Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks
|
|
- Merilyn Parker
- 5 years ago
- Views:
Transcription
1 Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks Simon R. lackburn 1 Keith M. Martin 1 Tuvi Etzion 2 Maura. Paterson 1 1 Information Security Group Royal Holloway, University of London 2 Technion -Israel Institute of Technology epartment of omputer Science 19 May 2009 Maura Paterson s and KPSs for Grid-ased WSNs 1/ 17
2 Outline Key Predistribution for Grid-ased Networks Maura Paterson s and KPSs for Grid-ased WSNs 2/ 17
3 Precision griculture Maura Paterson s and KPSs for Grid-ased WSNs 3/ 17
4 Grid-ased Wireless Sensor Networks r restricted memory restricted battery power restricted computational ability vulnerable to compromise Maura Paterson s and KPSs for Grid-ased WSNs 4/ 17
5 Key Predistribution efinition (key predistribution scheme (KPS)) nodes are assigned keys before deployment nodes that share keys can communicate securely {k 1, k 5, k 7 } {k 3, k 5, k 12 } k 5 e.g. Eschenauer and Gligor: Each node randomly draws m keys uniformly without replacement from a keypool K Maura Paterson s and KPSs for Grid-ased WSNs 5/ 17
6 Goals for a KPS in a Grid-ased Network enable as many pairs of neighbouring nodes as possible to communicate securely minimise storage be resilient against node compromise Observation: it is not necessary for two nodes to share more than one key Maura Paterson s and KPSs for Grid-ased WSNs 6/ 17
7 ostas rrays one dot per row/column vector differences between dots are distinct applications to sonar, radar known constructions are based on finite fields Maura Paterson s and KPSs for Grid-ased WSNs 7/ 17
8 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17
9 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17
10 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17
11 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17
12 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17
13 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
14 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
15 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
16 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
17 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
18 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys E E E each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
19 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys E E F F E F each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
20 Key Predistribution Using ostas rrays uses an n n ostas array G G E E G F F E F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
21 Key Predistribution Using ostas rrays uses an n n ostas array G G H E H E G F F H E F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
22 Key Predistribution Using ostas rrays uses an n n ostas array G G H E H E G I F I F H E I F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17
23 efinition (istinct-ifference onfiguration (m, r)) m dots are placed in a square grid the distance between any two dots is at most r vector differences between dots are all distinct (5, 8) can be used for key predistribution in the same way as a ostas array more general than a ostas array more flexible choice of parameters Maura Paterson s and KPSs for Grid-ased WSNs 10/ 17
24 Upper ounds on m Theorem If a (m, r) exists, then m π 2 r + 3π1/3 2 5/3 r 2/3 + O(r 1/3 ) r + O(r 2/3 ). a (m, r) is contained in an anticode of diameter at most r and area at most (π/4)r 2 cover in circles of radius l count pairs (, d) where d is a pair of dots in (m, r) Maura Paterson s and KPSs for Grid-ased WSNs 11/ 17
25 Lower ounds on m Theorem There exists a (m, r) with m r o(r). Maura Paterson s and KPSs for Grid-ased WSNs 12/ 17
26 Sequences with istinct ifferences efinition Let be an abelian group. sequence {a 1, a 2,..., a m } is a 2 -sequence if all the sums a i1 + a i2 with 1 i 1 i 2 m are distinct. examples: Singer difference set Golomb ruler ose: 2 -sequence of size q in Z q 2 1 Maura Paterson s and KPSs for Grid-ased WSNs 13/ 17
27 Folding a 2 -Sequence {3, 13, 24, 29, 37, 41, 43, 44} (mod 63) Maura Paterson s and KPSs for Grid-ased WSNs 14/ 17
28 Results for the Manhattan Metric Theorem If a (m, r) exists then m 1 2 r + (3/2 4/3 )r 2/3 + O(r 1/3 ). There exists a (m, r) with m = 1 2 r o(r) Maura Paterson s and KPSs for Grid-ased WSNs 15/ 17
29 Efficient Key Predistribution for Grid-ased Wireless Sensor Networks, Information Theoretic Security, LNS 5155, 54-69, istinct ifference onfigurations: Multihop Paths and Key Predistribution in Sensor Networks. Two-imensional Patterns with istinct ifferences onstructions, ounds, and Maximal nticodes. Key Predistribution Techniques for Grid-ased Wireless Sensor Networks. Maura Paterson s and KPSs for Grid-ased WSNs 16/ 17
30 thank you! Maura Paterson s and KPSs for Grid-ased WSNs 17/ 17
Designing Secure and Reliable Wireless Sensor Networks
Designing Secure and Reliable Wireless Sensor Networks Osman Yağan" Assistant Research Professor, ECE" Joint work with J. Zhao, V. Gligor, and F. Yavuz Wireless Sensor Networks Ø Distributed collection
More informationTwo Improvements of Random Key Predistribution for Wireless Sensor Networks
Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key
More informationChapter 9: Localization & Positioning
hapter 9: Localization & Positioning 98/5/25 Goals of this chapter Means for a node to determine its physical position with respect to some coordinate system (5, 27) or symbolic location (in a living room)
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.
Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology
More informationA Combinatorial Framework for Frequency Hopping Multiple Access
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationThe Eyes Have It: Shapely Servings
The Eyes Have It: Shapely Servings 2007 The University of Texas Health Science Center at San Antonio Station 1 Student Information Page 5C Activity Introduction: Today you will be asked to look at different
More informationCoverage Issue in Sensor Networks with Adjustable Ranges
overage Issue in Sensor Networks with Adjustable Ranges Jie Wu and Shuhui Yang Department of omputer Science and Engineering Florida Atlantic University oca Raton, FL jie@cse.fau.edu, syang@fau.edu Abstract
More informationSecure and reliable connectivity in heterogeneous wireless sensor networks
Secure and reliable connectivity in heterogeneous wireless sensor networks Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon University, Pittsburgh,
More informationNode Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2243-2255 Research India Publications http://www.ripublication.com Node Deployment Strategies and Coverage
More informationAd hoc and Sensor Networks Chapter 9: Localization & positioning
Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Means for a node to determine its physical position (with
More informationITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks
ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks Salman Avestimehr In collaboration with Navid Naderializadeh ITA 2/10/14 D2D Communication Device-to-Device (D2D) communication
More information2005 Galois Contest Wednesday, April 20, 2005
Canadian Mathematics Competition An activity of the Centre for Education in Mathematics and Computing, University of Waterloo, Waterloo, Ontario 2005 Galois Contest Wednesday, April 20, 2005 Solutions
More informationPROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION
PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University
More informationName: Partners: Math Academy I. Review 2 Version A
Name: Partners: Math Academy I ate: Review 2 Version A [A] ircle whether each statement is true or false. 1. Any two lines are coplanar. 2. Any three points are coplanar. 3. The measure of a semicircle
More informationWormhole-Based Anti-Jamming Techniques in Sensor. Networks
Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication
More informationUNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST
UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST First Round For all Colorado Students Grades 7-12 October 31, 2009 You have 90 minutes no calculators allowed The average of n numbers is their sum divided
More informationTrade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationZigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks
Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks Ammar Hawbani School of Computer Science and Technology, University of Science and Technology of China, E-mail: ammar12@mail.ustc.edu.cn
More informationOnline Computation and Competitive Analysis
Online Computation and Competitive Analysis Allan Borodin University of Toronto Ran El-Yaniv Technion - Israel Institute of Technology I CAMBRIDGE UNIVERSITY PRESS Contents Preface page xiii 1 Introduction
More informationSecure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach
Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Dijiang Huang Arizona State University Deep Medhi University of Missouri
More informationA VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE DEPLOYMENT SCHEMES IN WSNS
A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE DEPLOYMENT SCHEMES IN WSNS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of CSE, Sri Sai Aditya Institute of
More informationWormhole-Based Anti-Jamming Techniques in Sensor. Networks
Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication
More informationIdentifying, Modeling, and Mitigating Attacks in Wireless Ad-Hoc and Sensor Networks
Identifying, Modeling, and Mitigating Attacks in Wireless Ad-Hoc and Sensor Networks Patrick Tague A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy
More informationThe CENTRE for EDUCATION in MATHEMATICS and COMPUTING cemc.uwaterloo.ca Fryer Contest. Thursday, April 18, 2013
The CENTRE for EDUCATION in MATHEMATICS and COMPUTING cemc.uwaterloo.ca 2013 Fryer Contest Thursday, April 18, 2013 (in North America and South America) Friday, April 19, 2013 (outside of North America
More informationENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES
International Journal of Foundations of Computer Science c World Scientific Publishing Company ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES JIE WU and SHUHUI YANG Department
More informationJamming as Information: a Geometric Approach
arxiv:0809.0011v1 [math.ho] 29 ug 2008 Jamming as Information: a Geometric pproach Tanya Khovanova epartment of Mathematics, MIT ugust 27, 2008 bstract In this paper I discuss the kinds of information
More informationTowards a Unified View of Localization in Wireless Sensor Networks
Towards a Unified View of Localization in Wireless Sensor Networks Suprakash Datta Joint work with Stuart Maclean, Masoomeh Rudafshani, Chris Klinowski and Shaker Khaleque York University, Toronto, Canada
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationRound minutes. Best results:
Round 1 30 minutes Best results: Jakub Ondroušek Jan Zvěřina Matúš Demiger 410 points 390 points 350 points Round 1 Translation Sheet 1-3) Classic sudoku 6 6 Fill in the grid with digits 1 to 6 so that
More informationWireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationApplication-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes
Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes Daniel Bielefeld 1, Gernot Fabeck 2, Rudolf Mathar 3 Institute for Theoretical Information Technology, RWTH Aachen
More informationAnti-Jamming: A Study
Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationIN THIS ISSUE. Cave vs. Pentagroups
3 IN THIS ISSUE 1. 2. 3. 4. 5. 6. Cave vs. Pentagroups Brokeback loop Easy as skyscrapers Breaking the loop L-oop Triple loop Octave Total rising Dead end cells Pentamino in half Giant tents Cave vs. Pentagroups
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationStandard Sudoku point. 1 point. P a g e 1
P a g e 1 Standard 1-2 Place a digit from 1 to 6 in each empty cell so that each digit appears exactly once in each row, column and 2X box. 1 point A 6 2 6 2 1 5 1 point B 5 2 2 4 1 1 6 5 P a g e 2 Standard
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationWPF SUDOKU GP 2014 ROUND 2 WPF SUDOKU/PUZZLE GRAND PRIX Puzzle authors: Serbia. Organised by
WPF SUDOKU/PUZZLE GRAND PRIX 2014 WPF SUDOKU GP 2014 Puzzle authors: Serbia Classic sudoku by Nikola Živanović Sudoku variations by Zoran Tanasić and Čedomir Milanović Organised by 1 Classic Sudoku (6
More informationGravitational Lensing Experiment
EKA Advanced Physics Laboratory Gravitational Lensing Experiment Getting Started Guide In this experiment you will be studying gravitational lensing by simulating the phenomenon with optical lenses. The
More informationEffects of Beamforming on the Connectivity of Ad Hoc Networks
Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman Durrani and Adele Scott Department of Engineering, CECS The Australian National University Canberra ACT,
More informationWireless Sensor Networks 17th Lecture
Wireless Sensor Networks 17th Lecture 09.01.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Goals of this chapter Means for a node to determine its physical position (with respect to
More informationTime Synchronization and Distributed Modulation in Large-Scale Sensor Networks
Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks Sergio D. Servetto School of Electrical and Computer Engineering Cornell University http://cn.ece.cornell.edu/ RPI Workshop
More informationOutline. Communications Engineering 1
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal
More informationDaniel Plotnick. November 5 th, 2017 Mock (Practice) AMC 8 Welcome!
November 5 th, 2017 Mock (Practice) AMC 8 Welcome! 2011 = prime number 2012 = 2 2 503 2013 = 3 11 61 2014 = 2 19 53 2015 = 5 13 31 2016 = 2 5 3 2 7 1 2017 = prime number 2018 = 2 1009 2019 = 3 673 2020
More informationA Practical Approach to Landmark Deployment for Indoor Localization
A Practical Approach to Landmark Deployment for Indoor Localization Yingying Chen, John-Austen Francisco, Wade Trappe, and Richard P. Martin Dept. of Computer Science Wireless Information Network Laboratory
More informationGraphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA
Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department
More informationCoverage in Sensor Networks
Coverage in Sensor Networks Xiang Luo ECSE 6962 Coverage problems Definition: the measurement of quality of service (surveillance) that can be provided by a particular sensor network Coverage problems
More informationPART 2 VARIA 1 TEAM FRANCE WSC minutes 750 points
Name : PART VARIA 1 TEAM FRANCE WSC 00 minutes 0 points 1 1 points Alphabet Triplet No more than three Circles Quad Ring Consecutive Where is Max? Puzzle Killer Thermometer Consecutive irregular Time bonus
More informationA Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks
A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks Youn-Hee Han, Chan-Myung Kim Laboratory of Intelligent Networks Advanced Technology Research Center Korea University of
More informationRobust Location Distinction Using Temporal Link Signatures
Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has
More informationA Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs
International Journal of Advanced Robotic Systems ARTICLE A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs Regular Paper Wang Zheng-jie,* and Li Wei 2 School of Mechatronic Engineering,
More information2010 Pascal Contest (Grade 9)
Canadian Mathematics Competition n activity of the Centre for Education in Mathematics and Computing, University of Waterloo, Waterloo, Ontario 2010 Pascal Contest (Grade 9) Thursday, February 25, 2010
More informationa. Sketch a wrapper like the one described above, using the actual size of your cone. Ignore any overlap required for assembly.
Illustrative Mathematics G-MG Ice Cream Cone Alignment : G-MG.A.3 You have been hired by the owner of a local ice cream parlor to assist in his company s new venture. The company will soon sell its ice
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Randomised search approaches Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg Collaborative
More informationBeliefs and Sequential Equilibrium
Beliefs and Sequential Equilibrium to solve a game of incomplete information, we should look at the beliefs of the uninformed player(s) suppose that player 2 is in an information set which contains two
More informationMaximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks
Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks Zane Sumpter 1, Lucas Burson 1, Bin Tang 2, Xiao Chen 3 1 Department of Electrical Engineering and Computer Science, Wichita
More informationExamples: Find the domain and range of the function f(x, y) = 1 x y 2.
Multivariate Functions In this chapter, we will return to scalar functions; thus the functions that we consider will output points in space as opposed to vectors. However, in contrast to the majority of
More informationA camera controlling method for lecture archive
A camera controlling method for lecture archive NISHIGUHI Satoshi Kyoto University Graduate School of Law, Kyoto University nishigu@mm.media.kyoto-u.ac.jp MINOH Michihiko enter for Information and Multimedia
More informationProceedings Statistical Evaluation of the Positioning Error in Sequential Localization Techniques for Sensor Networks
Proceedings Statistical Evaluation of the Positioning Error in Sequential Localization Techniques for Sensor Networks Cesar Vargas-Rosales *, Yasuo Maidana, Rafaela Villalpando-Hernandez and Leyre Azpilicueta
More informationA Stepped Frequency CW SAR for Lightweight UAV Operation
UNCLASSIFIED/UNLIMITED A Stepped Frequency CW SAR for Lightweight UAV Operation ABSTRACT Dr Keith Morrison Department of Aerospace, Power and Sensors University of Cranfield, Shrivenham Swindon, SN6 8LA
More informationImplicit Fitness Functions for Evolving a Drawing Robot
Implicit Fitness Functions for Evolving a Drawing Robot Jon Bird, Phil Husbands, Martin Perris, Bill Bigge and Paul Brown Centre for Computational Neuroscience and Robotics University of Sussex, Brighton,
More informationarxiv: v1 [cs.cc] 21 Jun 2017
Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik
More informationDynamic Coverage of Mobile Sensor Networks
1 Dynamic Coverage of Mobile Sensor Networks Benyuan Liu, Olivier Dousse, Philippe Nain and Don Towsley To appear in IEEE Trans. on Parallel and Distributed Systems (TPDS) 2012 Abstract In this paper we
More informationNear-Optimal Radio Use For Wireless Network Synch. Synchronization
Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental
More informationWireless PHY: Modulation and Demodulation
Wireless PHY: Modulation and Demodulation Y. Richard Yang 09/11/2012 Outline Admin and recap Amplitude demodulation Digital modulation 2 Admin Assignment 1 posted 3 Recap: Modulation Objective o Frequency
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationThe Pythagorean Theorem
. The Pythagorean Theorem Goals Draw squares on the legs of the triangle. Deduce the Pythagorean Theorem through exploration Use the Pythagorean Theorem to find unknown side lengths of right triangles
More informationEfficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment
Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro
More informationBL V 2.0A 1.3MHz Synchronous Buck Converter
GENERATION DESCRIPTION The BL9309 is a high-efficiency, DC-to-DC step-down switching regulators, capable of delivering up to 2A of output current. The device operates from an input voltage range of 2.5V
More informationTOTAL MATHEMATICS KEY STAGE LEVELS 3 5 TEST B BORDERLINE CHECK CALCULATOR ALLOWED. First Name. Last Name.
MATHEMATICS KEY STAGE 2 2006 TEST B LEVELS 3 5 CALCULATOR ALLOWED PAGE 5 7 9 11 13 15 17 19 21 TOTAL BORDERLINE CHECK MARKS First Name Last Name School Lin David Rosie 2 Instructions You may use a calculator
More informationProbabilistic Coverage in Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:
More informationThe Pigeonhole Principle
The Pigeonhole Principle Some Questions Does there have to be two trees on Earth with the same number of leaves? How large of a set of distinct integers between 1 and 200 is needed to assure that two numbers
More informationON SPLITTING UP PILES OF STONES
ON SPLITTING UP PILES OF STONES GREGORY IGUSA Abstract. In this paper, I describe the rules of a game, and give a complete description of when the game can be won, and when it cannot be won. The first
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 8: LOCALIZATION TECHNIQUES Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 8: LOCALIZATION TECHNIQUES Anna Förster OVERVIEW 1. Localization Challenges and Properties 1. Location Information 2. Precision and Accuracy 3. Localization
More informationOutline. Wireless PHY: Modulation and Demodulation. Recap: Modulation. Admin. Recap: Demod of AM. Page 1. Recap: Amplitude Modulation (AM)
Outline Wireless PHY: Modulation and Demodulation Admin and recap Amplitude demodulation Digital modulation Y. Richard Yang 9// Admin Assignment posted Recap: Modulation Objective o Frequency assignment
More informationSequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance
Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance Jeril Kuriakose 1, V. Amruth 2, Swathy Nandhini 3 and V. Abhilash 4 1 School of Computing and Information
More informationIndoor Localization in Wireless Sensor Networks
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen
More informationMath Steven Noble. November 22nd. Steven Noble Math 3790
Math 3790 Steven Noble November 22nd Basic ideas of combinations and permutations Simple Addition. If there are a varieties of soup and b varieties of salad then there are a + b possible ways to order
More informationMinimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage
sensors Article Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage Xianghua Xu 1, *, Chengwei Zhao 1, Tingcong Ye 1 and Tao Gu 1 School of Computer Science and Technology,
More informationEfficient Channel Allocation for Wireless Local-Area Networks
1 Efficient Channel Allocation for Wireless Local-Area Networks Arunesh Mishra, Suman Banerjee, William Arbaugh Abstract We define techniques to improve the usage of wireless spectrum in the context of
More informationHIGH SCHOOL MATHEMATICS CONTEST. Prepared by the Mathematics Department of Rose-Hulman Institute of Technology Terre Haute, Indiana
HIGH SCHOOL MATHEMATICS CONTEST Prepared by the Mathematics Department of Rose-Hulman Institute of Technology Terre Haute, Indiana November 14, 015 Instructions: Put your name and home address on the back
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationDutch Sudoku Advent 1. Thermometers Sudoku (Arvid Baars)
1. Thermometers Sudoku (Arvid Baars) The digits in each thermometer-shaped region should be in increasing order, from the bulb to the end. 2. Search Nine Sudoku (Richard Stolk) Every arrow is pointing
More informationOn the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks
On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationLocali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall
Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage
More informationAn Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks
An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research
More informationStatic Path Planning for Mobile Beacons to Localize Sensor Networks
Static Path Planning for Mobile Beacons to Localize Sensor Networks Rui Huang and Gergely V. Záruba Computer Science and Engineering Department The University of Texas at Arlington 416 Yates, 3NH, Arlington,
More informationMake and Measure a Circle Without a Pattern
Published on Sew4Home Make and Measure a Circle Without a Pattern Editor: Liz Johnson Thursday, 25 August 2016 1:00 The circle is, in my humble opinion, the Queen of the geometric shapes. Don't get me
More information7. Three friends each order a large
005 MATHCOUNTS CHAPTER SPRINT ROUND. We are given the following chart: Cape Bangkok Honolulu London Town Bangkok 6300 6609 5944 Cape 6300,535 5989 Town Honolulu 6609,535 740 London 5944 5989 740 To find
More informationFrom Fountain to BATS: Realization of Network Coding
From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving
More information