2nd IEEE Workshop on Mobile Computing
Systems and Applications, New Orleans,
(Feb. 1999), pp. 90-100.
- [DSDV] "Highly
Distance-Vector Routing (DSDV) for Mobile
Computers," C. Perkins and P. Bhagwat,
Proceedings of SIGCOMM 1994.
highly Adaptive Distributed Routing
Algorithm for Mobile Wireless Networks,"
V. Park and M. Corson, Proceedings of IEEE
INFOCOM 1997, Vol 3, pp. 1405-1413, 1997.
"Location-Aided Routing(LAR) in Mobile
Ad Hoc Networks," "Routing Young-Bae Ko
and Nitin H. Vaidya, In Proceedings of
the Fourth Annual ACM/IEEE International
Conference on Mobile Computing and
Networking (MobiCom 1998), ACM, Dallas,
TX, October 1998.
- [HHL02] "Gossiping-based
Ad Hoc Routing'', Z. Haas, J.Y.
Halpern, and L. Li, Proc. IEEE
INFOCOM, pages 1707-1716, June 2002.
Comparison of Multi-hop Wireless Ad-hoc
Network Routing Protocols," Josh
Broch, David A. Maltz, David B. Johnson,
Yih-Chun Hu, Jorjeta Jetcheva. Mobile
Computing and Networking. 1998.
- [ETX] "A
High-Throughput Path Metric for Multi-Hop
Wireless Routing," Douglas S. J. De
Couto, Daniel Aguayo, John Bicket, Robert
Morris. Proc. of ACM Mobicom 2003.
- [WCETT] "Routing
in Multi-radio, Multi-hop Wireless Mesh
Network," Richard Draves, Jitendra
Padhye, and Brian Zill. Proc. of ACM
- [EXOR] "ExOR: Opportunistic Multi-Hop Routing for Wireless Networks,"
Sanjit Biswas, and Robert Morris.
In Proc. of ACM SIGCOMM, August 2005.
- [COPE] "XORs
in the Air: Practical Wireless Network
Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard,
. In Proc. of ACM SIGCOMM, September 2006.
Topology Control for Power Efficient
Operation in Multihop Wireless Ad Hoc
Wattenhofer, Li Li, Paramvir Bahl,
Yi-Min Wang, in Proceedings of IEEE
of a Cone-Based Distributed Topology
Control Algorithms for Wireless
Multi-hop Networks'', L. Li, J.Y.
Halpern, V. Bahl, Y.M. Wang and R.
Wattenhofer, Proc. ACM Symposium on
Principle of Distributed Computing
(PODC), pages 264-273, August 2001.
an Energy-Efficient Coordination
Algorithm for Topology Maintenance in Ad
Hoc Wireless Networks," Benjie Chen,
Kyle Jamieson, Hari Balakrishnan, and
Robert Morris.To appear in ACM Wireless
Networks Journal, Volume 8, Number 5,
Control Protocols to Conserve Energy in
Wireless Ad Hoc Networks," Y. Xu, S.
Bien, Y. Mori, J. Heidemann, D. Estrin.
Self-Configuring Sensor Networks
Topologies," Alberto Cerpa and
Deborah Estrin. In Proceedings of the
Twenty First International Annual Joint
Conference of the IEEE Computer and
Communications Societies (INFOCOM 2002),
New York, NY, USA, June 23-27 2002.
Upper Bounds on Network Lifetime
Extension for Cell-Based Energy
Conservation Techniques in Stationary Ad
Hoc Networks," Douglas Blough,
Georgia Institute of Technology, USA,
Paolo Santi, Mobicom '02.
Cooperative cell-based strategies have
been recently proposed as a technique
for extending the lifetime of wireless
ad hoc networks, while only slightly
impacting network performance. The
effectiveness of this approach depends
heavily on the node density: the
higher it is, the more consistent
energy savings can potentially be
achieved. However, no general analyses
of network lifetime have been done
either for a base network (one without
any energy conservation technique) or
for one using cooperative energy
conservation strategies. In this
paper, we investigate the
lifetime/density tradeoff under the
hypothesis that nodes are distributed
uniformly at random in a given region,
and that the traffic is evenly
distributed across the network. We
also analyze the case where the node
density is just sufficient to ensure
that the network is connected with
high probability. This analysis, which
is supported by the results of
extensive simulations, shows that even
in this low density scenario,
cell-based strategies can
significantly extend network lifetime.
Analysis of a Sensor Network with
Hybrid Automata Modelling," Sinem
Coleri, Mustafa Ergen and T. John Koo,
University of California, Berkeley.
Density Thresholds in Distributed
Wireless Networks," Bhaskar
Krishnamachari, Stephen Wicker, Ramon
Bejar, and Marc Pearlman, to appear in a
book on Advances in Coding and
Information Theory, eds. H. Bhargava,
H.V. Poor and V. Tarokh, Kluwer
Coverage-Preserving Node Scheduling
Scheme for Large Wireless Sensor
Networks, Di Tian and Nicolas D.
Georganas, University of Ottawa.
Deployment Strategy for Target
Detection," Thomas Clouqueur, Veradej
Phipatanasuphorn, Parmesh Ramanathan
and Kewal Saluja, University of
"Infrastructure Tradeoffs for Sensor
Networks," Sameer Tilak and Nael
Abu-Ghazaleh, Binghamton University;
Wendi Heinzelman, University of
Control for Wireless Sensor Networks,"
Jianping Pan, Thomas Hou, Lin Cai, Yi
Shi, and Sherman Shen, MobiCom 2003.
Fault-Tolerant Topology Control
Algorithms for Wireless
Multi-hop Networks ,"
MohammadTaghi Hajiaghayi, Nicole
Immorlica, and Vahab S. Mirrokni,
Bearing Grudges: Towards Routing
Security, Fairness, and Robustness in
Mobile Ad Hoc Networks," S.
Buchegger and J.-Y. Le Boudec, the 10th
Euromicro Workshop on Parallel,
Distributed and Network-based
Processing, Canary Islands, Spain,
"Efficient Power Control via Pricing in
Wireless Data Networks", Saraydar,
Mandayam and Goodman, IEEE Transactions
on Communications, February 2002.
A Simple, Cheat-Proof, Credit-Based
System for Mobile Ad-Hoc Networks,"
Sheng Zhong, Jiang Chen, and Yang
Richard Yang. In Proceedings of IEEE
INFOCOM 2003, San Francisco, CA, April
in Wireless Ad Hoc Networks," Vikram
Srinivasan, Pavan Nuggehalli,
Carla-Fabiana Chiasserini (Politecnico
di Torino), Ramesh Rao, INFOCOM 2003.
"Ad hoc-VCG: a
Truthful and Cost-Efficient Routing
Protocol for Mobile Ad Hoc Networks With
Selfish Agents," Luzi Anderegg,
Stephan Eidenbenz. In Mobicom 2003.
AD-MIX Protocol for Encouraging
Participation in Mobile Ad hoc
Networks." Swaminathan Sundaramurthy
and Elizabeth M. Belding-Royer.
Proceedings of the International
Conference on Network Protocols (ICNP),
Atlanta, GA, pp. 156-167, November 2003.
"Modeling Cooperation in Mobile Ad hoc
Networks: A Formal Description of
Selfishness", Urpi, Bonuccelli and
Giordano, WiOPT 2003.
"Equilibria in Topology Control Games
for Ad hoc Networks", Eidenbenz,
Kumar, Zust. DialM-POMC '03.
"Stability of Multipacket Slotted Aloha
with Selfish Users and Perfect
Information", IEEE Infocom, 2003.
Control in Random Access
Networks,"(Gzipped Postscript), C.
Yuen and P. Marbach, 2004.
in Wireless Ad Hoc Networks: A
Postscript), P. Marbach and Ying Qiu.
earlier version appeared in Infocom
Routing in Triangulations," P. Bose
and P. Morin, in Proceedings of the
Tenth International Symposium on
Algorithms and Computation (ISAAC'99),
pages 113-122, LNCS 1741,
Greedy Perimeter Stateless Routing for
Wireless Networks," Brad Karp and H.
T. Kung, in International Conference on
Mobile Computing and Networking
(MobiCom), pp. 243-254, 2000.
Survey on Position-based Routing in
Mobile Ad Hoc Networks", M. Mauve,
J. Widmer, and H. Hartenstein, IEEE
Network, Vol. 15 No. 6, pp. 30-39,
"Geographical and Energy Aware Routing:
A Recursive Data Dissemination Protocol
for Wireless Sensor Networks," Yan Yu,
Ramesh Govindan and Deborah Estrin. UCLA
Computer Science Department Technical
Report UCLA/CSD-TR-01-0023, May 2001.
Comparison of Two On-Demand Routing
Protocols for Ad Hoc Networks", C.
Perkins, E. Royer, S. Das, and M.
Marina, IEEE Personal Communications,
Vol. 8, No. 1, pp. 16-28, Feb. 2001.
Multipath Routing in Wireless Sensor
Networks," Deepak Ganesan, Ramesh
Govindan, Scott Shenker and Deborah
Estrin, Mobile Computing and
Communications Review (MC2R), vol. 1,
no. 2, 2002.
an Architecture for Robust Routing In
Volatile Environments," Chris
Karlof, Yaping Li, and Joseph Polastre,
UC Berkeley Tech Report. May 2002.
Ad-Hoc Routing: Of Theory and Practice.
Fabian Kuhn, Roger Wattenhofer, Yan
Zhang, and Aaron Zollinger. In the
Proceedings of the 22nd ACM Symposium on
the Principles of Distributed Computing
(PODC), Boston, Massachusetts, USA, July
Active Badge Location System," Roy
Want, Andy Hopper, Veronica Falcao and
Jonathan Gibbons, ACM Transactions on
Information Systems, vol. 10, no. 1,
pp. 91-102, January 1992.
- Badge transmits location;
sensors pick up the location (room) of
an Information System for a Mobile
Wireless Computing Environment,"
G. Voelker and B. Bershad, Proceedings
of Workshop on Mobile Computing
Systems and Applications, 1994, pp.
Distributed Location System for the
Active Office," A. Harter and A.
Hopper, IEEE Network, Vol. 8, No. 1,
Ultrasonic Location System
New Location Technique for the Active
Office," Andy Ward, Alan Jones,
Andy Hopper, IEEE Personal
Communications, Vol. 4, No.5, October
1997, pp. 42-47.
Issue on Global Positioning System,
P.Enge and P. Misra (guest editors),
Proceedings of the IEEE. Vol 87. No.1.
Century Challenges: Nexus -- an Open
Global Infrastructure for
Spatial-Aware Applications," F.
Hohl, U. Kubach, A. Leonhardi, K.
Rothermel, and M. Schwehm, ACM MobiCom
Ad Hoc Location-based Services for
Heterogeneous Mobile Clients," T.
Hodes and R. Katz, ACM Wireless
Networks Journal, Vol. 5, No. 5,
Anatomy of a Context-Aware Application,"
A. Harter, A. Hopper, P. Steggles, A.
Ward, and P. Webster, ACM MobiCom
An In-Building RF-based User Location
and Tracking System", Paramvir
Bahl and Venkata N. Padmanabhan, In
Proceedings of IEEE Infocom 2000,
Tel-Aviv, Israel, April 2000.
Cricket Location Support System,"
Nissanka Priyantha, Anit Chakraborty
and Hari Balakrishnan, in
International Conference on Mobile
Computing and Networking (MobiCom),
Boston, MA, August 2000.
- Measure signal of an
Probabilistic Approach to
Collaborative Multi-Robot Localization",
D. Fox, W. Burgard, H. Kruppa, and S.
Thrun, Autonomous Robots, 8(3), 2000.
of Developing and Deploying a
Context-Aware Tourist Guide: The GUIDE
Project," K. Cheverst, N. Davies,
K. Mitchell, and A. Friday, ACM
Cricket Location-Support System,"
N. Priyantha, A. Chakraborty, and H.
Balakrishnan, ACM MobiCom 2000.
Cricket Compass for Context-aware
Mobile Applications," N.
Priyantha, A. Miu, H. Balakrishnan,
and S. Teller, ACM MobiCom 2001.
Range Estimation Using Acoustic and
Multimodal Sensing", Lewis Girod
and Deborah Estrin, In Proceedings of
IEEE/RSJ International Conference on
Intelligent Robots and Systems (IROS
2001), Maui, Hawaii, October 2001.
- [HB01] "A
Survey of Localization," Jeffrey
Hightower and Gaatano Boriello, IEEE
Computer Magazine, Vol. 34, No. 8, pp.
57-66 . August 2001.
Position Estimation in Wireless Sensor
Networks", Lance Doherty,
Kristofer S.J. Pister and Laurent
El-Ghaoui, In Proceedings of IEEE
Infocom 2001, Anchorage, Alaska, April
Bits and Flops of the n-hop
Multilateration Primitive for Node
Localization Problems," Andreas
Savvides, Heemin Park and Mani
Srivastava, University of California,
Los Angeles, 2002.
Localization Systems: Design and
Experimental Evaluation, "
Nirupama Bulusu, John Heidemann,
Deborah Estrin and Tommy Tran.
Submitted for review to ACM
Transactions on Embedded Computing
Systems (ACM TECS), August 2002.
Collaborative Approach to In-Place
Sensor Calibration (PS
Vladimir Bychkovskiy, Seapahn
Megerian, Deborah Estrin, and Miodrag
Proceedings of the 2nd International
Workshop on Information Processing in
Sensor Networks (IPSN'03), volume 2634
of Lecture Notes in Computer Science,
pages 301-316. Springer-Verlag
Acoustic Array Processing and
Localization on Wireless Sensor
Network," J.C. Chen, L. Yip, J.
Elson, H. Wang, D. Maniezzo, R.E.
Hudson, K. Yao, and D. Estrin, in
Proceedings of the IEEE, Vol. 91, No.
8, August 2003.
Location Detection in Emergency Sensor
Networks," Saikat Ray, Rachanee
Ungrangsi, Francesco De Pellegrini,
Ari Trachtenberg, David Starobinski,
Collaborative Approach to In-Place
Sensor Calibration," Vladimir
Bychkovskiy, Seapahn Megerian, Deborah
Estrin, and Miodrag Potkonjak.
Submitted for review to the 2nd
International Workshop on Information
Processing in Sensor Networks
(IPSN'03), December 2003.
n-Hop Multilateration Primitive for
Node Localization Problems", A.
Savvides, H. Park and M. B.
Srivastava, Journal of Mobile Networks
and Applications (MONET), 8, 443-451,
Computation and Randomization in
Network Localization," T. Eren, D.
Goldenberg, W. Whiteley, Y.R. Yang,
A.S. Morse, B.D.O. Anderson, P. N.
Belhumeur. In Proceedings of
IEEE INFOCOM 2004.
Positioning in Wireless Ad-hoc Sensor
Networks with Multidimensional Scaling,"
X. Ji and Hongyuan Zha. To appear in
Proceedings of IEEE INFOCOM 2004.
- [SDP] "Semidefinite
Programming for Ad Hoc Wireless Sensor
Network Localization," Pratik
Biswas, and Yinyu Ye. In IPSN 2004.
the Computational Complexity of
Network Localization," J. Aspnes,
D. Goldenberg, and Y.R. Yang. April
- [Sweep] "Localization
in Sparse Networks using Sweeps,"
by David Goldenberg, Pascal Bihler,
Ming Cao, Jia Fang, Brian D.O.
Anderson, A. S. Morse, Y. Richard
Yang. In Proceedings of ACM MOBICOM,
Los Angeles, CA, September 2006.
- [LBS] "Foundations
of Location Based Services,"
byStefan Steiniger, Moritz Neun and
Alistair Edwardes, 2006.
Disks: Data Management for
Environments," S. Acharya, R.
Alonso, M. Franklin, and S.
Zdonik, Proceedings of ACM
Real-Time Fault-Tolerant Broadcast
Disks," A. Bestavros,
Proceedings IEEE Real-Time
Technology and Applications
Data Broadcast In Asymmetric
N. Vaidya and S. Hameed, Wireless
Networks, pp 171-182, Vol. 5, No.
3, May 1999
Prof. Nitin Vaidya's
tutorial on TCP over Wireless
"Improving Reliable Transport and
Handoff Performance in Cellular
Wireless Networks", H.
Balakrishnan, S. Seshan, R. H.
Katz, ACM Wireless Networks, V 1,
N 4, December, 1995.
TCP/IP Performance over Wireless
Networks," H. Balakrishnan, S.
Seshan, E. Amir, and R. Katz,
Proceedings ACM Mobicom'1995.
an Asymmetric Transport Protocol
Design for Mobile Systems," Z.
Haas and P. Agrawal, Proceedings
IEEE ICC 1997, pp. 1054-1058.
the Performance of Reliable
Transport Protocols in Mobile
Computing Rnvironments," R.
Caceres and L. Iftode, IEEE JSAC,
Vol. 13, No. 5, (Jun 1995), pp.
and Performance Evaluation of
Indirect TCP," A. Bakre and B.
Badrinath, IEEE Transactions on
Computers, Vol. 46, No. 3, (Mar
1997), pp. 260-278.
Comparison of Mechanisms for
Improving TCP Performance Over
Wireless Links," H.
Balakrishnan, V. Padmanabhan, S.
Seshan, and R. Katz, IEEE/ACM
Transactions on Networking,
Loss Notification and Wireless Web
Performance," H. Balakrishnan
and R. Katz, Proc. IEEE Globecom
Effects of Asymmetry on TCP
Performance," H. Balakrishnan,
R. Katz, and V. Padmanbhan, ACM
MONET Journal, 1998, pp. 219-241.
"Improving TCP Performance over
Wireless Networks at the Link
Layer", Christina Parsa, J.J
Networks and Applications, 1999.
"TCP and UDP Performance over a
Wireless LAN", George Xylomenos
and George C. Polyzos,
Proceedings of the IEEE INFOCOM
'99 Conference, pp.439-446.
Thin Networks," G. Montenegro,
S. Dawkins, M. Kojo, V. Magret,
and N. Vaidya, IETF RFC 2757.
Performance Implications of Link
Characteristics (PILC)" Working
of TCP Performance Over Mobile Ad
Hoc Networks", G. Holland and
N. Vaidya ACM/IEEE MobiCom'99,
TCP for Mobile Ad Hoc Networks,"
J. Liu and S. Singh, IEEE Journal
on Selected Areas in
Communications, Vol. 19, No. 7,
pp. 1300-1315, July 2001
Mobile File Systems
Operation in the Coda File
System," J. Kistler and M.
Satyanarayanan, ACM Transactions
on Computer Systems (TOCS), Vol.
10, No. 1, February 1992.
File Hoarding for Mobile
Computers," C. Tait, Hui
Lei, S. Acharya, and H. Chang,
Proceedings of ACM MobiCom'95,
Weak Connectivity for Mobile
File Access," L. Mummert, M.
Ebling and M. Satyanarayanan,
ACM SOSP 1995.
Update Conflicts in Bayou, a
Weakly Connected Replicated
Storage System," D. B. Terry
and M. M. Theimer and Karin
Petersen and A. J. Demers and M.
J. Spreitzer and C. H. Hauser,
ACM SOSP 1995.
Hoarding for Mobile Computers,"
G. Kuenning and G. Popek, ACM
Low-bandwidth Network File
System," A. Muthitacharoen,
B. Chen, and D. Mazieres, ACM
Evolution of Coda," M.
Satyanarayanan, ACM Transactions
on Computer Systems (TOCS), Vol.
20, No. 2, May 2002.
Scheduling Model for Reduced
CPU Energy," F. Yao, A.
Demers, and S. Shenker.
In IEEE Annual Foundations of
Computer Science, pages
Miscrosoft Windows Mobile 2003
Architecture Directions for
Network Sensors," J. Hill,
R. Szewczyk, A. Woo, S.
Hollar, D. Culler, and K.
Pister, ASPLOS 2000.
progress in integrated,
communication devices and
sensors makes a rich design
networked sensors viable.
They can be deeply embedded
in the physical world and
spread throughout our
environment like smart dust.
The missing elements are an
overall system architecture
and a methodology for
systematic advance. To this
end, we identify key
requirements, develop a
small device that is
representative of the class,
design a tiny event-driven
operating system, and show
that it provides support for
efficient modularity and
operation. Our operating
system fits in 178 bytes of
memory, propagates events in
the time it takes to copy
1.25 bytes of memory,
context switches in the time
it takes to copy 6 bytes of
memory and supports two
level scheduling. The
analysis lays a groundwork
for future architectural
Comments: 1) Small physical
size and low power
operation; 3) Limited
Physical Parallelism and
Controller Hierarchy; and 4)
Diversity in Design and
Message Communication for Tiny
Network Sensors," J. Hill,
P. Bounadonna, and D. Culler,
a Virtual Machine for Tiny
Networked Sensors," P.
Levis and D. Culler, ASPLOS,
Soft Real-Time CPU Scheduling
for Mobile Multimedia Systems,"
Wanghong Yuan, Klara
Proc. of 19th ACM Symposium on
Operating Systems Principles
Language: A Holistic Approach
to Networked Embedded
Systems," D. Gay, P. Levis, R.
Behren, M. Welsh, E.
Brewer, and D. Culler.
Proceedings of Programming
Language Design and
Implementation (PLDI) 2003,
Accurate and Scalable
Simulation of Entire TinyOS
Levis, Nelson Lee, Matt Welsh,
and David Culler. In
Proceedings of the First ACM
Conference on Embedded
Networked Sensor Systems
Architecture for a Secure
Service Discovery Service,"
S. Czerwinski, B. Zhao, T.
Hodes, A. Joseph, and R.
Katz, ACM MobiCom 1999.
Design and Implementation of
an Intentional Name System,"
W. Adjie-Winoto, E.
Schwartz, and H.
Balakrishnan, ACM SOSP 1999.
Efficient Wireless Sensor
Networks with Low-Level
John Heidemann, Fabio Silva,
Ramesh Govindan, Deborah
Estrin, and Deepak Ganesan.
In Proceedings of the
Symposium on Operating
Systems Principles, p. to
appear. Lake Louise, Banff,
Canada, ACM. October, 2001.
Personal Names for Globally
Connected Mobile Devices,"
by Bryan Ford, Jacob
Lesniewski-Laas, Sean Rhea,
Frans Kaashoek, and Robert
Morris. In the Proceedings
of the 7th USENIX Symposium
on Operating Systems Design
and Implementation (OSDI
'06), Seattle, Washington,
to Network and Client
Lessons and Perspectives,"
A. Fox, S. Gribble, Y.
Chawathe and E. Brewer, IEEE
Vol. 5, No. 4, (Aug. 1998),
Support for Mobile, Adaptive
Applications," B. Noble,
Communications, Vol. 7, No.
1, (Feb. 2000).
Conceptual Framework for
Network and Client
Badrinath, A. Fox, L.
Kleinrock, G. Popek, P.
Reiher, and M.
Satyanarayanan, ACM MONET
Journal, Vol. 5, No. 4,
(Dec. 2000), pp. 221-231.
Local Actions to Global
Tasks: Stigmergy and
Beckers, R., O. E. Holland
and J. L. Deneubourg
(1994), Artificial Life
IV, Proc. of the Fourth
International Workshop on
the Synthesis and
Simulation of Living
Systems, R. A. Brooks and
P. Maes (eds), pp.
Motion Planning for
Multiple Mobile Robots:
The Cocktail Party Model,"
V. Lumelsky, K.
Robots Journal No.4, 1997,
Role Assignment, and
Teamwork," P. Stone
and M. Veloso, Artificial
Without Deliberation: A
Approach to Multi-robot
Teams", Barry Brian
Messages to Mobile Users
in Disconnected Ad-hoc
Qun Li and Daniela Rus. In
Proceedings of the Sixth
Conference on Mobile
Computing and Networking (Mobicom),
pages 44-55, Boston,
"Directed Diffusion: A
Scalable and Robust
Communication Paradigm for
Sensor Networks", Chalermek
Govindan and Deborah Estrin
In Proceedings of the Sixth
Conference on Mobile
Computing and Networks
(MobiCOM 2000), August 2000,
"Multiagent Systems: A Survey from a Machine Learning Perspective," Stone and Veloso,
Autonomous Robots, 2000.
A Tiny Mobile Robot
Platform for Large-Scale
Sensor Networks," G.T.
Sibley, M.H. Rahimi, and
G.S. Sukhatme. In Proc. of
IEEE ICRA, pages 1143–8,
(NIMS) for Ambient
J. Kaiser, Gregory J.
Pottie, Mani Srivastava,
Gaurav S. Sukhatme, John
Villasenor, and Deborah
"Adaptive Sampling for
Mohammad Rahimi, Richard
Estrin,William J. Kaiser,
Mani Srivastava and Gaurav
S. Sukhatme, CENS
Technical Report 31,
- monitoring of
of atmospheric climate
phenomena. Use a special
type of mobility control
-- a type of grid.
Control for Mobile-Sensor
Networks", Z Butler, D. Rus, IEEE Pervasive
- Reposition of sensor
nodes according to event
distribution. Use the
inverse of histogram to
Mobility as a Network
Control Primitive," D.
Goldenberg, J. Lin, A.S.
Morse, B. Rosen, Y.R.
Yang. In ACM MobiHoc 2004.
Message Ferrying Approach
for Data Delivery in
Sparse Mobile Ad Hoc
Wenrui Zhao, Mostafa Ammar
and Ellen Zegura, In ACM
Source Localization and
Unknown Sensor Location
Estimation for Wideband
Signals in the Near-field,"
Joe C. Chen, Ralph E.
Hudson, and Kung Yao,
revision of manuscript
submitted in Dec. 2001 to
IEEE Trans. on Signal
and Tracking of Targets in
Networks", Dan Li,
Kerry Wong, Yu Hen Hu, Akbar
Sayeed. IEEE Signal
Volume: 19 Issue: 2, Mar
Beamforming," Joe C.
Chen, Kung Yao, and Ralph
E. Hudson, to be appeared
in IEEE Signal Processing
Magazine, Mar. 2002.
Collaboration for Target
Tracking", Feng Zhao,
Jaewon Shin, James Reich.
IEEE Signal Processing
Magazine, Volume: 19
Issue: 2, Mar 2002.
Encapsulation in Embedded
Software for Distributed
Sensing and Control
Proceedings of the IEEE.
Querying and Routing for
ad hoc Heterogeneous
Sensor Networks.''M. Chu,
H. Haussecker, F. Zhao,
Int'l J. of High
Applications, 2002. (ppt)
Tracking and Reasoning
Leonidas Guibas. IEEE
Magazine, Volume: 19
Issue: 2, Mar 2002.
Need a New Data Handling
Architecture for Sensor
Networks?" Deepak Ganesan
and Deborah Estrin, in
First Workshop on Hot
Topics in Networks
(Hotnets-I), vol. 1,
"Localized Edge Detection
in Sensor Fields," Krishna
Kant Chintalapudi, Ramesh
Signal and Information
Processing: An Information
Directed Approach." F.
Zhao, J. Liu, J. Liu, L.
Guibas, and J. Reich, "
Proceedings of the IEEE,
Source Localization and
Beamforming: Theory and
Practice," Joe C.
Chen, Kung Yao, and Ralph
E. Hudson, EURASIP
Advanced Signal Processing
Group Management for Track
Initiation and Maintenance
in Target Localization
Liu, J. Liu, J. Reich, P.
Cheung, and F. Zhao,
Proceedings of 2nd
International Workshop on
Information Processing in
Sensor Networks (IPSN'03),
Sensing and Communication
Protocols for Target
Aggregation." Q. Fang,
F. Zhao, and L. Guibas,
ACM Symp. on Mobile Ad Hoc
Networking and Computing
Algorithms for Guiding
Navigation Across a Sensor
network," Qun Li,
Michael De Rosa, and
Daniela Rus, MobiCom
Control for Mobile Sensing
Cortes, Sonia Martinez,
Timur Karatas, and
Francesco Bullo. IEEE
Transactions on Robotics
and Automation, Mar 2004,
vol 20:2, pages 243-255.
Software Mobility: Mobile
on the Move," P.
Morreale, IEEE Spectrum,
Vol. 35, No. 4, (April
1998), pp. 34-41.
Network Computing," T.
Stafford-Fraser, K. Wood,
and A. Hopper, IEEE Internet
Computing, Vol. 2, No. 1,
Jan/Feb 1998, pp 33-38.
Software Agents: an Overview,"
V. A. Pham and A. Karmouch,
Magazine, Vol. 36, No. 7,
(July 1998), pp. 26-37.
Agents with Java: The Aglet
API," D. Lange and M.
Oshima. In Programming and
Deploying Mobile AGents with
from Protocols to Agents,"
B. Joy, IEEE Internet
Computing , Vol. 4, No. 1,
(Jan.-Feb. 2000), pp. 63-64.
Agents: Motivations and
State of the Art," R.
Gray, G. Cybenko, D. Kotz,
and D. Rus, In Jeffrey
Bradshaw, editor, Handbook
of Agent Technology,
AAAI/MIT Press, 2001.
Energy Conservation for Ad
Hoc Routing," Y. Xu, J.
Heidemann, and D. Estrin,
ACM MobiCom 2001.
Battery Life Routing to
Support Ubiquitous Mobile
Computing in Wireless Ad Hoc
Networks," C.-K. Toh,
Magazine, Vol. 39, No. 6,
pp. 138-147, June 2001.
Cross Layer Design
Routing in Wireless Sensor
Estrin and Stephen Wicker.
ICDCS Workshop DEBS'02. July
2001. Vienna, Austria.
"Smart-Tag Based Data
Beaufour, Martin Leopold and
Philippe Bonnet, University
"A Two-tier Data
Dissemination Model for
Large-scale Wireless Sensor
Networks," Fan Ye, Haiyun
Luo, Jerry Cheng, Lixia
Zhang, Songwu Lu, Mobicom 02
Efficient Routing in Ad Hoc
Disaster Recovery Networks,"
Gil Zussman, Adrian Segall,
Distributed and Adaptive
Signal Processing Approach
to Reducing Energy
Consumption in Sensor
Networks," Jim Chou,
Dragan Petrovic, Kannan
Ramchandran, INFOCOM 2003.
"SPEED: A Stateless Protocol
for Real-Time Communication
in Sensor Networks,"
Tian He, John A. Stankovic,
Chenyang Lu, and Tarek F.
International Conference on
Systems (ICDCS 2003),
Providence, RI, May 2003.
the Physical World,"
Philippe Bonnet, J. E.
Gehrke, and Praveen
Seshadri, IEEE Personal
Communications, Vol. 7, No.
5, October 2000, pages
10-15. Special Issue on
Smart Spaces and
Continuously Adaptive Query
Processing," Joseph M.
Hellerstein and Ron Avnur.
In SIGMOD 2000.
a Tiny AGgregation Service
for Ad-Hoc Sensor Networks,"
Samuel R. Madden, Michael J.
Franklin, Joseph M.
Hellerstein, and Wei Hong,
OSDI, December 2002.
Storage in Sensornets,"
Shenker, S., Ratnasamy, S.,
Karp, B., Govindan, R., and
Estrin, D., ACM SIGCOMM
Workshop on Hot Topics in
Networks (HotNets 2002),
Princeton, NJ, October,
A Geographic Hash Table for
Ratnasamy, S., Karp, B.,
Yin, L., Yu, F., Estrin, D.,
Govindan, R., and Shenker,
S., First ACM International
Workshop on Wireless Sensor
Networks and Applications
(WSNA 2002), Atlanta, GA,
"RAP: A Real-Time
for Large-Scale Wireless
Chenyang Lu, Brian M. Blum,
Tarek F. Abdelzaher, John A.
Stankovic, and Tian He, IEEE
Real-Time and Embedded
Technology and Applications
Symposium (RTAS 2002), San
Jose, CA, September 2002.
A Programming Model for
Systems." E. Cheong, J.
Liebman, J. Liu, F. Zhao,
ACM Symposium on Applied
Computing, March, 2003.
Efficient Computing for
Wildlife Tracking: Design
Tradeoffs and Early
Experiences with Zebranet,"
P. Juong et al.
Storage in Sensornets with
GHT, a Geographic Hash Table,"
Sylvia Ratnasamy, Brad Karp,
Scott Shenker, Deborah
Estrin, Ramesh Govindan, Li
Yin, and Fang Yu,
Mobile Networks and
Journal of Special Issues on
Mobility of Systems, Users,
Data, and Computing: Special
Issue on Algorithmic
Solutions for Wireless,
Mobile, Ad Hoc and Sensor
Networks , Kluwer, mid-2003
A Distributed Index for
Features in Sensor Networks,"
Greenstein, B., Estrin, D.,
Govindan, R., Ratnasamy, S.,
SHenker, S., To appear in
Workshop on Sensor Network
Protocols and Application
Aggregation in Sensor
B. Przydatek, D.
Song, A. Perrig in SenSys
Design of an Acquisitional
Query Processor for Sensor
Networks," by S. Madden,
M. Franklin, Joe
Hellerstein, and Wei Hong.
Sophisticated Sensing with
Queries," W. Hong, S.
Madden, Joe Hellerstein, and
K. Stanek. 2nd
International Workshop on
Information Processing in
Sensor Networks (IPSN '03),
Compression in a Dense
Sensor Network", S.
Sandeep Pradhan, Julius
Kusuma, Kannan Ramchandran.
In Wireless Ad Hoc Sensor
Koushanfar, Gang Qu,
Miodrag Potkonjak, MobiCom
2001, pp. 139-150, July
Coverage and Connectivity
Configuration in Wireless
Sensor Networks," X.
Wang, G. Xing, Y. Zhang,
C. Lu, R. Pless, C. Gill
Washington University in
St. Louis. In SenSys 2003.
and Maximal Exposure Path
Algorithms for Wireless
Embedded Sensor Networks,"
G. Veltri, Q. Huang,
G. Qu, M.
Potkonjak. In SenSys 2003.
Surveillance for Sensor
Networks," T. Yan, T.
He, J. A. Stankovic, in
"Time, Clocks and the
Ordering of Events in
Communications of the ACM,
Time Synchronization: The
Network Time Protocol,"
David L. Mills,
"Tolerating Failures of
Sensors," K. Marzullo. ACM
Transactions on Computer
Systems, 8(4), November
1990, p. 284--304.
Synchronization in Ad Hoc
Networks," Kay Romer
Web page giving an
overview of using GPS for
Time Synchronization in
Saurabh Ganeriwal, Ram
Kumar, Sachin Adlakha and
Mani Srivastava, April
Jeremy Elson, Lewis Girod
and Deborah Estrin. In
Proceedings of the Fifth
Symposium on Operating
Systems Design and
2002), Boston, MA.
Ad Hoc Networks," L.
Zhou and Z. Hass, IEEE
Network, Volume: 13 Issue:
6 , Nov.-Dec. 1999.
IP and Security Issue: an
Overview," C. Perkins,
Proceedings of 1st IEEE
Workshop on Internet
Technologies and Services,
"Generating RSA Keys on a
Handheld Using an
Untrusted Server", N.
Modadugu, D. Boneh, M.
Detection in Wireless
Ad-Hoc Networks," Y.
Zhang and W. Lee,
Proceedings of ACM MobiCom
Composable Framework for
Secure Multi-Modal Access
to Internet Services From
Post-PC Devices," S.
Ross, J. Hill, M. Chen, A.
Joseph, D. Culler, and E.
Brewer, 3rd IEEE Workshop
on Mobile Computing
Systems and Applications,
2000, pp. 171 -182
Security Protocols for
Adrian Perrig, Robert
Szewczyk, Victor Wen,
David Culler, J. D. Tygar.
As sensor networks edge
security issues become a
central concern. So far,
the main research focus
has been on making
sensor networks feasible
and useful, and less
emphasis was placed on
security. We design a
suite of security
building blocks that are
SPINS has two secure
building blocks: SNEP
and TESLA. SNEP provides
the following important
authentication, and data
problem is to provide
authentication, which is
an important mechanism
for sensor networks.
TESLA is a new protocol
implemented the above
protocols, and show that
they are practical even
performance of the
protocol suite easily
matches the data rate of
demonstrate that the
suite can be used for
building higher level
N. Borisov, I. Goldberg,
and D. Wagner, ACM MobiCom
Quest for Security in
Mobile Ad Hoc Networks,"
J.-P. Hubaux, L. Buttyan,
and S. Capkun, ACM MobiHOC
Networks," Y.W. Law,
S. Dulman, S. Etalle and
P. Havinga. Department of
University of Twente,
TR-CTIT-02-18, Jul 2002.
Routing in Sensor
Networks: Attacks and
Chris Karlof and David
of Service in Sensor
Networks," Anthony D.
Wood, John A. Stankovic.
Evoluation of Mobile IP
towards Security," M.
for Sensor Networks," A.
Perrig, H. Chan, D. Song,
IEEE Symposium on Security
and Privacy 2003.
Aggregation in Sensor
Przydatek, D. Song, A.
Perrig, ACM Sensys 2003.
Copyright (c) 2000-2017
Department of Computer Science,