WorldWideScience

Sample records for 3g wireless networks

  1. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny

    2011-01-01

    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results of...... the radio link power consumption. Based on these description and analysis, we propose power consumption model. The power model was evaluated on the smartphone Nokia N900, which follows a 3GPP Release 5 and 6 supporting HSDPA/HSPA data bearers. Further we propose method of parameters selection for 3GPP...

  2. Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks

    Dogan Safak

    2007-01-01

    Full Text Available Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the input compressed video streams while controlling the output rates to provide robust communications over error-prone and bandwidth-limited 3G wireless networks. The transcoder is also designed to employ a new adaptive intra-refresh algorithm, which is responsive to the detected scene activity inherently embedded into the video content and the reported time-varying channel error conditions of the wireless network. Comprehensive computer simulations demonstrate significant improvements in the received video quality performances using the new transcoding architecture without an extra computational cost.

  3. Towards adaptive security for convergent wireless sensor networks in beyond 3G environments

    Mitseva, Anelia; Aivaloglou, Efthimia; Marchitti, Maria-Antonietta;

    2010-01-01

    The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context-aware adapt...

  4. RObust header compression (ROHC) performance for multimedia transmission over 3G/4G wireless networks

    Fitzek, Frank; Rein, S.; Seeling, P.; Reisslein, M.

    2005-01-01

    Robust Header Compression (ROHC) has recently been proposed to reduce the large protocol header overhead when transmitting voice and other continuous meadi over IP based control stacks in wireless networks. In this paper we evaluate the real-time transmission of GSM encoded voice and H. 26L encoded...... video with ROHC oevr a wireless link. For the voice transmission we examine the impact of ROHC on the consumed bandwidth, the voice qaulity, and the delay jitter in teh voice signal. We find that for a wide rang of error probabilities on teh wireless link, ROHC roughly cuts the bandwidth required for...... the transmission of GSM encoded voice in half. In addition, ROHC improves the voice quality compared to transmissions without ROHC, especially for large bit error probabilities on the wireless link. the improvement reaches 0.26 on the 5-point Mean Opinion Score for a bit error probability of 10...

  5. Call Admission Control performance model for Beyond 3G Wireless Networks

    Babu, H S Ramesh; Satyanarayana, P S

    2010-01-01

    The Next Generation Wireless Networks (NGWN) will be heterogeneous in nature where the different Radio Access Technologies (RATs) operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN. Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireles...

  6. The Research on Handoff Strategy in Beyond 3G Wireless Networks

    CUI Hong-yan; TIAN Hui; XU Hai-bo; ZHANG Ping

    2006-01-01

    One of the major challenges for beyond third generation mobile systems is efficient mobility management. This paper proposes a distributed dynamic management scheme of handoff based on B3G networks. This .scheme can reduce the co.st of update signalling and transmitting packets, and improve the system capability. In this .scheme, the dynamic building network approach is adopted to deduce the update signalling cost. We implement the distributed dynamic management scheme of handoff in a simulation platform and compare its performance with that of general centralized handoff management schemes. Our simulation results indicate that our .scheme is capable of reducing the update handoff latency, and enhancing the performance.

  7. Improving Throughput and Delay by Signaling Modification in Integrated 802.11 and 3G Heterogeneous Wireless Network

    Majid Fouladian

    2016-02-01

    Full Text Available Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility management and handoff decision making. Vertical handoff is switching process between heterogeneous wireless networks in a 3G/WLAN network. Vertical handoffs often fail due to the abrupt degrade of the WLAN signal strength. In this paper, proposed a new vertical handoff method for to decrease the number of signaling and registration processes, to examine the Special conditions such as WLAN black holes and to eliminate disconnecting effects. By estimating user locations related to WLAN position, interface on-times will be reduced which makes the power consuming of the system decreased. To indicate the efficiency of proposed approach the performance and the delay results are simulated.

  8. Performance Analysis of 3G Communication Network

    Toni Anwar; Lim Wern Li

    2008-01-01

    In this project, third generation (3G) technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the network from circuit switched to packet switched operation, resulting in increased overall network performance. Higher reliability, better coverag...

  9. Design and Development of Broadband Inverted E-shaped Patch Microstrip Array Antenna For 3G Wireless Network

    Norbahiah Misran

    2008-01-01

    Full Text Available Microstrip patch antenna has been received tremendous attention since the last two decades and now it becomes a major component in the development of Smart Antenna System for Third-Generation Wireless Network proposed by the ITU-R under the banner of IMT-2000. Smart antenna consists of an array of antennas associated with it a base-band hardware and control unit (inclusive of the software algorithm that have the capability to change its radiation pattern according to the direction of the user. This paper describes the design and development of broadband Inverted E-shaped patch microstrip array antennas for 3G wireless network. The antenna was designed for the IMT-2000 operating frequency range of 1.885–2.200GHz and was built as an array of 4x4 inverted E-shaped patches. The beamforming feed network comprises of commercial variable attenuators (KAT1D04SA002, variable phase shifters (KPH35OSC000, and the corporate 16-ways Wilkinson power divider which was developed in-house. The antenna successfully achieves the bandwidth of 16.14% (at VSWR: 1.5 with respect to the center frequency of 2.045 GHz. The antenna is capable of scanning with the maximum scanning angle of ±30º and ±25º in azimuth and elevation respectively.

  10. Performance Analysis of 3G Communication Network

    Toni Anwar

    2008-11-01

    Full Text Available In this project, third generation (3G technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the network from circuit switched to packet switched operation, resulting in increased overall network performance. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the network performance. Throughput and spectral efficiency are fundamental parameters in capacity planning for 3G cellular network deployments. In this project investigated the downlink (DL and uplink (UL throughput and spectral efficiency performance of the standard Universal Mobile Telecommunications system (UMTS system for different scenarios of user and different technologies. Then, compiles results and analyzes it. Thus, this analysis can significantly help system engineers to obtain crucial performance characteristics of 3G network.

  11. Wireless Networks

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  12. Wireless mesh networks.

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed. PMID:19047448

  13. Comparative Study of 3G / 4G Network Service

    Gulshan Kumar

    2014-10-01

    Full Text Available Modern technology is evolving so fast, that it can be very difficult to keep follow everything new. Cellular Communication is one of the most recent areas which is developing tremendously fast at present times, it is only due to the advancement of technology in all the fields of cellular and wireless communications. Networks are used basically in business and home applications, mobile users, and in all social concerns. At the present time, the use of 3 rd Generation (3G cellular communication systems seems to be the standard, while the 4th generation (4G stands for the next generation of wireless and cellular communications. This comparative study between 3G & 4G tells about the scope, background and the visualization for the 4G. In this paper, we first present a brief review on the evolutionary history, features, condition of network communication and comparison of 3G - 4G perspectives. It is followed by the introduction to 4G technologies to fulfill the limitations of 3G services. At the end, the paper is summarized.

  14. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    To William

    2005-01-01

    Full Text Available This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  15. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    To William; Salcic Zoran; Nguang Sing Kiong

    2005-01-01

    This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC) approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  16. Emerging wireless networks concepts, techniques and applications

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  17. Future mobile networks 3G and beyond

    Clapton, Alan

    2001-01-01

    This book explores the future of mobile communications networks given the increasing demands for services and higher quality, as well as the continued growth in the cellular mobile marketplace and the new private mobile radio systems. These demands will impact on the developments that are likely to occur in the near future which will continue to drive forward the technological capabilities. This book investigates the implications of increasing mobile customer numbers on a global scale, and the convergence of mobile and the internet, which, it is envisaged, will provide the next massive growth

  18. Mobile Wireless System Interworking with 3G and Packet Aggregation for Wireless LAN

    Ransbottom, J. Scot

    2004-01-01

    This research considered the efficient transmission of data within a wireless local area network (WLAN) system. A simulation model was developed to study the performance of our protocol, AGG-MAC (aggregated medium access control). AGG-MAC is a simple and elegant medium access control (MAC) protocol designed to improve performance by transmitting a maximal quantity of data with minimal overhead. Our enhancement to IEEE 802.11, AGG-MAC yields dramatic improvements in both local and global thro...

  19. Key technologies and concepts for beyond-3G networks

    Pehkonen, Kari; Uskela, Sami; Kalliojarvi, Kari; Oksanen, Lauri; Rikkinen, Kari

    2001-10-01

    Standardization of 3rd Generation (3G) mobile communication systems has produced the first specification releases and the commercial deployment of the 3G systems has started. Whereas 1G and 2G focused on efficiently providing voice services, in 3G a lot of attention has been devoted to solutions that support both Circuit Switched (CS) and Packet Switched (PS) communication. That has called for very flexible air interface and network solutions. 3G will continue to evolve and there are already on-going standardization activities that will, for example, boost the peak data rates up to 5-10 Mbps and improve spectral efficiency by 2-4 times. In the future, 3G evolution will be going towards 10/100 Mbps peak data rates in wide/local are coverage, respectively. This will take place partly because of technical improvements of 3G radio interface solutions, but also due to network evolution which will allow the integration other radio access methods like radio LANs into the 3G system. In longer term the 3G network evolution will be going towards ALL-IP networks. As 3G evolution seems to be going towards 10 Mbps/100 Mbps peak data rates and ALL-IP networks any beyond 3G air interface or network solution should be clearly better in order to justify its technical and commercial feasibility. Given the long evolution time of 3G and integration of other radio access schemes with 3G radio we may not even see a new, complete beyond 3G system being developed. Maybe we will just witness the emergence of a new, more advanced radio access solution which will then be connected to the evolving 3G network. As 3G evolution will continue for several years to come the research targets for any beyond 3G solutions must be set very high. When it comes to air interface, we should aim at 100 Mbps peak data rates for wide area access with high mobility, and at 1 Gbps for local area access with low mobility. Regarding possible commercial launches of any beyond 3G systems or solutions they could then

  20. Wireless Fidelity Networks

    Jäger, Vítězslav

    2009-01-01

    This work deals with main problems of wireless fidelity networks. In details it’s showing the terminology, used technical standards, network’s architecture and built-in security of wireless fidelity networks. For the question of the network’s security it’s handled regarding to VPN (Virtual Private Network) technology. Based on these theoretical assumptions there is new company’s network designed. This designed network offers combination of free wireless network with internet access and secure...

  1. Community Wireless Networks

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  2. Power consumption analysis of constant bit rate video transmission over 3G networks

    Ukhanova, Ann; Belyaev, Evgeny; Wang, Le;

    2012-01-01

    This paper presents an analysis of the power consumption of video data transmission with constant bit rate over 3G mobile wireless networks. The work includes the description of the radio resource control transition state machine in 3G networks, followed by a detailed power consumption analysis and...... measurements of the radio link power consumption. Based on this description and analysis, we propose our power consumption model. The power model was evaluated on a smartphone Nokia N900, which follows 3GPP Release 5 and 6 supporting HSDPA/HSUPA data bearers. We also propose a method for parameter selection...

  3. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Fei Liu; Ruizhen Han; Yong He

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classif...

  4. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Moon Bongkyo

    2010-01-01

    The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, a...

  5. Architecture of Wireless Network

    Ram Kumar Singh; Shweta Singh

    2012-01-01

    To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre). The mobile switching centre allow connectivity among the PSTN (public switched telephone network) and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a sys...

  6. Security for multihop wireless networks

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  7. Wireless rechargeable sensor networks

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  8. Wireless network pricing

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  9. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Moon Bongkyo

    2010-01-01

    Full Text Available The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, and the other is that most of the fields in request messages as well as response messages are duplicated when a set of SIP messages are exchanged during session re-setup procedure. In this scheme, no change is required in the SIP message processing except for the proxy agents in both BS and MH.

  10. Architecture of Wireless Network

    Ram Kumar Singh

    2012-03-01

    Full Text Available To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre. The mobile switching centre allow connectivity among the PSTN (public switched telephone network and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a system. The global telecommunications control grid of PSTN which associate with conventional (landline telephone switching centre (called central office with MSCs all around the world.

  11. Sustainable wireless networks

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  12. Energy efficiency in wireless networks

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  13. Miniaturized wireless sensor network

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  14. Wireless networked music performance

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  15. Wireless networks; Traadloese nettverk

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  16. Wireless Sensors Network (Sensornet)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  17. Evolution of Heterogeneous Wireless Networks

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  18. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Fei Liu

    2012-03-01

    Full Text Available This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP, which uses a digital signal processor (DSP as a core CPU, and a host control platform (HCP. The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests’ pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture.

  19. Feasibility study on a portable field pest classification system design based on DSP and 3G wireless communication technology.

    Han, Ruizhen; He, Yong; Liu, Fei

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests' pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture. PMID:22736996

  20. Insecurity of Wireless Networks

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  1. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    Shankar, R; Dananjayan, P; 10.5121/iju.2010.1303

    2010-01-01

    The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results ob...

  2. Cognitive wireless networks

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  3. Autonomic wireless networking

    Velayos Muñoz, Héctor Luis

    2005-01-01

    Large-scale deployment of IEEE 802.11 wireless LANs (WLANs) remains a significant challenge. Many access points (APs) must be deployed and interconnected without a-priori knowledge of the demand. We consider that the deployment should be iterative, as follows. At first, access points are deployed to achieve partial coverage. Then, usage statistics are collected while the network operates. Overloaded and under-utilized APs would be identified, giving the opportunity to relocate, add or remove ...

  4. Wireless Sensor Network Topology Control

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  5. Wireless Networks: New Meaning to Ubiquitous Computing.

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  6. Views of wireless network systems.

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  7. Security in Wireless Sensor Networks

    Abdollah Doavi; Hossein Parvan

    2015-01-01

    Wireless sensor network (WSN) is an emerging important research area. The variety in and number of applications is growing in wireless sensor networks. These wireless sensor nodes are tiny devices with limited energy, memory, transmission range, and computational power. Because WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are har...

  8. Wireless sensor networks architectures and protocols

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  9. Wireless Internet over Heterogeneous Wireless Networks

    Wu, G.; Mizuno, M.

    2001-01-01

    One of the two keywords for the next generation wireless communications is seamless. Being involved in the essential e-Japan Plan promoted by the Japanese Government, the MIRAI (Multimedia Integrated network by Radio Access Innovation) project is responsible for the research and development on the s

  10. Wi-Fi Wireless Networks and Technology

    2008-01-01

    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  11. Building RNC in All-IP Wireless Networks using Network Processors

    CHENG Sheng; NI Xian-le; ZHU Xin-ning; DING Wei

    2004-01-01

    This paper describes a solution to build network-processor-based Radio Network Controller (RNC) in all-IP wireless networks, it includes the structure of the 3rd Generation (3G) wireless networks and the role of network nodes, such as Base Station (BS), RNC, and Packet-Switched Core Networks (PSCN). The architecture of IXP2800 network processor; the detailed implementation of the solution on IXP2800-based RNC are also covered. This solution can provide scalable IP forward features and it will be widely used in 3G RNCs.

  12. Rate allocation strategies for energy-efficient multipath routing in Ad-hoc networks towards B3G

    ZHAN Song-tao; XU Guo-xin

    2007-01-01

    Wireless mobile Ad-hoc network is a special network that all nodes can self-organize and work together. It is flexible to form a network and extend the coverage area dynamically without infrastructure, so Ad-hoc network is envisioned as cornerstones of future generation networking technologies (B3G or 4G). However, the dynamic network topology makes the communication cost not only the energy of source/destination nodes, but also the relay nodes. Another problem of the Ad-hoc network is it is hard to provide a stable and persistent quality of service (QoS), which is strongly required by the beyond 3rd generation (B3G) system. In this article, the authors establish a scenario that contains B3G cellular base station and Ad-hoc mobile nodes, and propose two algorithms minimum incremental rate algorithm and power feed-back rate allocation algorithm in multipath routing. The algorithms can maintain a constant total transmission rate and bit error ratio (BER) to provide the QoS guarantee and reach the minimum power consumption of the relay nodes by adjusting the rate of each path in the multipath routing.

  13. Mobility in Wireless Sensor Networks

    Mehta, Ankur Mukesh

    2012-01-01

    The combination of mobility with wireless networks greatly expands the application space of both robots and distributed sensor networks; such a pervasive system can enable seamless integration between the digital and physical worlds. However, there are a number of issues in both robotic and wireless sensor network (WSN) fields that demand research, and their integration generates further challenges. A fundamental open problem in robotic systems is the issue of self-contained localization. ...

  14. MBMS—IP Multicast/Broadcast in 3G Networks

    Markus Kampmann

    2009-01-01

    Full Text Available In this article, the Multimedia Broadcast and Multicast Service (MBMS as standardized in 3GPP is presented. With MBMS, multicast and broadcast capabilities are introduced into cellular networks. After an introduction into MBMS technology, MBMS radio bearer realizations are presented. Different MBMS bearer services like broadcast mode, enhanced broadcast mode and multicast mode are discussed. Streaming and download services over MBMS are presented and supported media codecs are listed. Service layer components as defined in Open Mobile Alliance (OMA are introduced. For a Mobile TV use case capacity improvements achieved by MBMS are shown. Finally, evolution of MBMS as part of 3GPP standardization is presented.

  15. Wireless home networking for dummies

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  16. Wireless Ad Hoc Networks

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  17. Guide to wireless network security

    Vacca, John R

    2006-01-01

    A guide to key foundation topics and technology frameworks for designing and maintaining reliable operations. This work explains the concepts from basic concepts to designing principles to deployment. It covers wireless security testing techniques and prevention techniques for intrusion. It is aimed at wireless network administrators.

  18. Wireless network security theories and applications

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  19. Migrations amid Generations of Wireless networks

    Harpreet kaur

    2011-08-01

    Full Text Available This article presents an overview of migrations among various generations with emphasis on trends in the areas of wireless networking. Migrations from one type of network to another are being experienced due to advances in wireless communication since the days of ingenious inventions of Alexander Graham Bell and Guglielmo Marconi. Today’s wireless technology serves the plethora of person to person communication demands rather than point to point communication. These all advances are due to the technological growth, standards and services required. The nomenclature of the generations generally refers to a change in the nature of the service,non backwards compatible transmission technology and new frequency bands. The first move was from 1981 analogue (1G to digital(2G transmission in 1992. This was followed in 2002 by the 3G multi media support, spread spectrum transmission and at least 200kbit/s ,soon followed by 4G which refers to all IP packet-switched networks, mobile ultra-broadband (gigabit speed access and multi carrier transmission. Pre-4G technology such as mobile WiMAX and first release 3G Long Term Evolution (LTE have been available in market since 2006 and 2009 respectively.

  20. Wireless Sensor Networks: Issues & Challenges

    Indu; Sunita Dixit

    2014-01-01

    Wireless Sensor Networks (WSN) are highly distributed self organized systems. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, spread over a specific geographic area for some specific purposes like environmental monitoring, surveillance, target tracking etc. By combining sensing technology with processing power and wireless communication makes it lucrative for being exp...

  1. Secure positioning in wireless networks

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  2. Breaking Free with Wireless Networks.

    Fleischman, John

    2002-01-01

    Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…

  3. Wireless Internet on Heterogeneous Networks

    Wu, G.

    2001-01-01

    The wide proliferation of wireless systems and the use of software radio technologies enable the employment of a heterogeneous network. In this concept services are delivered via the network that is most efficient for that service. The solution is based on a common core network that interconnects ac

  4. 3G, 4G and beyond bringing networks, devices and the web together

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  5. Radio propagation and adaptive antennas for wireless communication networks

    Blaunstein, Nathan

    2014-01-01

    Explores novel wireless networks beyond 3G, and advanced 4G technologies, such as MIMO, via propagation phenomena and the fundamentals of adapted antenna usage.Explains how adaptive antennas can improve GoS and QoS for any wireless channel, with specific examples and applications in land, aircraft and satellite communications.Introduces new stochastic approach based on several multi-parametric models describing various terrestrial scenarios, which have been experimentally verified in different environmental conditionsNew chapters on fundamentals of wireless networks, cellular and non-cellular,

  6. Cooperative Diversity in Wireless Networks

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  7. Socially Aware Heterogeneous Wireless Networks.

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-01-01

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation. PMID:26110402

  8. Socially Aware Heterogeneous Wireless Networks

    Pavlos Kosmides

    2015-06-01

    Full Text Available The development of smart cities has been the epicentre of many researchers’ efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs, in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users’ locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  9. Design and security of small wireless network

    Cikánek, Svatopluk

    2014-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  10. Optimisation problems in wireless sensor networks

    Suomela, Jukka

    2009-01-01

    This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmit...

  11. Mobility Management in beyond 3G-Environments

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan

    2003-01-01

    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi

  12. Wireless wearable network and wireless body-centric network for future wearable computer

    2007-01-01

    The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.

  13. Centralized Routing for Prolonged Network Lifetime in Wireless Sensor Networks

    Hansen, Ewa

    2008-01-01

    In this thesis centralized routing methods for wireless sensor networks have been studied. The aim has been to prolong network lifetime by reducing the energy consumed by sensor-node communication. Wireless sensor networks are rapidly becoming common in application areas where information from many sensors is to be collected and acted upon. The use of wireless sensor networks adds flexibility to the network, and the cost of cabling can be avoided. Wireless sensor networks may consist of sever...

  14. Active Intrusion Detection for Wireless Multihop Networks

    do Carmo, Rodrigo Daniel

    2014-01-01

    This work focuses on network security and introduces an active-probing technique for intrusion detection in wireless multihop networks. Wireless networks have been the revolution of personal communications of the past decades. Millions of devices with wireless capabilities are sold to end customers every year: smartphones that enable access to the Internet almost everywhere, computers with wireless connections, personal watches, sports shoes, digital cameras, and even lenses with wirel...

  15. Wireless network security and cracking security key

    Bikov, Dusan; Bouyuklieva, Stefka; Stojanova, Aleksandra

    2014-01-01

    Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module), wireless security is an ever increasing issue for many organizations. In other words wireless networks add another entry point into a network for hackers. Because this technology is relatively new there is many security vulnerabilities. ...

  16. Interworking of Wireless LANs and Cellular Networks

    Song, Wei

    2012-01-01

    The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies. The popular cellular networks and wireless local area networks (WLANs) present perfectly complementary characteristics in terms of service capacity, mobility support, and quality-of-service (QoS) provisioning. The cellular/WLAN interworking is an effective way to promote the evolution of wireless networks. "Interworking of Wireless LANs and Cellular Networks" focuses on three aspects, namely access selection, call admission control and

  17. A Perspective of 3G Construction in China

    Beijing Norson Consulting Co.,Ltd

    2006-01-01

    @@ 1. The problems on hybrid network combining TD-SCDMA 1)Hybrid network is imperative in China At present, there are several major wireless networks in China,namely, GSM network of China Mobile, GSM network and CDMA network of China Unicom, PHS network of China Telecom and China Netcom, and therefore the seamless transition from the existent wireless network to 3G network is an inevitable factor must be taken into account. In view of the difference of release sequence and release target of 3G license, the hybrid network combining TD-SCDMA, WCDMA and CDMA2000 technology will be probably adopted in future 3G construction in China.

  18. Gigabit Wireless for Network Connectivity

    Schoedel, Eric

    2009-01-01

    Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…

  19. Multihop Wireless Networks Opportunistic Routing

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  20. Secure data aggregation for wireless sensor network

    Tran-Thi-Thuy, Trang

    2010-01-01

    Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires...

  1. Integrated Optical Wireless Network For Next Generation Wireless Systems

    Aditya Goel

    2009-03-01

    Full Text Available Next generation wireless networks need to support broadband wireless services at significantly reduced cost. The existing wireless systems can hardly provide transmission capacity of the order of few Mbps. However, millimeter waves and optical fiber can provide data capacity of the order of Gbps and Tbps respectively. Hence the requirements of broadband wireless system can be achieved through the integration of optical fiber and millimeter wireless systems. We suggest modified millimeter wireless system, with optical fiber as feeder network. Simulations have been carried out for AWGN and optical fiber channels using MATLAB code, so as to compare their individual performance. When compared it is observed that the performance of multimode optical fiber (MMOF link even for distance of 80 KM is better than that of the AWGN channel with SNR of 50 dB and above. Hence, an integrated fiber radio network is an excellent cost effective media for higher data rate (>100Mbps.

  2. Underwater optical wireless communication network

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  3. Dynamic wireless sensor networks

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  4. Security Issues & Challenges in Wireless Sensor Networks

    Anand Nayyar

    2012-01-01

    Wireless Sensor Network (WSN) is regarded as emerging futuristic technology which promises various applications development for people and military. Wireless Sensor Network technology is combined with processing power and wireless communications which makes it vulnerable for security breaches in the future. With the addition of Wireless Technology it is open to all types of security threats. This research paper is developed to research on various security issues cum challenges faced by Wirele...

  5. Tunneled data transmission over wireless sensor networks

    Yow, Thiam Poh

    2007-01-01

    A technique for terminal communication through transmission links established across a wireless sensor network is developed and tested. Using protocols established for conventional wireless communication networks as a guiding principle, different methodologies for link management, and segmentation and reassembly of information are explored. A protocol for sensor network encapsulation was designed and implemented across a network of terminals and wireless sensor motes. The study concludes ...

  6. Sybil attack in Wireless Sensor Network

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  7. Wireless Sensor Networks for Healthcare Applications

    Dishongh, Terrance J; Kuris, Ben

    2009-01-01

    This unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data collection and decision making, clinical deployment of wireless sensor networks, contextual awareness medication prompting field trials in homes, social health monitoring, and the future of wireless sensor networks in healthcare.

  8. Key Management in Wireless Sensor Networks

    Ismail Mansour; Gérard Chalhoub; Pascal Lafourcade

    2015-01-01

    Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take cont...

  9. Down-link power distributions for 2G and 3G mobile communication networks

    Knowledge of realistic power levels is key when conducting accurate EMF exposure assessments. In this study, down-link output power distributions for radio base stations in 2G and 3G mobile communication networks have been assessed. The distributions were obtained from network measurement data collected from the Operations Support System, which normally is used for network monitoring and management. Significant amounts of data were gathered simultaneously for large sets of radio base stations covering wide geographical areas and different environments. The method was validated with in situ measurements. For the 3G network, the 90. percentile of the averaged output power during high traffic hours was found to be 43 % of the maximum available power. The corresponding number for 2G, with two or more transceivers installed, was 65 % or below. (authors)

  10. Weaponizing Wireless Networks

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring...... of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and...... functionality of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security...

  11. R&D on wireless broadband communication systems: new generation ubiquitous mobile network

    Ogawa, Hiroyo

    2007-09-01

    R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.

  12. Distributed medium access control in wireless networks

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  13. Wireless Sensor Networks Approach

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  14. Indoor geolocation for wireless networks

    Ali, Shahid

    2011-01-01

    An ever growing demand for ‘location based services’ and the unprecedented growth of wireless local area networks (WLAN) has, in the past few years, attracted the focus of the research community to investigate and develop accurate indoor geolocation systems. Performance of any geolocation system is based upon the reported distance error . The accuracy required varies from application to application. For example an accurate geolocation system is required to appre...

  15. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  16. Mobility and Handoff Management in Wireless Networks

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of ...

  17. Wireless Sensor Networks Attacks and Solutions

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  18. Future wireless and optical networks

    Jiang, Shengming

    2012-01-01

    This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control prob

  19. Security Threats in Wireless Sensor Networks

    Sushma

    2011-05-01

    Full Text Available Wireless Sensor Network (WSN is an emergingtechnology that shows great promise for variousfuturistic applications both for mass public andmilitary. The sensing technology combined withprocessing power and wireless communication makesit lucrative for being exploited in abundance in future.Wireless sensor networks are characterized byseverely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN are currently receiving significant attention due to their unlimitedpotential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.

  20. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  1. Voice over IP in Wireless Heterogeneous Networks

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the...... deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality Vo......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality. The...

  2. Low-Power Wireless Sensor Network Infrastructures

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... in order to achieve the wanted lifetimes. Through more than a decade of wireless sensor network research, progress towards realizing wanted lifetimes have been made and wireless standards for packet formatting and routing have been proposed. With standards in place, the wide-span between programming...... environments and communication primitives in wireless sensor network and traditional network development are closing. However, fundamental differences in wireless technology and energy constraints are still to be considered at the lower levels of the software stack. To fulfill energy requirements hardware...

  3. Integration of RFID and Wireless Sensor Networks

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  4. The Security of Wireless Local Area Network

    林楠; 李翠霞

    2007-01-01

    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  5. Distributed Phased Arrays and Wireless Beamforming Networks

    David Jenn; Yong Loke; Tong Chin Hong Matthew; Yeo Eng Choon; Ong Chin Siang; Yeo Siew Yam

    2009-01-01

    Distributed phased arrays have advantages over conventional arrays in many radar and communication applications. Additional advantages are realized by replacing the microwave beamforming circuit by a wireless network, thus forming a wirelessly networked distributed sensor array. This article examines various aspects of a distributed phased array that incorporates wireless beamforming. First, the fundamental array theory and digital signal processing are reviewed. Basic equations are presented...

  6. Reliability of wireless sensor networks.

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  7. Distributed Greedy Scheduling for Multihop Wireless Networks

    Sunny, Albert; Kuri, Joy

    2010-01-01

    We consider the problem of scheduling in multihop wireless networks subject to interference constraints. We consider a graph based representation of wireless networks, where scheduled links adhere to the K-hop link interference model. We develop a distributed greedy heuristic for this scheduling problem. Further, we show that this distributed greedy heuristic computes the exact same schedule as the centralized greedy heuristic.

  8. Performance Analysis of IIUM Wireless Campus Network

    Abd Latif, Suhaimi; Masud, Mosharrof H.; Anwar, Farhat

    2013-12-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement.

  9. Performance Analysis of IIUM Wireless Campus Network

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  10. How to model wireless mesh networks topology

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  11. Distributed wireless quantum communication networks

    The distributed wireless quantum communication network (DWQCN) has a distributed network topology and transmits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum teleportation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entanglement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. (general)

  12. Wireless sensor networks in chemical industry

    Recent advances in wireless technology are a clear indication of the commercial promise of wireless networks. Industrial wireless sensing has now become more economical, efficient and secure as compared to traditional wired sensing. Wireless Sensor Networks (WSN) are successfully being used for process monitoring and control of many industrial plants. This paper explores how Chemical Industry in particular can benefit from the application of WSN technology. Various examples of successful implementation are cited. In order to address the industrial requirements, we propose a low power and low cost solution for process monitoring by implementing WSN. (author)

  13. Protocols for high-efficiency wireless networks

    Andreadis, Alessandro

    2007-01-01

    Preface. Part I: Mobile Communication Systems and Technologies. 1. Multiple access techniques for wireless systems. 2. The global system for mobile communications. 3. Mobile systems. 4. Satellite communications. 5. Mobile communications beyond 3G. Part II : Scheduling Techniques, Access Schemes and Mobile Internet Protocols for Wireless Communication Systems. 1. General concepts on radio resource management. 2. Traffic models. 3. RRM in GPS. 4. RRM in WCDMA. 5. RRM in UTRA-TDD. 6. RRM in wireless microcellular systems. 7. RRM in LEO-MSSS. 8. Analytical methods for RRM analysis and final consid

  14. Analyzing the Low Power Wireless Links for Wireless Sensor Networks

    Mamun, Md Mainul Islam; Kumar, Sumon; Islam, Md Zahidul

    2010-01-01

    There is now an increased understanding of the need for realistic link layer models in the wireless sensor networks. In this paper, we have used mathematical techniques from communication theory to model and analyze low power wireless links. Our work provides theoretical models for the link layer showing how Packet Reception Rate vary with Signal to Noise Ratio and distance for different modulation schemes and a comparison between MICA2 and TinyNode in terms of PRR.

  15. Contemporary Developments in Wireless Sensor Networks

    Sangeeta Mittal

    2012-04-01

    Full Text Available Wireless Sensor Networks (WSN since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software, Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent networks, sensor enabled smartness and role of artificial intelligence methods is elaborated. Insight into future directions & research avenues in all the above areas is provided

  16. A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network

    2005-01-01

    OAM (Operations, Administration and Maintenance) system is a very important component of 3G cellular network. In order to acquire overall management, fast response and steady operation, an SCTP (Stream Control Transmission Protocol) based OAM, i. e. , SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its transport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experimental results prove the proposed SOAM system achieves better performance on signaling transmission compared with conventional TCP based OAM system.

  17. Proxy SDN Controller for Wireless Networks

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  18. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai

    2011-08-01

    Full Text Available Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment channel, payment carrier and etc. After deep studying about previous payment methods and future 3G communication technology, this paper introduces a new mobile payment model by combining with IC chip, mobile phone and mobile internet, and then gives some improvement measures for current settlement mechanisms in the network transaction, which is entirely around payment channel, payment carrier, security authentication and other key issues in 3G environment. The real time processing of information flow, capital flow and logistics in mobile environment can be easily achieved, forming a complete and reliable business operation for mobile users, which can bring some great conveniences and profound influences for mobile payment industry.

  19. Resilient networking in wireless sensor networks

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  20. Location based Network Optimizations for Mobile Wireless Networks

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  1. The art of wireless sensor networks

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  2. Reliable Multihop Wireless Network Based on Neighbor Node Behavior

    Nobayashi, Daiki

    2011-01-01

    1 Introduction||2 Wireless LAN Technologies and Multihop Wireless Network||3 Access Point Evaluation with Packet Transfer Ratio in Multi-hop Wireless Network||4 Design and Implementation of Reputation Mechanism for Multihop Wireless Network||5 A Network Reconfiguring Scheme against Misbehaving Nodes||6 Concluding Remarks

  3. Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks

    Lu Lou

    2012-04-01

    Full Text Available Location-based services (LBS provide content that is dynamically customized according to the user's location. These services are commonly delivered to mobile devices. Due to wireless bandwidth limit, broadcasting based transmission technology is one of main methods to provide dynamic real-time information or public emergency for commercial LBS applications. Multimedia Broadcast and Multicast Services (MBMS is a broadcasting service offered via existing GSM and UMTS cellular networks. MBMS has the major benefit that the network infrastructure already exists for mobile network operators and the deployment can be cost effective compared with building a new network for the services. However, Location-based services historically were built as stand-alone applications that did not communicate easily with other applications and systems. Therefore, open standards will be a necessary catalyst for LBS growth. This paper proposes a novel LBS application framework based on the TPEG protocol (transport protocol experts group over MBMS and explains the implement of that using the stream delivery method and download delivery method. For download service, Results of performance tests for FLUTE protocol (File Delivery under unidirectional Transport and FEC (Forward error correction are also presented.

  4. Wireless Networks for Body-Centric Communications

    Martelli, Flavia

    2013-01-01

    Progress in miniaturization of electronic components and design of wireless systems paved the way towards ubiquitous and pervasive communications, enabling anywhere and anytime connectivity. Wireless devices present on, inside, around the human body are becoming commonly used, leading to the class of body-centric communications. The presence of the body with all its peculiar characteristics has to be properly taken into account in the development and design of wireless networks in this con...

  5. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  6. Forest Fire Prevention using Wireless Sensor Networks

    PRASHANTH; Prof. K ASHOK BABU

    2012-01-01

    Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messag...

  7. Wireless communications networks for the smart grid

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  8. Planning Wireless Networks by Shortest Path

    Carlo Mannino; Sara Mattia; Antonio Sassano

    2009-01-01

    Transmitters and receivers are the basic elements of wireless networks and are characterized by a number of radio-electrical parameters. The generic planning problem consists in establishing suitable values for these parameters so as to optimize some network performance indicator. The version here addressed, namely the Power Assignment Problem (PAP), is the problem of assigning transmission powers to the transmitters of a wireless network so as to maximize the satisfied demand. This problem h...

  9. Lightweight Intrusion Detection in Wireless Sensor Networks

    Riecker, Michael

    2015-01-01

    Wireless sensor networks have become a mature technology. They are increasingly being used in different practical applications. Examples include the monitoring of industrial environments and light adaptation in tunnels. For such applications, attacks are a serious concern. A disrupted sensor network may not only have a financial impact, but could also be safety-critical. Hence, the availability of a wireless sensor network is our key protection goal in this thesis. A special challenge lies in...

  10. Multilayer Statistical Intrusion Detection in Wireless Networks

    Noureddine Boudriga; Amel Meddeb-Makhlouf; Mohamed Hamdi

    2008-01-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The archite...

  11. Energy-efficient adaptive wireless network design

    Havinga, Paul J. M.; Smit, Gerard J.M.; Bos, Martinus

    2000-01-01

    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an energy-efficient highly adaptive architecture of a network interface and novel data link layer protocol for wireless networks that provides quality of service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations are necessary to achieve energy efficiency and an acceptable quality of service. The paper provides a review of ideas and...

  12. Secure Multipath routing in Wireless Sensor Networks

    Ravindra Gupta; Hema Dhadhal

    2012-01-01

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possib...

  13. Routing Security in Ad Hoc Wireless Networks

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  14. Characterizing User Mobility in Wireless Networks

    Nunes, Bruno Astuto Arouche

    2012-01-01

    n this work we study mobile wireless networks by looking at mobility management and analysis of human mobility, focusing on the main goal of understanding human mobility and applying our findings on developing new realistic mobility models for simulations. In our work, we start by analyzing Wireless Local Area Networks (WLAN) and GPS traces that record mobility in a variety of network environments. We observe that from a macroscopic level, human mobility is symmetric. We also study the direct...

  15. Approaches to Wireless Sensor Network: Security Protocols

    Harmandeep Singh; Garima Malik

    2011-01-01

    The advancement of electronics and wireless communication technologies have enabled the development of large scale wireless sensor network that consist of many low-power, low-cost and small size sensor nodes. With the help of sensor network we facilitate large scale and real time data processing even in complex environment. The proliferation of sensor application has increased the need of security in sensor network. At the beginning WSN were not built keeping the security in mind because sens...

  16. An Enhancement of Authentication Protocol and Key Agreement (AKA For 3G Mobile Networks

    Mustafa AL-Fayoumi

    2011-05-01

    Full Text Available This paper proposes a secure authentication mechanism by integrating the public key with the hash-chaining technique. The propose protocol satisfies the security requirements of third generation (3G mobile networks. Also provide the protection of the international mobile subscriber identity (IMSI to ensure subscriber un-traceability, key refreshment periodically, strong key management and a new non-repudiation service in a simple and elegant way. The proposed protocol is more secure protocol than the other available authentication protocols. To avoid the complicated synchronization as in universal mobile telecommunications system (UMTS the proposed protocol does not use sequence number (SEQ, the management of a hash chain is simple and elegant compared to that of SEQ. This proposed protocol is secure against network attacks, such as replay attacks, guessing attacks, and other attacks.

  17. Analyzing multimode wireless sensor networks using the network calculus

    2015-01-01

    The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N...

  18. New packet scheduling algorithm in wireless CDMA data networks

    Wang, Yu; Gao, Zhuo; Li, Shaoqian; Li, Lemin

    2002-08-01

    The future 3G/4G wireless communication systems will provide internet access for mobile users. Packet scheduling algorithms are essential for QoS of diversified data traffics and efficient utilization of radio spectrum.This paper firstly presents a new packet scheduling algorithm DSTTF under the assumption of continuous transmission rates and scheduling intervals for CDMA data networks . Then considering the constraints of discrete transmission rates and fixed scheduling intervals imposed by the practical system, P-DSTTF, a modified version of DSTTF, is brought forward. Both scheduling algorithms take into consideration of channel condition, packet size and traffic delay bounds. The extensive simulation results demonstrate that the proposed scheduling algorithms are superior to some typical ones in current research. In addition, both static and dynamic wireless channel model of multi-level link capacity are established. These channel models sketch better the characterizations of wireless channel than two state Markov model widely adopted by the current literature.

  19. Analysis and Testing of Mobile Wireless Networks

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  20. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective

    Alonso Zárate, Jesús; Kartsakli, Elli; Katz, Marcos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos

    2013-01-01

    Multi-Radio Cooperative Automatic Retransmission Request (MCARQ) schemes are introduced in this paper within the context of hybrid networks which combine long-range and short-range communications. Since the number of wireless devices is incessantly increasing, it is frequently possible to establish a spontaneous cooperative cluster in the close proximity of any wireless device. These devices forming the cluster are connected to both a cellular-based network such as WiMAX, 3G...

  1. Monitoring Greenhouse using Wireless Sensor Network

    Rohit.K.Nikhade

    2013-06-01

    Full Text Available Recent advances in science and technology havebeen ledto facilitate monitoring the environment,collecting data, processing the sensed data,threshold-decision making process and lastlyperforming of suitable actions by using ofdistributed wireless sensor networks and actornetworks. Wireless sensor actor networks (WSANis a combination of at least one coordinator nodewith sensors and actor nodes that communicatewirelessly to perform somespecifiedtasks ofsensing, monitoring and actuation.This papersummarizes an idea that can be carriedouttoprovide an efficient control mechanism ofmicroclimateinto greenhouses through theimplementation of aninfrastructure of WirelessSensors Network to control environmentalparameters.

  2. On computer vision in wireless sensor networks.

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  3. Securing radars using secure wireless sensor networking

    Tahmoush, David

    2014-06-01

    Radar sensors can be viewed as a limited wireless sensor network consisting of radar transmitter nodes, target nodes, and radar receiver nodes. The radar transmitter node sends a communication signal to the target node which then reflects it in a known pattern to the radar receiver nodes. This type of wireless sensor network is susceptible to the same types of attacks as a traditional wireless sensor network, but there is less opportunity for defense. The target nodes in the network are unable to validate the return signal, and they are often uncooperative. This leads to ample opportunities for spoofing and man-in-the-middle attacks. This paper explores some of the fundamental techniques that can be used against a limited wireless network system as well as explores the techniques that can be used to counter them.

  4. Coalitions in Cooperative Wireless Networks

    Mathur, Suhas; Mandayam, Narayan B

    2008-01-01

    Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coalition structure, i.e., set of coalitions from which users have no incentives to defect, depends on the manner in which the rate gains are apportioned among the cooperating users. Specifically, the stability of the grand coalition (GC), i.e., the coalition of all users, is studied. Transmitter and receiver cooperation in an interference channel (IC) are studied as illustrative cooperative models to determine the stable coalitions for both flexible (transferable) and fixed (non-transferable) apportioning schemes. It is shown that the stable sum-rate optimal coalition when only receivers cooperate by jointly decoding (transferable) is the GC. The stability of the GC depends on the detector when receivers cooperate using linear multiuser detectors (non-transferable). Transmitter cooperation is studied assuming that all receivers coopera...

  5. Mobility Management in beyond 3G-Environments

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan

    2003-01-01

    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi, GPRS, and UMTS networks. The GPRS and UMTS networks provide countrywide network access, while the WiFi networks provide network access in local areas such as city centres and airports. As a resul...

  6. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    Ramesh Babu H. S.

    2010-03-01

    Full Text Available The Call admission control (CAC is one of the Radio Resource Management (RRM techniques that plays influential role in ensuring the desired Quality of Service (QoS to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN. The proposed Fuzzy Neural call admission control (FNCAC scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compared to other two methods.

  7. Mobility and Handoff Management in Wireless Networks

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  8. Routing for wireless multi-hop networks

    Hamid, Sherin Abdel; Takahara, Glen

    2013-01-01

    The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

  9. Exposure optimization in indoor wireless networks by heuristic network planning

    Plets, David; Joseph, Wout; Vanhecke, Kris; Martens, Luc

    2013-01-01

    Due to the increased use of indoor wireless networks and the concern about human exposure to radio-frequency sources, exposure awareness has increased during recent years. However, current-day network planners rarely take into account electric-field strengths when designing networks. Therefore, in this paper, a heuristic indoor network planner for exposure calculation and optimization of wireless networks is developed, jointly optimizing coverage and exposure, for homogeneous or heterogeneous...

  10. 低辐射3G 网络基站选址优化∗%Optimized Planning of Low Electromagnetic Radiation 3G Network Base Station Location

    张英杰; 孙先佑; 毛赐平; 王镇道; 许伟; 汤龙波; 艾朝阳

    2015-01-01

    针对民众因担忧电磁辐射而投诉日益增多导致通信基站选址困难的现状,在考虑基站覆盖范围和建站成本的同时,兼顾基站电磁辐射对环境的影响,提出了面向低辐射的3G网络基站选址优化方案。通过对基站选址原则及其典型基站的电磁辐射模型分析,建立了基于多目标的基站评价模型,设计了基于改进的免疫优化算法3G 网络基站选址优化方案,并以模拟实验区域为对象进行了仿真实验测试。实验结果表明:本文提出的选址优化方案不仅能以较小的基站建设代价满足信号覆盖要求,同时也降低了基站电磁辐射的影响,获得了更好的社会效益。%Increasingly more people are worried about the electromagnetic radiation of the communica-tion network base station.The growing number of complaints has made base station siting difficult.This paper considered base station coverage and costs,while taking into account the impact of electromagnetic radiation on the environment of the base station.An optimized low electromagnetic radiation 3G network base stations site selection scheme was proposed in this paper.With the base station siting principles and an analysis of the electromagnetic radiation of typical base stations,this paper established a base station evaluation model based on multi-objective design optimization algorithm and proposed a 3G network base station site selection method based on improved immune optimization.A simulation area was set up for simulation tests.The results show that the proposed base station optimization program can not only meet the coverage requirements with relatively smaller construction cost,but also reduce the impact of electro-magnetic radiation for better social benefits.

  11. Performance Control in Wireless Sensor Networks

    Lindh, Thomas; Orhan, Ibrahim

    2009-01-01

    This paper presents an implementation of a method for performance control in wireless body sensor networks based on measurement feedback, especially targeted for demanding healthcare applications.

  12. An Enhancement of Authentication Protocol and Key Agreement (AKA For 3G Mobile Networks

    Mustafa AL-Fayoumi

    2011-05-01

    Full Text Available This paper proposes a secure authentication mechanism by integrating the public key with thehash-chaining technique. The propose protocol satisfies the security requirements of thirdgeneration (3G mobile networks. Also provide the protection of the international mobilesubscriber identity (IMSI to ensure subscriber un-traceability, key refreshment periodically,strong key management and a new non-repudiation service in a simple and elegant way. Theproposed protocol is more secure protocol than the other available authentication protocols. Toavoid the complicated synchronization as in universal mobile telecommunications system (UMTSthe proposed protocol does not use sequence number (SEQ, the management of a hash chain issimple and elegant compared to that of SEQ. This proposed protocol is secure against networkattacks, such as replay attacks, guessing attacks, and other attacks.

  13. Transmit Power Optimisation in Wireless Network

    Besnik Terziu

    2011-01-01

    Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS) for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Inter...

  14. ECDH power consumption in wireless sensor networks

    Kukuseva, Maja; Citkuseva Dimitrovska, Biljana

    2013-01-01

    Elliptic Curve Cryptography is cryptographic scheme that combines low power usage for key generation and high level of security in constrained Wireless Sensor Networks. Each sensor node is powered by a battery that should last for long period. This constrains wireless sensor networks in terms of energy usage. Another critical issue is secure communications ant thus, the development of cryptographic scheme is difficult and challenging task. Elliptic Curve Diffie- Hellman is secu...

  15. Wireless Sensor Networks for Ambient Assisted Living

    Raúl Aquino-Santos; Diego Martinez-Castro; Arthur Edwards-Block; Andrés Felipe Murillo-Piedrahita

    2013-01-01

    This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very s...

  16. Emulating Wired Backhaul with Wireless Network Coding

    Thomsen, Henning; de Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first component of our solution consists of a two-way, two-phase communication between the macro base station and a user in a small cell through the small cell base station. The second component consists of a...

  17. Intrusion detection and monitoring for wireless networks.

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  18. Audio coding in wireless acoustic sensor networks

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt;

    2015-01-01

    In this paper, we consider the problem of source coding for a wireless acoustic sensor network where each node in the network makes its own noisy measurement of the sound field, and communicates with other nodes in the network by sending and receiving encoded versions of the measurements. To make...

  19. A Survey on Energy Efficiency for Wireless Mesh Network

    Sarra Mamechaoui; Fedoua Didi; Guy Pujolle

    2013-01-01

    Reducing CO2 emissions is an important global environmental issue. Over the recent years, wireless and mobile communications have increasingly become popular with consumers. An increasingly popular type of wireless access is the so-called Wireless Mesh Networks (WMNs) that provide wireless connectivity through much cheaper and more flexible backhaul infrastructure compared with wired solutions. Wireless Mesh Network (WMN) is an emerging new technology which is being adopted as the wireless in...

  20. 4G Wireless Networks: Opportunities and Challenges

    Gobjuka, Hassan

    2009-01-01

    With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions.

  1. Forest Fire Prevention using Wireless Sensor Networks

    PRASHANTH

    2012-01-01

    Full Text Available Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messages to the control center through the network, thus we can achieve the remote control of the forest fire.

  2. Topological properties of random wireless networks

    Srikanth K Iyer; D Manjunath

    2006-04-01

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the issues of interest in random wireless networks. We then discuss some recent results for one-dimensional networks with the nodes distributed uniformly in $(0, z)$.We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally we discuss some recent generalisations in considering non uniform transmission ranges and non uniform node distributions. An annotated bibliography of some of the recent literature is also provided.

  3. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes. PMID:25379521

  4. Performance Analysis of Wireless Networks With MDQOS

    A. Leelavathi

    2014-07-01

    Full Text Available In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users. This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns

  5. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  6. Enhance Throughput in Wireless Sensor Network Using Topology Control Approach

    Parikha Chawla; Parmender Singh; Taruna Sikka

    2012-01-01

    This paper is associated with implementation of topology control approach to enhance throughput in wireless sensor network. A wireless sensor network is characterized by limited energy supply and large nodes. To maximise the network lifetime of wireless sensor network the topology control is the considered to be the important process. Every attempt is being made to reduce the energy consumption and to enhance throughput of the wireless sensor node. Topology Control aims at network-wide goals,...

  7. Case Study of Wireless Networking for Small Business

    Rehan Jamil, Irfan Jamil, Muhammad Ismail, Naveed Ur Rehman

    2015-01-01

    Mobile and wireless networks have undergone rapid changes and have seen an unprecedented growth during the last few years. Traditional ways of networking have changed to accommodate new lifestyles and newer ways of working. Wireless networks offer several advantages over fixed or wired networks through mobility, flexibility, ease of access, speed of deployment, and low cost. Flexibility of wireless networks facilitates rapid deployment. Finally, this paper identifies the benefits of wireless ...

  8. Routing in Wireless Networks with Position Trees

    Chavez, Edgar; Mitton, Nathalie; Tejeda, Hector

    2007-01-01

    Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing protocols are preferred because sensor networks have limited battery life. Location aware routing protocols are good candidates for sensor network applications, nevertheless they need either an external location service like GPS or Galileo (which are bulky, energy consuming devices) or internal location services prov...

  9. Wireless Sensor Networks for Ambient Assisted Living

    Raúl Aquino-Santos

    2013-11-01

    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  10. A Control and Management Network for Wireless ATM Systems

    Bush, Stephen F.; Jagannath, Sunil; Evans, Joseph B.; Frost, Victor; Minden, Gary; Shanmugan, K. Sam

    1999-01-01

    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reus...

  11. Agent routing algorithm in wireless sensor networks

    Zhang, Yuqing; Yang, Shuqun

    2013-03-01

    Wireless sensor networks are a new technology of information acquisition and processing, so they are widely used in all kinds of fields. In the paper we introduce Agent technology into the wireless sensor network, conduct a in-depth research on the four routing schemes, and propose a new improved routing scheme, which considers the energy consumption of both nodes and path. Furthermore, The scheme we proposed has efficient routing function, can balance the energy consumption of nodes and extends the lifetime of the network in a more efficient way.

  12. Wireless vehicular networks for car collision avoidance

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  13. Intelligent Communication Module for Wireless Biosensor Networks

    Naik, R.; Singh, J.; Le, H. P.

    2010-01-01

    This chapter presented a new paradigm of biosensors which have processing capability with an intelligent and adaptive wireless communication module. The adaptive communication module efficiently reconfigures its hardware components according to the changes in operating environment in order to reduce system power consumption and optimally utilise resources. The chapter presented several significant applications of wireless biosensor networks which hold enormous potential to benefit the communi...

  14. TCP Performance in Heterogeneous Wireless Networks

    Sarolahti, Pasi

    2007-01-01

    The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropri...

  15. Modeling Multistandard Wireless Networks in OPNET

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  16. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  17. Wireless Sensor Network Software Design Rules

    Strazdiņš, Ģirts

    2014-01-01

    Abstract In the last decade wireless sensor networks (WSNs) have evolved as a promising approach for smart investigation of our planet, providing solutions for environment and wild animal monitoring, security system development, human health telemonitoring and control, industrial manufacturing and other domains. Lack of unified standards and methodologies leads to limited sensor network solution interoperability and portability. Significant number of WSN operating systems...

  18. Service discovery in heterogeneous wireless networks

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible imple

  19. IPv6 for Future Wireless Networks

    Nielsen, Thomas Toftegaard

    2001-01-01

    enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...... wireless network....

  20. Energy-Harvesting Wireless Sensor Networks

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio;

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....

  1. Flexible network wireless transceiver and flexible network telemetry transceiver

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  2. Modify LEACH Algorithm for Wireless Sensor Network

    Mortaza

    2011-09-01

    Full Text Available Research on wireless sensor networks has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Prolonged network lifetime, scalability, and load balancing are important requirement for many sensor network applications. Clustering sensor nodes is an effective technique for achieving these goals. In this work, we introduce an energy efficient clustering algorithm for sensor networks based on the LEACH protocol. LEACH (Low Energy Adaptive Clustering Hierarchy is one of popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA based MAC protocol, and In order to maintain a balanced energy consumption. The proposed protocol adds feature to LEACH to reduce the consumption of the network resource in each round. The proposed protocol is simulated and the results show a significant reduction in network energy consumption compared to LEACH.

  3. Wireless local area network. A new technology of network

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  4. Spatial Throughput Maximization of Wireless Powered Communication Networks

    Che, Yue Ling; Duan, Lingjie; Zhang, Rui

    2014-01-01

    Wireless charging is a promising way to power wireless nodes' transmissions. This paper considers new dual-function access points (APs) which are able to support the energy/information transmission to/from wireless nodes. We focus on a large-scale wireless powered communication network (WPCN), and use stochastic geometry to analyze the wireless nodes' performance tradeoff between energy harvesting and information transmission. We study two cases with battery-free and battery-deployed wireless...

  5. Intrusion detection in wireless ad-hoc networks

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  6. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  7. Wireless sensor network for sodium leak detection

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  8. An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

    A.Sandeep Kumar ,Second Author

    2012-01-01

    wireless mesh networks (WMNs) has been widely used for the new generation wireless network. The capability of self-organization in WMNs reduces the complexity of wireless network deployment and maintenance. So, the perfect estimation of the bandwidth available of the mesh nodes is the required to admission control mechanism which provides QOs confirmation in wireless mesh networks. The bandwidth estimation of schemes do not give clear output. Here we are proposing bandwidth scheme estimation ...

  9. Ad hoc mobile wireless networks principles, protocols, and applications

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  10. Denial of service attacks and challenges in broadband wireless networks

    Khan, S.; Loo, KK; Naeem, T; Khan, MA

    2008-01-01

    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromis...

  11. Integrating Wireless Networking for Radiation Detection

    Board, Jeremy; Barzilov, Alexander; Womble, Phillip; Paschal, Jon

    2006-10-01

    As wireless networking becomes more available, new applications are being developed for this technology. Our group has been studying the advantages of wireless networks of radiation detectors. With the prevalence of the IEEE 802.11 standard (``WiFi''), we have developed a wireless detector unit which is comprised of a 5 cm x 5 cm NaI(Tl) detector, amplifier and data acquisition electronics, and a WiFi transceiver. A server may communicate with the detector unit using a TCP/IP network connected to a WiFi access point. Special software on the server will perform radioactive isotope determination and estimate dose-rates. We are developing an enhanced version of the software which utilizes the receiver signal strength index (RSSI) to estimate source strengths and to create maps of radiation intensity.

  12. Emulating Wired Backhaul with Wireless Network Coding

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... component of our solution consists of a two-way, two-phase communication between the macro base station and a user in a small cell through the small cell base station. The second component consists of an optimized adjustment of the transmit power from the macro base station during the multiple access phase......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  13. Dynamic Packet Scheduling in Wireless Networks

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference...

  14. Intrusion Detection Systems in Wireless Sensor Networks

    Vijay Kumar Mallarapu; K.V.D.Sagar

    2012-01-01

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their severe resource constrictions. In this paper, we describ...

  15. Teamwork and Collaboration in Cognitive Wireless Networks

    Doyle, Linda; NOLAN, KEITH EDWARD

    2007-01-01

    PUBLISHED This article looks at the principles and significant potential of teamwork in cognitive networks. These concepts represent a new evolutionary stage in the development of cognitive radio and cognitive networks, where wireless communication progresses from an individual, device-centric approach toward group and team behavior. This creates the potential for more effective and more robust communication solutions when deemed necessary. The key elements of effective cognitive network t...

  16. Stochastic petri nets for wireless networks

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  17. Future Wireless Networks and Information Systems Volume 1

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  18. A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure

    Biswajit Bhowmik

    2013-01-01

    Full Text Available Wireless and Mobile Network Infrastructure services generally examine how different infrastructure providers are positioning themselves to compete in wireless services. These services analyze the opportunities and challenges facing by the infrastructure providers selling to wireless and mobile network operators worldwide. The opportunities and challenges are the review of strategies, market positioning, and future direction in the market for wireless and mobile network infrastructure. The service covers all generations of wireless and mobile network infrastructure: 2G, 2.5G, 3G, and 4G so on global in scope. Majority of the users are mobile while availing these services. Mobility is the most important feature of any wireless and mobile network. Usually, continuous service is achieved by supporting handoff from one cell to another. Poorly designed handoff schemes tend to generate very heavy signaling traffic and, thereby, lead to a dramatic decrease in quality of service. In this paper we make a comparison study on some selective traffic models with priority handoff scheme. The study shows how a handoff procedure has a significant impact on wireless mobile network performance on the basis of two primary criteria – Blocking probability of originating calls and the forced termination probability of ongoing calls. In addition to this the study shows arrival rate of handoff calls, and approximate number of mobile users that get serviced by underlying base station.

  19. Network coding at different layers in wireless networks

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  20. Building new access network using reconfigurable optical grid network and wireless network

    Qiu, Yinghui; Wu, Runze; Ji, Yuefeng; Xu, Daxiong

    2007-11-01

    Recently wireless mesh network has been gaining increasing attention and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premise. In this paper, we propose a novel access network using reconfigurable optical burst switching grid network and wireless mesh network. The proposed access network architecture saves network deployment cost because fiber need not penetrate to each end user. We also propose a hierarchical routing protocol to enhance the routing efficiency.

  1. Secure Wireless Sensor Networks: Problems and Solutions

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  2. Load balancing in integrated optical wireless networks

    Yan, Ying; Dittmann, Lars; Wong, S-W.;

    2010-01-01

    In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely with the...... issues are outlined and a cost function based optimization model is developed for power management. In particularly, two alternative feedback schemes are proposed to report wireless network status. Simulation results show that our proposed load balancing mechanism improves network performances....... integrated control scheme so as to maximize overall network throughput in the integrated network architecture. To the best of our knowledge no load balancing mechanisms, especially based on the Multi-Point Control Protocol (MPCP) defined in the IEEE 802.3ah, have been proposed so far. The major research...

  3. Cooperative wireless networks for better green services

    Yang Yang; Zhang Wuxiong; Hu Honglin; Zhang Sihai; Wang Xin; Zhao Haitao; Zhou Wuyang; Wei Jibo

    2011-01-01

    In order to guarantee the overall return on investment ( ROI), improve user experience and quality of service (QoS), save energy, reduce electra magnetic interference (EMI) and radiation pollution, and enable the sustainable deployment of new profitable applications and services in heterogeneous wireless networks coexistence reality, this paper proposes a cross-network cooperation mechanism to effectively share network resources and infrastructures, and then adaptively control and match multi-network energy distribution characteristics according to actual user/service requirements in different geographic areas. Some idle or lightly-loaded base stations ( BS or BSs) will be temporally turned off for saving energy and reducing EMI. Initial simulation results show that the proposed approach can significantly improve the overall energy efficiency and QoS performance across multiple cooperative wireless networks.

  4. Quality of service for tactical wireless networks

    Ordower, Rick; Newman, Nisha; Myrtle, Jeremy

    2010-04-01

    Applications resident on tactical wireless networks are levying increasing offered loads. Tradeoffs can be made between range and throughput, but the wireless network is destined to be considered a limitation in information transfer. If managed correctly, the network can be an intelligent aid in ensuring the right information gets to the right place at the right time. Over the last 5 years, SAIC has worked with Natick Soldier Center (NSRDEC) to provide reliable communication with guaranteed service quality for the dismounted soldier. The effort utilizes a series of tools to mark, shape, condense, fragment and persist information for congestion and corruption control. The critical aspect of the congestion control solution is accomplished by adaptively throttling lower priority information at the sending node before it gets pushed to the wireless realm. Of note is that the solution adapts through passive processes without control messages. The solution also implements compression of messages and images, along with fragmentation techniques to alleviate congestion. Information corruption is purely a radio phenomenon and cannot be overcome through cognitive solutions. However, the solution mitigates corruption through information persistence and reliable retransmission. The implemented solution, unlike Transport Control Protocol, is optimized for wireless networks and demonstrates reduction of added signaling traffic. Combined congestion and corruption techniques have demonstrated how soldiers can get the right information at the right time during high traffic loads or network segmentation.

  5. Securing Wireless Sensor Networks: Security Architectures

    David Boyle

    2008-01-01

    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  6. Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays

    Whitbeck, John; Leguay, Jérémie; Conan, Vania; de Amorim, Marcelo Dias

    2010-01-01

    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. However, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-...

  7. Ad hoc mobile wireless networks principles, protocols and applications

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  8. Matching Theory for Future Wireless Networks: Fundamentals and Applications

    Gu, Yunan; Saad, Walid; Bennis, Mehdi; Debbah, Merouane; Han, Zhu

    2014-01-01

    The emergence of novel wireless networking paradigms such as small cell and cognitive radio networks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In this paper, the first comprehensive tutorial on the use of matching theory, a Nobelprize winning framework, for resource management in wireless networks is develop...

  9. Wireless Network Communications Overview for Space Mission Operations

    Fink, Patrick W.

    2009-01-01

    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  10. Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network

    Prof.N.Penchalaiah

    2010-08-01

    Full Text Available The convergence of mobile technologies will characterize the future telecommunication systems based on TCP/IP protocols. These Protocols can be used to build both wired and wireless parts on same platform. But TCP/IP headers overheads are large, so it utilizes more bandwidth even small services, whose payload is small. So it definitely needheader compression to save bandwidth, as we know bandwidth is the most expensive and scared resource in wireless systems.There are many approaches used to compress the headers overloads. Most commonly used approaches are, an adaptive robust TCP/IP header compression lgorithm for 3G wireless networks and an adaptive robust header compression algorithm based on UDP-RTS/CTS handshake for real-timestreams in wireless networks such a 3G platforms. But these approaches are not efficient in adaptive nature. So In this paper we are proposing one approach to solve the problem efficiently even in adaptive nature. The aim of this algorithm is to adjust the dimension of Variable Sliding Window (VSW in W-LSB encoding with the accurate estimation of wireless channel state to achieve the good balance of compression ratio and error-resistant robustness for the adaptive use in wireless link. We present simulation results that demonstrate theeffectiveness of this adaptive algorithm over wireless link and comparative study of existing approaches

  11. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Novarun Deb; Manali Chakraborty; Nabendu Chaki

    2011-01-01

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS) that are solely designed to de...

  12. Wireless Network Security Vulnerabilities and Concerns

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  13. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  14. Deploying a Wireless Sensor Network in Iceland

    K.; Martinez; Hart, J. K.; Ong, R.

    2009-01-01

    A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Advances in base station and sensor node design as well as initial results are described.

  15. Problem solving for wireless sensor networks

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  16. Synchronized Data Aggregation for Wireless Sensor Network

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...

  17. Clock Synchronization for Multihop Wireless Sensor Networks

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  18. Power Optimization in Wireless Sensor Networks

    Debmalya Bhattacharya

    2011-09-01

    Full Text Available Wireless Sensor Networks (WSNs consist of a network of wireless nodes that have the capability to sense a parameter of interest. Sensors of various types are deployed ubiquitously and pervasively in varied environments such as office buildings, wildlife reserves, battle fields, mobile networks, etc The sensed parameter is relayed to a base station through the network formed amongst these nodes. The devices used are typically characterized by low cost, low power and are rugged in operation. The node integrates programming, computation, communication, and sensing onto a single system and provides an easy user interface for operating and deploying it. The paper presents such a design which minimizes cost and power consumption, thus enhancing the life time of the node.

  19. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    Rung-Ching Chen

    2010-03-01

    Full Text Available Normal 0 0 2 false false false MicrosoftInternetExplorer4 A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject to very different types of attacks compare to wired networks. In this paper, we propose an isolation table to detect intrusion by hierarchical wireless sensor networks and to estimate the effect of intrusion detection. The primary experiment proves that isolation table intrusion detection can prevent attacks effectively.

  20. Advanced routing protocols for wireless networks

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  1. Classification of Attacks in Wireless Sensor Networks

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  2. Enhanced Wireless Network Ad Hoc Pattern

    M. Kamalakannan; V. Khanaa

    2012-01-01

    Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns and detailed local radio interactions. This study examines these factors alone and in combination, using simulation and analysis from first principles. Our results include both specific constants and general relationship Scaling helpful in understanding t...

  3. Survey of propagation Model in wireless Network

    Hemant Kumar Sharma; Sanjeev Sharma; Krishna Kumar Pandey

    2011-01-01

    To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, ref...

  4. Security Analysis in Wireless Sensor Networks

    Murat Dener

    2014-01-01

    In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. The paper also presents characteristics, security requir...

  5. Software Update Recovery for Wireless Sensor Networks

    Brown, Stephen; Sreenan, Cormac J.

    2009-01-01

    Updating software over the network is important for Wireless Sensor Networks in support of scale, remote deployment, feature upgrades, and fixes. The risk of a fault in the updated code causing system failure is a serious problem. In this paper, we identify a single, critical, symptom loss-of-control, that complements exception-based schemes, and supports failsafe recovery from faults in software updates. We present a new software update recovery mechanism that uses loss-ofc...

  6. Secure Multi-Purpose Wireless Sensor Networks

    Jacobi, Daniel

    2016-01-01

    Wireless sensor networks (WSNs) were made possible around the late 1990s by industry scale availability of small and energy efficient microcontrollers and radio interfaces. Application areas for WSNs range from agriculture to health care and emergency response scenarios. Depending on the scenario a sensor network can span from some rooms to an area of several square miles in size and so the number of sensor nodes can vary from a fistful of nodes to hundreds or thousands. Sensor nodes are comp...

  7. Performance Analysis of Asynchronous Multicarrier Wireless Networks

    Lin, Xingqin; Jiang, Libin; Andrews, Jeffrey G.

    2014-01-01

    This paper develops a novel analytical framework for asynchronous wireless networks deploying multicarrier transmission. Nodes in the network have different notions of timing, so from the viewpoint of a typical receiver, the received signals from different transmitters are asynchronous, leading to a loss of orthogonality between subcarriers. We first develop a detailed link-level analysis based on OFDM, based on which we propose a tractable system-level signal-to-interference-plus-noise ratio...

  8. Review of Wireless Sensor Networks- Architecture and Applications

    Mr. Kuntal Saroha; Mrs. Ruchika Lochab; Mr. Puneet Garg

    2011-01-01

    Wireless sensor networks (WSN) are currently receiving significant attention due to their unlimited potential. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability. In this Paper, I Concentrate on Architecture and the applications of Wireless SensorNetworks .I have also mentioned future scope of WSN. The network must possess self-organizing capabilities since thepositions of individual nodes are not predetermined.

  9. Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks Coverage

    Bing Cheng

    2014-01-01

    Efficient network coverage and connectivity are the requisites for most Wireless Sensor Network deployments, particularly those concerned with area monitoring. The Coverage Control Technology is one of the basic technologies of wireless sensor network, and is mainly concerned about how to prolong the network lifetime on the basis of meeting users’ perception demand. To optimize wireless sensor networks coverage, an algorithm which is based on particle swarm optimization with dynamic clo...

  10. Resource Allocation in Wireless Networks

    Jordan, Scott

    1996-01-01

    Wireless services are one of the strongest growth areas in telecommunications today. Dynamic channel allocation schemes have garnered a considerable amount of attention as methods for achieving efficient use of system resources. Various combinations of permanent channel assignment, channel borrowing, shared pools of channels, channel ordering, channel reassignment, and dynamic adjustment of parameters have been suggested. In this paper, we suggest a categorization of dynamic channel allocatio...

  11. Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

    Mutter, T.F.

    2009-01-01

    Traditional wireless networks form the wireless counterpart of wired networks, in which providing infrastructure is the main functionality. High bandwidth is the primary goal and the unlimited power supply is an important characteristic of traditional wireless networks. On the other hand, Wireless S

  12. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  13. Game theory for wireless communications and networking

    Zhang, Yan

    2011-01-01

    Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applica

  14. An underwater optical wireless communication network

    Arnon, Shlomi

    2009-08-01

    The growing need for underwater observation and sub-sea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, bio-geochemical, evolutionary and ecological changes in the sea, ocean and lake environments and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. We present models of three kinds of optical wireless communication links a) a line-of-sight link, b) a modulating retro-reflector link and c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered lighted it was possible to mitigate this decrease in some cases. We conclude from the analysis that a high data rate underwater optical wireless network is a feasible solution for emerging applications such as UUV to UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  15. Wireless Sensor Network for Medical Applications

    Hanady S.Ahmed

    2015-06-01

    Full Text Available This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals.

  16. Wireless sensor networks principles, design and applications

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  17. Quality of service in wireless networks over unlicensed spectrum

    Nahrstedt, Klara

    2011-01-01

    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireles

  18. Channel models for wireless body area networks.

    Takizawa, Kenichi; Aoyagi, Akahiro; Takada, Jun-Ichi; Katayama, Norihiko; Yekeh, Kamya; Takehiko, Yazdandoost; Kohno, Kobayashi Ryuji

    2008-01-01

    Wireless patient monitoring using wearable sensors is a promising application. This paper provides stochastic channel models for wireless body area network (WBAN) on the human body. Parameters of the channel models are extracted from measured channel transfer functions (CTFs) in a hospital room. Measured frequency bands are selected so as to include permissible bands for WBAN; ultra wideband (UWB), the industry, science and medical (ISM) bands, and wireless medical telemetry system (WMTS) bands. As channel models, both a path loss model and a power delay profile (PDP) model are considered. But, even though path loss models are derived for the all frequency bands, PDP model is only for the UWB band due to the highly frequency selectiveness of UWB channels. The parameters extracted from the measurement results are summarized for each channel model. PMID:19162968

  19. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li

    2011-01-01

    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  20. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor

    2013-01-01

    Full Text Available This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM, Rogue Access Points (RAP, Denial Of Services (DoS and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD, devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

  1. Worm Epidemics in Wireless Adhoc Networks

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  2. Worm epidemics in wireless ad hoc networks

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  3. Worm epidemics in wireless ad hoc networks

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  4. Hack Recognition In Wireless Sensor Network

    B. Srinivasulu

    2014-09-01

    Full Text Available A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

  5. Cross-platform wireless sensor network development

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open-source dev......Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open......-source development environment that takes a holistic approach to implementing sensor network applications. Users build applications using a drag-and-drop visual programming language Open Blocks, a language that Google selected for its App Inventor for Android. Tinylnventor uses cross-platform programming concepts...

  6. Priority image transmission in wireless sensor networks

    The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.

  7. Wireless Sensor Network Handles Image Data

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  8. Data aggregation in wireless sensor networks using the SOAP protocol

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  9. STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK

    MANJU.V.C

    2011-10-01

    Full Text Available In recent years, the design and implementation of the wireless sensor networks is widely chosen for research as sensor networks enable application that connects the physical world to the virtual world. Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor networks are prone to more attacks than wired networks. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networksinfeasible. This paper studies the security aspects of wireless sensor networks. A survey with current threats and countermeasures is carried out, in particular, explored the protocol layer attack on sensor networks.

  10. Data aggregation in wireless sensor networks using the SOAP protocol

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  11. Efficient data communication protocols for wireless networks

    Zeydan, Engin

    In this dissertation, efficient decentralized algorithms are investigated for cost minimization problems in wireless networks. For wireless sensor networks, we investigate both the reduction in the energy consumption and throughput maximization problems separately using multi-hop data aggregation for correlated data in wireless sensor networks. The proposed algorithms exploit data redundancy using a game theoretic framework. For energy minimization, routes are chosen to minimize the total energy expended by the network using best response dynamics to local data. The cost function used in routing takes into account distance, interference and in-network data aggregation. The proposed energy-efficient correlation-aware routing algorithm significantly reduces the energy consumption in the network and converges in a finite number of steps iteratively. For throughput maximization, we consider both the interference distribution across the network and correlation between forwarded data when establishing routes. Nodes along each route are chosen to minimize the interference impact in their neighborhood and to maximize the in-network data aggregation. The resulting network topology maximizes the global network throughput and the algorithm is guaranteed to converge with a finite number of steps using best response dynamics. For multiple antenna wireless ad-hoc networks, we present distributed cooperative and regret-matching based learning schemes for joint transmit beanformer and power level selection problem for nodes operating in multi-user interference environment. Total network transmit power is minimized while ensuring a constant received signal-to-interference and noise ratio at each receiver. In cooperative and regret-matching based power minimization algorithms, transmit beanformers are selected from a predefined codebook to minimize the total power. By selecting transmit beamformers judiciously and performing power adaptation, the cooperative algorithm is shown to

  12. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  13. Influence of distortions of key frames on video transfer in wireless networks

    Sagatov, E S; Calyam, P

    2010-01-01

    In this paper it is shown that for substantial increase of video quality in wireless network it is necessary to execute two obligatory points on modernization of the communication scheme. The player on the received part should throw back automatically duplicated RTP packets, server of streaming video should duplicate the packets containing the information of key frames. Coefficients of the mathematical model describing video quality in wireless network have been found for WiFi and 3G standards and codecs MPEG-2 and MPEG-4 (DivX). The special experimental technique which has allowed collecting and processing the data has been developed for calculation of values of factors.

  14. Formation And Maintenance of Self-Organizing Wireless Networks

    Scott, Keith; Bambos, Nicholas

    1997-01-01

    There are numerous military, commercial, and scientific applications for mobile wireless networks which are able to self-Organize without recousre to any pre-existing infrastructure. We present the Self Organizing Wireless Adaptive Network protocol, a distributed networking protocol capable of managing such networks.

  15. Scalable Video Streaming in Wireless Mesh Networks for Education

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  16. 47 CFR 27.1305 - Shared wireless broadband network.

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network....

  17. 47 CFR 90.1405 - Shared wireless broadband network.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network....

  18. Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks

    Lee, Seunghyun; Zhang, Rui; Huang, Kaibin

    2013-01-01

    Wireless networks can be self-sustaining by harvesting energy from ambient radio-frequency (RF) signals. Recently, researchers have made progress on designing efficient circuits and devices for RF energy harvesting suitable for low-power wireless applications. Motivated by this and building upon the classic cognitive radio (CR) network model, this paper proposes a novel method for wireless networks coexisting where low-power mobiles in a secondary network, called secondary transmitters (STs),...

  19. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    Wei Ni Ni; Song Yi

    2016-01-01

    The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the...

  20. Power distribution and performance analysis for wireless communication networks

    Zhao, Dongmei

    2012-01-01

    This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless communicat

  1. STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK

    MANJU.V.C

    2011-01-01

    In recent years, the design and implementation of the wireless sensor networks is widely chosen for research as sensor networks enable application that connects the physical world to the virtual world. Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor networks are prone to more attacks than wired networks. However, the hardware simplicity of these devices makes defense mechanisms d...

  2. Performance Monitoring and Control in Wireless Sensor Networks

    Orhan, Ibrahim

    2012-01-01

    Wireless personal area networks have emerged as an important communication infrastructure in areas such as at-home healthcare and home automation, independent living and assistive technology, as well as sports and wellness. Wireless personal area networks, including body sensor networks, are becoming more mature and are considered to be a realistic alternative as communication infrastructure for demanding services. However, to transmit data from e.g., an ECG in wireless networks is also a cha...

  3. Enhanced Wireless Network Ad Hoc Pattern

    M. Kamalakannan

    2012-06-01

    Full Text Available Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns and detailed local radio interactions. This study examines these factors alone and in combination, using simulation and analysis from first principles. Our results include both specific constants and general relationship Scaling helpful in understanding the limitations of wireless ad hoc networks. We examine interactions of the 802.11 MAC and ad hoc forwarding and the effect on capacity for several simple configurations and traffic patterns. While 802.11 discovers reasonably good schedules, we nonetheless observe capacities markedly less than optimal for very simple chain and lattice networks with very regular traffic patterns. We validate some simulation results with experiments. We also show that the traffic pattern determines whether an ad hoc network’s per node capacity will scale to large networks. In particular, we show that for total capacity to scale up with network size the average distance between source and destination nodes must remain small as the network grows. Nonlocal traffic patterns in which this average distance grows with the network size result in a rapid decrease of per node capacity.

  4. DMT of Wireless Networks: An overview

    Vinodh, K; Kumar, Vijay P; Lalitha, V; Prakash, N

    2010-01-01

    The e�cient operation of single-source, single-sink wireless network is considered with the diversity-multiplexing gain tradeo� (DMT) as the measure of performance. Whereas in the case of a point-to-point MIMO channel the DMT is determined by the fading statistics, in the case of a network, the DMT is additionally, a function of the time schedule according to which the network is operated, as well as the protocol that dictates the mode of operation of the intermediate relays.In general,...

  5. Cooperative networking in a heterogeneous wireless medium

    Ismail, Muhammad

    2013-01-01

    This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in

  6. Intrusion Detection Systems in Wireless Sensor Networks

    Vijay Kumar Mallarapu

    2012-01-01

    Full Text Available Wireless Sensor Networks (WSNs are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their severe resource constrictions. In this paper, we describe various threats to WSN and then examine existing approaches to identify these threats. Finally, we propose an intrusion detection mechanism based on these existing approaches to identifying threats.

  7. Security for multi-hop wireless networks

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  8. Wireless sensor networks distributed consensus estimation

    Chen, Cailian; Guan, Xinping

    2014-01-01

    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  9. An Intelligent Handover Management System for Future Generation Wireless Networks

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  10. Key Management in Wireless Sensor Networks

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  11. High fidelity wireless network evaluation for heterogeneous cognitive radio networks

    Ding, Lei; Sagduyu, Yalin; Yackoski, Justin; Azimi-Sadjadi, Babak; Li, Jason; Levy, Renato; Melodia, Tammaso

    2012-06-01

    We present a high fidelity cognitive radio (CR) network emulation platform for wireless system tests, measure- ments, and validation. This versatile platform provides the configurable functionalities to control and repeat realistic physical channel effects in integrated space, air, and ground networks. We combine the advantages of scalable simulation environment with reliable hardware performance for high fidelity and repeatable evaluation of heterogeneous CR networks. This approach extends CR design only at device (software-defined-radio) or lower-level protocol (dynamic spectrum access) level to end-to-end cognitive networking, and facilitates low-cost deployment, development, and experimentation of new wireless network protocols and applications on frequency- agile programmable radios. Going beyond the channel emulator paradigm for point-to-point communications, we can support simultaneous transmissions by network-level emulation that allows realistic physical-layer inter- actions between diverse user classes, including secondary users, primary users, and adversarial jammers in CR networks. In particular, we can replay field tests in a lab environment with real radios perceiving and learning the dynamic environment thereby adapting for end-to-end goals over distributed spectrum coordination channels that replace the common control channel as a single point of failure. CR networks offer several dimensions of tunable actions including channel, power, rate, and route selection. The proposed network evaluation platform is fully programmable and can reliably evaluate the necessary cross-layer design solutions with configurable op- timization space by leveraging the hardware experiments to represent the realistic effects of physical channel, topology, mobility, and jamming on spectrum agility, situational awareness, and network resiliency. We also provide the flexibility to scale up the test environment by introducing virtual radios and establishing seamless signal

  12. Coal mine gas monitoring system based on wireless sensor network

    WANG Jian; WANG Ru-lin; WANG Xue-min; SHEN Chuan-he

    2007-01-01

    Based on the nowadays'condition.it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems.The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system.Apply with multilayer data fuse to design working tactics,and import the artificial neural networks to analyze detecting result.The wireless sensors system communicates with the controI center through the optical fiber cable.All the gas sensor nodes distributed in coal mine are combined into an intelligent,flexible structure wireless network system.forming coal mine gas monitoring system based on wireless sensor network.

  13. Virtual network functions orchestration in wireless networks

    Riggio, Roberto; Bradai, Abbas; Rasheed, Tinku; Schulz-Zander, Julius; Kuklinski, Slawomir; Ahmed, Toufik

    2015-01-01

    Network Function Virtualization (NFV) is emerging as one of the most innovative concepts in the networking landscape. By migrating network functions from dedicated mid-dleboxes to general purpose computing platforms, NFV can effectively reduce the cost to deploy and to operate large networks. However, in order to achieve its full potential, NFV needs to encompass also the radio access network allowing Mobile Virtual Network Operators to deploy custom resource allocation solutions within their...

  14. Wireless Communication Networks' Planning in Underdeveloped Countries%Wireless Communication Networks' Planning in Underdeveloped Countries

    XU Rui

    2012-01-01

    The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general

  15. Wireless smart shipboard sensor network

    Nozik, Andrew B.

    2005-01-01

    This thesis studies the feasibility of developing a smart shipboard sensor network. The objective of the thesis is to prove that sensors can be made smart by keeping calibration constants and other relevant data such as network information stored on the sensor and a server computer. Study will focus on the design and implementation of an Ipsil IP(micro)8930 microcontroller, which is then connected, by the standard TCP/IP implementation, to a network where the sensor information can be see...

  16. COGRADNET: UBIQUITOUS HETEROGENEOUS WIRELESS NETWORKS

    MOHD HASBULLAH OMAR

    2009-06-01

    Full Text Available Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in terms of spectrum usage can be realized. Cognitive radio system is one of the advancement that enhanced the adaptive capabilities of the systems that make the usage of spectrum more efficient, versatile and flexible. It also able to adapt their operations based on its internal and external factors by sensing its environment. The cognitive radio systems may be a solution for the spectrum scarcity faced by developer to tackle the issue of signal propagation and bigger coverage for broadband internet access. This paper will addressed the cognitive radio technology for ubiquitous broadband wireless internet access.

  17. Contactless Biometrics in Wireless Sensor Network: A Survey

    Razzak, Muhammad Imran; Khan, Muhammad Khurram; Alghathbar, Khaled

    Security can be enhanced through wireless sensor network using contactless biometrics and it remains a challenging and demanding task due to several limitations of wireless sensor network. Network life time is very less if it involves image processing task due to heavy energy required for image processing and image communication. Contactless biometrics such as face recognition is most suitable and applicable for wireless sensor network. Distributed face recognition in WSN not only help to reduce the communication overload but it also increase the node life time by distributing the work load on the nodes. This paper presents state-of-art of biometrics in wireless sensor network.

  18. A novel compound chaotic block cipher for wireless sensor networks

    Tong, Xiao-Jun; Wang, Zhu; Liu, Yang; Zhang, Miao; Xu, Lianjie

    2015-05-01

    The nodes of wireless sensor network (WSN) have limited calculation and communication ability. Traditional encryption algorithms need large amounts of resources, so they cannot be applied to the wireless sensor network. To solve this problem, this paper proposes a block cipher algorithm for wireless sensor network based on compound chaotic map. The algorithm adopts Feistel network and constructs a Cubic function including discretized chaotic map, and its key is generated by the compound chaotic sequence. Security and performance tests show that the algorithm has high security and efficiency, low resource depletion. So the novel chaotic algorithm is suitable for the wireless sensor networks.

  19. Internet roaming: a WLAN/3G integration system for enterprises

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul

    2002-08-01

    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  20. Secure Communication in Stochastic Wireless Networks

    Pinto, Pedro C; Win, Moe Z

    2010-01-01

    Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, the intrinsically secure communications graph (iS-graph) is defined from the point of view of information-theoretic security. Conclusive results are provided for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. It is shown how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. Sectorized transmission and eavesdroppe...

  1. Multiple Antenna Secure Broadcast over Wireless Networks

    Liu, Ruoheng

    2007-01-01

    In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with perfect secrecy. That is, each user would like to obtain its own message reliably and confidentially. First, a computable Sato-type outer bound on the secrecy capacity region is provided for a multi-antenna broadcast channel with confidential messages. Next, a dirty-paper secure coding scheme and its simplified version are described. For each case, the corresponding achievable rate region is derived under the perfect secrecy requirement. Finally, two numerical examples demonstrate that the Sato-type outer bound is consistent with the boundary of the simplified dirty-paper coding secrecy rate region.

  2. Localization in Wireless Networks Foundations and Applications

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  3. Novel Concepts of Cooperative Wireless Networking

    Zhang, Qi

    2008-01-01

    and the concept of wireless device resource. It is promising to solve the crucial issues that cannot be easily tackled in conventional network architectures. Different cooperative strategies or schemes according to cooperation concept are proposed in the thesis to solve crucial issues in different wireless....... These two cooperative schemes are used for downlink traffic. In addition to that, cooperation is also applied to uplink access. One4all cooperative uplink access strategy is proposed for WLAN to reduce the collision probability to save energy. Cooperation concept is also applied in spectrum sensing...... for a cognitive radio MAC protocol. Finally, a novel modulation, hierarchical modulation, is used to facilitate the uplink transmission in cooperative networks. Simulation and analytical analysis has been conducted. Great potentials of cooperation are shown in improving the energy effciency, spectrum effciency...

  4. SITRUS: Semantic Infrastructure for Wireless Sensor Networks.

    Bispo, Kalil A; Rosa, Nelson S; Cunha, Paulo R F

    2015-01-01

    Wireless sensor networks (WSNs) are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks), which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS. PMID:26528974

  5. SITRUS: Semantic Infrastructure for Wireless Sensor Networks

    Kalil A. Bispo

    2015-10-01

    Full Text Available Wireless sensor networks (WSNs are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks, which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  6. Towards Self-Powered Wireless Sensor Networks

    SPENZA, DORA

    2013-01-01

    Ubiquitous computing aims at creating smart environments in which computational and communication capabilities permeate the word at all scales, improving the human experience and quality of life in a totally unobtrusive yet completely reliable manner. According to this vision, an huge variety of smart devices and products (e.g., wireless sensor nodes, mobile phones, cameras, sensors, home appliances and industrial machines) are interconnected to realize a network of distributed agents that co...

  7. Distributed Cooperative Caching In Social Wireless Network

    Dimple Pandya; Manan Shah

    2014-01-01

    This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders inclu...

  8. Geographic Wormhole Detection in Wireless Sensor Networks

    Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin

    2015-01-01

    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both special...

  9. Security Overview of Wireless Sensor Network

    Modares, Hero; Moravejosharieh, Amirhossein; Salleh, Rosli; Lloret, Jaime

    2013-01-01

    There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and secure routing, have not able to protect the WSN, effectively but a new Intrusion Detection System (IDS) can overcome these problems. The IDS collects data for analysis in order to identify any abnormal behaviour at the sensor nodes, which if pr...

  10. Convergecast in Wireless Body Area Networks

    Badreddine, Wafa; Khernane, Nesrine; Potop-Butucaru, Maria; Chaudet, Claude

    2015-01-01

    Wireless Body Area Networks (WBAN) is a recent challenging area in the domain of health monitoring. There are several concerns in this area ranging from energy efficient communication to designing delays efficient protocols that support nodes dynamicity induced by human body mobility. This paper focuses on the convergecast or data gathering protocols in WBAN. Our contribution is twofold. First, we extensively analyze the impact of postural body mobility on various classes of multi-hop conver...

  11. Cloud-assisted Wireless Body Area Networks

    Ullah, Sana; Vasilakos, Athanasios; Chao, Han-Chieh; Suzuki, Junichi

    2014-01-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology for medical and non-medical applications. WBANs consist of a number of miniaturized, portable, and autonomous sensor nodes that are used for long-term health monitoring of patients. These sensor nodes continuously collect information of patients, which are used for ubiquitous health monitoring. In addition, WBANs may be used for managing catastrophic events and increasing the effectiveness and performance of rescue for...

  12. EESA Algorithm in Wireless Sensor Networks

    Pei Zhang; Lu Feng

    2014-01-01

    Since there are many problems of traditional extended clustering algorithm in wireless sensor network like short extended time, over energy consumption, too many deviated position the of cluster head nodes and so on, this paper proposes the EESA algorithm. The algorithm makes many improvements on the way of dividing clusters, strategy of electing the cluster head and construction method of data relay path, the two aspects of inter-cluster energy balance and energy balance among the cluster ar...

  13. Wireless network-on-chip: a survey

    Shuai Wang; Tao Jin

    2014-01-01

    To alleviate the complex communication problems arising in the network-on-chip (NoC) architectures as the number of on-chip components increases, several novel interconnect infrastructures have been recently proposed to replace the traditional on-chip interconnection systems that are reaching their limits in terms of performance, power and area constraints. Wireless NoC (WiNoC) is among the most promising scalable interconnection architectures for future generation NoCs. In this study, the au...

  14. Deploying rural community wireless mesh networks

    Ishmael, J; Bury, S.; Pezaros, D.; Race, N. J. P.

    2008-01-01

    Inadequate Internet access is widening the digital divide between town and countryside, degrading both social communication and business advancements in rural areas. Wireless mesh networking can provide an excellent framework for delivering broadband services to such areas. With this in mind, Lancaster University deployed a WMN in the rural village of Wray over a three-year period, providing the community with Internet service that exceeds many urban offerings. The project gave researchers...

  15. OPTICS Based Coverage in Wireless Sensor Network

    Adak, Chandranath

    2014-01-01

    This paper deals with the coverage problem of wireless sensor network. We use the density based clustering technique - OPTICS to cover a target region with less number of sensor nodes. OPTICS works well to identify the outliers, core points and it obtains the denser regions. We define a level of acceptance to find next appropriate sensor in the region. We eliminate overlapped area and obtain a decision tree to minimally cover up the target region.

  16. A secure middleware for wireless sensor networks

    Vairo, Claudio; Albano, Michele; Chessa, Stefano

    2008-01-01

    SMEPP Light is a middleware for Wireless Sensor Networks (WSNs) based on mote-class sensors. It is derived from the specification developed under the framework of the SMEPP pro ject, to deal with the hardware and software constraints of WSNs. SMEPP Light features group management, group- level security policies, mechanisms for query injection and data collection based on a subscribe/event mechanism, and adaptable energy efficiency mechanisms. In this paper we present the SMEPP Light specifica...

  17. How to secure a wireless sensor network

    Law, Yee Wei; Paul J. M. Havinga

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the implementors¿ adoption of the technologies. We answer the challenge by proposing a guidelines according to which WSN security can be implemented in practice

  18. Network Management Framework for Wireless Sensor Networks

    Kim, Jaewoo; Jeon, Hahnearl; Lee, Jaiyong

    Network Management is the process of managing, monitoring, and controlling the network. Conventional network management was based on wired network which is heavy and unsuitable for resource constrained WSNs. WSNs can have large scale network and it is impossible to manage each node individually. Also, polling mechanism of Simple Network Management Protocol (SNMP) impose heavy management traffic overhead. Since management messages consume resources of WSNs, it can affect the performance of the network. Therefore, it is necessary for WSNs to perform energy efficient network management. In this paper, we will propose network management framework. We will introduce cluster-based network management architecture, and classify the Management Information Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.

  19. Experiment of Wireless Sensor Network to Monitor Field Data

    Kwang Sik Kim

    2009-08-01

    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  20. CAC AND BDS FOR MAXIMIZING THE CAPACITY OF ENHANCED 3G NETWORK

    Er. SONIA JINDAL,

    2010-10-01

    Full Text Available The crucial issues in cellular network for service provider is to provide the guaranteed quality of service (QoS, minimizing the dropping rate (DR for handoff calls, blocking rate (BR for new calls and most important is to increasing the capacity of network . This paper purposes two concepts in WCDMA network i.e call admissioncontrol (CAC by considering distance of the cell as a deciding factor in order to minimize BR and DR .Our work is useful in the case when call can not transfer to lightly loaded cell as done in load balancing with cell breathing concept and blocked due to non availability of bandwidth then bandwidth degradation scheme (BDS is used to increase the capacity of a cell/overall network and also to assign priority to the handoff calls over new call.

  1. Key handling in wireless sensor networks

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  2. Interference Mitigation in Large Random Wireless Networks

    Aldridge, Matthew

    2011-01-01

    A central problem in the operation of large wireless networks is how to deal with interference -- the unwanted signals being sent by transmitters that a receiver is not interested in. This thesis looks at ways of combating such interference. In Chapters 1 and 2, we outline the necessary information and communication theory background, including the concept of capacity. We also include an overview of a new set of schemes for dealing with interference known as interference alignment, paying special attention to a channel-state-based strategy called ergodic interference alignment. In Chapter 3, we consider the operation of large regular and random networks by treating interference as background noise. We consider the local performance of a single node, and the global performance of a very large network. In Chapter 4, we use ergodic interference alignment to derive the asymptotic sum-capacity of large random dense networks. These networks are derived from a physical model of node placement where signal strength d...

  3. A Survey on Wireless Sensor Network Security

    Sen, Jaydip

    2010-01-01

    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

  4. Security in wireless sensor networks

    Oreku, George S

    2016-01-01

    This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

  5. Distance based (DBCP) Cluster Protocol for Heterogeneous Wireless Sensor Network

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Clustering is an important concept to reduce the energy consumption and prolonging the life of a wireless sensor network. In heterogeneous wireless sensor network some of the nodes are equipped with more energy than the other nodes. Many routing algorithms are proposed for heterogeneous wireless sensor network. Stable Election Protocol (SEP) is one of the important protocol in this category. In this research paper a novel energy efficient distance based cluster protocol (DBCP) is proposed for...

  6. On Narrowband Interference Mitigation Methods for Robust Wireless Sensor Networks

    Moussavinik, Hessam

    2013-01-01

    In this dissertation different approaches to robustness in ultra wideband (UWB) wireless sensor networks, specifically biomedical applications, are studied. UWB wireless sensor networks are unlicensed users of the frequency spectrum and they can be interfered by signals from other licensed users/devices that are generally narrowband signals. Due to the relatively high power of narrowband interferences (NBI) UWB wireless sensor networks can strongly get affected and loose their performance. Th...

  7. Architecture and Routing Protocols for Smart Wireless Home Sensor Networks

    Yang Xu; Shuai Wu; Ruochen Tan; Zheng Chen; Min Zha; Tina Tsou

    2013-01-01

    As an important application domain of wireless sensor networks (WSN), wireless home sensor network (WHSN) can be built as a traditional WSN. However, when we consider its own character that plug-in sensors are fixed with AC power supply while mobile sensors are battery powered, traditional WSN techniques do not match well. In this paper, we propose a smart wireless home sensor network architecture with improved routing protocols. It is a hierarchical architecture in which AC-powered sensors a...

  8. Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    Taruna, S; Jain Kusum Lata; Purohit G.N

    2011-01-01

    Wireless Sensor Networks, are made of low-cost, low -power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of t he important performance factors for wireless senso r networks survivability be-cause nodes operate with limited battery power. In this paper we propose and analyze a new approach of zone based clustering hea d selection algorithm for wireless sensor network o f hom...

  9. Ant colony based routing in wireless sensor networks

    Varnika Bains; Kanchan Sharma

    2012-01-01

    Wireless Sensor Networks comprises of small sensor nodes communicating with each other in a network topology which keeps on varying. The wireless sensor nodes also known as motes have limited energy resources along with constraints on its computational and storage capabilities. Due to these restrictions coupled with its dynamic topology, routing in Wireless Sensor Networks (WSN) is a very challenging task. Routing protocols for WSN’s have to ensure reliable multi-hop communication under thes...

  10. Energy Efficient Load Balanced Routing Protocol for Wireless Sensor Networks

    Alghanmi Ali Omar; ChongGun Kim

    2014-01-01

    Due to the enormous applications of wireless sensor s, the research on wireless sensor networks remains active throughout the past two decades. Bec ause of miniaturization of sensor nodes and their limited batteries, the energy efficiency and energy balancing are the demand in-need to extend the life time of sensor networks. This study proposes an energy-aware directional routing protocol for stationary wireless sensor network. Th e routing ...

  11. Security Analysis of Routing Protocols in Wireless Sensor Networks

    Mohammad Sadeghi; Farshad Khosravi; Kayvan Atefi; Mehdi Barati

    2012-01-01

    In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of the...

  12. Smart parking service based on wireless sensor networks

    Yang, Jihoon; Portilla Berrueco, Jorge; Riesgo Alcaide, Teresa

    2012-01-01

    n this paper, we present the design and implementation of a prototype system of Smart Parking Services based on Wireless Sensor Networks (WSNs) that allows vehicle drivers to effectively find the free parking places. The proposed scheme consists of wireless sensor networks, embedded web-server, central web-server and mobile phone application. In the system, low-cost wireless sensors networks modules are deployed into each parking slot equipped with one sensor node. The state of the parking sl...

  13. Wireless networks for beamforming in distributed phased array radar

    Gomez Noris, Jose Saul

    2007-01-01

    The Wirelessly Networked Aperstructure Digital Phased Array Radar (WNADPAR) applies three relatively new concepts: Opportunistic, Aperstructure, and Wirelessly Networked Digital Architecture concepts. Using this approach almost the full length of the ship becomes the aperture of the phased array radar by placing the antenna elements at available open areas and having the power supply as the only wired connection. This thesis research addressed the wireless networking of the full-scale r...

  14. A Hybrid Distance Estimation for Wireless Body Sensor Networks

    Jae-Kyung Kim; Won-Sung Sohn; Kyeong Hur

    2013-01-01

    Wireless body area networks become a new research issue in recent years. In this paper, we propose hibernation and distance estimation schemes for wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for body sensor networks (BSNs). The proposed middleware platform is composed of hibernation and optimal short distance estimation solution. Firstly, this paper provides WUSB private channel allocation scheme at the m-periodic allocation hibernation of a WBAN superfra...

  15. An Advanced Wireless Sensor Network for Health Monitoring

    NITYA; PUSHPAM; MANINDER KAUR

    2013-01-01

    In this paper we propose a system architecture for smart healthcare based on an advanced Wireless Sensor Network(WSN). It specifically targets assisted-living residents and others who may benefit from continuous, remote health monitoring .It presents best practices in wireless sensor network design for health care applications. Based on the most important aspects like power efficiency and security which guide the development of a wireless sensor network based applications.

  16. Industrial wireless sensor networks applications, protocols, and standards

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  17. An Analytical Approach for Mobility Load Balancing in Wireless Networks

    Sarhan M. Musa; Mir, Nader F.

    2011-01-01

    Management of mobility especially balancing the load of handoff for wireless networks is an essential parameter for wireless network design and traffic study. In this paper, we present analytical mobility management in high speed wireless mobile networks focusing on factors such as the number of channel slots and offered load. We demonstrate the performance of handoffs with mobility consideration using several metrics including the alteration of states prior to reaching a cell boundary, the s...

  18. Community wireless network development in Ciudad Bolívar

    Luis F. Pedraza; Andrea Cepeda Ruiz; Dora Ballesteros

    2013-01-01

    The present paper illustrates the process of fully deploying a wireless network for the local community at Ciudad Bolívar (Bolivar wireless), an outer-city area with the highest poverty levels in Bogotá (Colombia). This paper shows implementation procedures and design stages for the nodes of the community wireless network. A mesh-based network topology and various Information and Communication Technology (ICT) applications are utilized. These applications are currently being used by the local...

  19. Performance Optimization of Wireless Infrastructure and Mesh Networks

    Pries, Jan Rastin

    2010-01-01

    Future broadband wireless networks should be able to support not only best effort traffic but also real-time traffic with strict Quality of Service (QoS) constraints. In addition, their available resources are scare and limit the number of users. To facilitate QoS guarantees and increase the maximum number of concurrent users, wireless networks require careful planning and optimization. In this monograph, we studied three aspects of performance optimization in wireless networks: resource opti...

  20. SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

    Mohammad Alwadi; Girija Chetty

    2015-01-01

    In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor networks, based on data mining formulation. The proposed adapting routing scheme for sensors for achieving energy efficiency from temperature wireless sensor network data set. The experimental validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network dataset shows that it is possible to achieve energy efficient environment monitoring fo...

  1. Simultaneous information and power transfer in wireless cooperative networks

    Ding, Zhiguo; Perlaza, Samir M.; Esnaola, Iñaki; Poor, H. Vincent

    2013-01-01

    —Simultaneous power and signal transfer over wireless channels is particularly important to communication scenarios with constrained energy, such as wireless sensor networks. This paper considers a wireless cooperative network with multiple pairs of sources and destinations communicating via a relay. The impact of various strategies of power allocation on the end-to-end transmission reliability in this cooperative network is studied. Both analytical and numerical results are developed to faci...

  2. Wireless sensor network for monitoring soil moisture and weather conditions

    A wireless sensor network (WSN) was developed and deployed in three fields to monitor soil water status and collect weather data for irrigation scheduling. The WSN consists of soil-water sensors, weather sensors, wireless data loggers, and a wireless modem. Soil-water sensors were installed at three...

  3. Hybrid RRM Architecture for Future Wireless Networks

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio;

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide...... and wide area respectively. The aim of this paper is twofold: first, it presents an architectural solution for scalable and hybrid radio resource management to efficiently integrate the different WINNER modes; second, it proposes a hybrid handover mechanism to exploit the availability of the different...

  4. An Improved Wireless Sensor Network Routing Algorithm

    Shengmei Luo; Xue Li; Yiai Jin; Zhixin Sun

    2015-01-01

    High performance with low power consumption is an essential factor in wireless sensor networks (WSN). In order to address the issue on the lifetime and the consumption of nodes in WSNs, an improved ad hoc on⁃demand distance vector rout⁃ing (IAODV) algorithm is proposed based on AODV and LAR protocols. This algorithm is a modified on⁃demand routing al⁃gorithm that limits data forwarding in the searching domain, and then chooses the route on basis of hop count and power consumption. The simulation results show that the algorithm can effectively reduce power consumption as well as prolong the network lifetime.

  5. Statistical modeling and analysis of interference in wireless networks

    Wildemeersch, Matthias

    2013-01-01

    In current wireless networks, interference is the main performance-limiting factor. The quality of a wireless link depends on the signal and interference power, which is strongly related to the spatial distribution of the concurrently transmitting network nodes, shortly denominated as the network ge

  6. Energy Efficient RFID Technique for Wireless Sensor Network- A Review

    Bhawna Mannan; Harmanjot Singh

    2014-01-01

    A wireless sensor network is a technology that provides monitoring. Wireless sensor play an important role in the processing of structural response data. This network also has some design issues. These issues become benchmark during deployment of the network. Energy consumption is also a design issue which we will discussed in this paper. GPS master will be deployed to overcome this problem.

  7. A Wireless Communications Laboratory on Cellular Network Planning

    Dawy, Z.; Husseini, A.; Yaacoub, E.; Al-Kanj, L.

    2010-01-01

    The field of radio network planning and optimization (RNPO) is central for wireless cellular network design, deployment, and enhancement. Wireless cellular operators invest huge sums of capital on deploying, launching, and maintaining their networks in order to ensure competitive performance and high user satisfaction. This work presents a lab…

  8. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  9. SECURE AND AUTHENTICATED SOURCE ROUTING IN WIRELESS NETWORKS

    Mukesh Singla

    2012-09-01

    Full Text Available Wireless networking is today’s glamour technology. Wecan hardly pick up a technology publication withoutencountering articles extolling its virtues or excoriating itsfaults. Wireless networking refers to technology thatenables two or more computers to communicate usingstandard network protocols, but without network cabling. Ifa user, application or company wishes to make dataportable, mobile and accessible then wireless networking isthe answer. A wireless networking system would rid of thedowntime you would normally have in a wired network dueto cable problems. It would also save time and money dueto the fact that you would spare the expense of installing alot of cables. Also, if a client computer needs to relocate toanother part of the office then all you need to do is movethe machine with the wireless network card [1].

  10. Wireless body sensor networks for health-monitoring applications

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  11. Energy Efficient Distributed Data Fusion In Multihop Wireless Sensor Networks

    Huang, Yi

    2010-01-01

    This thesis addresses a transmission energy problem for wireless sensor networks. There are two types of wireless sensor networks. One is single-hop sensor network where data from each sensor is directly transmitted to a fusion center, and the other is multihop sensor network where data is relayed through adjacent sensors. In the absence of a moving agent for data collection, multihop sensor network is typically much more energy efficient than single-hop sensor network since the former avoids...

  12. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  13. Flight Testing of Wireless Networking for Nanosat Launch Vehicles Project

    National Aeronautics and Space Administration — The innovation proposed here addresses the testing and evaluation of wireless networking technologies for small launch vehicles by leveraging existing nanosat...

  14. Intelligent Devices in Rural Wireless Networks

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  15. Applying physical layer network coding in wireless networks

    Shengli, Zhang

    2009-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput incre...

  16. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  17. Consideration of using 3G cellular network to monitor ABB’s remote circuit breakers

    Afolabi, Ibrahim

    2013-01-01

    Increase in the energy demand for domestic purposes as well as in the manufactur-ing industries has led to a rapid and proportional increase in the electrical energy production today. In meeting this huge electric consumption and demand, proper network and supply of electric power has to be in place from the electric energy generation stations to the final user i.e. the consumers at home, in offices and heavy manufacturing industries. Achieving this goal without mincing safety and securit...

  18. Enhanced Network Throughput of Wireless Network for Digital Video Transmission

    S.M. Koli

    2013-03-01

    Full Text Available Digital video transmission using wireless technology is an important functionality in multimediacommunication. Such wireless transmission considers various parameters of channel like reliability,quality of service (QoS, transmission rate, transmission delay etc. User datagram protocol (UDP is afast transmission protocol used by most of the real-time applications as it is suitable for delay sensitiveapplications like video and audio transmission. UDP does not provide flow control or error recovery anddoes not require connection management. Since more applications with real-time constraints areintroduced day by day, both over wired and over wireless, some improvements should be made in orderto obtain better end to end performance. This paper surveys the literature on real time communicationover wireless and suggests an intermediate solution providing more reliability in transmission usingadaptive error control mechanism. The idea used is to inject an adaptive amount of redundant packets(RPs in every sent block (or datagram in order to achieve a desired recovery rate at the receiverwithout using any retransmission mechanism. The technique used is called adaptive forward errorcontrol (AFEC and is implemented at physical layer. The network simulator NS-2 is used to evaluateAFEC and the simulation results indicate that the suggested methods can guarantee enhanced networkthroughput for video transmission in the high packet loss wireless network.

  19. Wireless traffic steering for green cellular networks

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  20. Energy Consumption in Wireless Sensor Networks

    JIN Yan; WANG Ling; YANG Xiao-zong; WEN Dong-xin

    2007-01-01

    Wireless sensor networks (WSNs) can be used to collect surrounding data by multi-hop. As sensor networks have the constrained and not rechargeable energy resource, energy efficiency is an important design issue for its topology. In this paper, the energy consumption issue under the different topology is studied. We derive the exact mathematical expression of energy consumption for the fiat and clustering scheme, respectively. Then the energy consumptions of different schemes are compared. By the comparison, multi-level clustering scheme is more energy efficient in large scale networks. Simulation results demonstrate that our analysis is correct from the view of prolonging the large-scale network lifetime and achieving more power reductions.

  1. Graphical Model Theory for Wireless Sensor Networks

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  2. Graphical Model Theory for Wireless Sensor Networks

    Davis, William B.

    2002-12-08

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  3. Frameless ALOHA Protocol for Wireless Networks

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses...... contention process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme....... the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current...

  4. Frameless ALOHA Protocol for Wireless Networks

    Stefanovic, Cedomir; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current contention process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme.

  5. Performance of International roaming Location Update in 3G and 4G networks

    Moshirian, Sanaz

    2015-01-01

    Since Mobile network operator (MNO) relies on many Business Support Systems (BSS) and Operation Support Systems (OSS) it should be assured that operator’s systems supports the requirements of the future.This thesis shall focus on the “start-to-end” aspects that must be considered to ensure that International Roaming continues to operate flawless. The thesis experience Long Term Evolution (LTE) in case of international roaming by measuring the end to end location update delay.In order to evalu...

  6. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  7. Detecting and Localizing Wireless Network Attacks Techniques

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  8. Influence of the Packet Size on the One-Way Delay in 3G Networks

    Arlos, Patrik; Fiedler, Markus

    We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation process on mobile access links is far less transparent to the user; still, its properties need to be known in order to minimize the impact of the network on application performance. This paper investigates the impact of the packet size on the minimal one-way delay for the uplink in third-generation mobile networks. For interactive and real-time applications such as VoIP, one-way delays are of major importance for user perception; however, they are challenging to measure due to their sensitivity to clock synchronisation. Therefore, the paper applies a robust and innovative method to assure the quality of these measurements. Results from measurements from several Swedish mobile operators show that applications can gain significantly in terms of one-way delay from choosing optimal packet sizes. We show that, in certain cases, an increased packet size can improve the one-way delay performance at best by several hundred milliseconds.

  9. Reliable Communication in Wireless Meshed Networks using Network Coding

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin;

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses this...... problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  10. An Efficient Management System for Wireless Sensor Networks

    Mei-Yu Lee; Yueh-Min Huang; Yi-Wei Ma; Jiann-Liang Chen

    2010-01-01

    Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP)-based sensor network management system was developed that is a convenient and effective way for managers to monitor and contro...

  11. Wireless Mesh Software Defined Networks (wmSDN)

    Detti, A.; Pisa, C.; Salsano, S.; Blefari-Melazzi, N.

    2013-01-01

    In this paper we propose to integrate Software Defined Networking (SDN) principles in Wireless Mesh Networks (WMN) formed by OpenFlow switches. The use of a centralized network controller and the ability to setup arbitrary paths for data flows make SDN a handy tool to deploy fine-grained traffic engineering algorithms in WMNs. However, centralized control may be harmful in multi-hop radio networks formed by commodity devices (e.g. Wireless Community Networks), in which node isolation and netw...

  12. Energy Efficient (EECP) Clustered Protocol for Heterogeneous Wireless Sensor Network

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Energy Conservation and prolonging the life of Wireless Sensor Network is one of the major issues in the wireless sensor network as sensor nodes are highly energy constrained devices. Many routing protocols have been proposed for sensor network, especially cluster based routing protocols. Cluster based routing protocols are best known for its energy efficiency, network stability and for increasing the life time of the sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of ...

  13. Node Heterogeneity for Energy Efficient Synchronization for Wireless Sensor Network

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    The energy of the node in the Wireless Sensor Networks (WSNs) is scare and causes the variation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the network sustains i.e. energy consumption. One way to increase the sustainability of network is the i......The energy of the node in the Wireless Sensor Networks (WSNs) is scare and causes the variation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the network sustains i.e. energy consumption. One way to increase the sustainability of network...

  14. New Applications for the Testing and Visualization of Wireless Networks

    Griffin, Robert I.; Cauley, Michael A.; Pleva, Michael A.; Seibert, Marc A.; Lopez, Isaac

    2005-01-01

    Traditional techniques for examining wireless networks use physical link characteristics such as Signal-to-Noise (SNR) ratios to assess the performance of wireless networks. Such measurements may not be reliable indicators of available bandwidth. This work describes two new software applications developed at NASA Glenn Research Center for the investigation of wireless networks. GPSIPerf combines measurements of Transmission Control Protocol (TCP) throughput with Global Positioning System (GPS) coordinates to give users a map of wireless bandwidth for outdoor environments where a wireless infrastructure has been deployed. GPSIPerfView combines the data provided by GPSIPerf with high-resolution digital elevation maps (DEM) to help users visualize and assess the impact of elevation features on wireless networks in a given sample area. These applications were used to examine TCP throughput in several wireless network configurations at desert field sites near Hanksville, Utah during May of 2004. Use of GPSIPerf and GPSIPerfView provides a geographically referenced picture of the extent and deterioration of TCP throughput in tested wireless network configurations. GPSIPerf results from field-testing in Utah suggest that it can be useful in assessing other wireless network architectures, and may be useful to future human-robotic exploration missions.

  15. AN Enhanced SINR-Based Call Admission Control in 3G Networks

    Moses Ekpenyong

    2011-11-01

    Full Text Available This paper presents the signal-to-interference plus noise ratio (SINR-based call admission control (CAC as an effective technique that guarantees signal quality for admitted users. We propose a CAC model that admits users as long as the SINR exceeds a threshold (th SINR . To reduce blocking, we ensure that the threshold level is maintained at a lower bound (lb thSINR −, convenient to keep the blocking probability ( Pb below a maximum value ( Pb−max. We simulate the CAC model with the Java programming language and evaluate the performance of the model. Simulation results show that our CAC scheme produce the expected performance that improves the network quality.

  16. A tutorial survey of topics in wireless networking: Part I

    Anurag Kumar; D Manjunath

    2007-12-01

    In this two part paper, we provide a survey of recent and emerging topics in wireless networking. We view the area of wireless networking as dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In the first part of the paper, we first survey the area by providing a taxonomy of wireless networks as they have been deployed. Then, we provide a quick tutorial on the main issues in the wireless ‘physical’ layer, which is concerned with transporting bits over the radio frequency spectrum. Then, we proceed to discuss some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In the second part of the paper, we first analyse random access wireless networks and pay special attention to 802·11 (Wi-Fi) networks. We then survey some topics in ad hoc multihop wireless networks, where we discuss arbitrary networks, as well as some theory of dense random networks. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  17. A tutorial survey of topics in wireless networking: Part II

    Anurag Kumar; D Manjunath

    2007-12-01

    This is the second part of the survey of recent and emerging topics in wireless networking. We provide an overview of the area of wireless networking as that of dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In Part I we provided a taxonomy of wireless networks as they have been deployed. We then provided a quick survey of the main issues in the wireless 'physical' layer. We then discussed some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In this part we begin with a discussion of random access wireless networks. We first provide an overview of the evolution of random access networks from Aloha to the currently popular 802·11 (Wi-Fi) networks. We then analyse the performance of the 802·11 random access protocol. We briefly discuss the problem of optimal association of nodes to Wi-Fi access points. Next, we consider topics in ad hoc multihop wireless networks. We first discuss topology and cross layer control. For the latter, we describe the important maximum weight link scheduling algorithm. The connectivity and capacity of randomly deployed networks are then analysed. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  18. Secure Routing in Wireless Mesh Networks

    Sen, Jaydip

    2011-01-01

    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are des...

  19. Small Worlds in the Tree Topologies of Wireless Sensor Networks

    Qiao, Li; Lingguo, Cui; Baihai, Zhang; Fan, Zhun

    In this study, the characteristics of small worlds are investigated in the context of the tree topologies of wireless sensor networks. Tree topologies, which construct spatial graphs with larger characteristic path lengths than random graphs and small clustering coefficients, are ubiquitous in...... wireless sensor networks. Suffering from the link rewiring or the link addition, the characteristic path length of the tree topology reduces rapidly and the clustering coefficient increases greatly. The variety of characteristic path length influences the time synchronization characteristics of wireless...

  20. Authentication Algorithm for Intrusion Detection in Wireless Networks

    A. K. Santra; Nagarajan S

    2012-01-01

    Security has been a major issue in wireless networks. In a wireless network, wireless devices are prone to be unauthorized accessing data or resources. Hence it becomes necessary to consider issues of security such as : 1. Authentication, 2. Access Control. Traditional methods of Authentication has been to assign user names and passwords. This is extremely vulnerable to be accessed and misused. Therefore, to overcome these problems, This paper proposes a method by which the Username and Passw...

  1. Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks

    Prathaban Mookiah; Walsh, John M.; Rachel Greenstadt; Dandekar, Kapil R.

    2013-01-01

    Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detect...

  2. Evaluation of Handover Protocols in Wireless ATM Networks

    Jamila Bhar; Ridha Ouni; Abdelhamid Helali; Salem Nasri

    2007-01-01

    The extension of the ATM infrastructure with wireless access and mobility offer a great service advantages and high traffic performances. Allowing the Wireless ATM network in order to maintain the already QoS of ATM networks, some protocols of wireline architecture should be updated. The adaptation of the existing protocols to wireless requires integrating radio access functionalities and terminal mobility management. This last is an important factor in provisioning multimedia applications ov...

  3. An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks

    Sen, Jaydip

    2011-01-01

    Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselves over possibly multi-hop paths with or without the involvement of MRs. User privacy and security...

  4. Spectral efficiency enhancement with interference cancellation for wireless relay network

    Yomo, Hiroyuki; De Carvalho, Elisabeth

    The introduction of relaying into wireless communication system for coverage enhancement can cause severe decrease of spectral efficiency due to the requirement on extra radio resource. In this paper, we propose a method to increase spectral efficiency in such a wireless relay network by employing...... distance of identical radio resource. We analyze a simple scenario with BS, single RS, and 2 MSs, and show that the proposed method has significant potential to enhance spectral efficiency in wireless relay networks....

  5. Security planning for wireless networks : DoD concerns

    Fowler, James D.

    1999-01-01

    Wireless networking is a rapidly emerging technology and security must be addressed as it is incorporated into new and existing local area networks (LANs). It is important to know what unique properties of wireless LANs might amplify existing LAN vulnerabilities or introduce new ones. Wireless transmission techniques, topologies, and vendor offerings were surveyed from a security perspective. Three rating systems were developed to analyze aspects of these survey areas. These areas were then r...

  6. System-level Modeling of Wireless Integrated Sensor Networks

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present ...

  7. Node coloring for dense wireless sensor networks

    Amdouni, Ichrak; Adjih, Cédric

    2011-01-01

    Coloring is used in wireless networks to improve communication efficiency, mainly in terms of bandwidth, energy and possibly end-to-end delays. In this research report, we define the h-hop node coloring problem, with h any positive integer. We prove that the associated decision problem is NP-complete. We then present a 3-hop distributed coloring algorithm that is optimized for dense networks: a node does not need to exchange the priorities and colors of its 2-hop neighbors. Through simulation results, we highlight the impact of priority assignment on the number of colors obtained for any network. We then focus on grids and identify a color pattern that can be reproduced to color the whole grid. We show how the coloring algorithm can use regularity properties to obtain a periodic color pattern with the optimal number of colors. We then consider grids with holes and study how to extend our results.

  8. Node clustering for wireless sensor networks

    Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network) and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted. Keywords: Clustering, Sensor Network, Static, Dynamic

  9. Overload Control for the Wireless Intelligent Network

    Zuojie Deng

    2014-02-01

    Full Text Available Wireless intelligent network (WIN is a network in the mobile environment that supports the use of intelligent network capabilities which is mainly made up of a service control point (SCP and some mobile switching centers (MSCs. When there are too more incoming services to SCP and MSCs in the WIN simultaneously than they can handle will cause the SCP or MSCs overload and degrades the performance of the WIN. To resolve this problem, we introduce a queue model, design an overload control model and put forward a two-level overload control algorithm for the WIN. The results of our analysis and experiments show that our overload control algorithm is effective

  10. Pivot Routing Improves Wireless Sensor Networks Performance

    Nancy El Rachkidy

    2012-06-01

    Full Text Available Nowadays, wireless sensor networks (WSNs are used in several applications such as environmental monitoring. When network size and data rate increase, congestion becomes as an important issue, especially when an emergency situation generates alarm messages in a specific area of the network. In this paper, we describe the pivot routing protocol named PiRAT, which avoids congested paths by using intermediate pivot nodes. Simulations show that PiRAT has better performance than previous protocols in terms of packet loss, end-to-end delay, congestion and node overload. Moreover, we show that the load-balancing ability of PiRAT allows it to benefit from nodes having independent low duty cycles.

  11. Fractional Power Control for Decentralized Wireless Networks

    Jindal, Nihar; Andrews, Jeffrey G

    2007-01-01

    We propose and analyze a new paradigm for power control in decentralized wireless networks, termed fractional power control. Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. Choosing s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0, 1) allows all intermediate policies between these two extremes to be evaluated, and we see that neither extreme is ideal. We prove that using an exponent of s = 1/2 optimizes the transmission capacity of an ad hoc network, meaning that the inverse square root of the channel strength is the optimal transmit power scaling. Intuitively, this choice achieves the optimal balance between helping disadvantaged users while making sure they do not flood the network with interference.

  12. Network Coding for Energy Efficiency in Wireless Body Area Networks

    Shi, Xiaomeng; Lucani, Daniel

    2010-01-01

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. We propose a simple network layer protocol, study the mean energy to complete in-cast transmissions of given packets from the sensors to the base station (BS), and show through numerical examples that this scheme can reduce the overall energy consumption. More specifically, Time Division Multiple Access (TDMA) is used to allocate the wireless channel to individual nodes. Each node linearly combines its data packets before taking turns to send the ensuing mixtures to the BS. An acknowledgement message is broadcasted by the BS after each round of transmissions, indicating the number of coded packets to be transmitted in the next round. We parametrically study the optimal number of coded packets to send, in terms of completion energy, given the packet erasure probabilities, and the energy use for transmitting data packets as well as listening...

  13. NEW CLUSTERING SCHEMES FOR WIRELESS SENSOR NETWORKS

    S. M. Mazinani

    2010-05-01

    Full Text Available In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECS-M that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability.  In the competition phase in contrast to EECS using a fixed competition range for any volunteer node, we assign a variable competition range to it that is related to its distance to base station. The volunteer nodes compete in their competition ranges and every one with more residual energy would become cluster head. In the second one, we develop a clustering protocol for single hop wireless sensor networks. In the proposed algorithm some of the nodes become volunteers to be cluster heads. We develop a time based competitive clustering algorithm that the advertising time is based on the volunteer node’s residual energy. We assign to every volunteer node a competition range that may be fixed or variable as a function of distance to BS. The volunteer nodes compete in their competition ranges and every one with more energy would become cluster head. In both proposed algorithms, our objective is to balance the energy consumption of the cluster heads all over the network. Simulation results show the more balanced energy consumption and longer lifetime.

  14. Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding

    Jen-Yeu Chen; Yi-Ying Tseng

    2012-01-01

    Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \\emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network and save the needed number of packet transmissions. Moreover, in an energy-constraint wireless network such as Wireless Sensor Network (a typical type of wireless ad hoc network), applying networ...

  15. Noncoherent fusion detection in wireless sensor networks

    Yang, Fucheng

    2013-01-01

    The main motivation of this thesis is to design low-complexity high efficiency noncoherent fusion rules for the parallel triple-layer wireless sensor networks (WSNs) based on frequency-hopping Mary frequency shift keying (FH/MFSK) techniques, which are hence referred to as the FH/MFSK WSNs. The FH/MFSKWSNs may be employed to monitor single or multiple source events (SEs)with each SE having multiple states. In the FH/MFSKWSNs, local decisions made by local sensor nodes (LSNs) are transmitted t...

  16. Improving Multicast Communications Over Wireless Mesh Networks

    Keegan, Brian

    2010-01-01

    In wireless mesh networks (WMNs) the traditional approach to shortest path tree based multicasting is to cater for the needs of the poorest performingnode i.e. the maximum permitted multicast line rate is limited to the lowest line rate used by the individual Child nodes on a branch. In general, this meansfixing the line rate to its minimum value and fixing the transmit power to its maximum permitted value. This simplistic approach of applying a single multicast rate for all nodes in the mult...

  17. NEW CLUSTERING SCHEMES FOR WIRELESS SENSOR NETWORKS

    Mazinani, S. M.; J. Chitizadeh; M. H. Yaghmaee; M. T. Honary; F. Tashtarian

    2010-01-01

    In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECS-M that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability.  In the competition phase in contrast to EECS using a fixed competition range for any volunteer no...

  18. Mobile middleware for wireless body area network.

    Chen, Xiang; Waluyo, Agustinus Borgy; Pek, Isaac; Yeoh, Wee-Soon

    2010-01-01

    This paper presents a flexible, efficient and lightweight Wireless Body Area Network (WBAN) Middleware. The Middleware is developed to bridge the communication between mobile device as a gateway and the sensor nodes, and therefore it shields the underlying sensor and OS/protocol stack away from the WBAN application layer. The middleware is coded in the form of lightweight dynamic link library, which allows the application developer to simply incorporate the middleware resource dynamic link library into their application and call the required functions (i.e. data acquisition, resource management and configurations). A showcase of the middleware deployment is exhibited at the end of the paper. PMID:21096294

  19. Power consumption in wireless access networks

    Deruyck, Margot; Vereecken, Willem; Tanghe, Emmeric; Joseph, Wout; Pickavet, Mario; Martens, Luc; Demeester, Piet

    2010-01-01

    The power consumption of wireless access networks will become an important issue in the coming years. In this paper the power consumption of base stations for mobile WiMAX, fixed WiMAX and UMTS is modelled. This power consumption is evaluated in relation to the coverage. For a physical bit rate of 2 Mbps, a power consumption of approximately 5600 W and a range of 1 km is obtained with UMTS. Fixed WiMAX covers 70 % and mobile WiMAX only 40 % of this range. However, fixed and mobile WiMAX consu...

  20. Wireless sensor networks from theory to applications

    El Emary, Ibrahiem M M

    2013-01-01

    Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and consider

  1. Wireless sensor networks and ecological monitoring

    Jiang, Joe-Air

    2013-01-01

    This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.  

  2. Transmit Power Optimisation in Wireless Network

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  3. Wireless sensor network for irrigation application in cotton

    A wireless sensor network was deployed in a cotton field to monitor soil water status for irrigation. The network included two systems, a Decagon system and a microcontroller-based system. The Decagon system consists of soil volumetric water-content sensors, wireless data loggers, and a central data...

  4. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  5. Failure impact on coverage in linear wireless sensor networks

    Mohamed, Nader; Al-Jaroodi, Jameela; Jawhar, Imad;

    2013-01-01

    Wireless Sensor networks (WSN) are used to monitor long linear structures such as pipelines, rivers, railroads, international borders, and high power transmission cables. In this case a special type of WSN called linear wireless sensor network (LSN) is used. One of the main challenges of using LSN...

  6. Wireless Networks : Analysis, Protocols, Architecture and Towards Convergence

    Kumar, P.R.

    2003-01-01

    International audience We present a brief account of some recent work of our group in four areas: i) Information theoretic limits on how much traffic wireless networks can carry. ii) Information theoretically optimal strategies for operating wireless networks. iii) Protocols for media access control, power control, clustering, and routing. iv) The importance of architecture in the oncoming convergence of control with communication and computing.

  7. Utilising eduroam[TM] Architecture in Building Wireless Community Networks

    Huhtanen, Karri; Vatiainen, Heikki; Keski-Kasari, Sami; Harju, Jarmo

    2008-01-01

    Purpose: eduroam[TM] has already been proved to be a scalable, secure and feasible way for universities and research institutions to connect their wireless networks into a WLAN roaming community, but the advantages of eduroam[TM] have not yet been fully discovered in the wireless community networks aimed at regular consumers. This aim of this…

  8. Convergence of wireless, wireline, and photonics next generation networks

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  9. Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

    Khan, S.; Jaime Lloret; Jonathan Loo

    2014-01-01

    Khan, S.; Lloret, J.; Loo, J. (2014). Intrusion Detection and Security Mechanisms for Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2014:1-3. doi:10.1155/2014/747483.

  10. Random access MAC protocols and system monitoring methodology in wireless mesh networks.

    Huang, F.

    2008-01-01

    As an extension of wireless Ad Hoc 1 and sensor 2 networks, wireless mesh networks (WMN) 3 have recently been developed as a key solution to provide high-quality multimedia services and applications, such as voice, data and video, over wireless personal area networks (WPAN) 4, wireless local area network (WXAN) 5 and wireless metropolitan area network (WMAN) 6. A WMN usually has a hierarchical network infrastructure with backbone and access networks operated in both Ad Hoc and centralized mod...

  11. Lifetime maximization routing with network coding in wireless multihop networks

    DING LiangHui; WU Ping; WANG Hao; PAN ZhiWen; YOU XiaoHu

    2013-01-01

    In this paper, we consider the lifetime maximization routing with network coding in wireless mul- tihop networks. We first show that lifetime maximization with network coding is different from pure routing, throughput maximization with network coding and energy minimization with network coding. Then we formulate lifetime maximization problems in three different cases of (i) no network coding, (ii) two-way network coding, and (iii) overhearing network coding. To solve these problems, we use flow augmenting routing (FA) for the first case, and then extend the FA with network coding (FANC) by using energy minimized one-hop network coding. After that, we investigate the influence of parameters of FANC, evaluate the performance of FANC with two-way and overhearing network coding schemes and compare it with that without network coding under two different power control models, namely, protocol and physical ones. The results show that the lifetime can be improved significantly by using network coding, and the performance gain of network coding decreases with the increase of flow asymmetry and the power control ability.

  12. A Distributed Geo-Routing Algorithm for Wireless Sensor Networks

    Gyanendra Prasad Joshi; Sung Won Kim

    2009-01-01

    Geographic wireless sensor networks use position information for greedy routing. Greedy routing works well in dense networks, whereas in sparse networks it may fail and require a recovery algorithm. Recovery algorithms help the packet to get out of the communication void. However, these algorithms are generally costly for resource constrained position-based wireless sensor networks (WSNs). In this paper, we propose a void avoidance algorithm (VAA), a novel idea based on upgrading virtual dist...

  13. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

    Hossein Jadidoleslamy

    2011-01-01

    Networks protection against different types of attacks is one of most important posed issue into the network andinformation security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to theirspecial properties, has more importance. Now, there are some of proposed architectures and guide lines to protectWireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has acomprehensive view to this problem and they are usually d...

  14. Association Discovery Protocol for Hybrid Wireless Mesh Networks

    Adjih, Cédric; Cho, Song Yean; Jacquet, Philippe

    2006-01-01

    Wireless mesh networks (WMNs) consist of two kinds of nodes: mesh routers which form the backbones of WMNs and mesh clients which associate with mesh routers to access networks. Because of the discrepancy between mesh routers and mesh clients, WMNs have a hybrid structure. Their hybrid structure presents an opportunity to integrate WMNs with different networks such as wireless LAN, Bluetooth and sensor networks through bridging functions in mesh routers. Because of the ability to integrate va...

  15. Distributed design of network codes for wireless multiple unicasts

    Kim, Sukwon; Effros, Michelle; Ho, Tracey

    2009-01-01

    Previous results on network coding for low-power wireless transmissions of multiple unicasts rely on opportunistic coding or centralized optimization to reduce the power consumption. This paper proposes a distributed strategy for reducing the power consumption in a network coded wireless network with multiple unicasts. We apply a simple network coding strategy called “reverse carpooling,” which uses only XOR and forwarding operations. In this paper, we use the rectangu...

  16. Making TCP/IP Viable for Wireless Sensor Networks

    Dunkels, Adam; Alonso, Juan; Voigt, Thiemo

    2003-01-01

    The TCP/IP protocol suite, which has proven itself highly successful in wired networks, is often claimed to be unsuited for wireless micro-sensor networks. In this work, we question this conventional wisdom and present a number of mechanisms that are intended to enable the use of TCP/IP for wireless sensor networks: spatial IP address assignment, shared context header compression, application overlay routing, and distributed TCP caching (DTC). Sensor networks based on TCP...

  17. Application of wireless sensor networks to healthcare promotion

    Neves, P.A.C.S.; Stachyra, Michal; Rodrigues, Joel

    2008-01-01

    Born on military applications, wireless sensor networks (WSNs) application grew on the promise of environment sensing and data processing capability at low cost. These networks can hold hundreds or even thousands of smart sensing nodes with processing and sensing capabilities and even integrated power through a dedicated battery. This paper surveys on the application of wireless sensor networks to healthcare promotion, namely with the use of biosensor technology applied to body sensor network...

  18. COMPARATIVE STUDY OF NEXT GENERATION HIGH SPEED WIRELESS NETWORK

    RAHUL MALHOTRA

    2011-06-01

    Full Text Available Advances in mobile communication theory have enabled the development of different wireless access technologies. Alongside the revolutionary progress in wireless access technologies, advances in wireless access devices such as laptops, palmtops, and cell phones and mobile middleware have paved the way for the deliveryof beyond-voice-type services while on the move. This sets the platform for high-speed mobile communications that provide high-speed data and both real and non-real time multimedia to mobile users. Today's wireless world uses several communication infrastructures such as Bluetooth for personal area, IEEE 802.11 for local area,Universal Mobile Telecommunication System (UMTS for wide area, and Satellite networks for global networking other hand, since these wireless networks are complementary to each other, their integration and coordinated operation can provide ubiquitous “always best connection" quality mobile communications to the users. This paper discusses the different architectures of wireless networks and the different factors to be considered while designing a hybrid wireless network. The different factors to be considered for design of ahybrid wireless network and the different networks have been explored in this paper.

  19. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  20. Analysis on China 3G Development

    Shen Zixin

    2005-01-01

    @@ Foreword: Forecast of 3G and 3G Evolution International Market Size According to UMTS forecast, by 2010, global annual 3G income could reach USD 320 billion, while that from Asia-Pacific region will be around USD 118 billion.China's selection of 3G standards will affect all global wireless equipment suppliers, while how to select TD-SCDMA most crucial.

  1. Energy-efficient multipath routing in wireless sensor network considering wireless interference

    2011-01-01

    Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), design of energy-efficient multipath routing protocols is a crucial concern for WSN applications. To provide high-quality monitoring information, many WSN applications require high-rate data transmission. Multipath routing protocols are often used to increase the network transmission rate and throughput. Although large-scale WSN can be supported by high bandwidth backbone network, the WSN remains the bot...

  2. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    Yu, Xianbin; Zhao, Ying; Deng, Lei; Pang, Xiaodan; Tafur Monroy, Idelfonso

    2012-01-01

    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  3. An Efficient ECDSA-Based Signature Scheme for Wireless Networks

    XU Zhong; DAI Guanzhong; YANG Deming

    2006-01-01

    Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.

  4. Node Clustering for Wireless Sensor Networks

    Sania Bhatti

    2012-01-01

    Full Text Available Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted.

  5. Self Calibrated Wireless Distributed Environmental Sensory Networks

    Fishbain, Barak; Moreno-Centeno, Erick

    2016-04-01

    Recent advances in sensory and communication technologies have made Wireless Distributed Environmental Sensory Networks (WDESN) technically and economically feasible. WDESNs present an unprecedented tool for studying many environmental processes in a new way. However, the WDESNs’ calibration process is a major obstacle in them becoming the common practice. Here, we present a new, robust and efficient method for aggregating measurements acquired by an uncalibrated WDESN, and producing accurate estimates of the observed environmental variable’s true levels rendering the network as self-calibrated. The suggested method presents novelty both in group-decision-making and in environmental sensing as it offers a most valuable tool for distributed environmental monitoring data aggregation. Applying the method on an extensive real-life air-pollution dataset showed markedly more accurate results than the common practice and the state-of-the-art.

  6. Wireless Networks Effective Time Power Synchronization

    Kamalakannan

    2012-06-01

    Full Text Available Time synchronization is a critical piece of infrastructure for any distributed system. Distributed, wireless sensor net-works make extensive use of synchronized time, but often have unique requirements in the scope, lifetime and precision of the synchronization achieved, as well as the time and energy required to achieve it. Existing time synchronization methods need to be extended to meet these new needs. We outline the synchronization requirements of future sensor networks and present an implementation of our own low-power synchronization scheme, post-facto synchronization. We also describe an experiment that characterizes its performance for creating short-lived and localized but high-precision synchronization using very little energy.

  7. Low Maintenance Wireless Network Architecture and Strategies For Mitigating Challenges In Implementing Wireless Networks and Wireless Sensor Networks in Dense Forests and Rural Areas

    Samrat Pravin Patel; Sumeet S. Deshmukh; Anil R. Rajbhar

    2013-01-01

    An innovative ,cost effective and eco friendly approach for the implementation of wide area wireless network coverage forsurveillance, remote wireless sensing , monitoring and other usage in dense forest and rural areas in developing countries like India andAfrica .The paper gives an simplified layout for the network implementation for bridging the digital divide and the knowledge flowbetween the urban areas and the remote locations where telecom companies cannot reach easily or deploy networ...

  8. AN INTELLIGENT VERTICAL HANDOVER DECISION ALGORITHM FOR WIRELESS HETEROGENEOUS NETWORKS

    V. Anantha Narayanan

    2014-01-01

    Full Text Available The Next Generation Wireless Networks (NGWN should be compatible with other communication technologies to offer the best connectivity to the mobile terminal which can access any IP based services at any time from any network without the knowledge of its user. It requires an intelligent vertical handover decision making algorithm to migrate between technologies that enable seamless mobility, always best connection and minimal terminal power consumption. Currently existing decision engines are simple, proprietary and its handover is only based on the received signal strength which has been proven unintelligent. The proposed decision algorithm gains intelligence by combining fuzzy logic system to handle imprecise data, multiple attribute decision making to handle multiple attributes for decision making and context aware strategies to reduce unnecessary handover. The proposed intelligent decision algorithm detects new network which offers best connectivity than current network and does authentication and mobile IP registration before making the handover; thereby reducing the packet loss to ensure high quality of service. This algorithm is capable of forwarding data packets to appropriate attachment point to maximize battery lifetime and also to maintain load balancing. The performance analysis shows that the proposed algorithm efficiently uses the network resources by switching between 3G and Wi-Fi under the different RF environmental conditions to offer best connectivity with minimal service cost to the users. It is observed that average handover delay for the experiment is 30-40ms and the integration of cellular network with WLAN using the proposed intelligent decision algorithm reduces the call dropping rate (<0.006 and call blocking probability (<0.00607 as well as unnecessary handover in heterogeneous networks.

  9. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  10. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    Wei Ni Ni

    2016-01-01

    Full Text Available The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the realizations of these two mechanisms. After the analysis of these two algorithms, this paper proposes a ReInforM routing algorithm based braid multipath routing algorithm.

  11. Guest Editorial: Special Issue on Wireless Mobile Computing and Networking

    Yu Wang; Yanwei Wu; Fan Li; Bin Xu; Teresa Dahlberg

    2011-01-01

    Recent convergence of information communications technology and computing is creating new demands and opportunities for ubiquitous computing via wireless and mobile equipments.The demanding networking environment of wireless communications and the fast-growing number of mobile users impose several challenges in terms of channel estimation,network protocol design,resource management,systematic design,application development,and security.The objective of this special issue is to gather recent advances addressing networks,systems,algorithms,and applications that support the symbiosis of mobile computers and wireless networks.

  12. A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks

    Byrne, Eimear; Manada, Akiko; Marinkovic, Stevan; Popovici, Emanuel

    2011-01-01

    Modern medical wireless systems, such as wireless body area networks (WBANs), are applications of wireless networks that can be used as a tool of data transmission between patients and doctors. Accuracy of data transmission is an important requirement for such systems. In this paper, we will propose a WBAN which is robust against erasures and describe its properties using graph theoretic techniques.

  13. FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY

    Priyanka Bhatia

    2014-12-01

    Full Text Available Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys

  14. Group Interaction Method Based on Wireless Sensor Network

    Wu Qun

    2013-06-01

    Full Text Available This paper presents a group interaction method based on Wireless Sensor Network which supplies new attempts and ideas for human-computer interaction. Firstly, analyze group interaction framework that is different from the monomer interaction, then integrate data language of group interaction based on user’s purpose so that the Wireless Sensor Network technology and methods are applied to the system of group interaction. Finally, group interaction toys based on Wireless Sensor Network are developed. Each of toy monomers is compactly filled with sensors, wireless communication devices, LED lights. The Wireless Sensor Network which is composed of many monomers makes interface function come true in virtual. The users not only act on the physical object but also act directly on the "data" when they use the device. Currently the functions including light transmission and light color blending have been accomplished and developing.

  15. Throughput Maximization for Wireless Multimedia Sensor Networks in Industrial Applications

    M.Markco

    2014-06-01

    Full Text Available n recent years, there has been growing interests in wireless sensor networks. Wireless sensor network is an autonomous system of sensor connected by wireless devices without any fixed infrastructure support. To meet the challenge paradigms of wireless sensor networks like Energy efficiency, Delay constraints, Reliability and adaptive mechanis m the sensor nodes are enhanced with multimedia support. The Wireless multimedia sensor nodes (WMSN enable to streamline the data that will control and monitor the industrial activities within the sensing area. The adaptive sleepless protocol will address the following issues: First, this protocol mainly designed for desired packet delivery and delay probabilities while reducing the energy consumption of the network. Second, this protocol is based on demand based dynamic sleep scheduling scheme for data communication. In this packets are transmitted through the cross layer interaction. In this cross layer interaction enables to reach a maximum efficiency.

  16. Association Analaysis in Wireless Network using Trace data

    L.Velmurugan,

    2010-12-01

    Full Text Available With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been proposed, a better way is to study wireless mobility traces which gives more accurate movement information for a population. An accurate location predictor can significantly improve the performance or reliability of wireless network protocols and the wireless network infrastructure itself. These improvements lead to a better user experience to a more cost-effective infrastructure or both. In this work, it is proposed to study mobility traces and generate rules for mobility of users which was previously unknown in campus wide wireless network. We also study analyze and show that atcertain locations access points are very rarely used.

  17. Distributed Cooperative Caching In Social Wireless Network

    Dimple Pandya

    2014-04-01

    Full Text Available This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET.SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP, network service providers, and End Consumers (EC.This paper develops practical network, service, and pricing models which are then used for creating two object caching strategies for reducing content provisioning costs in networks with homogenous and heterogeneous object demands. The paper develops analytical and simulation designs for analysing the proposed caching strategies in the presence of selfish users that deviate from network-wide cost-optimal policies. It also reports results from an Android phone based prototype SWNET, validating the presented analytical and simulation results.

  18. Attacks on IEEE 802.11 wireless networks

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  19. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Sanjeev Prakash

    2015-12-01

    Full Text Available Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G. It is become possible to reduce the size of mobile nodes (MNs with manifold network interfaces and development in IP-based applications. 4G mobile/wireless computing and communication heterogeneous environment consist of various access technologies that differ in bandwidth, network conditions, service type, latency and cost. A major challenge of the 4G wireless network is seamless vertical handoff across the heterogeneous wireless access network as the users are roaming in the heterogeneous wireless network environment. Today communication devices are portable and equipped with manifold interfaces and are capable to roam seamlessly among the various access technology networks for maintaining the network connectivity, since no single-interface technology provides ubiquitous coverage and quality-of-service (QoS. This paper reports a mobile agent based heterogeneous wireless network management system. In this system agent’s decision focuses on multi parameter system (MPS. This system works on the parameters- network delay, received signal strength, network latency and study of the collected information about adjoining network cells viz., accessible channel. System is simulated and a comparative study is also made. From results it is observed that system improves the performance of wireless network.

  20. 基于3G 无线传输的测震台站监控设备的研制%The Design and Realization of a Type of Monitoring Equipment for Seismic Stations Based on 3G Wireless Data Transmission

    孙宏志; 王学成; 刘一萌; 卢山; 赵龙梅; 孙恺微

    2014-01-01

    介绍了一种基于3G(第三代移动通信技术)和 SMS(短信业务)的无线数据传输测震台监控仪的工作原理、设计和实现。可实现对相关设备进行断电、上电、重启和备用设备切换等控制;具有通过网口和串口监控数据采集器工作状态的功能;具有通过3G 无线传输测震数据的功能。%Quickly recovering the seismic signals channel or solving problems with seismic station equipment is a major challenge once they are damaged or experience sudden failure.In our study, we designed and constructed wireless data transmitting and monitoring equipment for seismic sta-tions based on the global system for mobile communication(GSM),third generation mobile com-munication technology(3G)and short message service(SMS).This equipment can control(shut down,switch on,restart,and enable the backup device)remote equipment easily,monitor the earthquake data acquisition system (EDAS)by the serial port and network,and transmit the seis-mic data by 3G.The hardware is composed of a core interfacing circuit board and a driving circuit board.The core circuit board includes one LAN port,two COM ports,and a number of I/O inter-faces.The working status of the EDAS at a local seismic station is real-time monitored through the LAN port and COM port.When abnormal data is outputted from the EDAS,the data output stops or is unable to be recognized.Abnormal information of the EDAS is sent to the earthquake monitoring center as short messages,and the center staff is able to make a judgment and take the correct action according to the messages.We designed two CPUs on the core circuit board,one a P89c668 and the other an STC12C5A60S2.The device can make data exchanges with the EDAS-24IP through the LAN chip.Meanwhile,P89c668 can monitor the real-time data flow of the EDAS-24IP,and analyze the correctness of the seismic data flow of the EDAS-24IP as well.In or-der to store parameter data,we used an electrically erasable

  1. The Design and Realization of a Type of Monitoring Equipment for Seismic Stations Based on 3G Wireless Data Transmission%基于3G 无线传输的测震台站监控设备的研制

    孙宏志; 王学成; 刘一萌; 卢山; 赵龙梅; 孙恺微

    2014-01-01

    介绍了一种基于3G(第三代移动通信技术)和 SMS(短信业务)的无线数据传输测震台监控仪的工作原理、设计和实现。可实现对相关设备进行断电、上电、重启和备用设备切换等控制;具有通过网口和串口监控数据采集器工作状态的功能;具有通过3G 无线传输测震数据的功能。%Quickly recovering the seismic signals channel or solving problems with seismic station equipment is a major challenge once they are damaged or experience sudden failure.In our study, we designed and constructed wireless data transmitting and monitoring equipment for seismic sta-tions based on the global system for mobile communication(GSM),third generation mobile com-munication technology(3G)and short message service(SMS).This equipment can control(shut down,switch on,restart,and enable the backup device)remote equipment easily,monitor the earthquake data acquisition system (EDAS)by the serial port and network,and transmit the seis-mic data by 3G.The hardware is composed of a core interfacing circuit board and a driving circuit board.The core circuit board includes one LAN port,two COM ports,and a number of I/O inter-faces.The working status of the EDAS at a local seismic station is real-time monitored through the LAN port and COM port.When abnormal data is outputted from the EDAS,the data output stops or is unable to be recognized.Abnormal information of the EDAS is sent to the earthquake monitoring center as short messages,and the center staff is able to make a judgment and take the correct action according to the messages.We designed two CPUs on the core circuit board,one a P89c668 and the other an STC12C5A60S2.The device can make data exchanges with the EDAS-24IP through the LAN chip.Meanwhile,P89c668 can monitor the real-time data flow of the EDAS-24IP,and analyze the correctness of the seismic data flow of the EDAS-24IP as well.In or-der to store parameter data,we used an electrically erasable

  2. Handbook of sensor networks compact wireless and wired sensing systems

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  3. ON THE CAPACITY REGION OF WIRELESS AD HOC RELAY NETWORKS

    Dai Qinyun; Yao Wangsheng; Peng Jianmin; Su Gang

    2006-01-01

    Network capacity is a key characteristic to evaluate the performance of wireless networks. The goal of this paper is to study the capacity of wireless ad hoc relay network. In the model, there is at most ns source nodes transmitting signal simultaneously in the network and the arbitrarily complex network coding is allowed. The upper capacity bound of the network model are derived from the max-flow min-cut theorem and the lower capacity bound are obtained by the rate-distortion function for the Gaussian source. Finally, simulation results show that the upper network capacity will decrease as the number of source nodes is increased.

  4. Energy management in wireless cellular and ad-hoc networks

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  5. Challenges: From Standards to Implementation for Industrial Wireless Sensor Networks

    Jian Ma; Hongchao Wang; Dong Yang; Yujun Cheng

    2016-01-01

    Despite the fact that a number of research efforts in the area of Industrial Wireless Sensor Networks (IWSNs) exist, there is a lack of really practical IWSN implementations, deployments, and in-field applications. This paper presents the design and implementation of an IWSN for welder machine systems, called WirelessCAN which is based on WirelessHART to replace wired CAN fieldbus. Although the implementation and challenges are application-specific, we believe that the problems we encountered...

  6. Secure Roaming and Handover Procedures in Wireless Access Networks

    Meyer, Ulrike

    2006-01-01

    A growing number of wireless technologies and providers, as well as users' increasing need and desire to be connected and reachable at all times, call for solutions that enable interoperation between providers and technologies. Roaming procedures enable wireless access in areas that are covered by network providers with which the user does not have any prior arrangements. Handover procedures enable the maintenance of ongoing connections while a user moves across different wireless access netw...

  7. Frequency hopping CDMA for flexible third generation wireless networks

    Fitton, MP; Nix, AR; Beach, MA

    1997-01-01

    Frequency hopping spread spectrum (FH-SS) has found a number of applications in cellular systems, wireless local loop, and wireless local area networks. The suitability of slow frequency hopping code division multiple access (SFH-CDMA) is characterised, for application in third generation wireless communications. An FH architecture displays inherent frequency diversity, and consequently is resilient to the effects of intersymbol interference arising from significant time dispersion in the cha...

  8. Using software-defined networking principles for wireless sensor networks

    Jacobsson, Martin; Orfanidis, Charalampos

    2015-01-01

    In this paper, we propose an architecture based on software-defined networking (SDN) for wireless sensor networks. Ideas of how to design and make use of the flexibility that SDN offers are presented. We discuss how SDN principles can lead to the use of commodity hardware in a wider range of WSN deployments and then tailor the software only to meet the requirements of the specific deployments and their applications. A few examples are introduced that demonstrate how the architecture can be us...

  9. Routing Protocol for Anycast Communications in a Wireless Sensor Network

    Rachkidy, Nancy; Guitton, Alexandre; Misson, Michel

    2010-01-01

    International audience In wireless sensor networks, there is usually a sink which gathers data from the battery-powered sensor nodes. As sensor nodes around the sink consume their energy faster than the other nodes, several sinks have to be deployed to increase the network lifetime. In this paper, we motivate the need of anycast communications in wireless networks, where all the sinks are identical and can gather data from any source. To reduce interference and congestion areas on the wire...

  10. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks

    Zhongwei Si; Junyang Ma; Ragnar Thobaben

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy throug...

  11. An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks

    Sen, Jaydip

    2010-01-01

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on co-operative algorithms, absence of c...

  12. Sensors Grouping Hierarchy Structure for Wireless Sensor Network

    Ammar Hawbani; Xingfu Wang; Saleem Karmoshi; Lin Wang; Naji Husaini

    2015-01-01

    There are many challenges in implementation of wireless sensor network systems: clustering and grouping are two of them. The grouping of sensors is computational process intended to partition the sensors of network into groups. Each group contains a number of sensors and a sensor can be an element of multiple groups. In this paper, we provided a Sensors Grouping Hierarchy Structure (GHS) to split the nodes in wireless sensor network into groups to assist the collaborative, dynamic, distribute...

  13. REVIEW OVER HOLE HEALING TECHNIQUES IN WIRELESS SENSOR NETWORKS

    Latesh Mehta

    2016-02-01

    Full Text Available Improving coverage and connectivity is a very important issue in wireless sensor networks. The unattended or uncovered region in a sensing field is called a coverage hole. A coverage hole impacts the performance of the wireless sensor network, disconnects the network topology and causes delay in data transmission. These coverage holes can be healed randomly or each hole can be assigned a priority value for healing. In this paper we will discuss about various hole healing strategies and their mechanisms.

  14. SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

    Khaled Zeraoulia; Nadjib Badache

    2014-01-01

    Next-generation wireless networks (NGN) and internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based ne...

  15. A survey on the wireless sensor network technology

    Wireless sensor technology is required in the safety inspection for safety-critical unit of nuclear power plant. This report describes wireless sensor technology related with the project named 'Development of a remote care system of NPP components based on the network and safety database'. This report includes contents of methodology and status of sensor network construction, status of zigbee sensor network, problem of security and sensor battery. Energy harvesting technology will be mentioned on the next report

  16. A Multievent Congestion Control Protocol for Wireless Sensor Networks

    Shah GhalibA; Hussain FaisalB; Cebi Yalcin

    2008-01-01

    Abstract Wireless sensor networks are application-dependent networks. An application may require general event region information, per-node event region information, or prioritized event information in case of multiple events. All event flows are subject to congestion in wireless sensor networks. This is due to the sudden impulse of information flow from a number of event nodes to a single destination. Congestion degrades system throughput and results in energy loss of nodes. In this paper, w...

  17. Easy Wireless: broadband ad-hoc networking for emergency services

    de Graaf,, Dirk C; Berg, van den, C.A.; Boucherie, Richard J.; Brouwer, Frank; Bruin, de, K.; Elfrink, Herman; Fernandez-Diaz, Irene; Heemstra de Groot, Sonia; Haan, de, R.J.; Jongh, de, J.; Nunez, Sindo; Ommeren, van, F.J.; Roijers, Frank; Stemerdink, Jan; Tromp, Erik

    2007-01-01

    Wireless ad-hoc networks will enable emergency services to continuously overview and act upon the actual status of the situation by retrieving and exchanging detailed up-to-date information between the rescue workers. Deployment of high-bandwidth, robust, self-organising ad-hoc networks will enable quicker response to typical what/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses a number of results of the Easy Wireless ...

  18. Adaptive Energy-Aware Gathering Strategy for Wireless Sensor Networks

    E M Saad; Awadalla, M. H.; R. R. Darwish

    2009-01-01

    Energy hole problem is considered one of the most severe threats in wireless sensor networks. In this paper the idea of exploiting sink mobility for the purpose of culling the energy hole problem in hierarchical large-scale wireless sensor networks based on bees algorithm is presented. In the proposed scheme, a mobile sink equipped with a powerful transceiver and battery, traverses the entire field, and periodically gathers data from network cluster heads. The mobile sink follows an adaptive ...

  19. Kairos: A Macro-Programming System for Wireless Sensor Networks

    Gummadi, Ramakrishna; Kothari, Nupur; Millstein, Todd; Govindan, Ramesh

    2005-01-01

    Wireless sensor networks research has, till date, made impressive advances in platforms and software services. Research in the area has moved on to consider an essential piece of sensor network technology—support for programming wireless sensor network applications and systems components at a suitably high level of abstraction. Two broad classes of programming models are currently being investigated by the community. One class focuses on providing higher-level abstractions for specifying a no...

  20. Wireless Multimedia Sensor Networks: Current Trends and Future Directions

    Julian Morillo-Pozo; Manel Guerrero Zapata; Jamal N. Al-Karaki; Almalkawi, Islam T.

    2010-01-01

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. In this paper, we outline ...

  1. An energy efficient clustering routing algorithm for wireless sensor networks

    LI Li; DONG Shu-song; WEN Xiang-ming

    2006-01-01

    This article proposes an energy efficient clustering routing (EECR) algorithm for wireless sensor network. The algorithm can divide a sensor network into a few clusters and select a cluster head base on weight value that leads to more uniform energy dissipation evenly among all sensor nodes.Simulations and results show that the algorithm can save overall energy consumption and extend the lifetime of the wireless sensor network.

  2. On optimizing low SNR wireless networks using network coding

    Thakur, Mohit

    2010-01-01

    The rate optimization for wireless networks with low SNR is investigated. While the capacity in the limit of disappearing SNR is known to be linear for fading and non-fading channels, we study the problem of operating in low SNR wireless network with given node locations that use network coding over flows. The model we develop for low SNR Gaussian broadcast channel and multiple access channel respectively operates in a non-trivial feasible rate region. We show that the problem reduces to the optimization of total network power which can be casted as standard linear multi-commodity min-cost flow program with no inherent combinatorially difficult structure when network coding is used with non integer constraints (which is a reasonable assumption). This is essentially due to the linearity of the capacity with respect to vanishing SNR which helps avoid the effect of interference for the degraded broadcast channel and multiple access environment in consideration, respectively. We propose a fully decentralized Prim...

  3. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Chwen-Fu Horng

    2009-12-01

    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  4. Cross Layer Protocols For Multimedia Transmission In Wireless Networks

    Santhosha Rao

    2012-07-01

    Full Text Available Wireless networks initially inherited the traditional layered architecture from wired networks. Nevertheless, as third and fourth generation wireless communications and networking begin to proliferate in the area of communication networks, the suitability of the layered architecture is coming under close scrutiny from the research community. It is repeatedly argued that although layered architectures have served well for wired networks, they might not be suitable for wireless networks [1]. One of the key challenges for next-generation broadband wireless networks is to devise end-to-end protocol solutions across wired and wireless networks to accommodate large densities of highly mobile users demanding services and applications with a wide range of Quality of Service (QoS requirements. Hence, in order to meet the challenging demands on future wireless networks, it may be required to adopt new approaches in which protocols can be designed by violating the reference layered architecture allowing direct communication between protocols in nonadjacent layers Such violations of a layered architecture have been termed as cross-layer design(CLD.

  5. 2014 International Conference on Wireless Communications, Networking and Applications

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  6. Development of a Testbed for Wireless Underground Sensor Networks

    Mehmet C. Vuran

    2010-01-01

    Full Text Available Wireless Underground Sensor Networks (WUSNs constitute one of the promising application areas of the recently developed wireless sensor networking techniques. WUSN is a specialized kind of Wireless Sensor Network (WSN that mainly focuses on the use of sensors that communicate through soil. Recent models for the wireless underground communication channel are proposed but few field experiments were realized to verify the accuracy of the models. The realization of field WUSN experiments proved to be extremely complex and time-consuming in comparison with the traditional wireless environment. To the best of our knowledge, this is the first work that proposes guidelines for the development of an outdoor WUSN testbed with the goals of improving the accuracy and reducing of time for WUSN experiments. Although the work mainly aims WUSNs, many of the presented practices can also be applied to generic WSN testbeds.

  7. A Survey on Energy Efficiency for Wireless Mesh Network

    Sarra Mamechaoui

    2013-04-01

    Full Text Available Reduction of CO2 emissions is a major global environmental issue. Over the past few years, wireless andmobile communications are becoming increasingly popular with consumers. The Most popular kind ofwireless access is known as Wireless Mesh Networks (WMNs that provide wireless connectivity throughlot cheaper and more supple backhaul infrastructure relative to wired solutions. Wireless Mesh Network(WMN is a new emerging technology which has been adopted as the wireless internetworking solution forthe near future. Due to higher energy consumption in the information and communication technology (ICTindustries, and which would have an impact on the environment, energy efficiency has become a key factorto evaluate the performance of a communication network.This paper primarily focuses on the classification layer the greatest existing approaches devoted to theconservation of energy. It is also discussing the most interesting works on energy saving in WMNsnetworks.

  8. Wireless network traffic modeling based on extreme value theory

    Liu, Chunfeng; Shu, Yantai; Yang, Oliver W. W.; Liu, Jiakun; Dong, Linfang

    2006-10-01

    In this paper, Extreme Value Theory (EVT) is presented to analyze wireless network traffic. The role of EVT is to allow the development of procedures that are scientifically and statistically rational to estimate the extreme behavior of random processes. There are two primary methods for studying extremes: the Block Maximum (BM) method and the Points Over Threshold (POT) method. By taking limited traffic data that is greater than the threshold value, our experiment and analysis show the wireless network traffic model obtained with the EVT fits well with that of empirical distribution of traffic, thus illustrating that EVT has a good application foreground in the analysis of wireless network traffic.

  9. Security Analysis of Routing Protocols in Wireless Sensor Networks

    Mohammad Sadeghi

    2012-01-01

    Full Text Available In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of these protocols to meet their security requirements. At last some simulation results of these protocols that have been done by their designer are mentioned.

  10. Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks

    Rafe Alasem

    2010-05-01

    Full Text Available Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme

  11. Radio Frequency Energy Harvesting for Long Lifetime Wireless Sensor Networks

    Han, Bo; Nielsen, Rasmus Hjorth; Prasad, Ramjee

    2014-01-01

    In wireless sensor networks energy scarcity is a major concern on energy consumption, and by properly designing on the node network architecture or selecting efficient protocols of the networks, the maximum energy can be reduced significantly thereby increasing the network lifetime. However, in...

  12. Performance of the hybrid wireless mesh protocol for wireless mesh networks

    Boye, Magnus; Staalhagen, Lars

    2010-01-01

    Wireless mesh networks offer a new way of providing end-user access and deploying network infrastructure. Though mesh networks offer a price competitive solution to wired networks, they also come with a set of new challenges such as optimal path selection, channel utilization, and load balancing....... These challenges must first be overcome before satisfactory network stability and throughput can be achieved. This paper studies the performance of the Hybrid Wireless Mesh Protocol, the proposed routing protocol for the upcoming IEEE 802.11s standard. HWMP supports two modes of path selection: reactive...

  13. A cross-layer optimization algorithm for wireless sensor network

    Wang, Yan; Liu, Le Qing

    2010-07-01

    Energy is critical for typical wireless sensor networks (WSN) and how to energy consumption and maximize network lifetime are big challenges for Wireless sensor networks; cross layer algorithm is main method to solve this problem. In this paper, firstly, we analyze current layer-based optimal methods in wireless sensor network and summarize the physical, link and routing optimization techniques. Secondly we compare some strategies in cross-layer optimization algorithms. According to the analysis and summary of the current lifetime algorithms in wireless sensor network A cross layer optimization algorithm is proposed,. Then this optimization algorithm proposed in the paper is adopted to improve the traditional Leach routing protocol. Simulation results show that this algorithm is an excellent cross layer algorithm for reducing energy consumption.

  14. Component Based Clustering in Wireless Sensor Networks

    Amaxilatis, Dimitrios; Koninis, Christos; Pyrgelis, Apostolos

    2011-01-01

    Clustering is an important research topic for wireless sensor networks (WSNs). A large variety of approaches has been presented focusing on different performance metrics. Even though all of them have many practical applications, an extremely limited number of software implementations is available to the research community. Furthermore, these very few techniques are implemented for specific WSN systems or are integrated in complex applications. Thus it is very difficult to comparatively study their performance and almost impossible to reuse them in future applications under a different scope. In this work we study a large body of well established algorithms. We identify their main building blocks and propose a component-based architecture for developing clustering algorithms that (a) promotes exchangeability of algorithms thus enabling the fast prototyping of new approaches, (b) allows cross-layer implementations to realize complex applications, (c) offers a common platform to comparatively study the performan...

  15. Improving Handover Performance in Wireless Mobile Networks

    Konstantinos Lizos

    2012-09-01

    Full Text Available In this paper, we propose an enhanced packet scheduling scheme to favour UEs that experienced handover (HO in wireless mobile networks. The main idea of the proposed scheme is not only prioritized the HO connections at the CAC level but also prioritized the HO connections at the scheduler level. At the CAC level, a guard code scheme favours HO calls over new calls. At the scheduler level, a Packet Scheduler based-HandOver Class (PS-HOC scheme makes use of the elapsed time of HO connections to classify the HO requests into prioritized HO and non-prioritized HO calls. Further, PS-HOC sorts the connections based on their delay sensitivity and their channel quality. The performance of the proposed scheme is compared with delay driven scheduler (DDS scheme in terms of average packet delay, average queue size and average packet dropping rate. The simulation results show the effectiveness of our proposed scheme.

  16. DSTC Layering Protocols in Wireless Cooperative Networks

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  17. Wireless network-on-chip: a survey

    Shuai Wang

    2014-04-01

    Full Text Available To alleviate the complex communication problems arising in the network-on-chip (NoC architectures as the number of on-chip components increases, several novel interconnect infrastructures have been recently proposed to replace the traditional on-chip interconnection systems that are reaching their limits in terms of performance, power and area constraints. Wireless NoC (WiNoC is among the most promising scalable interconnection architectures for future generation NoCs. In this study, the authors first provide a general description of the WiNoC architecture. Then, they discuss the research problems under five categories: topology, routing, flow control, antenna and reliability. Open research issues for the realisation of the WiNoC are also discussed.

  18. INSTRUMENTATION AND CONTROL FOR WIRELESS SENSOR NETWORK FOR AUTOMATED IRRIGATION

    An in-field sensor-based irrigation system is of benefit to producers in efficient water management. A distributed wireless sensor network eliminates difficulties to wire sensor stations across the field and reduces maintenance cost. Implementing wireless sensor-based irrigation system is challengin...

  19. Integrated control platform for converged optical and wireless networks

    Yan, Ying

    . Traffic load and network resources are distributed based on the network states, channel conditions, and QoS requirements. A new aspect in the design of future network is the energy efficiency. An energy management mechanism is proposed and evaluated for the optical network. With regard to power saving, a......The next generation of broadband access networks is expected to be heterogeneous. Multiple wired and wireless systems can be integrated, in order to simultaneously provide seamless access with an appropriate Quality of Service (QoS). Wireless networks support ubiquitous connectivity yet low data...

  20. Performance Evaluation of Wireless LAN Integration with LTE Heterogeneous Networks

    Bysany Dasharatharamasetty, Satish

    2014-01-01

    Heterogeneous Network (HetNet) refers to the coexistence and cooperation of multiple types of radio access technologies in the same wireless network. Wireless Local Area Network (WLAN), also called WiFi, is a local area network whereas a wide area network consists of macrocells, picocells and/or femtocells in a cellular network such as Long Term Evolution (LTE). In this thesis, the focus is on: (1) Simulation of Layer 1 (physical layer) and Layer 2 (MAC layer) of IEEE 802.11 WLAN st...

  1. Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

    Chakrapani gadde

    2012-06-01

    Full Text Available In the last decade wireless mesh networks (WMNs have emerged as a key technology for next generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. One such application is to provide peer-to-peer communication for all the users who are distributed over some area. Since the users are connected in awireless multi-hop passion complete ubiquity is provided. But as the number of users accessing the network is increasing there could be a chance of experiencing more interference by each user due to the communication link of every other user. So in a wireless mesh network as the load increases the throughput of network is going to be decreased due to wireless interference by other users. To sustain this problem we are going to integrate the WMN with passive optical network (PON. The resulting hybrid network (Optical-wireless network could reduce the wireless hops of each user, so that we can reduce the total wireless interference experienced by each user resulting in improved network throughput. This paper aims to study the network throughput gain in Optical-wireless network subject to peer-to-peer communications.

  2. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Tieming Chen; Zhenbo Yu; Shijian Li; Bo Chen

    2016-01-01

    Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challengin...

  3. DMP Packet Scheduling For Wireless Sensor Network

    Pallavi Sawale

    2015-01-01

    Full Text Available Most of the existing packet scheduling mechanisms of the wireless sensor network use First Come First Served (FCFS non pre emptive priority and pre emptive priority scheduling algorithms. The above algorithms have high processing overhead and also long end-to-end data transmission delay. In FCFS concept the data packet which is entering the node first will go out first from the node, and the packet which will enter last will leave at last. But in FCFS scheduling of real time data packets coming to the node have to wait for a long time period.In non pre emptive priority scheduling algorithm there is starvation of real time data packets because once the processor enters the running state, it will not allow remove until it is completed, so there is starvation of real time data packets. In pre emptive scheduling, starvation of non real time data packets, due to continuous arrival of real time data. Therefore the data packets are to be schedule in multilevel queue. But the multilevel queue scheduling scheme is not suitable for dynamic inputs, and hence the scheme is designed for dynamically change in the inputs. The Dynamic Multilevel Priority (DMP packet scheduling is the scheme for dynamically changes in the inputs. In this scheme each node except the last level of the virtual hierarchy in the zone based topology of wireless sensor network has three levels of priority queues. Real time data packets are placed into highest priority queue and can preempt the data packets in the other queues. Non real time data packets are placed into other two queues based on threshold of their estimated processing time. The leaf node have two queues, one for real time data packet and another for non real time data packet since they do not receive data from other nodes and thus reduces end to end delay. This scheme reduces the average waiting time and end-to –end delay of data packets.

  4. ZigBee wireless sensor network for environmental monitoring system

    Chai, Shun-qi; Ji, Lei; Wu, Hong

    2009-11-01

    ZigBee is a new close-up, low-complexity, low-power, low data rate, low-cost wireless networking technology, mainly used for short distance wireless transmission. It is based on IEEE802.15.4 standards, thousands of tiny sensors form a network through mutual coordination to communications. This paper introduces the ZigBee wireless sensor networks in environmental monitoring applications. The hardware design, including microprocessor, data acquisition, antenna and peripheral circuits of the chips, and through software design composed ZigBee mesh network that can make data acquisition and communication. This network has low power consumption, low cost, the effective area is big, and information transfers reliable merits. And have confirmed the network's communication applicability by the Serial Com Assistant, also testified the network have very good pragmatism by the NS2 emulation the network's operation.

  5. Reliability Analysis of Wireless Sensor Networks Using Markovian Model

    Jin Zhu

    2012-01-01

    Full Text Available This paper investigates reliability analysis of wireless sensor networks whose topology is switching among possible connections which are governed by a Markovian chain. We give the quantized relations between network topology, data acquisition rate, nodes' calculation ability, and network reliability. By applying Lyapunov method, sufficient conditions of network reliability are proposed for such topology switching networks with constant or varying data acquisition rate. With the conditions satisfied, the quantity of data transported over wireless network node will not exceed node capacity such that reliability is ensured. Our theoretical work helps to provide a deeper understanding of real-world wireless sensor networks, which may find its application in the fields of network design and topology control.

  6. Wireless Sensor Networks Formation: Approaches and Techniques

    Miriam Carlos-Mancilla

    2016-01-01

    Full Text Available Nowadays, wireless sensor networks (WSNs emerge as an active research area in which challenging topics involve energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, efficiency, and so forth. Despite the open problems in WSNs, there are already a high number of applications available. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. A key factor in this is the way the network is formed. This survey presents most recent formation techniques and mechanisms for the WSNs. In this paper, the reviewed works are classified into distributed and centralized techniques. The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not. We focus on recent works and present a discussion of their advantages and drawbacks. Finally, the paper overviews a series of open issues which drive further research in the area.

  7. Compressed Neighbor Discovery for Wireless Networks

    Guo, Dongning; Zhang, Lei; Shen, Kai

    2010-01-01

    This paper studies neighbor discovery problem in wireless networks. A novel scheme, called compressed neighbor discovery is proposed, which assigns each node a unique signature and let nodes simultaneously transmit their signatures during the discovery period. The query node then determines, based on the superposition of the signatures, a small number of nodes as its neighbors, out of a large number of nodes in the network. This is fundamentally a sparse recovery problem. Using the proposed scheme, a single frame time suffices to achieve reliable discovery for large networks. This is in contrast to conventional schemes, where each node repeatedly transmits its identity with random delay, so that a receiver can identify each neighbor at least once without collision. Two practical, low-complexity discovery schemes are studied. The first scheme assigns sparse pseudo-random on-off signatures to the nodes, so that each node can listen to the channel during its own off-slots. Despite of half-duplex constraint, all ...

  8. Wireless Sensor Networks for Environmental Monitoring

    Liang, X.; Liang, Y.; Navarro, M.; Zhong, X.; Villalba, G.; Li, Y.; Davis, T.; Erratt, N.

    2015-12-01

    Wireless sensor networks (WSNs) have gained an increasing interest in a broad range of new scientific research and applications. WSN technologies can provide high resolution for spatial and temporal data which has not been possible before, opening up new opportunities. On the other hand, WSNs, particularly outdoor WSNs in harsh environments, present great challenges for scientists and engineers in terms of the network design, deployment, operation, management, and maintenance. Since 2010, we have been working on the deployment of an outdoor multi-hop WSN testbed for hydrological/environmental monitoring in a forested hill-sloped region at the Audubon Society of Western Pennsylvania (ASWP), Pennsylvania, USA. The ASWP WSN testbed has continuously evolved and had more than 80 nodes by now. To our knowledge, the ASWP WSN testbed represents one of the first known long-term multi-hop WSN deployments in an outdoor environment. As simulation and laboratory methods are unable to capture the complexity of outdoor environments (e.g., forests, oceans, mountains, or glaciers), which significantly affect WSN operations and maintenance, experimental deployments are essential to investigate and understand WSN behaviors and performances as well as its maintenance characteristics under these harsh conditions. In this talk, based on our empirical studies with the ASWP WSN testbed, we will present our discoveries and investigations on several important aspects including WSN energy profile, node reprogramming, network management system, and testbed maintenance. We will then provide our insight into these critical aspects of outdoor WSN deployments and operations.

  9. Shooter Localization in Wireless Microphone Networks

    Wilsson Olof

    2010-01-01

    Full Text Available Shooter localization in a wireless network of microphones is studied. Both the acoustic muzzle blast (MB from the gunfire and the ballistic shock wave (SW from the bullet can be detected by the microphones and considered as measurements. The MB measurements give rise to a standard sensor network problem, similar to time difference of arrivals in cellular phone networks, and the localization accuracy is good, provided that the sensors are well synchronized compared to the MB detection accuracy. The detection times of the SW depend on both shooter position and aiming angle and may provide additional information beside the shooter location, but again this requires good synchronization. We analyze the approach to base the estimation on the time difference of MB and SW at each sensor, which becomes insensitive to synchronization inaccuracies. Cramér-Rao lower bound analysis indicates how a lower bound of the root mean square error depends on the synchronization error for the MB and the MB-SW difference, respectively. The estimation problem is formulated in a separable nonlinear least squares framework. Results from field trials with different types of ammunition show excellent accuracy using the MB-SW difference for both the position and the aiming angle of the shooter.

  10. Optimizing Retransmission Threshold in Wireless Sensor Networks.

    Bi, Ran; Li, Yingshu; Tan, Guozhen; Sun, Liang

    2016-01-01

    The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission threshold for all sensor nodes in advance. The method did not take link quality and delay requirement into account, which decreases the probability of a packet passing its delivery path within a given deadline. This paper investigates the problem of finding optimal retransmission thresholds for relay nodes along a delivery path in a sensor network. The object of optimizing retransmission thresholds is to maximize the summation of the probability of the packet being successfully delivered to the next relay node or destination node in time. A dynamic programming-based distributed algorithm for finding optimal retransmission thresholds for relay nodes along a delivery path in the sensor network is proposed. The time complexity is O n Δ · max 1 ≤ i ≤ n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path, n is the length of the delivery path and Δ is the given upper bound of the transmission delay of the delivery path. If Δ is greater than the polynomial, to reduce the time complexity, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, when the ranges of the upper and lower bounds of retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results show that the proposed algorithms have better performance. PMID:27171092

  11. On the Capacity of Hybrid Wireless Networks with Opportunistic Routing

    Tan Le

    2010-01-01

    Full Text Available This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR. We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure network through base stations. We then develop linear programming models to calculate the end-to-end throughput bounds from multiple source nodes to single as well as multiple destination nodes. The developed models are applied to study several hybrid wireless network examples. Through case studies, we investigate several factors that have significant impacts on the hybrid wireless network capacity under opportunistic routing, such as node transmission range, density and distribution pattern of base stations (BTs, and number of wireless channels on wireless nodes and base stations. Our numerical results demonstrate that opportunistic routing could achieve much higher throughput on both ad hoc and hybrid networks than traditional unicast routing (UR. Moreover, opportunistic routing can efficiently utilize base stations and achieve significantly higher throughput gains in hybrid wireless networks than in pure ad hoc networks especially with multiple-channel base stations.

  12. CAREER researchers merge game theory with wireless networks, create

    Crumbley, Liz

    2005-01-01

    Using economic theory to improve wireless communications networks and designing garments that can sense their own shapes are among the goals of two National Science Foundation Faculty Early Career Development Program (CAREER) Award projects recently funded at Virginia Tech.

  13. The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources

    Glenn Platt

    2008-04-01

    Full Text Available CSIRO is using wireless sensor network technology to deploy “tiny agents”, working as autonomous controllers for individual pieces of electrical load/generation equipment in a distributed energy system. The tiny agent concept is a novel application of wireless sensor networks, providing the benefits of multi-agent systems science in a cheap, mobile, and highly distributable platform. However, the performance constraints inherent to wireless sensor networks mean the real-world realization of a tiny agent system is a significant challenge. This article details our work on tiny agents. We include a brief review of multiagent system benefits, and then discuss the challenges inherent to the tiny agent concept. We also detail our applications work in applying wireless sensor network technology to operate as tiny agents, with a focus on intelligent heating, ventilation and air- conditioning control.

  14. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Sun Baolin; Li Layuan

    2006-01-01

    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  15. Resource aware sensor nodes in wireless sensor networks

    Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small locally powered sensor nodes. In this paper, we propose IDEALS, a system to manage a wireless sensor network using a combination of information management, energy harvesting and energy monitoring, which we label resource awareness. Through this, IDEALS is able to extend the network lifetime for important messages, by controlling the degradation of the network to maximise information throughput

  16. Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges

    Akhoundi, Farhad; Jamali, Mohammad Vahid; Banihassan, Navid; Beyranvand, Hamzeh; Minoofar, Amir; Salehi, Jawad A.

    2016-01-01

    Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobile users. Fundamental key aspects of the network such as its backhaul architecture, its potential...

  17. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    Roy Sohini

    2015-01-01

    Wireless Sensor Network (WSN) has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at...

  18. Collaborative Algorithms for Communication in Wireless Sensor Networks

    Nieberg, Tim; Dulman, Stefan; Havinga, Paul; Hoesel, van, CPM Stan; Wu, Jian; Basten, Twan; Geilen, Marc; Groot

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient solutions for medium access control, clusterbased routing, and multipath creation and exploitation are discussed. The proposed MAC protocol is autonomous, decentralized and designed to minimize powe...

  19. Collaborative algorithms for communication in wireless sensor networks

    Nieberg, Tim; Dulman, Stefan; Havinga, Paul; Hoesel, van, CPM Stan; Wu, Jian

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient solutions for medium access control, clusterbased routing, and multipath creation and exploitation are discussed. The proposed MAC protocol is autonomous, decentralized and designed to minimize powe...

  20. Traffic Flow Detection Based on Wireless Sensor Network

    Bao-juan Liang

    2013-01-01

    Detecting traffic flow by in-road inductive loop is the most common methods, but inductive loop is physically large, it is hard to install and maintain, also the classification rate is low. The inductive loops cannot communicate with each other, so they cannot share traffic data with each other. The wireless sensor network has these features: real-time, fault tolerance, scalability and coordination. Applying wireless sensor network into traffic area for traffic flow detection is easier to ins...

  1. Analysis of Security Protocols in Wireless Sensor Network

    Ritu Sharma; Yogesh Chaba; Yudhvir Singh

    2010-01-01

    Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, indus...

  2. Intrusion Detection System in Wireless Sensor Networks: A Review

    Anush Ananthakumar; Tanmay Ganediwal; Dr. Ashwini Kunte

    2015-01-01

    The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments. As many innovative and efficient models have emerged in the last decade in this area, we mainly focus our work on Intrusion detection Systems. This paper reviews various intrusion detection systems which can be broadly class...

  3. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Gyanendra Prasad Joshi; Sung Won Kim; Seung Yeob Nam

    2013-01-01

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of ...

  4. Coverage and Connectivity Issue in Wireless Sensor Networks

    Rachit Trivedi

    2013-04-01

    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  5. A Novel Energy efficient Surface water Wireless Sensor Network Algorithm

    B. Meenakshi; P. Anandhakumar

    2012-01-01

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. It has been a challenge to design wireless sensor networks to enable applications for oceanographicdata collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion cente...

  6. Subsurface Event Detection and Classification Using Wireless Signal Networks

    Suleiman, Muhannad T.; Sibel Pamukcu; Liang Cheng; Ehsan Ghazanfari; Suk-Un Yoon

    2012-01-01

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for even...

  7. SYS3: Cyclops: Image Based Sensing for Wireless Sensor Networks

    Mohammad Rahimi; Deborah Estrin; Mani Srivastava; Rick Baer (Agilent); Jay Warrior (Agilent)

    2005-01-01

    Despite their increasing sophistication, wireless sensor networks still do not exploit the most powerful of the human senses: vision. Indeed, vision provides humans with unmatched capabilities to distinguish objects and identify their importance. This work seeks to provide wireless sensor networks with similar capabilities by exploiting emerging, cheap, low-power and small form factor CMOS imaging technology. In fact, we go beyond the stereo capabilities of human vision, and exploit the large...

  8. Compatibility Issues of IPSec and TCP in Wireless Networks

    ZHAO Hai-yang; XIN Yang

    2004-01-01

    Due to the problems arising when the Transmission Control Protocol (TCP) is applied over wireless networks, many TCP performance enhancement mechanisms have been proposed. However, such mechanisms aren't compatible with IPSec protocol. The paper reviews the TCP performance enhancement mechanisms in wireless networks. Then the conflicts between them are analyzed. Several proposals for solving theconflicts are discussed, and their benefit and limitations are examined.

  9. Communication Timing Control with Interference Detection for Wireless Sensor Networks

    Kokuke Sekiyama; Yuki Kubo

    2006-01-01

    This paper deals with a novel communication timing control for wireless networks and radio interference problem. Communication timing control is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes collision-free communication. In wireless communicatio...

  10. Ubiquitous healthcare system based on a wireless sensor network

    Chung, W.-Y. (Wan-Young)

    2009-01-01

    Abstract This dissertation aimed at developing a multi-modal sensing u-healthcare system (MSUS), which reflects the unique properties of a healthcare application in a wireless sensor network. Together with health parameters, such as ECG, SpO2 and blood pressure, the system also transfers context-aware data, including activity, position and tracking data, in a wireless sensor network environment at home or in a hospital. Since packet loss may have fatal consequences for patients, healt...

  11. WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING

    S. Janani Devi; G. S. Sreetha Devi; G. M. Tamil Selvan

    2013-01-01

    In past years, Patient observation is done manually or by using wireless Body Sensor Network which is sensibly observed by medical organization agents. Mesh network is used for reading physiological framework and clear description of the patient using wireless sensors. Inventive Agents are proposed for alerting medical organization and data aggregation. Cloud is also proposed for supporting healthcare community and remote or mobile patient monitoring.

  12. Asymptotic properties of wireless multi-hop networks

    Dousse, Olivier; Thiran, Patrick

    2007-01-01

    In this dissertation, we consider wireless multi-hop networks, where the nodes are randomly placed. We are particularly interested in their asymptotic properties when the number of nodes tends to infinity. We use percolation theory as our main tool of analysis. As a first model, we assume that nodes have a fixed connectivity range, and can establish wireless links to all nodes within this range, but no other (Boolean model). We compute for one-dimensional networks the probability that two nod...

  13. Optimisation and algorithms in wireless networks for mission critical applications

    Tavakoli Dehkordi , Anousheh

    2015-01-01

    The focus of this dissertation is to present novel algorithms and techniques in wireless network systems aiming at performance optimisation. This thesis provides contribution to knowledge on the following topics: (a) sum rate maximisation of two interfering users in an Orthogonal Frequency Division Multiple Access (OFDMA)-based cooperative base stations and (b) event-region detection in Wireless Sensor Networks (WSNs). The first area of work makes contribution on problem of maximising t...

  14. Enhancements of LEACH Algorithm for Wireless Networks: A Review

    M. Madheswaran

    2013-12-01

    Full Text Available Low Energy Adaptive Clustering Hierarchy (LEACH protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN. In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.

  15. Distance Based Fault detection in wireless sensor network

    Ayasha Siddiqua; Shikha Swaroop; Prashant Krishan; Sandip Mandal

    2013-01-01

    Wireless Sensor Network (WSNs) have become a new information collection and monitoring solution for a variety of application. In WSN, sensor nodes have strong hardware and software restrictionin terms of processing power, memory capability, power supply and communication throughput. Due to these restrictions, fault may occur in sensor. This paper presents a distance based fault detection (DBFD)method for wireless sensor network using the average of confidence level and sensed data of sensor n...

  16. Measurement-Based Performance and Admission Controlin Wireless Sensor Networks

    Orhan, Ibrahim; Lindh, Thomas

    2011-01-01

    This journal paper presents a measurement-basedperformance management system for contention-based wireless sensor networks. Its main features are admission andperformance control based on measurement data from lightweight performance meters in the endpoints. Test results showthat admission and performance control improve the predictability and level of performance. The system can also be used asa tool for dimensioning and configuration of services in wireless sensor networks. Among the rapidl...

  17. Gentrification in the mesh: ethnography of Open Wireless Network (OWN)

    Cardullo, Paolo

    2015-01-01

    The paper presents findings from a longitudinal ethnography of Open Wireless Network (OWN) in Deptford, inner-city London. It offers a critical perspective on the practices of construction and consumption of wireless mesh networks, by investigating challenges that gentrification and commercialisation of the Internet present to their implementation. Drawing on Social Construction of Technology (SCOT) and critical urban theory, the paper frames OWN as a socio-technology deeply entangled w...

  18. Seamless and secure communications over heterogeneous wireless networks

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  19. Wireless sensor and ad hoc networks under diversified network scenarios

    Sarkar, Subir Kumar

    2012-01-01

    Due to significant advantages, including convenience, efficiency and cost-effectiveness, the implementation and use of wireless ad hoc and sensor networks have gained steep growth in recent years. This timely book presents the current state-of-the-art in these popular technologies, providing you with expert guidance for your projects in the field. You find broad-ranging coverage of important concepts and methods, definitions of key terminology, and a look at the direction of future research. Supported with nearly 150 illustrations, the book discusses a variety of critical topics, from topology

  20. High Fidelity Simulations of Large-Scale Wireless Networks

    Onunkwo, Uzoma [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Benz, Zachary [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.