A method for collecting uniform amount of fresh data from areas with varying population density

With the development of wireless communication technology, the utilization of the ambient information that the network users observe has attracted much attention. In this paper, we focus especially on the utilization of observed environmental signals for authentication systems. Ambient information taken as unique data at a particular time and place can be utilized to construct stronger authentication systems. However, since the environmental condition of the network is different for each location, which has a huge effect on the observed ambient information in the area, required data are also different for each place. Thus, in this paper, we propose an efficient data collection method which dynamically changes the way data is collected according to the requirements and the network condition. More specifically, our proposal aims to collect uniform amount of fresh data from areas with varying population density. Additionally, an algorithm to improve the efficiency of our proposal regarding the accommodation of the environmental condition of the network is introduced. Moreover, numerical results verify the effectiveness of our proposal.

[1]  Jiming Chen,et al.  Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[2]  Yiwei Thomas Hou,et al.  Proximity-Based Security Techniques for Mobile Users in Wireless Networks , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Yao Zheng,et al.  SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags , 2012, ESORICS.

[4]  Jiming Chen,et al.  Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks , 2012, IEEE Trans. Mob. Comput..

[5]  Jianping Pan,et al.  Evaluating Service Disciplines forOn-Demand Mobile Data Collectionin Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[6]  Yuping Zhao,et al.  Analysis and Compare of Slotted and Unslotted CSMA in IEEE 802.15.4 , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Janus Dam Nielsen,et al.  Location privacy via actively secure private proximity testing , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[8]  Xinbing Wang,et al.  Wireless Mesh Network Capacity Achievable Over the CSMA/CA MAC , 2012, IEEE Transactions on Vehicular Technology.

[9]  Nei Kato,et al.  Internet of Things (IoT): Present State and Future Prospects , 2014, IEICE Trans. Inf. Syst..

[10]  Yang Yang,et al.  Delay distributions of slotted ALOHA and CSMA , 2003, IEEE Trans. Commun..