Wyniki wyszukiwania dla: ad-hoc nodes network
-
Position and Orientation Estimation in Radio Network With Groups of Locally Synchronized Nodes
PublikacjaThis article presents a positioning system with groups of locally synchronized nodes. A mobile object is equipped with a group of several synchronized receivers that are able to measure the difference in the time of arrival of signals from reference transmitters. The reference transmitters are synchronized only in local groups, with no global synchronization between groups. It is assumed that the synchronous operation of transmitters...
-
Dedukcja zachowań węzłów sieci ad hoc na podstawie potwierdzeń końcowych: ocena dokładności
PublikacjaPrzebadano precyzję algorytmu dedukcji rzeczywistych spolegliwości węzłów sieci MANET w oparciu o potwierdzenia end-to-end i bez użycia mechanizmu watchdog. W przeprowadzonych eksperymentach numerycznych wskazano charakterystyki topologiczne wpływające na tę precyzję.
-
World Research Journal of Ad Hoc and Ubiquitous Computing
Czasopisma -
Model egoistycznych ataków na mechanizm odłożenia transmisji w warstwie MAC bezprzewodowych sieci lokalnych ad hoc
PublikacjaZaprezentowano mechanizm i efekty ataku na mechanizm odczekania CSMA/CA w lokalnej sieci IEEE 802.11. Stosując rachunek miar motywacyjnych pokazano, w jako sposób zachowania niekooperacyjne stacji sieci mogą wpływać na osiąganą globalną przepustowość i rozdział pasma sieci.
-
Iwona Nowakowska dr
OsobyAdiunkt badawczo-dydaktyczny w Instytucie Psychologii Akademii Pedagogiki Specjalnej im. Marii Grzegorzewskiej w Warszawie. Absolwentka psychologii (Uniwersytet Warszawski, 2019), doktor nauk społecznych w dyscyplinie psychologia (Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej, 2022). Prowadziła badania w obszarach: pogranicza psychologii społecznej i klinicznej oraz społecznej i różnic indywidualnych. Obecna aktywność...
-
Czy e-demokracja i rozwiązania znane ze świata biznesu są właściwymi kierunkami zmian politycznych w Polsce?
PublikacjaCEL NAUKOWY: Celem artykułu jest przedstawienie wybranych problemów systemu demokratycznego w Polsce oraz zaproponowanie kierunków rozwoju, poprawiających jego działanie. PROBLEM i METODY BADAWCZE: Problem badawczy dotyczył sprawdzenia czy wdrożenie założeń nowoczesnych koncepcji organizacyjnych i rozwiązań teleinformatycznych może przyczynić się do sprawniejszego sprawowania demokratycznej władzy, a także podwyższenia...
-
International Journal of Ad Hoc and Ubiquitous Computing
Czasopisma -
Jacek Stefański prof. dr hab. inż.
OsobyJacek Stefański ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej (PG) w 1993 r. W 2000 r. uzyskał stopień doktora nauk technicznych w dyscyplinie telekomunikacja, w 2012 r. stopień doktora habilitowanego, natomiast w 2020 r. tytuł profesora nauk inżynieryjno-technicznych. Obecnie pracuje na stanowisku profesora w Katedrze Systemów i Sieci Radiokomunikacyjnych (KSiSR) PG. W latach 2005-2009 był zatrudniony w Instytucie...
-
Wojciech Gumiński dr inż.
OsobyWojciech Gumiński ukończył studia na Wydziale Elektroniki, Telekomunikacji I Informatyki w 1991 r. W roku 2003 uzyskał stopień doktora nauk technicznych. Zainteresowania naukowe obejmują architektury sieciowe i protokoły telekomunikacyjne oraz cyfrowe przetwarzanie sygnałów. Uczestniczył jako główny wykonawca w szeregu projektach, między innymi: Inżynieria Internetu Przyszłości, PL-LAB 2020 i Internet na Bałtyku. Publikacje...
-
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Publikacja -
Network lifetime maximization in wireless mesh networks for machine-to-machine communication
Publikacja -
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publikacja -
How to provide fair service for V2I communications in VANETs?
PublikacjaIn this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Distinguishing views in symmetric networks: A tight lower bound
PublikacjaThe view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublikacjaThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Transmission protocol simulation framework for the resource-constrained sensor network
PublikacjaIn this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...
-
Collision-free network exploration
PublikacjaMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublikacjaIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Bilateral multi-issue negotiation of execution contexts by proactive document agents
PublikacjaA proactive document can react to its actual environment by autonomously selecting and performing actions integrated into its body and interact with its user. When migrating over a network of execution devices it may encounter diverse execution contexts, each one set up according to temporal characteristics of a receiving device and preferences of its owner. A concept to augment proactive documents with negotiation capability is...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Toward Fast Calculation of Communication Paths for Resilient Routing
PublikacjaUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Collision-Free Network Exploration
PublikacjaA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
The reliability of tree and star networks
PublikacjaThis paper investigated the reliability of tree and star networks. Following measures of network reliability are assumed: the expected number of nodes, that can communicate with the central node; the expected number of node pairs, that are connected by a path through the central node; the expected number of node pairs communicating.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublikacjaDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Ryszard Katulski prof. dr hab. inż.
Osoby -
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublikacjaMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublikacjaThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns
PublikacjaIn this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublikacjaMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublikacjaThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
The Methodology of identifying the place to install shunt compensators in the transmission network
PublikacjaThis methodology of selection and localization of static com- paper presents pensators in wide network. Proposed method is based on analysis of voltage area power profiles in the nodes of the power grid, and designating locations, In Which Voltages ex- cessively tend to change in time. Practical way of modeling the SVC device in PLANS program you Presented, as well as some example results of research.
-
A concept of measurement system based on the Z-Wave standard
PublikacjaIn the paper a new concept of measurement system based on the Z-Wave standard is presented. This standard is dedicated to use mainly in home automation systems, but its properties enable to use it in dispersed measurement systems and support wireless communication between measurement nodes in a mesh-type network. In the paper basic metrological aspects of the Z-Wave standard and an example of impedance measurement system are discussed.
-
Gossiping by energy-constrained mobile agents in tree networks
PublikacjaEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Disciplines and measures of information resilience
PublikacjaCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
The realization of ASON/GMPLS control plane
PublikacjaASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublikacjaIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...