1,090 results on '"COMPUTER network protocols"'
Search Results
102. Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
- Author
-
NEWELL, ANDREW, HONGYI YAO, RYKER, ALEX, HO, TRACEY, and NITA-ROTARU, CRISTINA
- Subjects
- *
WIRELESS sensor networks , *WIRELESS communications , *SIMULATION methods & models , *OPERATIONS research , *COMPUTER network protocols - Abstract
Key management is required for basic security services of confidentiality, integrity, and data source authentication. Wireless sensor networks (WSNs) are a challenging environment to provide such services due to the resource constraints and the increased likelihood of nodes to be captured. Various key management techniques were proposed that trade off resilience to node capture and overhead in terms of communication and memory. We identify the main factors influencing the design space of key management protocols for sensor networks and describe representative protocols that trade off the number of links established, communication overhead, and resilience to node capture. These trade-offs are due to using direct, pathbased, or multipath-based communication to establish secure links. We propose a new multipath protocol relying on an encoding scheme tailored for WSNs and analyze the effects of key pre-distribution on multipath key establishment. We provide extensive simulations to understand the trade-offs between resilience to node compromise and communication overhead under numerous network scenarios. This comparison highlights the tradeoffs between these vastly different key management schemes. For the newer class of key management schemes--multipath based--we quantify experimentally the additional communication overhead required for extra paths and the improvement in resilience from using these paths. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
103. LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks.
- Author
-
Li, Zhong, Wang, Cheng, Yang, Siqian, Jiang, Changjun, and Li, Xiangyang
- Subjects
- *
SOCIAL networks , *MOBILE communication systems , *COMPUTER network protocols , *MOBILE computing , *WIRELESS communications - Abstract
This paper aims to design an efficient data forwarding scheme based on local activity and social similarity (LASS) for mobile social networks (MSNs). Various definitions of social similarity have been proposed as the criterion for relay selection, which results in various forwarding schemes. The appropriateness and practicality of various definitions determine the performances of these forwarding schemes. A popular definition has recently been proven to be more efficient than other existing ones, i.e., the more common interests between two nodes, the larger social similarity between them. In this work, we show that schemes based on such definition ignore the fact that members within the same community, i.e., with the same interest, usually have different levels of local activity, which will result in a low efficiency of data delivery. To address this, in this paper, we design a new data forwarding scheme for MSNs based on community detection in dynamic weighted networks, called Local-Activity and Social-Similarity, taking into account the difference of members’ internal activity within each community, i.e., local activity. To the best of our knowledge, the proposed scheme is the first one that utilizes different levels of local activity within communities. Through extensive simulations, we demonstrate that LASS achieves better performance than state-of-the-art protocols. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
104. Enhanced binary exponential backoff algorithm for fair channel access in the ieee 802.11 medium access control protocol.
- Author
-
Al ‐ Hubaishi, M., Alahdal, T., Alsaqour, R., Berqia, A., Abdelhaq, M., and Alsaqour, O.
- Subjects
- *
AD hoc computer networks , *ACCESS control of computer networks , *BINARY number system , *ALGORITHMS , *IEEE 802.11 (Standard) , *COMPUTER network protocols , *WIRELESS communications - Abstract
SUMMARY The medium access control protocol determines system throughput in wireless mobile ad hoc networks following the ieee 802.11 standard. Under this standard, asynchronous data transmissions have a defined distributed coordination function that allows stations to contend for channel usage in a distributed manner via the carrier sensing multiple access with collision avoidance protocol. In distributed coordination function, a slotted binary exponential backoff (BEB) algorithm resolves collisions of packets transmitted simultaneously by different stations. The BEB algorithm prevents packet collisions during simultaneous access by randomizing moments at stations attempting to access the wireless channels. However, this randomization does not eliminate packet collisions entirely, leading to reduced system throughput and increased packet delay and drop. In addition, the BEB algorithm results in unfair channel access among stations. In this paper, we propose an enhanced binary exponential backoff algorithm to improve channel access fairness by adjusting the manner of increasing or decreasing the contention window based on the number of the successfully sent frames. We propose several configurations and use the NS2 simulator to analyze network performance. The enhanced binary exponential backoff algorithm improves channel access fairness, significantly increases network throughput capacity, and reduces packet delay and drop. Copyright © 2013 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
105. Signal design for higher capacity correlated fading signature multiple access.
- Author
-
Al-Hussaibi, Walid
- Subjects
- *
MULTIPLE access protocols (Computer network protocols) , *WIRELESS communications , *MULTIPLEXING , *COMPUTER network protocols , *DATA packeting , *RADIO access networks , *AD hoc computer networks - Abstract
Fading signature multiple access (FSMA) is a promising radio access technology that utilizes the difference in users' fading channels for joint signal detection. However, channels' correlation has direct impact to degrade the capacity of wireless communications considerably. In this paper, efficient signal design methods are proposed to mitigate the correlation effects and maintain highest achievable channel capacity of correlated FSMA system. Two methods named as unequal power signal constellation (UPSC) and rotated signal constellation (RSC) are considered and compared with the conventional identical signal constellation (ISC) technique. Based on the principles of maximizing the minimum Euclidean distance of composite received signals, user's data can be recovered using maximum likelihood detection irrespective of correlation values ( ρ). For highly correlated channels, utilizing constellation rearrangement of the transmitted signals enables maximum achievable capacity by resolving the possible ambiguity of signal detection. For example, it is shown for four users employing QPSK modulation and communicating with three antenna receiver that maximum 8 bit/s/Hz can be achieved using UPSC and RSC compared with 4.64 bit/s/Hz for ISC at extreme correlation level of ρ = 1. The superiority of these methods provides a potential step towards efficient utilization of the available spectrum for next generation wireless and mobile communications in different channel environments. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
106. Rendezvous-based data dissemination for supporting mobile sinks in multi-hop clustered wireless sensor networks.
- Author
-
Lee, Euisin, Park, Soochang, Oh, Seungmin, and Kim, Sang-Ha
- Subjects
- *
WIRELESS sensor networks , *NETWORK routing protocols , *WIRELESS communications , *WIRELESS sensor nodes , *COMPUTER network protocols , *ENERGY consumption - Abstract
In wireless sensor networks, a clustering-based technique is considered as an efficient approach for supporting mobile sinks without using position information. It exploits a Backbone-based Virtual Infrastructure (BVI) which uses only cluster heads (CHs) to construct routing structures. Since sensor nodes have constrained energy and are failure-prone, the effective design of both a clustering structure to construct a BVI and a routing protocol in the BVI is an important issue to achieve energy-efficient and reliable data delivery. However, since previous studies use one-hop clustering for a BVI, they are not robust against node and link failures and thus leading low data delivery ratio. They also use flooding-based routing protocols in a BVI and thus leading high energy consumption. Thus, in this paper, we propose a rendezvous-based data dissemination protocol based on multi-hop clustering (RDDM). Since RDDM uses a multi-hop clustering to provide enough backup sensor nodes to substitute a CH and enough backup paths between neighbor CHs, it can provide high robustness against node and link failures. By using a rendezvous CH, RDDM constructs routing paths from source nodes to mobile sinks without flooding in our BVI and thus can save energy of sensor nodes. By considering movement types of sinks, RDDM finds out a shorter path between a source node and a mobile sink through signaling only between neighbor CHs and thus can reduce the energy consumption. Analysis and simulation results show that RDDM provides better performance than previous protocols in terms of energy consumption and data delivery ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
107. Routing protocol over lossy links for ISA100.11a industrial wireless networks.
- Author
-
Pham, Tung-Linh and Kim, Dong-Seong
- Subjects
- *
NETWORK routing protocols , *COMPUTER network protocols , *WIRELESS communications , *ENERGY consumption , *MATHEMATICAL optimization , *LINEAR programming , *ALGORITHMS - Abstract
This paper proposes novel routing and topology control algorithms for industrial wireless sensor networks (IWSNs) based on the ISA100.11a standard. The proposed algorithms not only reduces energy consumption at the node level but also reduces packet latency at the network level. Using the residual energy and packet reception rate of neighbor nodes, the source node can estimate the highest election weight. Hence, packets are conveyed by a multi-hop forwarding scheme from source nodes to the sink by the optimal path. Furthermore, energy consumption and network latency are minimized using integer linear programming. Simulation results show that the proposed algorithms are fully effective in terms of energy conservation and network latency for IWSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
108. Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography.
- Author
-
Farash, Mohammad
- Subjects
- *
CRYPTOGRAPHY , *COMPUTER access control , *RADIO frequency identification systems , *WIRELESS communications , *DATA security , *COMPUTER network protocols - Abstract
Radio frequency identification (RFID) is a wireless technology for automatic identification and data capture. Security and privacy issues in the RFID systems have attracted much attention. Many approaches have been proposed to achieve the security and privacy goals. One of these approaches is RFID authentication protocols by which a server and tags can authorize each other through an intracity process. Recently, Chou proposed a RFID authentication protocol based on elliptic curve cryptography. However, this paper demonstrates that the Chou's protocol does not satisfy tag privacy, forward privacy and authentication, and server authentication. Based on these security and privacy problems, we also show that Chou's protocol is defenseless to impersonation attacks, tag cloning attacks and location tracking attacks. Therefore, we propose a more secure and efficient scheme, which does not only cover all the security flaws and weaknesses of related previous protocols, but also provides more functionality. We prove the security of the proposed improved protocol in the random oracle model. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
109. A new dialogue strategy in multi-agent systems.
- Author
-
Beigi, Akram and Mozayani, Nasser
- Subjects
- *
MULTIAGENT systems , *FEATURE selection , *WIRELESS communications , *DECISION making , *COMPUTER network protocols - Abstract
For establishing communications and modeling a framework for dialogue between intelligent agents, it is beneficial to have a well-defined strategy. In a dialogue run, the strategies are the manners to achieve the agents' goals by selecting the best option between the different existent choices. There are not many works which define the strategies for dialogue between agents. In this paper a formal model for dialogue strategy is proposed. The proposed model is a decision making problem of selecting the type of the act and the compatible content to utter at each step of a dialogue. In a given dialogue step, the model can decide the appropriate act and content allowed by the dialogue protocol in order to satisfy the agents' goals. The strength of the decisions which define the best next move is computed by argumentation theory. The proposed model is illustrated through an example of Dutch auction. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
110. A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks.
- Author
-
Lin Lin, Shiwei Ma, and Maode Ma
- Subjects
- *
WIRELESS sensor networks , *WIRELESS sensor nodes , *COMPUTER network protocols , *SYNCHRONIZATION , *WIRELESS communications , *DIGITAL communications research - Abstract
Clock synchronization is a very important issue for the applications of wireless sensor networks. The sensors need to keep a strict clock so that users can know exactly what happens in the monitoring area at the same time. This paper proposes a novel internal distributed clock synchronization solution using group neighborhood average. Each sensor node collects the offset and skew rate of the neighbors. Group averaging of offset and skew rate value are calculated instead of conventional point-to-point averaging method. The sensor node then returns compensated value back to the neighbors. The propagation delay is considered and compensated. The analytical analysis of offset and skew compensation is presented. Simulation results validate the effectiveness of the protocol and reveal that the protocol allows sensor networks to quickly establish a consensus clock and maintain a small deviation from the consensus clock. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
111. An Adaptive Jitter Mechanism for Reactive Route Discovery in Sensor Networks.
- Author
-
Cordero, Juan Antonio, Jiazi Yi, and Clausen, Thomas
- Subjects
- *
WIRELESS communications , *NETWORK routers , *COMPUTER network protocols , *DETECTORS , *AD hoc computer networks , *ROUTING (Computer network management) - Abstract
This paper analyses the impact of jitter when applied to route discovery in reactive (on-demand) routing protocols. In multi-hop non-synchronized wireless networks, jitter--a small, random variation in the timing of message emission--is commonly employed, as a means to avoid collisions of simultaneous transmissions by adjacent routers over the same channel. In a reactive routing protocol for sensor and ad hoc networks, jitter is recommended during the route discovery process, specifically, during the network-wide flooding of route request messages, in order to avoid collisions. Commonly, a simple uniform jitter is recommended. Alas, this is not without drawbacks: when applying uniform jitter to the route discovery process, an effect called delay inversion is observed. This paper, first, studies and quantifies this delay inversion effect. Second, this paper proposes an adaptive jitter mechanism, designed to alleviate the delay inversion effect and thereby to reduce the route discovery overhead and (ultimately) allow the routing protocol to find more optimal paths, as compared to uniform jitter. This paper presents both analytical and simulation studies, showing that the proposed adaptive jitter can effectively decrease the cost of route discovery and increase the path quality. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
112. An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks.
- Author
-
Bhutta, Muhammad, Cruickshank, Haitham, and Sun, Zhili
- Subjects
- *
COMPUTER network protocols , *PUBLIC key cryptography , *DELAY-tolerant networks , *COMPUTER network security , *PROBLEM solving , *WIRELESS communications , *DATA packeting - Abstract
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost . [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
113. Network Initialization in Low-Power Wireless Networks: A Comprehensive Study.
- Author
-
Radi, Marjan, Dezfouli, Behnam, Bakar, Kamalrulnizam Abu, Razak, Shukor Abd, and Lee, Malrey
- Subjects
- *
WIRELESS communications , *ELECTRIC power , *SURVEYS , *COMPUTER network protocols , *ACQUISITION of data - Abstract
The increasing growth of low-power wireless networks in real-world implementations has intensified the need to develop well-organized key network building blocks. Neighbor discovery, link quality measurement and data collection are among the fundamental building blocks of network initialization process. Over the past decade, network initialization has attracted significant attention from the research community of low-power wireless networks. Accordingly, the general concern of this paper is to survey neighbor discovery, link evaluation and collection tree construction protocols, as well as, research challenges in these research areas. Furthermore, we explore the impacts of these protocols on the functionality of different layers in the network protocol stack. In order to provide a clear view of the state-of-the-art neighbor discovery approaches, this paper also presents a classification of the existing neighbor discovery protocols. Finally, some of the important open issues in developing network initialization protocols are discussed to present new directions for further research. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
114. On the Achievable Diversity of Repetition-Based and Relay Selection Network-Coded Cooperation.
- Author
-
Di Renzo, Marco
- Subjects
- *
RELAY control systems , *CHANNEL coding , *COMPUTER network protocols , *RADIO detectors , *WIRELESS communications - Abstract
In this paper, we provide a mathematical framework for the analysis, design, and optimization of network-coded cooperative diversity (NCCD) protocols. The analysis is applicable to relay-aided protocols based on the error propagation model, which rely on appropriately designed diversity-combining demodulators at the destination. Wireless networks with an arbitrary number of sources and relays are considered. Arbitrary multilevel modulation schemes and network codes constructed over a non-binary Galois field (GF) are analyzed. NCCD protocols based on repetition-based and relay selection cooperation are investigated. Two takeaway messages emerge from our analysis: 1) repetition-based NCCD protocols are capable of achieving full-diversity, e.g., if the GF size is sufficiently large and the network code satisfies the maximum distance separable (MDS) property; and 2) NCCD protocols based on relay selection are capable of achieving full-diversity under more restrictive assumptions than repetition-based protocols, e.g., if the number of active relays is no fewer than the number of sources and an MDS network code is used. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
115. Auto-configuration of Physical Cell ID in LTE femtocellular systems using Self Organizing Networks.
- Author
-
Saxena, Navrati, Roy, Abhishek, Kim, HanSeok, and Won, Jeong-Jae
- Subjects
- *
COMPUTER network protocols , *LONG-Term Evolution (Telecommunications) , *TELECOMMUNICATION , *WIRELESS communications , *DIGITAL electronics - Abstract
The commercial success of cellular networks, combined with advances in digital electronics, signal processing, and telecommunications research have lead to the design of next generation 4G-based long term evolution (LTE) wireless systems. The key essence of these emerging, LTE cellular systems lie in deployment of multiple femtocells for improved coverage and higher data rates. However, the arbitrary deployment of a wide number of femtocells makes the configuration, management and planning of LTE systems quite complex and challenging. In order to support dynamic and efficient network configuration, every cell needs to be assigned a particular Physical Cell ID (PCID). In this paper we show that the dynamic, optimal PCID allocation problem in LTE systems is NP-complete. Subsequently we provide a near-optimal solution using Self-Organizing Networks which models the problem using new merge operations and explores the search space using a suitable randomized algorithmic approach. We also discuss two feasible options for dynamic auto-configuration of the system and analyze the algorithm to prove its convergence. Simulation results point out that our proposed near-optimal solution dynamically achieves ∼85−90 % of global optimal auto-configuration in computationally feasible time. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
116. Routing protocols for wireless sensor networks with mobile sinks: a survey.
- Author
-
Yu, Sheng, Zhang, Baoxian, Li, Cheng, and Mouftah, Hussein
- Subjects
- *
WIRELESS sensor networks , *WIRELESS communications , *NETWORK routing protocols , *COMPUTER network protocols , *DATA transmission systems - Abstract
Wireless sensor networks with mobile sinks, mWSNs, have attracted a lot of attention recently. This is because sink mobility can greatly alleviate the hotspot issue in WSNs and further prolong the network lifetime. However, sink mobility also causes unexpected changes in network topology and data routing paths, which can largely affect the routing performance in such networks. Design of efficient routing protocols for mWSNs has been a critical issue, and much work has been carried out in this aspect. In this article, we first classify existing protocols based on different design criteria and then present a survey of the state-of-the-art routing protocols in this area. We illustrate how each of the protocols works, and discuss their advantages and disadvantages. Finally, we point out some future directions for efficient routing in mWSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
117. FUZZY MULTIPLE METRICS LINK ASSESSMENT FOR ROUTING IN MOBILE AD-HOC NETWORK.
- Author
-
Soo, Ai Luang, Tan, Chong Eng, and Tay, Kai Meng
- Subjects
- *
AD hoc computer networks , *NETWORK routing protocols , *FUZZY systems , *DECISION making , *COMPUTER networks , *WIRELESS communications , *COMPUTER network protocols - Abstract
In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
118. ANALYSIS OF HANDOFF MECHANISMS IN MOBILE IP.
- Author
-
Jayaraj, Maria Nadine Simonel, Issac, Biju, and Haldar, Manas Kumar
- Subjects
- *
ROAMING (Telecommunication) , *INTERNET protocols , *MOBILE communication systems , *NETWORK routing protocols , *DATA packeting , *WIRELESS communications , *COMPUTER network protocols - Abstract
One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
119. Simulation and Performance evaluation of ZigBee for wireless sensor networks having multiple events occurring simultaneously at a time.
- Author
-
Dhama, Nitin, Minal, Kaur, Prabhjot, and Kumar, Neelu
- Subjects
- *
WIRELESS sensor networks , *WIRELESS communications , *WIRELESS LAN standards , *PERFORMANCE evaluation , *COMPUTER network protocols , *SIMULATION methods & models , *COST effectiveness - Abstract
ZigBee is an emerging standard for Wireless Sensor Networks (WSNs). It targets low distance, low data rate, low power consumption and low cost applications. According to standard nomenclature, it implements a Low Rate-Wireless Personal Area Network (LR-WPAN). ZigBee defines upper layers (network and application) of the ISO protocol reference model. On the contrary, in regards to the physical and data link ones, it relies over another standard, the well accepted IEEE802.15.4, which offers a gross transfer rate of 250 kbps in the 2.4 GHz ISM unlicensed band. Although ZigBee is designed for event-based applications, ZigBee is designed as a low-cost, low-power, low-data rate wireless mesh technology. There are many wireless sensor networks in which it is required to send information to the pan coordinator continuously and simultaneously. Our purpose here in this paper is to test zigbee for such kind of networks where multiple events take place simultaneously. Also we want to see the effect of increasing the number of events in a scenario, so that we can find out its effect. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
120. RFID Communication Using Software Defined Radio Technique.
- Author
-
Hannan, M. A., Islam, M., Samad, S. A., and Hussain, A.
- Subjects
- *
COMPUTER software , *RADIO frequency identification systems , *WIRELESS communications , *ELECTRONIC systems , *COMPUTER network protocols - Abstract
Radio Frequency Identification (RFID) is currently the hottest technology in wireless applications area. Its unique advantages such as data transmission with extreme low power or even without power in tag can be the biggest beneficial for goods management. Software Defined Radio (SDR) is a wireless communications system where all of the signal processing is implemented in software. By simply downloading a new program, a software radio is able to interoperate with different wireless protocols, incorporate new services, and upgrade to new standards. In this paper, we build an RFID application simulation environment over the SDR. We do the source to sink transmission simulation by using Quadrature Amplitude Modulation, Then, we compare the differences of BER versus SNR performances for input and output signals. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
121. A Handover Scheme for Subnet Mobility in Heterogeneous Networks.
- Author
-
Xuefeng Yan, Bing Chen, Hongyan Qian, Feng Gu, and Xiaolin Hu
- Subjects
- *
WIRELESS communications , *MOBILE communication systems , *COMPUTER network protocols , *TELECOMMUNICATION equipment , *COMPUTER networks - Abstract
an increase number of wireless applications consist of a network of mobile nodes moving together in high velocity, existing protocols focused on roaming of single node, and there are no mature solutions to keeping uninterrupted high-speed mobile communications for roaming the entire subnet with a moving velocity as high as a vehicle. In this paper, firstly we propose the idea of the new handover scheme based on mobile IP, and then introduce the principle and key issues for subnet mobility in networks. The station (STA), a wireless communications equipments in mobile wireless subnet, taking the access point (AP) as the gateway, implements the multiple-hop subnet mobile IP by cooperation of the home agent, the foreign agent, interior network routing agent and reused tunneling, thus to overcome the limitation of one hop between the movement node (MN) to the exit of the tunnel. A dynamic next AP scanning and finding model and a handover trigger model named Well-time is designed to provide low latency. We implement the scheme on re-designed STA and AP, the experiment shows that the new scheme enables a mobile subnet to handover seamlessly across heterogeneous wireless networks and maintains all ongoing high-speed communications with the nodes in fixed networks, when moving at a high velocity up to 50km/h. [ABSTRACT FROM AUTHOR]
- Published
- 2009
122. Performance Evaluation of both DSR and SSR Routing Protocols on Various Wireless Networks.
- Author
-
Rizos, G. E. and Vasiliadis, D. C.
- Subjects
- *
COMPUTER network protocols , *NETWORK routers , *WIRELESS communications , *COMPUTER simulation , *AD hoc computer networks - Abstract
An Ad-hoc network is a collection of mobile nodes, which are forming a network without requiring any pre-established infrastructure. A number of protocols have been developed insofar to facilitate the administration, management and operation of such networks; for packet routing, in particular, two of the most widespread protocols are DSR (Dynamic Source Routing) and SSR (Signal Stability Routing). In this work, we use simulation to assess and compare the performance of these two protocols. Although the approaches taken by these protocols share a considerable number of common features, our simulation has shown that differences in performance figures do exist, which may be attributed either to implementation issues or interlayer operations. In our study, we have considered different network loads, number of nodes within the network and mobility parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
123. EFFICIENCY AND BENEFITS OF WIRELESS NETWORK SEGREGATION.
- Author
-
Paraskelidis, Athanasios and Adda, Mo
- Subjects
- *
WIRELESS communications , *COMPUTER simulation , *COMPUTER network protocols , *TOPOLOGY , *MULTICHANNEL communication - Abstract
This paper examines the performance of segregate networks with single and multiple channels. It compares the simulation results to the location-aware channel assignment protocol named GRID. The term segregated means that the network is divided into smaller domains and each one operates on different radios. Each node is assigned a predefine pool of radios, per segregate. The results show that the average delay of the segregate is comparable to GRID topology, in some instances. We also demonstrate that the effect of single channel interference has been minimised and the throughput of the network has been increased, far more when multiple channel allocations are deployed within the segregate. Segregate networks are more robust in harsh environments and provide better data reliability. [ABSTRACT FROM AUTHOR]
- Published
- 2008
124. A Comprehensive Review on Time Sensitive Networks with a Special Focus on Its Applicability to Industrial Smart and Distributed Measurement Systems.
- Author
-
Fedullo, Tommaso, Morato, Alberto, Tramarin, Federico, Rovati, Luigi, and Vitturi, Stefano
- Subjects
- *
STANDARDIZATION , *COMPUTER network protocols , *WIRELESS Internet , *TELECOMMUNICATION systems , *AUTOMATION , *VERTICAL integration , *WIRELESS communications , *WIRELESS sensor networks - Abstract
The groundbreaking transformations triggered by the Industry 4.0 paradigm have dramatically reshaped the requirements for control and communication systems within the factory systems of the future. The aforementioned technological revolution strongly affects industrial smart and distributed measurement systems as well, pointing to ever more integrated and intelligent equipment devoted to derive accurate measurements. Moreover, as factory automation uses ever wider and complex smart distributed measurement systems, the well-known Internet of Things (IoT) paradigm finds its viability also in the industrial context, namely Industrial IoT (IIoT). In this context, communication networks and protocols play a key role, directly impacting on the measurement accuracy, causality, reliability and safety. The requirements coming both from Industry 4.0 and the IIoT, such as the coexistence of time-sensitive and best effort traffic, the need for enhanced horizontal and vertical integration, and interoperability between Information Technology (IT) and Operational Technology (OT), fostered the development of enhanced communication subsystems. Indeed, established technologies, such as Ethernet and Wi-Fi, widespread in the consumer and office fields, are intrinsically non-deterministic and unable to support critical traffic. In the last years, the IEEE 802.1 Working Group defined an extensive set of standards, comprehensively known as Time Sensitive Networking (TSN), aiming at reshaping the Ethernet standard to support for time-, mission- and safety-critical traffic. In this paper, a comprehensive overview of the TSN Working Group standardization activity is provided, while contextualizing TSN within the complex existing industrial technological panorama, particularly focusing on industrial distributed measurement systems. In particular, this paper has to be considered a technical review of the most important features of TSN, while underlining its applicability to the measurement field. Furthermore, the adoption of TSN within the Wi-Fi technology is addressed in the last part of the survey, since wireless communication represents an appealing opportunity in the industrial measurement context. In this respect, a test case is presented, to point out the need for wirelessly connected sensors networks. In particular, by reviewing some literature contributions it has been possible to show how wireless technologies offer the flexibility necessary to support advanced mobile IIoT applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
125. A Survey of User Interaction for Spontaneous Device Association.
- Author
-
MING KI CHONG, MAYRHOFER, RENE, and GELLERSEN, HANS
- Subjects
- *
AD hoc computer networks , *COMPUTER network protocols , *SURVEYS , *END users (Information technology) , *WIRELESS communications - Abstract
In a wireless world, users can establish ad hoc virtual connections between devices that are unhampered by cables. This process is known as spontaneous device association. A wide range of interactive protocols and techniques have been demonstrated in both research and practice, predominantly with a focus on security aspects. In this article, we survey spontaneous device association with respect to the user interaction it involves. We use a novel taxonomy to structure the survey with respect to the different conceptual models and types of user action employed for device association. Within this framework, we provide an in-depth survey of existing techniques discussing their individual characteristics, benefits, and issues. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
126. Buffer-aided cooperative communications: opportunities and challenges.
- Author
-
Zlatanov, Nikola, Ikhlef, Aissa, Islam, Toufiqul, and Schober, Robert
- Subjects
- *
WIRELESS communications , *WIRELESS cooperative communication , *IEEE 802.11 (Standard) , *SIGNAL-to-noise ratio , *COMPUTER network protocols - Abstract
Cooperative communication can increase the throughput and/or extend the coverage of wireless networks. However, in conventional cooperative networks, half-duplex relays transmit and receive under a prefixed schedule, which does not allow them to exploit the best receiving and transmitting channels, thus limiting performance. Recently, new protocols have been proposed that circumvent this problem by making use of the additional flexibility offered by relays with buffers. Compared to conventional relaying protocols, these buffer-aided protocols provide significant gains in terms of throughput, diversity, and signal-to-noise ratio. This article outlines several buffer-aided relaying protocols for different network topologies, including one-way single- and multi-relay networks as well as two-way single-relay networks. Moreover, some practical challenges inherent to buffer-aided relaying, such as increased delay and complexity, and topics for future research are discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
127. Smart management of D2D constructs: an experiment-based approach.
- Author
-
Karvounas, Dimitrios, Georgakopoulos, Andreas, Tsagkaris, Kostas, Stavroulaki, Vera, and Demestichas, Panagiotis
- Subjects
- *
MOBILE communication systems , *MACHINE-to-machine communications , *WIRELESS communications , *FEMTOCELLS , *COMPUTER network protocols - Abstract
This article considers the concept of device-to- device communications for the resolution of persistent issues in mobile networks. Specifically, two scenarios are described, the opportunistic coverage expansion of the infrastructure, where an access point transits to offline mode (and hence its terminals shall exploit the presence of neighboring devices in order to reroute their traffic to alternative APs), as well as the opportunistic capacity expansion scenario where an AP faces congestion issues due to the excessive traffic of its terminals or the use of an obsolete RAT with low capacity. In the same manner, part of the traffic shall be offloaded to alternative APs through the creation of D2D links with neighboring devices. In order to realize the proposed solutions, the network elements exchange information regarding their capabilities and their status so as to identify the best path from all the potential ones. Therefore, control channels for cognitive radio systems will be utilized since the information that is conveyed through them comprises information from all the layers of the protocol stack. Furthermore, the article focuses on the coverage expansion scenario, which is implemented at the w.iLab-t testbed. In order to realize the D2D constructs, the devices of the testbed will be configured to communicate through WiFi technology, and specifically the 802.11s standard for wireless mesh networks, in order to enable multihop communications. In this respect, the D2D constructs that will be created are mesh networks that comprise the problematic terminals, their neighboring terminals that offload their traffic, and the APs that receive the traffic. In order to evaluate the proposed solution, the signaling loads of the conveyed messages are measured, as well as the performance of the mesh network that is created after the solution enforcement through the use of a ping, a file transfer, and a video streaming application. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
128. A Real-Time and Efficient MAC Protocol for Smart Grid Wireless Communications.
- Author
-
Qiang Liu, Danqi Chen, Fangping Gao, and Guoli Pang
- Subjects
- *
REAL-time computing , *COMPUTER network protocols , *WIRELESS communications , *GRID computing , *WIRELESS sensor nodes - Abstract
Communication and information technologies play crucial roles in the smart grid system. Wireless communications offer many unique features to utilities. Real-time capability and high efficiency under heavy load are vital capabilities for smart grid wireless communications. However, the existing medium access control (MAC) protocols for low-rate and short-range wireless transfer in the literature mainly aim to achieve the objectives of low energy consumption and self-configuration and rarely address these requirements under heavy traffic intensity. This paper presents a real-time, efficient, and lightweight MAC (RE-MAC) protocol to support smart grid applications, based on priority node polling and a hybrid scheme. The upper bounds of packet delay are determined using the embedded Markov chain method, and the simulation results demonstrate that the protocol can achieve predictable, real-time, and efficient performance. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
129. A-LNT: A Wireless Sensor Network Platform for Low-Power Real-Time Voice Communications.
- Author
-
Yong Fu, Qiang Guo, and Changying Chen
- Subjects
- *
WIRELESS sensor networks , *SPEECH processing systems , *REAL-time computing , *WIRELESS communications , *COMPUTER network protocols , *ELECTRIC network topology - Abstract
Combiningwireless sensor networks and voice communication formultidata hybridwireless network suggests possible applications in numerous fields. However, voice communication and sensor data transmissions have significant differences, Meanwhile, highspeed massive real-time voice data processing poses challenges for hardware design, protocol design, and especially power management. In this paper, we present a wireless audio sensor network platform A-LNT and study and discuss key elements for systematic design and implementation: node hardware design, low-power voice codec and processing, wireless network topology, hybrid MAC protocol design based on superframe, radio channel allocation, and clock synchronization. Furthermore, we discuss energy management methods such as address filtering and efficient power management in detail. The experimental and simulation results show that A-LNT is a lightweight, low-power, low-speed, and high-performance wireless sensor network platform for multichannel real-time voice communications. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
130. SISTEMA DE SENSORES INALÁMBRICOS PARA LA IMPLEMENTACIÓN DE ESPACIOS INTELIGENTES.
- Author
-
Cázarez-Ayala, Gerardo, Duarte-Valenzuela, Aldo, Castillo-Meza, Hugo, Rodríguez-Beltrán, Antonio, Lugo-Zavala, Sócrates, and Ramírez-Montenegro, Miguel
- Subjects
- *
INTELLIGENT sensors , *WIRELESS sensor networks , *COMPUTER network protocols , *WIRELESS communications , *DETECTORS , *ZIGBEE - Abstract
This paper describes the design, implementation and application of a smart sensor system based in wireless communication protocol, which was developed with the main objective of facilitate the implementation of smart places, whereby monitoring and supervision of environmental physical variables in a residence or commercial buildings. Based in this system, we want to co-help taking advantage and save electric energy, optimizing the use of the lighting systems and air conditioner only in the schedules and under pre-established conditions for the final user. The system is based in a variety of nodes o modules of sensors like temperature, humidity, light, carbon monoxide, noise and LP gas which have the ability to work collaboratively in networks with topologies like star, tree and mesh. [ABSTRACT FROM AUTHOR]
- Published
- 2014
131. ENHANCEMENTS OF LEACH ALGORITHM FOR WIRELESS NETWORKS: A REVIEW.
- Author
-
Madheswaran, M. and Shanmugasundaram, R. N.
- Subjects
- *
WIRELESS communications , *ROUTING (Computer network management) , *WIRELESS sensor networks , *ROUTING algorithms , *COMPUTER network protocols - Abstract
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN). In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2013
132. A Review of Communication Protocols for Intelligent Remote Terminal Unit Development.
- Author
-
Ab Ghani, Mohd Ruddin, Jusoh, Wan Nor Shela Ezwane W., Hanafiah, Mohd Ariff M., Raman, Siti Hajar, and Jano, Zanariah
- Subjects
- *
COMPUTER network protocols , *REMOTE computer terminals , *SUPERVISORY control & data acquisition systems , *WIRELESS communications - Abstract
This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU). Supervisory Control and Data Acquisition (SCADA) system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI) and International Standard Organization (ISO). The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3), controller area network (CAN), International Electro-technical Commission (IEC 60870), and transmission control protocol/internet protocol (TCP/IP). [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
133. A Sequential Patterns Data Mining Approach Towards Vehicular Route Prediction in VANETs.
- Author
-
Merah, Amar Farouk, Samarah, Samer, Boukerche, Azzedine, and Mammeri, Abdelhamid
- Subjects
- *
DATA mining , *VEHICULAR ad hoc networks , *AD hoc computer networks , *ROUTING (Computer network management) , *TELECOMMUNICATION systems routing , *COMPUTER network protocols , *WIRELESS communications - Abstract
Behavioral patterns prediction in the context of Vehicular Ad hoc Networks (VANETs) has been receiving increasing attention due to the enabling of on-demand, intelligent traffic analysis and real-time responses to traffic issues. One of these patterns, sequential patterns, is a type of behavioral pattern that describes the occurrence of events in a timely and ordered fashion. In the context of VANETs, these events are defined as an ordered list of road segments traversed by vehicles during their trips from a starting point to their final intended destination. In this paper, a new set of formal definitions depicting vehicular paths as sequential patterns is described. Also, five novel communication schemes have been designed and implemented under a simulated environment to collect vehicular paths; such schemes are classified under two categories: RSU (Road Side Unit)-based and Vehicle-based. After collection, extracted frequent paths are obtained through data mining, and the probability of these frequent paths is measured. In order to evaluate the effectiveness and efficiency of the proposed schemes, extensive experimental analysis has been realized. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
134. Application of Cognitive Techniques to Adaptive Routing for VANETs in City Environments.
- Author
-
Blanco, Bego, Liberal, Fidel, and Aguirregoitia, Amaia
- Subjects
- *
VEHICULAR ad hoc networks , *AD hoc computer networks , *COMPUTER network protocols , *COMPUTER networks , *INTERNET protocols , *WIRELESS communications - Abstract
The evolution of smart vehicles has widened the application opportunities for vehicular ad hoc networks. In this context, the routing issue is still one of the main challenges regarding to the performance of the network. Although there are multiple ad hoc routing proposals, the traditional general-purpose approaches do not fit the distinctive properties of vehicular network environments. New routing strategies must complement the existing protocols to improve their performance in vehicular scenarios. This paper introduces a novel intelligent routing technique that makes decisions in order to adaptively adjust its operation and obtain a global benefit. The nodes sense the network locally and collect information to feed the cognitive module which will select the best routing strategy, without the need of additional protocol message dissemination or convergence mechanism. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
135. Performance of RPL under wireless interference.
- Author
-
Han, Dong and Gnawali, Omprakash
- Subjects
- *
NETWORK routing protocols , *COMPUTER network protocols , *WIRELESS communications , *TELECOMMUNICATION systems , *INTERFERENCE (Telecommunication) - Abstract
Smart homes and environments will consist of a large number of low power wireless devices such as sensors and actuators. Recently IETF standardized a network protocol called RPL that is designed to run on these nodes. In this article, we study the performance of RPL on a variety of scenarios that these nodes will encounter when they are deployed in practice. We deploy a network of 23 sensor nodes in a computer lab to monitor energy used by each computer across the applications and users. We subject the network to four different levels of interference that are representative of the types and levels of interference that these networks might encounter in deployment. Our study finds that RPL?s reliability degrades even with an access point in overlapping channel under normal network traffic. With high interference, the packet delivery reliability goes down to 10 percent. The scenario that resulted in this performance is not unimaginable in smart home or environment. This performance degradation is partly due to lack of coordination across the layers of the protocol stack: RPL is unaware of the changes in the wireless environment underneath and proceeds as usual. As other research has shown, coordination across the network stack is essential for network protocols to work reliably in the presence of interference. This will require a more coordinated approach to standards across the bodies. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
136. Using Geomagnetic Field for Indoor Positioning.
- Author
-
Li, Binghao, Gallagher, Thomas, Rizos, Chris, and Dempster, Andrew G.
- Subjects
- *
GEOMAGNETISM , *WIRELESS communications , *COMPUTER network protocols , *TELECOMMUNICATION , *MAGNETOMETERS , *WIRELESS Internet - Abstract
Geomagnetic field variation in support to indoor positioning and navigation has recently attracted considerable interest because of the advantage that technology based on the geomagnetic field has no infrastructure needs. Test using sensitive magnetometers has confirmed that it is possible to use geomagnetic field information for positioning purposes, however there are still issues to be addressed before it can be used in real applications. For example, are the low cost built-in magnetometers in mobile phones good enough for positioning purposes based on "fingerprinting" approaches? Is the geomagnetic field temporally stable for very long period of time? Tests have been carried out using several devices including smart phones. Because geomagnetic field positioning techniques alone may have difficulties, integration with other positioning methods is necessary. Wi-Fi is one of the obvious technology options. One approach is using Wi-Fi to first estimate approximate position, and then applying geomagnetic field information to refine position estimation. An experiment was carried out to test the proposed approach, and the error of fingerprintbased magnetic field positioning was analysed. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
137. Improving Management Performance of P2PSIP for Mobile Sensing inWireless Overlays.
- Author
-
Sendín-Raña, Pablo, González-Castaño, Francisco Javier, Gómez-Cuba, Felipe, Asorey-Cacheda, Rafael, and Pousada-Carballo, José María
- Subjects
- *
WIRELESS communications , *SESSION Initiation Protocol (Computer network protocol) , *COMPUTER network protocols , *INTERNET telephony - Abstract
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by de?ning an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
138. Preliminary study on the enhancement of WCDMA technology with SON functionality.
- Author
-
Jabłoński, Ireneusz
- Subjects
- *
WIRELESS communications , *RESEARCH methodology , *MATHEMATICAL optimization , *SYSTEMS design , *COMPUTER network protocols , *DATA structures - Abstract
Highlights: [•] A new paradigm for planning, optimization and management of wireless telecommunication network is presented. [•] Extensive considerations are possible with the use of presented methodology, both theoretical and application nature. [•] Deduction on optimized technological fusion of numerous technologies will be conducted with the use of designed tool. [•] Integrated research on SON protocol expresses wide range scope in a domain of telecommunication technology and services. [•] IRSON tool joins the real and local measurement data with flexible networking structure imitated with the use of computer. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
139. Design, Implementation and Characterization of Practical Distributed Cognitive Radio Networks.
- Author
-
Khattab, Ahmed, Perkins, Dmitri, and Bayoumi, Magdy A.
- Subjects
- *
TELECOMMUNICATION systems , *COMPUTER network protocols , *COGNITIVE radio , *WIRELESS communications , *PERFORMANCE evaluation , *AD hoc computer networks - Abstract
Opportunistic Spectrum Access (OSA) in distributed cognitive radio networks (CRNs) has been well studied in the literature from a theoretical perspective. However, such theoretically-optimized distributed OSA approaches are challenged by several practical implementation issues. In this paper, we design a custom cross-layer framework that enables the: (i) clean-slate implementation of a wide variety of OSA mechanisms; (ii) experimental evaluation of the individual practical OSA components of the Rate-Adaptive Probabilistic (RAP) framework; and (iii) detailed comparison of the performance of such a practical OSA approach against theoretical OSA approaches developed for fully-capable CRNs. Our evaluation reveals the multi-fold goodput improvement and remarkable fairness characteristics of the practical RAP OSA approach compared to the OSA approaches that overlook the OSA and CR practical limitations. However, the superior performance of practical OSA comes at the expense of more outages to the primary licensed networks but within the permissible bounds. Another key finding is that the wide family of existing theoretically-optimized OSA protocols can benefit from the gains available to the individual components of the practical RAP approach, namely, the random spectrum sensing and the probabilistic non-greedy access. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
140. Discrete-Bandwidth Nonblocking Networks.
- Author
-
Xuan, Yuanzhe and Lea, Chin-Tau
- Subjects
- *
TELECOMMUNICATION systems , *BANDWIDTH allocation , *COMPUTER network protocols , *ELECTRIC network topology , *SIGNAL quantization , *WIRELESS communications - Abstract
In this paper, we describe a framework for designing a discrete-bandwidth nonblocking network. The theoretical foundation of the framework combines theories from both networking and switching. While the conventional Clos theory must assume a particular topology, the new theory allows us to design a nonblocking network with an arbitrary topology. Thus it can be considered as a generalization of the Clos theory. In addition to the design of WDM or SONET networks, applications such as grid computing and supercomputing can also benefit from the results developed in the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
141. Low-Latency Data Sharing in Erasure Multi-Way Relay Channels.
- Author
-
Noori, Moslem, Bagheri, Hossein, and Ardakani, Masoud
- Subjects
- *
TELECOMMUNICATION systems , *ELECTRIC relays , *DATA transmission systems , *WIRELESS communications , *COMPUTER network protocols - Abstract
We consider an erasure multi-way relay channel (EMWRC) in which several users share their data through a relay over erasure links. Assuming no feedback channel between the users and the relay, we first identify the challenges for designing a data sharing scheme over an EMWRC. Then, to overcome these challenges, we propose practical low-latency and low-complexity data sharing schemes based on fountain coding. Later, we introduce the notion of end-to-end erasure rate (EEER) and analytically derive it for the proposed schemes. EEER is then used to calculate the achievable rate and transmission overhead of the proposed schemes. Using EEER and computer simulations, the achievable rates and transmission overhead of our proposed schemes are compared with the ones of one-way relaying. This comparison implies that when the number of users and the channel erasure rates are not large, our proposed schemes outperform one-way relaying. We also find an upper bound on the achievable rates of EMWRC and observe that depending on the number of users and channel erasure rates, our proposed solutions can perform very close to this bound. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
142. Secrecy Outage Capacity of Fading Channels.
- Author
-
Gungor, Onur, Tan, Jian, Koksal, Can Emre, El-Gamal, Hesham, and Shroff, Ness B.
- Subjects
- *
RADIO transmitter fading , *ERGODIC theory , *PROBABILITY theory , *COMMUNICATION , *INFORMATION theory , *COMPUTER network protocols , *WIRELESS communications - Abstract
This paper considers point-to-point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter channel state information (CSI). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper channel gains. In this scenario, the capacity achieving scheme relies on opportunistically exchanging private keys between the legitimate nodes. These keys are stored in a key buffer and later used to secure delay sensitive data using the Vernam's one time pad technique. We then extend our results to the more practical scenario where the transmitter is assumed to know only the legitimate channel gain. Here, our achievability arguments rely on privacy amplification techniques to generate secret key bits. In the two cases, we also characterize the optimal power control policies which, interestingly, turn out to be a judicious combination of channel inversion and the optimal ergodic strategy. Finally, we analyze the effect of key buffer overflow on the overall outage probability. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
143. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.
- Author
-
Whye Kit Tan, Sang-Gon Lee, Jun Huy Lam, and Seong-Moo Yoo
- Subjects
- *
INVESTMENT analysis , *NETWORK routing protocols , *COMPUTER network protocols , *WIRELESS mesh networks , *WIRELESS communications - Abstract
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
144. A protocol for processing interfered data in facility sensor networks.
- Author
-
Jeong, Wootae, Ko, Hoo, Lim, Heejong, and Nof, Shimon
- Subjects
- *
INFORMATION storage & retrieval systems , *WIRELESS sensor networks , *AUTOMATION , *MANUFACTURING industries , *ELECTROMAGNETIC interference , *COMPUTER network protocols , *WIRELESS communications , *PERFORMANCE evaluation - Abstract
Wireless sensor networks (WSNs) have recently extended application areas to numerous sectors such as industrial automation, military applications, transportation systems, building management, and environment surveillance. In particular, WSNs provide flexible, reliable, cost-effective solutions to monitor the real-time status of automated manufacturing facilities. A facility-specific WSN for reliable monitoring and efficient management of industrial facilities is called the facility sensor network (FSN). In general, industrial facilities run various electromagnetic devices causing electromagnetic interference (EMI), which disturbs wireless data communication. To obtain accurate and reliable data in such environments, the FSN needs to deal with the EMI by proper deployment of sensor nodes and their validation and fusion. This paper proposes a data processing protocol, called Interfered Sensor Data Processing Protocol (ISDPP) to handle the EMI affecting wireless communication. ISDPP is developed with a data fusion algorithm and an exponentially weighted moving average/fuzzy logic-based error detection method to obtain reliable information from the FSN. To evaluate the performance, experiments in various settings are performed in a test-bed manufacturing facility. The experimental results indicate the interfered data, and outliers can be filtered out even if unexpected interferences occur in the facility. The FSN with the ISDPP can provide efficient real-time monitoring solutions for various industrial applications. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
145. Large-scale access scheduling in wireless mesh networks using social centrality.
- Author
-
Wu, Di, Bao, Lichun, Regan, Amelia C., and Talcott, Carolyn L.
- Subjects
- *
COMPUTER scheduling , *WIRELESS communications , *MESH networks , *INTERNET access , *PEER-to-peer architecture (Computer networks) , *COMPUTER network protocols - Abstract
Abstract: Wireless mesh networking is an economic and convenient way to provide last mile Internet access through ad hoc peer-to-peer communication links. However, without systematic network configuration and channel resource management, these networks suffer from scalability, performance degradation and service disruption issues due to overwhelming co-channel interference, unscrupulous channel utilization and inherent network mobility. The IEEE 802.11 DCF and EDCA mechanisms based on CSMA/CA are the most widely used random channel access mechanisms, but unfortunately these cannot effectively eliminate hidden terminal and exposed terminal problems in multi-hop scenarios. Social network analysis techniques proposed for economic and social studies have recently been shown to be a successful approach for characterizing information propagation in multi-hop wireless networks. We propose a set of efficient resource allocation algorithms and channel access scheduling protocols based on Latin squares and social centrality metrics for wireless mesh networks (WMNs) with multi-radio multi-channel (MRMC) communication capabilities, called , which can coexist with IEEE 802.11 DCF and be effectively applied in large scale WMNs. Based on interference information provided by the interference graph, uses nodal degree centrality to form cliques for intra-cluster communication, and betweenness centrality to choose bridge nodes to form cliques for inter-cluster communication in WMNs, and then applies Latin squares to map the clique-based clustering structure to radios and channels for wireless communication purposes. Afterwards, again applies Latin squares to schedule the channel access amongst nodes within each cluster in a collision-free manner. We evaluate using simulations, and results show that achieves much better performance than existing IEEE 802.11 standards and other multi-channel access control protocols. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
146. Strong roaming authentication technique for wireless and mobile networks.
- Author
-
He, Daojing, Chen, Chun, Chan, Sammy, and Bu, Jiajun
- Subjects
- *
COMPUTER access control , *WIRELESS communications , *ROAMING (Telecommunication) , *DATA security , *MOBILE apps , *COMPUTER network protocols , *FEASIBILITY studies - Abstract
SUMMARY When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication protocol, Priauth, exceeds the security and efficiency of other authentication techniques. This paper studies the existing roaming authentication protocols and shows that they are not strong enough to provide secure roaming services in three aspects. Further, using Priauth as an example, we propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
147. Algebraic data retrieval algorithms for multi-channel wireless data broadcast.
- Author
-
Gao, Xiaofeng, Lu, Zaixin, Wu, Weili, and Fu, Bin
- Subjects
- *
INFORMATION retrieval , *COMPUTER algorithms , *WIRELESS communications , *INFORMATION storage & retrieval systems , *MOBILE computing , *COMPUTER network protocols - Abstract
Abstract: Wireless data broadcast is an important data dissemination method for distributing public information to mobile users. Due to the exponentially increasing number of mobile network users, it is necessary to develop efficient data retrieval protocols for end users to download data items effectively. In this paper, we concentrate on investigating scheduling algorithms for retrieving a set of data items from a multichannel wireless data broadcast system. As we know, the most important issues in mobile computing are energy efficiency and query response efficiency. However, in data broadcast the objectives of reducing access latency and energy cost can be contradictive to each other. Consequently, we define a new problem named Minimum Constraint Data Retrieval Problem (MCDR). We prove that MCDR is NP-hard, and then show a fixed parameter tractable algorithm which can balance two factors together. It has computational time , where is the number of channels, is the number of required data items, is the maximal time slot, and is the maximal number of channel switches. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
148. Asymmetric radio resource allocation scheme for OFDMA wireless networks with collaborative relays.
- Author
-
Chang, Zheng and Ristaniemi, Tapani
- Subjects
- *
WIRELESS communications , *RADIO resource management , *COMPUTER network protocols , *RESOURCE allocation , *ELECTRIC relays - Abstract
This work addresses the radio resource allocation problem for cooperative relay assisted OFDMA wireless network. The relays adopt the decode-and-forward protocol and can cooperatively assist the transmission from source to destination. Recent works on the subject have mainly considered symmetric source-to-relay and relay-to-destination resource allocations, which limits the achievable gains through relaying. In this paper we consider the problem of asymmetric radio resource allocation, where the objective is to maximize the system throughput of the source-to-destination link under various constraints. In particular, we consider optimization of the set of cooperative relays and link asymmetries together with subcarrier and power allocation. We derive theoretical expressions for the solutions and illustrate them through simulations. The results show clear additional performance gains through asymmetric cooperative scheme compared to the other recently proposed resource allocation schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
149. On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.
- Author
-
Chen, Tingting, Wu, Fan, and Zhong, Sheng
- Subjects
- *
COMPUTER network protocols , *IMPACT (Mechanics) , *WIRELESS communications , *SILICON carbide , *NASH equilibrium , *BANDWIDTH allocation - Abstract
Channel assignment is a crucial problem for wireless networks, especially for noncooperative wireless networks, in which nodes are selfish. While there have been a few studies of noncooperative, multiradio channel assignment, most existing studies are restricted to single collision domains only. In this paper, we study the design of incentive-compatible protocols for noncooperative, multiradio channel assignment in multiple collision domains. First, we show the necessity of designing incentive-compatible protocols for this problem. Specifically, we show that, if no incentive-compatible protocol is deployed, Nash Equilibria (NEs) may have undesired properties, such as Pareto suboptimality and low throughput. To prevent the system from converging to the NEs with undesired properties, we propose an incentive-compatible protocol for channel assignment in multiple collision domains. We rigorously show that our protocol guarantees that the system converges to NEs that are Pareto-optimal and have the maximum system-wide throughput. Our simulation results also verify that our protocols are effective in ensuring that the system converges to the desired NEs. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
150. Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
- Author
-
Shen, Yulong and Zhang, Yuanyu
- Subjects
- *
COMPUTER network protocols , *BIG data , *DATA security , *WIRELESS sensor networks , *CELL phone jamming , *WIRELESS communications - Abstract
Wireless communications nowadays are increasingly becoming irreplaceable networking technologies for military, governmental and financial communications where the data is exploding in volume, variety and velocity, called big data. This poses great challenges to ensuring security through cryptography. Recently, cooperative jamming has been proved as a promising physical layer technique to provide the everlasting security for wireless networks. Based on this scheme, this paper proposes a two-hop transmission protocol with parameters l , k , r and τ (2HR- ( l , k , r , τ ) ) to ensure secure and reliable big data transmissions in wireless networks with multiple eavesdroppers. We first determine the relay selection region (RSR) as the square of side-length l centered at the middle point between the source and the destination. Then one of the k best relays located in the RSR is randomly selected as the message relay. During the forwarding in both hops, the remaining relays at least distance r away from the intended receivers and with channel gain to the intended receivers less than τ are selected to generate jamming signals to confuse the eavesdroppers. The results in this paper indicate that our protocol can provide flexible control of security, reliability and the energy balance performance, which characterizes how energy consumption for forwarding message is balanced among all the relays. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.