摘要:
A method is provided for efficiently processing messages staged for authentication in a security layer of a protocol stack in a wireless vehicle-to-vehicle communication system. The vehicle-to-vehicle communication system includes a host vehicle receiver for receiving messages transmitted by one or more remote vehicles. The host receiver is configured to authenticate received messages in a security layer of a protocol stack. A wireless message broadcast by a remote vehicle is received. The wireless message contains characteristic data of the remote vehicle. The characteristic data is analyzed for determining whether the wireless message is in compliance with a predetermined parameter of the host vehicle. The wireless message is discarded prior to a transfer of the wireless message to the security layer in response to a determination that the wireless message is not in compliance with the predetermined parameter of the host vehicle. Otherwise, the wireless message is transferred to the security layer.
摘要:
A method is provided for efficiently processing messages staged for authentication in a security layer of a protocol stack in a wireless vehicle-to-vehicle communication system. The vehicle-to-vehicle communication system includes a host vehicle receiver for receiving messages transmitted by one or more remote vehicles. The host receiver is configured to authenticate received messages in a security layer of a protocol stack. A wireless message broadcast by a remote vehicle is received. The wireless message contains characteristic data of the remote vehicle. The characteristic data is analyzed for determining whether the wireless message is in compliance with a predetermined parameter of the host vehicle. The wireless message is discarded prior to a transfer of the wireless message to the security layer in response to a determination that the wireless message is not in compliance with the predetermined parameter of the host vehicle. Otherwise, the wireless message is transferred to the security layer.
摘要:
A system and method for providing energy-efficient support of continuous aggregate queries in a sensor network by efficiently orchestrating the collection and transmission of data gathered by a collective set of sensors to ensure conformance to a specified QoI bound. To ensure this, the sink communicates a potentially different value of precision range or interval to each individual sensor, the sensor is adapted to only report its samples back to the sink if the sample values fall outside this specified range. An additional way to specify temporally varying precision ranges to an individual sensor or groups of sensors is provided without having to explicitly communicate the precision bounds for these different time instants. Using temporally varying precision ranges permits the exploitation of temporal correlation among the sample values recorded by an individual sensor to further reduce the need for reports from the sensors. This approach is more energy-efficient and improves performance of long-running pervasive environment monitoring applications.
摘要:
A system and method for providing energy-efficient support of continuous aggregate queries in a sensor network by efficiently orchestrating the collection and transmission of data gathered by a collective set of sensors to ensure conformance to a specified QoI bound. To ensure this, the sink communicates a potentially different value of precision range or interval to each individual sensor, the sensor is adapted to only report its samples back to the sink if the sample values fall outside this specified range. An additional way to specify temporally varying precision ranges to an individual sensor or groups of sensors is provided without having to explicitly communicate the precision bounds for these different time instants. Using temporally varying precision ranges permits the exploitation of temporal correlation among the sample values recorded by an individual sensor to further reduce the need for reports from the sensors. This approach is more energy-efficient and improves performance of long-running pervasive environment monitoring applications.
摘要:
A system and method for assigning certificates and reducing the size of the certificate revocation lists in a PKI based architecture for a vehicle wireless communications system that includes separating a country, or other area, into geographic regions and assigning region-specific certificates to the vehicles. Therefore, a vehicle need only process certificates and certificate revocation lists for the particular region that it is traveling in. Vehicles can be assigned multiple certificates corresponding to more than one region in the vehicles vicinity as advance preparation for possible travel or transmission into nearby regions. Further, the expiration time of certificates assigned to vehicles corresponding to a given geographic region can be tailored to be inversely proportional to the distance from a registered home region of the vehicle. A scalable design for a back-end certifying authority with region-based certificates can also be provided.
摘要:
A system and method for providing energy-efficient support of continuous aggregate queries in a sensor network by efficiently orchestrating the collection and transmission of data gathered by a collective set of sensors to ensure conformance to a specified QoI bound. To ensure this, the sink communicates a potentially different value of precision range or interval to each individual sensor; the sensor is adapted to only report its samples back to the sink if the sample values fall outside this specified range. An additional way to specify temporally varying precision ranges to an individual sensor or groups of sensors is provided without having to explicitly communicate the precision bounds for these different time instants. Using temporally varying precision ranges permits the exploitation of temporal correlation among the sample values recorded by an individual sensor to further reduce the need for reports from the sensors. This approach is more energy-efficient and improves performance of long-running pervasive environment monitoring applications.
摘要:
The present invention relates to a traffic analysis method and tool for a network based on TCP/IP or UDP/IP or a combination thereof comprising passive monitoring means at intermediate nodes of the network, and estimation means to determine a full set of network traffic metrics connected to said passive monitoring means.The instant invention also provides a configured computer program product for carrying out the above method.
摘要:
A system and method for assigning certificates and reducing the size of the certificate revocation lists in a PKI based architecture for a vehicle wireless communications system that includes separating a country, or other area, into geographic regions and assigning region-specific certificates to the vehicles. Therefore, a vehicle need only process certificates and certificate revocation lists for the particular region that it is traveling in. Vehicles can be assigned multiple certificates corresponding to more than one region in the vehicles vicinity as advance preparation for possible travel or transmission into nearby regions. Further, the expiration time of certificates assigned to vehicles corresponding to a given geographic region can be tailored to be inversely proportional to the distance from a registered home region of the vehicle. A scalable design for a back-end certifying authority with region-based certificates can also be provided.
摘要:
A method for improving TCP throughput over lossy communication links without affecting performance over non-lossy links comprises determining lookahead-loss which is the number of lost packets in a given loss-window; using the loss-window and lookahead-loss to detect congestion in the communication links; and controlling transmission under congestion conditions and under normal conditions, wherein the controlling transmission comprises controlling a size of the loss-window by beginning in a slow-start phase; advancing to a congestion avoidance phase when a slow-start threshold is reached; entering a halt growth phase when the first level of packet loss has been recovered; returning to the congestion avoidance phase when a first level of packet recovery occurs; entering a k-recovery phase when a second level of packet loss occurs. The loss window and slow-start threshold are reduced in half and returned to the congestion avoidance phase when the second level of packet loss has been recovered.
摘要:
A system, method, and computer program product for carrying out the method for managing power consumption in a master driven time division duplex wireless network comprising optimizing power consumption while maintaining quality of service requirements for end-to-end packet delay by adjusting the polling interval for each slave in low power mode based on the incoming traffic at the slave.