Author
Gaia Maselli
Other affiliations: National Research Council, University of Pisa
Bio: Gaia Maselli is an academic researcher from Sapienza University of Rome. The author has contributed to research in topics: Wireless ad hoc network & Mobile ad hoc network. The author has an hindex of 11, co-authored 43 publications receiving 996 citations. Previous affiliations of Gaia Maselli include National Research Council & University of Pisa.
Papers
More filters
••
TL;DR: The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract: Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.
430 citations
••
TL;DR: A new performance metric is proposed by which to judge these anticollision protocols for passive RFID systems: time system efficiency, which provides a direct measure of the time taken to read a group of tags.
Abstract: One of the major challenges in the use of Radio Frequency-based Identification (RFID) on a large scale is the ability to read a large number of tags quickly. Central to solving this problem is resolving collisions that occur when multiple tags reply to the query of a reader. To this purpose, several MAC protocols for passive RFID systems have been proposed. These typically build on traditional MAC schemes, such as aloha and tree-based protocols. In this paper, we propose a new performance metric by which to judge these anticollision protocols: time system efficiency. This metric provides a direct measure of the time taken to read a group of tags. We then evaluate a set of well-known RFID MAC protocols in light of this metric. Based on the insights gained, we propose a new anticollision protocol, and show that it significantly outperforms previously proposed mechanisms.
139 citations
••
23 Mar 2004
TL;DR: This work explores the cooperation issues across layers of the protocol stack for a network node, and performs a perprotocol analysis of cooperative aspects, and identifies the problems potentially affecting each layer.
Abstract: The infrastructureless nature of ad hoc networks requires the distribution of network functions to all the participating nodes. The underlying requirement for making operational the cooperative paradigm is the supposed good-behavior of all entities composing and, at the same time, using the system. However, the lack of any centralized authority that enforces the overall collaboration motivates a possible tendency of entities toward self-interested behavior. We explore the cooperation issues across layers of the protocol stack for a network node. In particular, we perform a perprotocol analysis of cooperative aspects, and identify the problems potentially affecting each layer. Afterward, we survey current research approaches to cooperation enforcing, highlighting common features among different layers' solutions, as well as open issues.
58 citations
01 Jan 2003
TL;DR: This paper focuses on network-based intrusion detection and it explores a different approach to the problem, showing that in every network there are some global variables that can be profitably used for detecting network anomalies, regardless of the type of network users and equipment.
Abstract: Network management platforms provide flexible facilities for setting up custom applications able to detect network anomalies on a specific environment. This is because each network is made of users, services and computers with a specific behaviour that is then reflected in the generated network traffic. Goal of this paper is to show that in every network there are some global variables that can be profitably used for detecting network anomalies, regardless of the type of network users and equipment. As most of the relations among these variables are fixed, this paper shows that it is possible to define generic network rules aimed to automatically detect selected network anomalies. Finally, it covers the design and implementation of an open-source application used to effectively validate this work on a large campus network. 1 Background and Motivation This paper focuses on network-based intrusion detection and it explores a different approach to the problem. Intrusion detection techniques can be categorised into signature detection and anomaly detection [1][2]. Signature detection systems use patterns of well-known attacks or weak spots of the system to match and identify known intrusions. They perform a pattern matching between network traffic captured and attack signature. If the matching succeds, then the system generates an alarm. The main advantage of signature detection paradigm is that it can accurately and efficiently detect instances of known attacks. The main disadvantage is that it lacks the ability to detect the newly
51 citations
••
01 May 2006
TL;DR: A lightweight mechanism for REliable and Efficient Forwarding (REEF), which mitigates the effects of adverse situations caused by cooperation misbehavior or network fault conditions, and becomes also a security mechanism in case of a security association established between the communication parties.
Abstract: This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve performance of nodes communication. In particular, we present a lightweight mechanism for REliable and Efficient Forwarding (REEF), which mitigates the effects of adverse situations caused by cooperation misbehavior or network fault conditions. It exploits nodes' local knowledge to estimates route reliability, and multi-path routing to forward packets on the most reliable route. REEF becomes also a security mechanism in case of a security association established between the communication parties. This additional feature makes the mechanism robust, guaranteeing trustworthiness of the reliability estimator and security of data transmission. A new approach to cooperation enforcing is also proposed. The classical method denies service to misbehaving nodes by, for example, not serving their forwarding requests. We approach the problem less drastically, differentiating the quality of service provided to nodes according to their behavior. In other words, traffic of misbehaving nodes will flow through the network slower than that one of reliable nodes.
44 citations
Cited by
More filters
••
01 Oct 2004TL;DR: S sensor-actor and actor-actor coordination is explored and research challenges for coordination and communication problems are described.
Abstract: Wireless sensor and actor networks (WSANs) refer to a group of sensors and actors linked by wireless medium to perform distributed sensing and acting tasks. The realization of wireless sensor and actor networks (WSANs) needs to satisfy the requirements introduced by the coexistence of sensors and actors. In WSANs, sensors gather information about the physical world, while actors take decisions and then perform appropriate actions upon the environment, which allows a user to effectively sense and act from a distance. In order to provide effective sensing and acting, coordination mechanisms are required among sensors and actors. Moreover, to perform right and timely actions, sensor data must be valid at the time of acting. This paper explores sensor-actor and actor-actor coordination and describes research challenges for coordination and communication problems.
1,624 citations
••
01 Jul 2003TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Abstract: Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANETs characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future. � 2003 Elsevier B.V. All rights reserved.
1,430 citations
01 Jan 2016
TL;DR: The linear and nonlinear programming is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Abstract: Thank you for downloading linear and nonlinear programming. As you may know, people have search numerous times for their favorite novels like this linear and nonlinear programming, but end up in malicious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some infectious bugs inside their desktop computer. linear and nonlinear programming is available in our book collection an online access to it is set as public so you can download it instantly. Our digital library spans in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the linear and nonlinear programming is universally compatible with any devices to read.
943 citations
01 Jan 2010
TL;DR: In this article, the authors examined the patterns and effects of departmental oversight across 28 ministries in Estonia, Hungary, Poland and Slovenia in relation to transposition planning, legal review and monitoring of deadlines.
Abstract: The extent to which member states transpose EU directives in a timely fashion is often argued to be strongly associated with the general effectiveness of national bureaucracies. But what kind of institutional solutions ensure better performance? This paper examines the patterns and effects of departmental oversight across 28 ministries in Estonia, Hungary, Poland and Slovenia. In mapping the strength of oversight, it relies on around 90 structured interviews regarding the rules-in-use on transposition planning, legal review and monitoring of deadlines. The analysis of the impact of departmental oversight is based on an original dataset of over 300 directives with transposition deadlines between January 2005 and December 2008.
858 citations
••
TL;DR: A taxonomy of the ad hoc routing protocols is created to uncover the requirements considered by the different protocols, the resource limitations under which they operate, and the design decisions made by the authors.
554 citations