75 research outputs found

    On the Displacement for Covering a dd-dimensional Cube with Randomly Placed Sensors

    Full text link
    Consider nn sensors placed randomly and independently with the uniform distribution in a dd-dimensional unit cube (d2d\ge 2). The sensors have identical sensing range equal to rr, for some r>0r >0. We are interested in moving the sensors from their initial positions to new positions so as to ensure that the dd-dimensional unit cube is completely covered, i.e., every point in the dd-dimensional cube is within the range of a sensor. If the ii-th sensor is displaced a distance did_i, what is a displacement of minimum cost? As cost measure for the displacement of the team of sensors we consider the aa-total movement defined as the sum Ma:=i=1ndiaM_a:= \sum_{i=1}^n d_i^a, for some constant a>0a>0. We assume that rr and nn are chosen so as to allow full coverage of the dd-dimensional unit cube and a>0a > 0. The main contribution of the paper is to show the existence of a tradeoff between the dd-dimensional cube, sensing radius and aa-total movement. The main results can be summarized as follows for the case of the dd-dimensional cube. If the dd-dimensional cube sensing radius is 12n1/d\frac{1}{2n^{1/d}} and n=mdn=m^d, for some mNm\in N, then we present an algorithm that uses O(n1a2d)O\left(n^{1-\frac{a}{2d}}\right) total expected movement (see Algorithm 2 and Theorem 5). If the dd-dimensional cube sensing radius is greater than 33/d(31/d1)(31/d1)12n1/d\frac{3^{3/d}}{(3^{1/d}-1)(3^{1/d}-1)}\frac{1}{2n^{1/d}} and nn is a natural number then the total expected movement is O(n1a2d(lnnn)a2d)O\left(n^{1-\frac{a}{2d}}\left(\frac{\ln n}{n}\right)^{\frac{a}{2d}}\right) (see Algorithm 3 and Theorem 7). In addition, we simulate Algorithm 2 and discuss the results of our simulations

    Simulating Opportunistic Networks: Survey and Future Directions

    Full text link
    (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works[EN] Simulation is one of the most powerful tools we have for evaluating the performance of opportunistic networks (OppNets). In this paper, we focus on available tools and mod- els, compare their performance and precision and experimentally show the scalability of different simulators. We also perform a gap analysis of state-of-the-art OppNet simulations and sketch out possible further development and lines of research. This paper is targeted at students starting work and research in this area while also serving as a valuable source of information for experienced researchers.This work was supported in part by the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, in part by the Universidad Laica Eloy Alfaro de Manabi, and in part by the Secretaria Nacional de Educacion Superior, Ciencia, Tecnologia e Innovacion, Ecuador. (Corresponding author: Jens Dede.)Dede, J.; Förster, A.; Hernández-Orallo, E.; Herrera-Tapia, J.; Kuladinithi, K.; Kuppusamy, V.; Manzoni, P.... (2018). Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials. 20(2):1547-1573. https://doi.org/10.1109/COMST.2017.2782182S1547157320

    Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults

    Full text link
    A set of mobile robots is placed at points of an infinite line. The robots are equipped with GPS devices and they may communicate their positions on the line to a central authority. The collection contains an unknown subset of "spies", i.e., byzantine robots, which are indistinguishable from the non-faulty ones. The set of the non-faulty robots need to rendezvous in the shortest possible time in order to perform some task, while the byzantine robots may try to delay their rendezvous for as long as possible. The problem facing a central authority is to determine trajectories for all robots so as to minimize the time until the non-faulty robots have rendezvoused. The trajectories must be determined without knowledge of which robots are faulty. Our goal is to minimize the competitive ratio between the time required to achieve the first rendezvous of the non-faulty robots and the time required for such a rendezvous to occur under the assumption that the faulty robots are known at the start. We provide a bounded competitive ratio algorithm, where the central authority is informed only of the set of initial robot positions, without knowing which ones or how many of them are faulty. When an upper bound on the number of byzantine robots is known to the central authority, we provide algorithms with better competitive ratios. In some instances we are able to show these algorithms are optimal

    Asynchronous Gathering of Robots with Finite Memory on a Circle under Limited Visibility

    Full text link
    Consider a set of nn mobile entities, called robots, located and operating on a continuous circle, i.e., all robots are initially in distinct locations on a circle. The \textit{gathering} problem asks to design a distributed algorithm that allows the robots to assemble at a point on the circle. Robots are anonymous, identical, and homogeneous. Robots operate in a deterministic Look-Compute-Move cycle within the circular path. Robots agree on the clockwise direction. The robot's movement is rigid and they have limited visibility π\pi, i.e., each robot can only see the points of the circle which is at an angular distance strictly less than π\pi from the robot. Di Luna \textit{et al}. [DISC'2020] provided a deterministic gathering algorithm of oblivious and silent robots on a circle in semi-synchronous (\textsc{SSync}) scheduler. Buchin \textit{et al}. [IPDPS(W)'2021] showed that, under full visibility, OBLOT\mathcal{OBLOT} robot model with \textsc{SSync} scheduler is incomparable to FSTA\mathcal{FSTA} robot (robots are silent but have finite persistent memory) model with asynchronous (\textsc{ASync}) scheduler. Under limited visibility, this comparison is still unanswered. So, this work extends the work of Di Luna \textit{et al}. [DISC'2020] under \textsc{ASync} scheduler for FSTA\mathcal{FSTA} robot model

    Industrial Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are penetrating our daily lives, and they are starting to be deployed even in an industrial environment. The research on such industrial wireless sensor networks (IWSNs) considers more stringent requirements of robustness, reliability, and timeliness in each network layer. This Special Issue presents the recent research result on industrial wireless sensor networks. Each paper in this Special Issue has unique contributions in the advancements of industrial wireless sensor network research and we expect each paper to promote the relevant research and the deployment of IWSNs

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Data and the city – accessibility and openness. a cybersalon paper on open data

    Get PDF
    This paper showcases examples of bottom–up open data and smart city applications and identifies lessons for future such efforts. Examples include Changify, a neighbourhood-based platform for residents, businesses, and companies; Open Sensors, which provides APIs to help businesses, startups, and individuals develop applications for the Internet of Things; and Cybersalon’s Hackney Treasures. a location-based mobile app that uses Wikipedia entries geolocated in Hackney borough to map notable local residents. Other experiments with sensors and open data by Cybersalon members include Ilze Black and Nanda Khaorapapong's The Breather, a "breathing" balloon that uses high-end, sophisticated sensors to make air quality visible; and James Moulding's AirPublic, which measures pollution levels. Based on Cybersalon's experience to date, getting data to the people is difficult, circuitous, and slow, requiring an intricate process of leadership, public relations, and perseverance. Although there are myriad tools and initiatives, there is no one solution for the actual transfer of that data

    State of the Art and Recent Research Advances in Software Defined Networking

    Get PDF
    corecore