93 results on '"Ad hoc networks"'
Search Results
2. FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats.
- Author
-
Alrashdi, Ibrahim, Sallam, Karam M., Alrowaily, Majed Abdullah, Alruwaili, Omar, and Arain, Bilal
- Abstract
The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks.
- Author
-
Singamaneni, Kranthi Kumar and Muhammad, Ghulam
- Subjects
ADVANCED Encryption Standard ,DATA privacy ,QUANTUM computing ,FLEXIBLE work arrangements ,QUANTUM cryptography ,CRYPTOGRAPHY - Abstract
The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning.
- Author
-
Dey, Debasmita and Ghosh, Nirnay
- Subjects
REINFORCEMENT learning ,CHILD behavior ,MARL ,SECURITY systems ,DECISION making - Abstract
Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes iTRPL , an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its ϵ -Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that iTRPL learns to make optimal decisions with time. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. LANET: Visible-light ad hoc networks.
- Author
-
Cen, Nan, Jagannath, Jithin, Moretti, Simone, Guan, Zhangyu, and Melodia, Tommaso
- Subjects
WIRELESS communications ,AD hoc computer networks ,SOFTWARE-defined networking ,ROUTING (Computer network management) ,INTERNET of things - Abstract
Abstract Visible light communication (VLC) is a wireless technology complementary to well-understood radio frequency (RF) communication that is promising to help alleviate the spectrum crunch problem in overcrowded RF spectrum bands. While there has been significant advancement in recent years in understanding physical layer techniques for visible light point-to-point links, the core problem of developing efficient networking technology specialized for visible-light networks is substantially unaddressed. This article discusses the current existing techniques as well as the main challenges for the design of visible-light ad hoc networks - referred to as LANETs. The paper discusses typical architectures and application scenarios for LANETs and highlights the major differences between LANETs and traditional mobile ad hoc networks (MANETs). Enabling technologies and design principles of LANETs are analyzed and existing work is surveyed following a layered approach. Open research issues in LANET design are also discussed, including long-range visible light communication, full-duplex LANET MAC, blockage-resistant routing, VLC-friendly TCP and software-defined prototyping, among others. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
6. Joint spatial multiplexing and transmit diversity in MIMO ad hoc networks.
- Author
-
Carvalho, Marcelo M., Firyaguna, Fadhil, Christófaro, Ana C.O., Andrade, Éverton A.L., and Bonfim, Tiago S.
- Subjects
AD hoc computer networks ,SIGNAL-to-noise ratio ,MIMO systems ,IEEE 802.11 (Standard) ,ANTENNAS (Electronics) - Abstract
Abstract This paper investigates the performance of MIMO ad hoc networks that employ transmit diversity, as delivered by the Alamouti scheme, and/or spatial multiplexing, according to the Vertical Bell Labs Layered Space-Time system (V-BLAST). Both techniques are implemented in the ns-3 network simulator by focusing on their overall effect on the resulting signal-to-interference-plus-noise ratio (SINR) at the intended receiver. Unlike previous works that have studied fully-connected scenarios or have assumed simple abstractions to represent MIMO behavior, this paper evaluates MIMO ad hoc networks that are not fully connected by taking into account the impact of multiple antennas on the carrier sense activity in CSMA-like medium access control (MAC) protocols. In addition to presenting a performance evaluation of ad hoc networks operating according to each individual MIMO scheme, this paper proposes simple modifications to the IEEE 802.11 DCF MAC to allow the joint operation of both MIMO techniques. Hence, each pair of nodes is allowed to select the best MIMO configuration for the impending data transfer. The joint operation is based on three operation modes that are selected based on the estimated SINR at the intended receiver and its comparison with a set of threshold values. The performance of ad hoc networks operating with the joint MIMO scheme is compared with the performance when using each individual MIMO scheme and the standard single-input single output (SISO) IEEE 802.11. Performance results are presented based on MAC-level throughput per node, delay, and throughput fairness under saturated traffic conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
7. Channel quality aware cross-layer design based rate adaptive MAC for improving the throughput capacity of multi-hop ad hoc networks.
- Author
-
Shete, Prasanna J., Awale, R.N., and Ket, Satish Y.
- Subjects
AD hoc computer networks ,RADIO transmitters & transmission ,ACCESS control of ad hoc networks ,SCALING laws (Nuclear physics) ,SCATTERING (Physics) - Abstract
In this paper we address the goal of achieving higher throughput capacity in multi-hop wireless ad hoc networks than estimated by capacity scaling laws of Gupta and Kumar (2000) [1]. By exploiting the implications pointed in earlier research, a cross-layer design based channel quality aware rate adaptive MAC algorithm CQRA-MAC is proposed to achieve this goal. CQRA-MAC dynamically switches the MAC transmission rate on the basis of channel quality experienced at the physical layer. The proposed algorithm is implemented by modifying the IEEE 802.11 model of Qualnet 4.5 simulator and its performance is evaluated in static and mobile network scenarios following the random access transport capacity approach. Experimental results show that CQRA-MAC achieves higher throughput than DCF and ARF. The achieved throughput capacity is quantified in terms of measurable network parameters and thus validates equations of random access transport capacity framework (Andrews et al., 2010) [9]. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
8. A new hierarchical beam search algorithm for wireless ad hoc networks in multipath channel scenario.
- Author
-
Zou, Weixia, Li, Hui, and Wang, Ye
- Subjects
SEARCH algorithms ,WIRELESS communications ,AD hoc computer networks ,MULTIPATH channels ,COMPUTER networks - Abstract
For the beam search algorithms proposed by some existing literatures cannot always find the global optimal beam in multipath channel and the single communication link may easily be broken, the node at the edge of a wireless ad hoc network will encounter a temporary outage problem, which means it will be isolated from the network. To solve this problem, we propose a new hierarchical beam search algorithm which can be performed on some marginal nodes. The algorithm will take advantage of the multipath channel and find some available communication beams together with the global optimal beam. The main idea of our algorithm is to increase the opportunity to find multiple local optimal beams. The selected number of beams at each level is greater than or equal to the number of paths. In last level, we selectively delete beams and then obtain a plurality of local optimal beams which can be alternative communication beams for the marginal node. Furthermore, we can also get the global optimal beam simultaneously, which are included in these local optimal beams. The simulation results show that, comparing with the exhaustive search algorithm, it has almost the same success rate, but lower search complexity to get a number of alternative beams. Comparing with binary search algorithm, the proposed algorithm has higher success rate to find the global optimal communication beam in multipath environment. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
9. Analytically modeling data dissemination in vehicular ad hoc networks.
- Author
-
Liu, Xiaoyun and Yan, Gongjun
- Subjects
VEHICULAR ad hoc networks ,ACCIDENT prevention ,TRAFFIC congestion ,INFORMATION dissemination ,DATA modeling - Abstract
Without pre-defined infrastructures, vehicles connect to each other to form Vehicular Ad-Hoc Networks (VANETs) to deliver data among vehicles. Dissemination of messages, for example accident alert messages or congestion messages is critical in VANETs. People’s lives may be at stake in accidents. Modeling and predicting VANETs’ message dissemination opens an opportunity to adopt appropriate strategies to alert severe accidents, manage traffic, evacuate vehicles from disasters, or recover from accidents. However, modeling data dissemination is challenging due to vehicles’ high mobility, which results in network topologies rapidly changing and data transmission being unstable. This paper presents analytical data dissemination models on VANETs. We model data dissemination as a new production adoption process and as a time-dependent stochastic process. The fact that information value or importance is decreasing with time and distance is also considered. The analytical models allow prediction and evaluation of information diffusion and enable intelligent traffic management. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
10. Fairness and high-throughput scheduling for multihop wireless ad hoc networks.
- Author
-
Liu, Qiang, Leung, Ka-Cheong, Li, Victor O.K., Zhao, Ze, Yang, Guanghua, and Cui, Li
- Subjects
AD hoc computer networks ,BIT rate ,INTERFERENCE channels (Telecommunications) ,SCHEDULING ,ROBUST control - Abstract
In multihop wireless ad hoc networks, it is important to maintain the outcome fairness of throughput and to maximize the throughput. In this paper, we propose a novel opportunistic scheduling framework by considering outcome fairness and throughput simultaneously. Since the data rate fluctuates intensively due to channel errors, we first devise a data rate estimation method with an adaptive sliding window to accurately and adaptively estimate the data rate. Then, we present a framework together with two mechanisms. The first proposed mechanism is ROSA-WOM, with the weighted objective function method to configure the data rate. The other one is ROSA-MGCF, and it is a maximum total goodput method under a constrained fairness index. The proposed mechanisms are able to schedule the flows fairly even when the data rate of all flows is more than the channel capacity. We establish a testbed to evaluate these two mechanisms. The experiment results show that our proposed mechanisms can not only trade off with different fairness and throughput requirements, but also effectively provide robust service isolation, outcome fairness, and high throughput in the presence of channel errors. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
11. A survey on clustering techniques for cooperative wireless networks.
- Author
-
Sucasas, Victor, Radwan, Ayman, Marques, Hugo, Rodriguez, Jonathan, Vahid, Seiamak, and Tafazolli, Rahim
- Subjects
SCALABILITY ,AD hoc computer networks ,SCIENTIFIC community ,INTERNET of things ,ALGORITHMS ,WIRELESS cooperative communication - Abstract
Clustering became relevant in the past as a solution for the scalability problems of ad hoc networking, but, the unsuccessful application of ad hoc solutions to real scenarios, such as the projects SURAN and PRNet, decreased the interest of research community on ad hoc communications, and subsequently, on clustering algorithms. Recently, however, clustering techniques have gained renewed interest due to the emergence of cooperative communications for cellular networking. Clustering is envisaged, in this scenario, as a technique to team up nodes to support efficient data aggregation for energy saving, scalability and privacy among other benefits. Moreover, research on 5G networks also envisages a connected society, where everything and everyone will be connected under the umbrella of Internet of Everything (IoE). This novel communication paradigm has fostered new research on clustering, which has yielded novel and more advanced algorithms and applications. This article surveys the State-of-the-Art in clustering techniques and provides detailed descriptions of the basics of clustering and the latest novel ideas. Open issues, technical challenges and directions for future research are also outlined. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
12. Data communication in VANETs: Protocols, applications and challenges.
- Author
-
Cunha, Felipe, Villas, Leandro, Boukerche, Azzedine, Maia, Guilherme, Viana, Aline, Mini, Raquel A. F., and Loureiro, Antonio A. F.
- Subjects
VEHICULAR ad hoc networks ,DATA transmission systems ,COMPUTER network protocols ,AD hoc computer networks ,WIRELESS communications - Abstract
VANETs have emerged as an exciting research and application area. Increasingly vehicles are being equipped with embedded sensors, processing and wireless communication capabilities. This has opened a myriad of possibilities for powerful and potential life-changing applications on safety, efficiency, comfort, public collaboration and participation, while they are on the road. Although, considered as a special case of a Mobile Ad Hoc Network, the high but constrained mobility of vehicles bring new challenges to data communication and application design in VANETs. This is due to their highly dynamic and intermittent connected topology and different application’s QoS requirements. In this work, we survey VANETs focusing on their communication and application challenges. In particular, we discuss the protocol stack of this type of network, and provide a qualitative comparison between most common protocols in the literature. We then present a detailed discussion of different categories of VANET applications. Finally, we discuss open research problems to encourage the design of new VANET solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. An efficient multi-channel MAC protocol for wireless ad hoc networks.
- Author
-
Dang, Duc Ngoc Minh, Nguyen, VanDung, Le, Huong Tra, Hong, Choong Seon, and Choe, Jongwon
- Subjects
MULTICHANNEL communication ,AD hoc computer networks ,IEEE 802.11 (Standard) ,CARRIER sense multiple access ,BANDWIDTH allocation ,COMPUTER network protocols ,ACCESS control ,NETWORK performance - Abstract
IEEE 802.11 MAC is designed for single channel and based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The throughput of network is limited by the bandwidth of the single channel and the CSMA-based MAC protocol with omnidirectional antennas can cause the serious unfairness or flow starvation. By exploiting the multiple channels and using the directional antennas, nodes located in each other’s vicinity may communicate simultaneously. This helps to increase the spatial reuse of the wireless channel and thus increase the network performance. In this paper, we propose a Multi-channel MAC protocol with Directional Antennas (MMAC-DA) that adopts IEEE 802.11 Power Saving Mechanism (PSM) and exploits multiple channel resources and directional antennas. Nodes have to exchange control packets during the Announcement Traffic Indication Message (ATIM) window to select data channels and determine the beam directions which are used to exchange data packets during the data window. The simulation results show that MMAC-DA can improve the network performance in terms of aggregate throughput, packet delivery ratio, energy efficiency and fairness index. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
14. Performance of polling disciplines for the receiver-initiated binary exponential backoff MAC protocol.
- Author
-
Firyaguna, Fadhil and Carvalho, Marcelo M.
- Subjects
COMPUTER network protocols ,IEEE 802.11 (Standard) ,ALGORITHMS ,TOPOLOGY ,INFORMATION technology - Abstract
The study of polling disciplines for receiver-initiated MAC protocols has not received much attention in the literature, and simple schemes such as round-robin or uniform prioritization are usually assumed. However, not only the order, but also the rate at which nodes are polled is significant: a polling rate that is too slow may render low throughput and high delays, whereas the opposite may lead to excessive control traffic and frame collisions. Ideally, a receiver-initiated MAC protocol would perform best if nodes could know “whom” and “when” to poll based on data availability. This paper investigates the performance of three polling disciplines when applied to a specific receiver-initiated unicast MAC protocol that is based on a reversal of the binary exponential backoff (BEB) algorithm of the IEEE 802.11. With the BEB algorithm, the polling rate is self-regulated according to channel conditions and traffic availability at polled nodes. Additionally, this paper extends the BEB-based MAC protocol by introducing a new control frame and a frame reordering technique at MAC queues to speed up polling rounds. The performance of the polling disciplines are also compared to the traditional IEEE 802.11 with respect to control overhead, delay, fairness, and throughput, according to different topologies and traffic scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. On cooperative transmission range extension in multi-hop wireless ad-hoc and sensor networks: A review.
- Author
-
Lin, Jian, Jung, Haejoon, Chang, Yong Jun, Jung, Jin Woo, and Weitnauer, Mary Ann
- Subjects
AD hoc computer networks ,WIRELESS sensor networks ,FEATURE extraction ,ACCESS control of computer networks ,COMPUTER network protocols ,NETWORK performance - Abstract
Range extension is a promising feature offered by cooperative transmission (CT), also known as virtual multiple-input–single-output (VMISO). Many authors have considered how the diversity and array gains from CT may benefit a wireless multi-hop network, when the gains are used for increasing link reliability and reducing transmit power. However, relatively less attention has been given to the benefits of CT range extension and few testbed implementations of CT have been demonstrated. In this paper, we focus on how CT range extension can impact the lower three layers, especially medium access control (MAC) and routing for ad hoc and sensor multi-hop networks (AHSMNs). We assume cooperators decode and forward the packets. Various analytical models, performance analyses, and experimental results using software-defined radios in an indoor office environment are discussed. For wireless sensor networks (WSNs), we review CT range extension at the network layer, to eliminate the energy hole that forms around sink nodes in non-CT networks, and we review cooperator selection and duty cycle scheduling algorithms at Layer 2, to maximize the lifetime of a multi-hop WSN. For ad hoc networks, we emphasize a family of lightweight broadcasting and unicasting protocols based on a simple form of CT called the opportunistic large array (OLA). Experimental results, including OLA-based unicast routing and diversity order effects in two-hop CT networks, are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
16. N-body: A social mobility model with support for larger populations.
- Author
-
Zhao, Chen, Sichitiu, Mihail L., and Rhee, Injong
- Subjects
AD hoc computer networks ,MANY-body problem ,SOCIAL mobility ,HUMAN mechanics ,HUMAN-computer interaction ,COMPUTER simulation ,MATHEMATICAL models - Abstract
An accurate reproduction of real human movement is essential in simulations of MANETs in order to obtain meaningful performance results. Existing models capturing real world mobility features often require knowledge of the underlying dynamics of the target scenario, therefore limiting the application scope. In this paper we tackle this problem from a different perspective. Rather than considering the details of the target scenario, we extract features from a sample trace, and synthesize traces that have similar features. In particular, as human activities are often socially organized, resulting in a tendency of forming groups, we propose an N-body mobility model that captures the group forming tendency from traces of a small number of nodes, and reproduces them in mobility traces of a larger population. Through simulation we show that the N-body model is capable of synthesizing the group forming behavior similar to that observed from sample traces. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
17. Enhanced power saving mode for low-latency communication in multi-hop 802.11 networks.
- Author
-
Vukadinovic, V., Glaropoulos, I., and Mangold, S.
- Subjects
ENERGY conservation ,TELECOMMUNICATION ,COMPUTER networks ,IEEE 802.11 (Standard) ,COMPARATIVE studies ,COMPUTER operating systems - Abstract
The Future Internet of Things (IoT) will connect billions of battery-powered radio-enabled devices. Some of them may need to communicate with each other and with Internet gateways (border routers) over multi-hop links. While most IoT scenarios assume that for this purpose devices use energy-efficient IEEE 802.15.4 radios, there are use cases where IEEE 802.11 is preferred despite its potentially higher energy consumption. We extend the IEEE 802.11 power saving mode (PSM), which allows WLAN devices to enter a low-power doze state to save energy, with a traffic announcement scheme that facilitates multi-hop communication. The scheme propagates traffic announcements along multi-hop paths to ensure that all intermediate nodes remain awake to receive and forward the pending data frames with minimum latency. Our simulation results show that the proposed Multi-Hop PSM (MH-PSM) improves both end-to-end delay and doze time compared to the standard PSM; therefore, it may optimize WLAN to meet the networking requirements of IoT devices. MH-PSM is practical and software-implementable since it does not require changes to the parts of the IEEE 802.11 medium access control that are typically implemented on-chip. We implemented MH-PSM as a part of a WLAN driver for Contiki OS, which is an operating system for resource-constrained IoT devices, and we demonstrated its efficiency experimentally. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
18. Clustering in Vehicular Ad Hoc Networks using Affinity Propagation.
- Author
-
Hassanabadi, B., Shea, C., Zhang, L., and Valaee, S.
- Subjects
VEHICULAR ad hoc networks ,ROUTING (Computer network management) ,ALGORITHMS ,ROBUST control ,ERROR analysis in mathematics ,STABILITY theory ,COMPUTER performance - Abstract
Abstract: The need for an effective clustering algorithm for Vehicular Ad Hoc Networks (VANETs) is motivated by the recent research in cluster-based MAC and routing schemes. VANETs are highly dynamic and have harsh channel conditions, thus a suitable clustering algorithm must be robust to channel error and must consider node mobility during cluster formation. This work presents a novel, mobility-based clustering scheme for Vehicular Ad hoc Networks, which forms clusters using the Affinity Propagation algorithm in a distributed manner. This proposed algorithm considers node mobility during cluster formation and produces clusters with high stability. Cluster performance was measured in terms of average clusterhead duration, average cluster member duration, average rate of clusterhead change, and average number of clusters. The proposed algorithm is also robust to channel error and exhibits reasonable overhead. Simulation results confirm the superior performance, when compared to other mobility-based clustering techniques. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
19. Onto scalable wireless ad hoc networks: Adaptive and location-aware clustering.
- Author
-
Conceição, Luís and Curado, Marilia
- Subjects
COMPUTER networks ,SCALABILITY ,AD hoc computer networks ,ELECTRIC network topology ,NETWORK routing protocols ,INTERNET ,ALGORITHMS - Abstract
Abstract: Clustering is a widely used solution to provide routing scalability in wireless ad hoc networks. In the literature, clustering schemes feature different characteristics and purposes, however few schemes are context-aware. This work proposes a new solution called Distributed and Location-aware Clustering (DiLoC), a clustering scheme designed to operate in indoor environments, providing mechanisms to gather context location information in order to ease the maintenance of clusters, thus resulting in a stabler network topology in order to provide a scalable network topology for an efficient routing. DiLoC considers three distinct approaches, regarding the characteristics of the deployment environment, aiming to cover infrastructure-less, infrastructure and hybrid network scenarios. DiLoC was evaluated and compared with a similar clustering scheme, featuring the stability, amount of clustered nodes and network load. Included results demonstrate a scalable algorithm with a significant high stability. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
20. A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks.
- Author
-
Jaffrès-Runser, Katia, Schurgot, Mary R., Wang, Qi, Comaniciu, Cristina, and Gorce, Jean-Marie
- Subjects
AD hoc computer networks ,PERFORMANCE evaluation ,PARETO optimum ,NETWORK routing protocols ,COMPUTATIONAL complexity ,TIME delay systems ,COMPUTER reliability - Abstract
Abstract: In this paper we address the problem of finding the optimal performance region of a wireless ad hoc network when multiple performance metrics are considered. Our contribution is to propose a novel cross-layer framework for deriving the Pareto optimal performance bounds for the network. These Pareto bounds provide key information for understanding the network behavior and the performance trade-offs when multiple criteria are relevant. Our approach is to take a holistic view of the network that captures the cross-interactions among interference management techniques implemented at various layers of the protocol stack (e.g. routing and resource allocation) and determines the objective functions for the multiple criteria to be optimized. The resulting complex multiobjective optimization problem is then solved by multiobjective search techniques. The Pareto optimal sets for an example sensor network are presented and analyzed when delay, reliability and energy objectives are considered. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
21. Energy efficient networking via dynamic relay node selection in wireless networks.
- Author
-
de Graaf, Maurits
- Subjects
WIRELESS sensor networks ,ENERGY consumption ,COMPUTER networks ,AD hoc computer networks ,ALGORITHMS ,COMPUTER systems - Abstract
Abstract: Mobile wireless ad hoc networks need to maximize their network lifetime (defined as the time until the first node runs out of energy). In the broadcast network lifetime problem, all nodes are sending broadcast traffic, and one asks for an assignment of transmit powers to nodes, and for sets of relay nodes so that the network lifetime is maximized. The selection of a dynamic relay set consisting of a single node (the ‘master’), can be regarded as a special case, providing lower bounds to the optimal lifetime in the general setting. This paper provides a preliminary analysis of such a ‘dynamic master selection’ algorithm, comparing relaying to direct routing. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
22. On the scheduling, multiplexing and diversity trade-off in MIMO ad hoc networks: A unified framework.
- Author
-
ElBatt, Tamer
- Subjects
COMPUTER scheduling ,MULTIPLEXING ,MIMO systems ,AD hoc computer networks ,PROBLEM solving ,COMPUTATIONAL complexity - Abstract
Abstract: In this paper we study the fundamental scheduling, multiplexing and diversity trade-off in MIMO ad hoc networks. In particular, we propose a unified framework for the scheduling-multiplexing and scheduling-diversity sub-problems that constitutes a major step towards solving the overall problem. The two sub-problems are motivated by a fundamental trade-off between scheduling full multiplexing (diversity) gain non-interfering links and scheduling interfering links using lower multiplexing (diversity) gain in conjunction with interference nulling. First, we cast each sub-problem as a cross-layer optimization problem that jointly decides the scheduling and MIMO stream allocation, subject to signal-to-interference-and-noise-ratio (SINR) constraints. Second, we characterize the problem as non-convex integer programming which is quite challenging to solve. Hence, we shift our focus to characterize the optimal for the simple case of two links. The main result of this paper is that the two fundamentally different sub-problems give rise to structurally similar SINR-based decision rules which constitute the basis for a resource allocation algorithm with linear complexity in the number of links, namely Iterative MIMO Link Scheduling (IMLS), that solves the two sub-problems and achieves significant gains for any number of links. Numerical results exhibit more than twofold/quadratic improvement over scheduling non-interfering links with full multiplexing/diversity gain, for plausible scenarios. IMLS and its variants reveal an important throughput-fairness trade-off which is an interesting topic for future research. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
23. A density-driven publish subscribe service for mobile ad-hoc networks.
- Author
-
Friedman, Roy and Kaplun Shulman, Anna
- Subjects
AD hoc computer networks ,COMPUTER simulation ,TREE graphs ,PERFORMANCE evaluation ,COMPUTER networks ,WIRELESS communications - Abstract
Abstract: This paper studies a density driven virtual topography based publish/subscribe service for mobile ad hoc networks. Two variants of the service are presented and evaluated by extensive simulations; the first is very communication frugal while the latter trades a higher message overhead for faster latency. Both variants are also being compared to two other representative approaches for publish/subscribe in ad hoc networks, a dissemination tree based scheme and an efficient flooding based scheme. It is shown that the density-driven approach outperforms the others in most tested scenarios. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
24. Detecting anomalous spectrum usage in dynamic spectrum access networks.
- Author
-
Liu, Song, Greenstein, Larry J., Trappe, Wade, and Chen, Yingying
- Subjects
DYNAMIC spectrum access ,RADIO resource management ,COMPUTER network protocols ,INFORMATION resources ,STATISTICAL hypothesis testing ,MOBILE communication systems - Abstract
Abstract: Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that access spectrum resources in a proper, disciplined manner. For a cognitive radio network to achieve this goal, spectrum policies and the ability to enforce them are necessary. Detection of an unauthorized (anomalous) usage is one of the critical issues in spectrum etiquette enforcement. In this paper, we present a network structure for dynamic spectrum access and formulate the anomalous usage detection problem using statistical significance testing. The detection problem investigated considers two cases, namely, the authorized (primary) transmitter is (i) mobile and (ii) fixed. We propose a detection scheme for each case by exploiting the spatial pattern of received signal energy across a network of sensors. Analytical models are formulated when the distribution of the energy measurements is given and, due to the intractability of the general problem, we present an algorithm using machine learning techniques to solve the general case when the statistics of the energy measurements are unknown. Our simulation results show that our approaches can effectively detect unauthorized spectrum usage with a detection probability above 0.9 while keeping the false alarm rate less than 0.1 when only one unauthorized radio is present, and the detection probability is even higher for more unauthorized radios. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
25. Reactive routing for mobile cognitive radio ad hoc networks.
- Author
-
Cacciapuoti, Angela Sara, Caleffi, Marcello, and Paura, Luigi
- Subjects
ROUTING (Computer network management) ,MOBILE communication systems ,RADIO networks ,AD hoc computer networks ,FEASIBILITY studies ,PERFORMANCE evaluation ,COMPUTER simulation - Abstract
Abstract: Although more than a decade has passed from the proposal of the Cognitive Radio paradigm, in these years the research has mainly focused on physical and medium access issues, and few recent works focused on the problem of routing in cognitive networks. This paper addresses such a problem by evaluating the feasibility of reactive routing for mobile cognitive radio ad hoc networks. More specifically, we design a reactive routing protocol for the considered scenario able to achieve three goals: (i) to avoid interferences to primary users during both route formation and data forwarding; (ii) to perform a joint path and channel selection at each forwarder; (iii) to take advantage of the availability of multiple channels to improve the overall performance. Two different versions of the same protocol, referred to as Cognitive Ad-hoc On-demand Distance Vector (CAODV), are presented. The first version exploits inter-route spectrum diversity, while the second one exploits intra-route spectrum diversity. An exhaustive performance analysis of both the versions of the proposed protocol in different environments and network conditions has been carried out via numerical simulations. The results state the suitability of the proposed protocol for small mobile cognitive radio ad hoc networks. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
26. Connectivity management in mobile ad hoc networks using particle swarm optimization.
- Author
-
Dengiz, Orhan, Konak, Abdullah, and Smith, Alice E.
- Subjects
MOBILE communication systems ,AD hoc computer networks ,PARTICLE swarm optimization ,WIRELESS sensor nodes ,MOBILE agent systems ,MATHEMATICAL models ,ALGORITHMS - Abstract
Abstract: This paper proposes a dynamic mobile ad hoc network (MANET) management system to improve network connectivity by using controlled network nodes, called agents. Agents have predefined wireless communication capabilities similar to the other nodes in the MANET, however their movements, and thus their locations, are dynamically determined to optimize network connectivity. A new approach to measuring connectivity using a maximum flow formulation is proposed – this is both responsive and tractable. Furthermore, users’ locations are predicted for several time steps ahead and this is shown to improve network connectivity over the network operation period. A particle swarm optimization (PSO) algorithm uses the maximum flow objective to choose optimal locations of the agents during each time step of network operation. The proposed MANET management system is rigorously tested on numerous static and dynamic problems. Computational results show that the proposed approach is effective in improving the connectivity of MANETs and predicting movements of user nodes and deploying agents accordingly significantly improves the overall performance of a MANET. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
27. Dynamic asymmetric group key agreement for ad hoc networks.
- Author
-
Zhao, Xingwen, Zhang, Fangguo, and Tian, Haibo
- Subjects
AD hoc computer networks ,DATA encryption ,INFORMATION asymmetry ,PUBLIC key cryptography ,COMPUTER network protocols ,DIGITAL signatures ,DATA transmission systems - Abstract
Abstract: A group key agreement protocol allows a set of users to establish a common symmetric key via open networks. Dynamic asymmetric group key agreement means that a dynamic set of users form a temporary group and negotiate to share a public encryption key, so that anyone can send message securely and efficiently to the temporary group. Users can join or leave the group efficiently without triggering a completely new key agreement protocol, which will greatly benefit the users in ad hoc networks. We describe a generic construction of dynamic asymmetric group key agreement by combining a conventional authenticated group key agreement, a public key encryption and a multi-signature. Then we give out an instance with constant rounds of interactions and constant transmission cost for each participant. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
28. A greedy-based stable multi-path routing protocol in mobile ad hoc networks.
- Author
-
Yang, Wenjing, Yang, Xinyu, Yang, Shusen, and Yang, Dongxu
- Subjects
ROUTING (Computer network management) ,COMPUTER network protocols ,AD hoc computer networks ,COMPUTER simulation ,WIRELESS communications ,MULTIMEDIA communications - Abstract
Abstract: With the increasing popularity of multimedia, there is a growing tendency in mobile ad hoc networks (MANETs) to establish stable routes with long route lifetimes, low control overhead and high packet delivery ratios. According to recent analytical result, the lifetime of a route, which can reflect the route stability, depends on the length of the route and the lifetime of each link in the route. This paper presents a Greedy-based Backup Routing (GBR) protocol that considers both route length and link lifetime to achieve high route stability. In GBR, the primary path is constructed primarily based on a greedy forwarding mechanism, whereas the local-backup path for each link is established according to the link lifetime. Both analytical and simulation results demonstrate that GBR has excellent performance in terms of route lifetime, packet delivery ratio, and control overhead. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
29. Evaluation and design of beaconing in mobile wireless networks.
- Author
-
Nayebi, Abbas, Karlsson, Gunnar, and Sarbazi-Azad, Hamid
- Subjects
MOBILE communication systems ,WIRELESS sensor networks ,DATA packeting ,PROBABILITY theory ,ANTENNA arrays ,AD hoc computer networks - Abstract
Abstract: One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, such as hello packets. Although a poorly designed beaconing scheme may lead to unnecessary energy usage or poor throughput, a systematic approach to analyze and select beaconing parameters is not provided in the literature. Here, we propose a model to study the beaconing efficiency using some measures such as the link lifetime, the probability of link establishment, and the delay to discover a new neighbor. The model is general and does not adhere to any particular mobility model; the only input from the mobility is the distribution of physical link durations, which not only abstracts away the mobility details but also all effects that contribute to the link stability such as non-perfectly omni-directional antennas and the path loss exponents. Among our results, we prove that the periodic beaconing (which is widely used owing to its simplicity) is the best in terms of beacon hits; we compare one-way and two-way beaconing schemes and study beaconing energy optimization. Finally, the model is applied to three cases of ad hoc, delay-tolerant, and sensor networks, and a simple rule of thumb is proposed to efficiently adjust the beacon interval. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
30. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks.
- Author
-
Jaramillo, Juan José and Srikant, R.
- Subjects
GAME theory ,WIRELESS sensor networks ,AD hoc computer networks ,DATA packeting ,SCHEMES (Algebraic geometry) ,COMPUTER networks - Abstract
Abstract: In wireless ad hoc networks one way to incentivize nodes to forward other nodes’ packets is through the use of reputation mechanisms, where cooperation is induced by the threat of partial or total network disconnection if a node acts selfishly. The problem is that packet collisions and interference may make cooperative nodes appear selfish sometimes, generating unnecessary and unwanted punishments. With the use of a simple network model we first study the performance of some proposed reputation strategies and then present a new mechanism called DARWIN (Distributed and Adaptive Reputation mechanism for Wireless ad hoc Networks), where we try to avoid retaliation situations after a node is falsely perceived as selfish to help restore cooperation quickly. Using game theory, we prove that our mechanism is robust to imperfect measurements, is collusion-resistant and can achieve full cooperation among nodes. Simulations are presented to complement our theoretical analysis and evaluate the performance of our algorithm compared to other proposed reputation strategies. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
31. Power-aware semi-beaconless 3D georouting algorithms using adjustable transmission ranges for wireless ad hoc and sensor networks.
- Author
-
Abdallah, A.E., Fevens, T., Opatrny, J., and Stojmenovic, I.
- Subjects
AD hoc computer networks ,WIRELESS sensor networks ,ROUTING (Computer network management) ,ALGORITHMS ,DATA transmission systems ,ENERGY consumption ,MESSAGE processing (Telecommunication) - Abstract
Abstract: Due to the limited lifetime of the nodes in ad hoc network, energy efficiency needs to be an important design consideration in any routing algorithm for ad hoc and sensor networks. In most of the existing position-based routing algorithms the nodes use the maximum transmission power to discover neighbors, which may cause excessive power consumption. This paper presents several localized power-aware 3D position-based routing algorithms that increase the lifetime of a network by maximizing the average lifetime of its nodes. New algorithms are semi-beaconless, using for neighbor discovery an optimal transmission range (OR) for control packets, and, if needed, maximal transmission range (MR) during routing process, and using adjusted transmission radius for message transmission. PAGR algorithm selects neighbor closest to destination among those within OR if any exists providing progress, or otherwise among those within MR. If greedy progress is not possible, PAGR:CFace(1) variant resorts to face routing on projected network in coordinate plane until recovery is possible, at which point PAGR algorithm resumes. We evaluate our algorithms and compare their power savings with the current power-aware routing algorithms. The simulation results show a significant improvement in the overall network lifetime. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
32. Location safety protection in ad hoc networks.
- Author
-
Xu, Toby and Cai, Ying
- Subjects
NETWORK routing protocols ,COMPUTER network security ,MATHEMATICAL analysis ,COMPUTER simulation ,WIRELESS sensor networks ,COST effectiveness - Abstract
Abstract: Many routing protocols and applications developed for ad hoc networks rely on location information of participating nodes. The exposure of such information, however, presents significant safety threats to the networks. In this paper, we investigate the problem of preventing an adversary from locating (and thus destroying) nodes based on their location information they disclose in communications. Our idea is to reduce location resolution to achieve a desired level of safety protection. We define the safety level of a geographic region to be the ratio of its area and the number of nodes inside it. The higher safety level a region has, the less attractive for an adversary to search over it for the nodes. When a node has to disclose its location, it can compute a cloaking box that meets a desired level of safety requirement and report that as its current location information. To implement this simple idea, there are several challenges. First, each cloaking box must be as small as possible in order to minimize the impact of reduced location resolution on the efficiency of network operating and applications. Second, nodes must be able to compute their cloaking boxes without having to reveal their accurate position. Finally, given a sequence of cloaking boxes, they must not be correlated to refine an area whose safety level is less than the requirement. Our research addresses these challenges with cost-effective solutions in the context of both stationary and mobile ad hoc networks. We evaluate the performance of our techniques through both mathematical analysis and simulation. In addition, we present a new geographic routing protocol which can work with blurred location information and evaluate the impact of location resolution reduction on the performance of this technique. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
33. CRAHNs: Cognitive radio ad hoc networks.
- Author
-
Akyildiz, Ian F., Lee, Won-Yeol, and Chowdhury, Kaushik R.
- Subjects
AD hoc computer networks ,RADIO frequency ,WIRELESS communications ,COMPUTER networks - Abstract
Abstract: Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, equipped with the intrinsic capabilities of the cognitive radio, will provide an ultimate spectrum-aware communication paradigm in wireless communications. CR networks, however, impose unique challenges due to the high fluctuation in the available spectrum as well as diverse quality-of-service (QoS) requirements. Specifically, in cognitive radio ad hoc networks (CRAHNs), the distributed multi-hop architecture, the dynamic network topology, and the time and location varying spectrum availability are some of the key distinguishing factors. In this paper, intrinsic properties and current research challenges of the CRAHNs are presented. First, novel spectrum management functionalities such as spectrum sensing, spectrum sharing, and spectrum decision, and spectrum mobility are introduced from the viewpoint of a network requiring distributed coordination. A particular emphasis is given to distributed coordination between CR users through the establishment of a common control channel. Moreover, the influence of these functions on the performance of the upper layer protocols, such as the network layer, and transport layer protocols are investigated and open research issues in these areas are also outlined. Finally, a new direction called the commons model is explained, where CRAHN users may independently regulate their own operation based on pre-decided spectrum etiquette. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
34. A quality of service aware cross-layer approach for wireless ad hoc networks with smart antennas.
- Author
-
Mundarath, J.C., Ramanathan, P., and Van Veen, B.D.
- Subjects
ANTENNAS (Electronics) ,AD hoc computer networks ,WIRELESS communications ,COMPUTER networks - Abstract
Abstract: Recent technological advances have led to a growing interest in multi-antenna wireless ad hoc networks in which each node has more than one antenna. This paper proposes a cross-layer approach called QoS-aware smart antenna protocol (QSAP) for such networks that assures quality of service (QoS) needs of applications with reduced energy consumption. The proposed scheme adaptively allocates the degrees of freedom present in the multi-antenna system at each node to reduce the transmit energy while meeting the QoS needs of the application. The effectiveness of the proposed approach is demonstrated through simulations. The simulations show that the cross-layer aspects of the proposed approach result in considerable energy savings compared to schemes which meet the QoS needs without the cross-layer interaction. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
35. Hitting time analysis for a class of random packet forwarding schemes in ad hoc networks.
- Author
-
Hsin, Chih-fan and Liu, Mingyan
- Subjects
AD hoc computer networks ,DATABASE searching ,PACKET switching ,RANDOM walks ,QUERY (Information retrieval system) ,STOCHASTIC analysis - Abstract
Abstract: In this paper, we study the problem of searching for a node or a piece of data in an ad hoc network using random packet forwarding. In particular, we examine three different methods. The first is a random direction forwarding scheme where the query packet is forwarded along a randomly chosen direction (following an approximate straight line) till it either hits the destination node (the target) or the boundary. It bounces off the boundary in the latter case and the process continues till the target is found. In the second approach, in addition to query packet traversing the network, the target releases an advertisement packet that propagates along a randomly chosen direction so that all nodes visited by the advertisement packet obtain and store the target location information. In the third method the query packet is assumed to follow a random walk type of forwarding. Our primary interest is in comparing the average hitting time under these methods and the memory required to store location information. In particular, we show that under the random direction forwarding the target hitting time is , where and denote the size/radii of the network and the target area, assumed to be circular in shape, respectively. The hitting time is with target advertisement, and under the random walk type of forwarding. We further show that the target advertisement method achieves mean hitting time on the same order as greedy forwarding schemes with less memory requirement. We compare this class of schemes with the family of Lévy walks and provide simulation results on their performance under more realistic settings. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
36. Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks.
- Author
-
Rajendran, Arunkumar, Balakrishnan, Nagaraj, and P, Ajay
- Subjects
AD hoc computer networks ,SUPERVISED learning ,DEEP learning ,ANOMALY detection (Computer security) ,FEATURE extraction ,COMPUTER network security - Abstract
Due to the properties of ad-hoc networks, it appears that designing sophisticated defence schemes with more computing capital is impossible in most situations. Recently, an inconsistency in the ad-hoc design of intrusion detection in the network has gotten a lot of coverage, with these intrusion detection techniques operating in either cluster-based or host-based configurations. The host and cluster-based systems have advantages and disadvantages, such as the network preserve security in case of delay in replacing a cluster head. Many detection systems in these networks use a supervised learning method to learn from shared routing knowledge. Deep learning is the trending supervised learning method which is been suggested for many applications, due to its deep feature extraction and classification capability. The deep learning method is best suitable to resolve the problems of the ad hoc network. But due to its limitation of supervised learning nature, more research finds are needed before implementation. These intelligence methods need a massive labeled dataset to self-train and take a decision in real-time. Also, these methods will be vulnerable to new attacks. To address the issues posed, the deep learning approach requires a technique of incorporating unsupervised learning behaviours. This paper proposes and highlights the methodology - Deep Embedded Median Clustering (DEMC), which performs two-phase operations (1) Organization of latent feature space (2) K-median clustering to cluster the Z with Kullback–Leibler divergence as the objective function. Many researchers suggested various methodologies for better anomaly detection in the network, but the knowledge gap and the possibilities for a better solution still exist. This study explores the new possibility and potential of an unsupervised learning technique that works with the nature of deep learning for analyzing and detecting anomalies and intrusion in ad hoc networks. The test to check the DEMC ability has been organized, and the findings are tabulated for analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Exploiting spatial multiplexing and reuse in multi-antenna wireless ad hoc networks.
- Author
-
Mundarath, J.C., Ramanathan, P´., and Van Veen, B.D.
- Subjects
MULTIPLEXING ,AD hoc computer networks ,ANTENNAS (Electronics) ,TRANSMITTERS (Communication) ,ANTENNA arrays ,MIMO systems ,WIRELESS communications - Abstract
Abstract: Efficient exploitation of multiple antenna capabilities in ad hoc networks requires carefully designed cross-layer techniques. The work presented in this paper provides a medium access control (MAC)/physical cross-layer scheme for ad hoc networks to address several of the challenges involved in cross-layer design. Multiple antenna systems can be used to increase data rate by spatial multiplexing, that is communicating multiple parallel streams, and to increase spatial reuse by interference suppression. Our proposed scheme, called HYB, exploits both spatial multiplexing and reuse so a receiver node can receive multiple simultaneous data streams from a desired transmitter while suppressing interference from other transmitters in the neighborhood. HYB partitions the available degrees of freedom in the antenna array between spatial multiplexing and reuse which allows the user to obtain different performance characteristics. The applicability of HYB spans across all wireless environments, including line-of-sight and dense multipath scenarios. Simulations demonstrate the significant performance gains and flexibility offered by HYB. The simulation results also offer key insights into the multi-antenna resource allocation problem in ad hoc networks based on traffic patterns and network/transport layer protocols, and consequently provide guidelines for network configuration/management. We show that throughput increases when the degrees of freedom allocated to spatial multiplexing increases, while fairness increases when the degrees of freedom allocated to spatial reuse increases. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
38. Robust throughput and routing for mobile ad hoc wireless networks.
- Author
-
Rubin, Izhak and Zhang, Runhe
- Subjects
AD hoc computer networks ,CELL phones ,ALGORITHMS ,WIRELESS communications ,ROUTING (Computer network management) ,MATHEMATICAL analysis - Abstract
Abstract: Flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support critical interactive real-time data transactions, to provide for the uninterrupted execution of a transaction, or for the rapid transport of a high value file, it is essential to identify robust routes across which such transactions are transported. Noting that route failures can induce long re-routing delays that may be highly interruptive for many applications and message/stream transactions, it is beneficial to configure the routing scheme to send a flow across a route whose lifetime is longer, with sufficiently high probability, than the estimated duration of the activity that it is selected to carry. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. As a special case, for certain applications only transactions that are completed without being prematurely interrupted may convey data to their intended users that is of acceptable utility. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless network systems. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
39. Interference aware cooperative routing for wireless ad hoc networks.
- Author
-
Mahmood, Hasan and Comaniciu, Cristina
- Subjects
AD hoc computer networks ,ROUTING (Computer network management) ,MOBILE communication systems ,WIRELESS communications - Abstract
Abstract: In this paper, we propose a cooperative approach for routing in wireless ad hoc networks. Our solution improves the interference distribution in the network, with an immediate positive impact on the throughput performance and energy efficiency. In determining new routes, we consider not only the cost associated with the current route, but also the potential interference impact of the route on the neighboring nodes. We use this cooperative approach to determine routes for CDMA ad hoc networks, which are known to be severely limited in performance by the near–far effect. Our simulation results using cooperative routing show an improvement in throughput of up to 60% compared to the classic minimum energy routing approach. This improvement is achieved at the expense of only a slight increase in the average energy per bit transmission for an end-to-end path. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
40. Queuing network models for delay analysis of multihop wireless ad hoc networks.
- Author
-
Bisnik, Nabhendra and Abouzeid, Alhussein A.
- Subjects
AD hoc computer networks ,QUEUEING networks ,WIRELESS communications ,COMPUTER networks - Abstract
Abstract: In this paper we analyze the average end-to-end delay and maximum achievable per-node throughput in random access multihop wireless ad hoc networks with stationary nodes. We present an analytical model that takes into account the number of nodes, the random packet arrival process, the extent of locality of traffic, and the back off and collision avoidance mechanisms of random access MAC. We model random access multihop wireless networks as open G/G/1 queuing networks and use the diffusion approximation in order to evaluate closed form expressions for the average end-to-end delay. The mean service time of nodes is evaluated and used to obtain the maximum achievable per-node throughput. The analytical results obtained here from the queuing network analysis are discussed with regard to similarities and differences from the well established information-theoretic results on throughput and delay scaling laws in ad hoc networks. We also investigate the extent of deviation of delay and throughput in a real world network from the analytical results presented in this paper. We conduct extensive simulations in order to verify the analytical results and also compare them against NS-2 simulations. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
41. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining.
- Author
-
Hu, Fei, Jiang, Meng, Celentano, Laura, and Xiao, Yang
- Subjects
WIRELESS communications ,ELECTROCARDIOGRAPHY ,ELECTRODIAGNOSIS ,HEART disease diagnosis - Abstract
Abstract: Heart disease is the top elder killer in the world. To reduce the healthcare cost, it is a necessary tendency to deploy self-organized, wireless heart disease monitoring hardware/software systems. Telemedicine platform based on ad hoc interconnection of tiny ECG sensors, called medical ad hoc sensor networks (MASN), can provide a promising approach for performing low-cost, real-time, remote cardiac patient monitoring at any time. The contribution of this research is the design of a practical MASN hardware/software platform to perform real-time healthcare data collections. It has reliable, cluster-based communication scheme. Due to the radio broadcasting nature of wireless networks, a MASN has the risk of being attacked. This research also designs a low overhead medical security scheme to achieve confidential ECG data transmission in the wireless medium. Finally, our MASN system has the capability of keeping track of cardiac patients and extracting ECG features based on wavelet theories. Our MASN platform is very useful to practical medical monitoring applications. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
42. On ant routing algorithms in ad hoc networks with critical connectivity.
- Author
-
Rosati, Laura, Berioli, Matteo, and Reali, Gianluca
- Subjects
ALGORITHMS ,NETWORK routers ,COMPUTER routing equipment ,COMPUTER networks - Abstract
Abstract: This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing algorithms inspired by the behavior of the ant colonies in locating and storing food. The effectiveness of the heuristic algorithm is supported by mathematical proofs and demonstrated by a comparison with the well-known Ad hoc On Demand Distance Vector (AODV) algorithm. The differences and the similarities of the two algorithms have been highlighted. Results obtained by a theoretical analysis and a simulation campaign show that DAR allows obtaining some important advantages that makes it a valuable candidate to operate in ad hoc networks and the same method helps in the selection of the algorithm parameters. Since the approach aims at minimizing complexity in the nodes at the expenses of the optimality of the solution, it results to be particularly suitable in environments where fast communication establishment and minimum signalling overhead are requested. These requirements are typical of ad hoc networks with critical connectivity, as described in the paper. Thus the performance of the proposed algorithm are shown in ad hoc networks with critical connectivity and compared to some existing ad hoc routing algorithms. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
43. Exploiting path diversity in the link layer in wireless ad hoc networks.
- Author
-
Jain, Shweta and Das, Samir R.
- Subjects
NETWORK routers ,STATISTICAL correlation ,PROBABILITY theory ,MATHEMATICAL statistics - Abstract
Abstract: We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward packets when multiple next hop choices are available. Such choices can come from a multipath routing protocol, for example. This technique can reduce transmission retries and packet drop probabilities in the face of channel fading. We develop an anycast extension of the IEEE 802.11 MAC layer based on this idea. We implement the protocol in an experimental proof-of-concept testbed using the Berkeley motes platform and S-MAC protocol stack. We also implement it in the popular ns-2 simulator and experiment with the AOMDV multipath routing protocol and Ricean fading channels. We show that anycast performs significantly better than 802.11 in terms of packet delivery, particularly when the path length or effect of fading is large. Further we experiment with anycast in networks that use multiple channels and those that use directional antennas for transmission. In these networks, deafness and hidden terminal problems are the main source of packet loss. We implemented anycast as extension of 802.11 like protocols that were proposed for these special networks. We are able to show that anycast is capable of enhancing the performance of these protocols by simply making use of the path diversity whenever it is available. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
44. Variable power broadcast using local information in ad hoc networks.
- Author
-
Chiganmi, Avinash, Baysan, Mehmet, Sarac, Kamil, and Prakash, Ravi
- Subjects
BROADCASTING industry ,SOCIAL groups ,ENERGY consumption ,POWER resources - Abstract
Abstract: Network wide broadcast is a frequently used operation in ad hoc networks. Developing energy efficient protocols to reduce the overall energy expenditure in network wide broadcast can contribute toward increasing the longevity of ad hoc networks. Most of the existing work in energy efficient broadcast protocols use either a fixed transmission power model or assume global knowledge of the entire network at each node. Variable power broadcast with local knowledge has recently been proposed as a promising alternative approach for network wide broadcast in ad hoc networks. In this paper, we present a novel approach, called INOP, for network wide broadcast. INOP is a variable power broadcast approach that uses local (two-hop neighborhood) information. INOP utilizes a novel technique for determining the transmission power level at each transmitting node. We also propose two alternative methods to cover the nodes that are not covered by the transmission of the source or a retransmitting node. Our simulation based evaluations show that, compared to other approaches, INOP achieves better results in terms of energy efficiency, and competes with and exceeds other approaches in terms of a number of other performance metrics including traffic overhead, coverage, and convergence time. Based on these results, we can conclude that INOP improves the current state-of-the-art approaches for energy efficient broadcast in ad hoc networks. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
45. Energy cost and error performance of range-aware, anchor-free localization algorithms.
- Author
-
Jordt, Gustav J., Baldwin, Rusty O., Raquet, John F., and Mullins, Barry E.
- Subjects
ALGORITHMS ,ROUTING (Computer network management) ,WIRELESS communications ,SOFTWARE localization - Abstract
Abstract: Many applications that use sensor data from a wireless sensor network (WSN) require corresponding node position information as well. Therefore, it is not surprising that a common figure of merit for localization algorithms is the accuracy of the position estimate produced. Similarly, the amount of communication required by a localization algorithm is often of paramount interest as well since it is common knowledge that communication expends the most energy in a WSN. However, localization algorithms seldom characterize their communication cost. Furthermore, when they do it is often merely qualitative and is typically described as “expensive”. For two types of range-aware, anchor-free localization algorithms we found the opposite to be true. Rather than being expensive, the communication costs were quite modest. So much so that we maintain range-aware, anchor-free localization algorithms should be chosen on the basis of the accuracy required by the intended application independent of the communication cost. In this paper, we examine the effect of node degree, node distribution, range error and network size on distance error and communication cost for both incremental and concurrent versions of range-aware, anchor-free algorithms. The concurrent algorithm is twice as accurate as the incremental, but less efficient. Furthermore, node degree influences the energy cost of the algorithms the most, but neither algorithm uses more than a surprisingly small 0.8% of a 560mAh battery. This result indicates less energy efficient localization algorithms can be tolerated, especially if they provide better accuracy. Furthermore, if energy does need to be conserved, there is not much savings available within the localization algorithm and savings must be found in other areas such as the MAC protocol or routing algorithm. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
46. Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals.
- Author
-
Vassis, Dimitris and Kormentzas, Georgios
- Subjects
WIRELESS communications ,NETWORK routers ,DIGITAL communications ,COMPUTER architecture - Abstract
Abstract: The paper evaluates the performance effects of exposed terminals in IEEE 802.11 ad hoc networks in finite load conditions. It derives analytical models for the estimation of channel utilization and media access delay for IEEE 802.11 ad hoc networks in finite load conditions with and without exposed terminals. The simulation results show that the analytical estimated channel utilization and media access delay metrics are fairly accurate. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
47. An adaptive medium access control protocol using m-ary tree algorithms for quality-of-service support in single-cell ad hoc networks.
- Author
-
Tsigkas, Orestis and Pavlidou, Fotini-Niovi
- Subjects
COMPUTER security ,SECURITY systems ,WIRELESS communications ,ALGORITHMS - Abstract
Abstract: Concurrent with the rapid expansion of wireless networks is an increasing interest in providing Quality-of-Service (QoS) support to them. As a consequence, a number of medium access control protocols has been proposed which aims at providing service differentiation at the distributed wireless medium access layer. However, most of them provide only average performance assurances. We argue that average performance guarantees will be inadequate for a wide range of emerging multimedia applications and “per-flow” service assurances must be provided instead. Based on m-ary tree algorithms, we propose an adaptive and distributed medium access algorithm for single-cell ad hoc networks to provide “per-flow” service assurances to flows whose QoS requirement can be expressed as a delay requirement. Both analytical and simulation experiments are conducted to assess the performance of the proposed scheme. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
48. Hybrid mobile backbone network routing with flow control and distance awareness (MBNR-FC/DA).
- Author
-
Huang, Xiaolong and Rubin, Izhak
- Subjects
NETWORK routers ,MOBILE communication systems ,WIRELESS communications ,COMPUTER architecture - Abstract
Abstract: The mobile backbone network (MBN) architecture has been introduced to synthesize robust, scalable and efficient mobile ad hoc wireless networks that support multimedia flows. Backbone capable nodes are dynamically elected to construct a mobile backbone (Bnet). In this article, we present a hybrid routing mechanism for such networks, identified as MBN routing with flow control and distance awareness (MBNR-FC/DA) scheme. Flows that travel a distance longer than a threshold level are routed across the Bnet. This induces a significant reduction in the route discovery control overhead, yielding a highly scalable operation. In turn, a limited span global route discovery process is invoked for routing shorter distance flows. Discovered global routes use effectively the capacity of non-backbone wireless links. Such an operation serves to upgrade the network’s throughput capacity level when the backbone network does not provide global topological covering. The hybrid routing protocol introduced and studied in this paper, also employs combined nodal congestion control and flow admission control schemes to guide admitted flows across areas that are less congested, and to avoid overloading the network. We present a centralized procedure as well as a distributed adaptive scheme for the calculation of the distance threshold level under varying traffic loading and backbone coverage conditions. We show our schemes to make efficient use of network-wide capacity resources by dynamically selecting proper distance threshold levels, yielding outstanding delay–throughput performance. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
49. Ad hoc routing for multilevel power save protocols.
- Author
-
Miller, Matthew J. and Vaidya, Nitin H.
- Subjects
CONSUMPTION (Economics) ,NETWORK routers ,ENERGY consumption ,WIRELESS communications - Abstract
Abstract: Designing energy-efficient protocols for ad hoc networks is important since there has been little improvement in the amount of energy stored on these devices. Previous work considers leaving a subset of nodes in a state with high energy consumption and low latency while the rest of the network remains in a power save state (i.e., low energy consumption and high latency). Our work is the first to generalize this concept for ad hoc networks by proposing the use of k levels of power save, each of which presents a different energy–latency tradeoff (i.e., a lower latency state requires more energy consumption). Thus, previous work only considered the case where k =1 or k =2. In this paper, we propose a link layer protocol to provide k levels of power save and a routing protocol to use this link layer effectively. Via simulation, we show that our protocols are able to maintain a desired end-to-end latency with a relatively low energy consumption. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
50. A cluster based mobility prediction scheme for ad hoc networks.
- Author
-
Dekar, Lyes and Kheddouci, Hamamache
- Subjects
MOBILE communication systems ,WIRELESS communications ,TELECOMMUNICATION systems ,TELEPHONES - Abstract
Abstract: The ad hoc networks are completely autonomous wireless networks where all the users are mobile. These networks do not work on any infrastructure and the mobiles communicate either directly or via other nodes of the network by establishing routes. These routes are prone to frequent ruptures because of nodes mobility. If the future movement of the mobile can be predicted in a precise way, the resources reservation can be made before be asked, which enables the network to provide a better QoS. In this aim, we propose a virtual dynamic topology, which on one hand, will organize the network as well as possible and decreases the impact of mobility, and on the other hand, is oriented user mobility prediction. Our prediction scheme uses the evidence theory of Dempster–Shafer in order to predict the future position of the mobile by basing itself on relevant criteria. These ones are related to mobility and network operation optimisation. The proposed scheme is flexible and can be extended to a general framework. To show the relevance of our scheme, we combine it with a routing protocol. Then, we implemented the prediction-oriented topology and the prediction scheme which performs on it. We implemented also a mobility prediction based routing protocol. Simulations are made according to a set of elaborate scenarios. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.