WorldWideScience

Sample records for 3g wireless networks

  1. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny

    2011-01-01

    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results of...... the radio link power consumption. Based on these description and analysis, we propose power consumption model. The power model was evaluated on the smartphone Nokia N900, which follows a 3GPP Release 5 and 6 supporting HSDPA/HSPA data bearers. Further we propose method of parameters selection for 3GPP...

  2. Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks

    Dogan Safak

    2007-01-01

    Full Text Available Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the input compressed video streams while controlling the output rates to provide robust communications over error-prone and bandwidth-limited 3G wireless networks. The transcoder is also designed to employ a new adaptive intra-refresh algorithm, which is responsive to the detected scene activity inherently embedded into the video content and the reported time-varying channel error conditions of the wireless network. Comprehensive computer simulations demonstrate significant improvements in the received video quality performances using the new transcoding architecture without an extra computational cost.

  3. Towards adaptive security for convergent wireless sensor networks in beyond 3G environments

    Mitseva, Anelia; Aivaloglou, Efthimia; Marchitti, Maria-Antonietta;

    2010-01-01

    The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context-aware adapt...

  4. RObust header compression (ROHC) performance for multimedia transmission over 3G/4G wireless networks

    Fitzek, Frank; Rein, S.; Seeling, P.; Reisslein, M.

    2005-01-01

    Robust Header Compression (ROHC) has recently been proposed to reduce the large protocol header overhead when transmitting voice and other continuous meadi over IP based control stacks in wireless networks. In this paper we evaluate the real-time transmission of GSM encoded voice and H. 26L encoded...... video with ROHC oevr a wireless link. For the voice transmission we examine the impact of ROHC on the consumed bandwidth, the voice qaulity, and the delay jitter in teh voice signal. We find that for a wide rang of error probabilities on teh wireless link, ROHC roughly cuts the bandwidth required for...... the transmission of GSM encoded voice in half. In addition, ROHC improves the voice quality compared to transmissions without ROHC, especially for large bit error probabilities on the wireless link. the improvement reaches 0.26 on the 5-point Mean Opinion Score for a bit error probability of 10...

  5. Call Admission Control performance model for Beyond 3G Wireless Networks

    Babu, H S Ramesh; Satyanarayana, P S

    2010-01-01

    The Next Generation Wireless Networks (NGWN) will be heterogeneous in nature where the different Radio Access Technologies (RATs) operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN. Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireles...

  6. The Research on Handoff Strategy in Beyond 3G Wireless Networks

    CUI Hong-yan; TIAN Hui; XU Hai-bo; ZHANG Ping

    2006-01-01

    One of the major challenges for beyond third generation mobile systems is efficient mobility management. This paper proposes a distributed dynamic management scheme of handoff based on B3G networks. This .scheme can reduce the co.st of update signalling and transmitting packets, and improve the system capability. In this .scheme, the dynamic building network approach is adopted to deduce the update signalling cost. We implement the distributed dynamic management scheme of handoff in a simulation platform and compare its performance with that of general centralized handoff management schemes. Our simulation results indicate that our .scheme is capable of reducing the update handoff latency, and enhancing the performance.

  7. Improving Throughput and Delay by Signaling Modification in Integrated 802.11 and 3G Heterogeneous Wireless Network

    Majid Fouladian

    2016-02-01

    Full Text Available Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility management and handoff decision making. Vertical handoff is switching process between heterogeneous wireless networks in a 3G/WLAN network. Vertical handoffs often fail due to the abrupt degrade of the WLAN signal strength. In this paper, proposed a new vertical handoff method for to decrease the number of signaling and registration processes, to examine the Special conditions such as WLAN black holes and to eliminate disconnecting effects. By estimating user locations related to WLAN position, interface on-times will be reduced which makes the power consuming of the system decreased. To indicate the efficiency of proposed approach the performance and the delay results are simulated.

  8. Performance Analysis of 3G Communication Network

    Toni Anwar; Lim Wern Li

    2008-01-01

    In this project, third generation (3G) technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the network from circuit switched to packet switched operation, resulting in increased overall network performance. Higher reliability, better coverag...

  9. Design and Development of Broadband Inverted E-shaped Patch Microstrip Array Antenna For 3G Wireless Network

    Norbahiah Misran

    2008-01-01

    Full Text Available Microstrip patch antenna has been received tremendous attention since the last two decades and now it becomes a major component in the development of Smart Antenna System for Third-Generation Wireless Network proposed by the ITU-R under the banner of IMT-2000. Smart antenna consists of an array of antennas associated with it a base-band hardware and control unit (inclusive of the software algorithm that have the capability to change its radiation pattern according to the direction of the user. This paper describes the design and development of broadband Inverted E-shaped patch microstrip array antennas for 3G wireless network. The antenna was designed for the IMT-2000 operating frequency range of 1.885–2.200GHz and was built as an array of 4x4 inverted E-shaped patches. The beamforming feed network comprises of commercial variable attenuators (KAT1D04SA002, variable phase shifters (KPH35OSC000, and the corporate 16-ways Wilkinson power divider which was developed in-house. The antenna successfully achieves the bandwidth of 16.14% (at VSWR: 1.5 with respect to the center frequency of 2.045 GHz. The antenna is capable of scanning with the maximum scanning angle of ±30º and ±25º in azimuth and elevation respectively.

  10. Performance Analysis of 3G Communication Network

    Toni Anwar

    2008-11-01

    Full Text Available In this project, third generation (3G technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the network from circuit switched to packet switched operation, resulting in increased overall network performance. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the network performance. Throughput and spectral efficiency are fundamental parameters in capacity planning for 3G cellular network deployments. In this project investigated the downlink (DL and uplink (UL throughput and spectral efficiency performance of the standard Universal Mobile Telecommunications system (UMTS system for different scenarios of user and different technologies. Then, compiles results and analyzes it. Thus, this analysis can significantly help system engineers to obtain crucial performance characteristics of 3G network.

  11. Wireless Networks

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  12. Wireless mesh networks.

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed. PMID:19047448

  13. Comparative Study of 3G / 4G Network Service

    Gulshan Kumar

    2014-10-01

    Full Text Available Modern technology is evolving so fast, that it can be very difficult to keep follow everything new. Cellular Communication is one of the most recent areas which is developing tremendously fast at present times, it is only due to the advancement of technology in all the fields of cellular and wireless communications. Networks are used basically in business and home applications, mobile users, and in all social concerns. At the present time, the use of 3 rd Generation (3G cellular communication systems seems to be the standard, while the 4th generation (4G stands for the next generation of wireless and cellular communications. This comparative study between 3G & 4G tells about the scope, background and the visualization for the 4G. In this paper, we first present a brief review on the evolutionary history, features, condition of network communication and comparison of 3G - 4G perspectives. It is followed by the introduction to 4G technologies to fulfill the limitations of 3G services. At the end, the paper is summarized.

  14. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    To William

    2005-01-01

    Full Text Available This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  15. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    To William; Salcic Zoran; Nguang Sing Kiong

    2005-01-01

    This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC) approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  16. Emerging wireless networks concepts, techniques and applications

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  17. Future mobile networks 3G and beyond

    Clapton, Alan

    2001-01-01

    This book explores the future of mobile communications networks given the increasing demands for services and higher quality, as well as the continued growth in the cellular mobile marketplace and the new private mobile radio systems. These demands will impact on the developments that are likely to occur in the near future which will continue to drive forward the technological capabilities. This book investigates the implications of increasing mobile customer numbers on a global scale, and the convergence of mobile and the internet, which, it is envisaged, will provide the next massive growth

  18. Mobile Wireless System Interworking with 3G and Packet Aggregation for Wireless LAN

    Ransbottom, J. Scot

    2004-01-01

    This research considered the efficient transmission of data within a wireless local area network (WLAN) system. A simulation model was developed to study the performance of our protocol, AGG-MAC (aggregated medium access control). AGG-MAC is a simple and elegant medium access control (MAC) protocol designed to improve performance by transmitting a maximal quantity of data with minimal overhead. Our enhancement to IEEE 802.11, AGG-MAC yields dramatic improvements in both local and global thro...

  19. Key technologies and concepts for beyond-3G networks

    Pehkonen, Kari; Uskela, Sami; Kalliojarvi, Kari; Oksanen, Lauri; Rikkinen, Kari

    2001-10-01

    Standardization of 3rd Generation (3G) mobile communication systems has produced the first specification releases and the commercial deployment of the 3G systems has started. Whereas 1G and 2G focused on efficiently providing voice services, in 3G a lot of attention has been devoted to solutions that support both Circuit Switched (CS) and Packet Switched (PS) communication. That has called for very flexible air interface and network solutions. 3G will continue to evolve and there are already on-going standardization activities that will, for example, boost the peak data rates up to 5-10 Mbps and improve spectral efficiency by 2-4 times. In the future, 3G evolution will be going towards 10/100 Mbps peak data rates in wide/local are coverage, respectively. This will take place partly because of technical improvements of 3G radio interface solutions, but also due to network evolution which will allow the integration other radio access methods like radio LANs into the 3G system. In longer term the 3G network evolution will be going towards ALL-IP networks. As 3G evolution seems to be going towards 10 Mbps/100 Mbps peak data rates and ALL-IP networks any beyond 3G air interface or network solution should be clearly better in order to justify its technical and commercial feasibility. Given the long evolution time of 3G and integration of other radio access schemes with 3G radio we may not even see a new, complete beyond 3G system being developed. Maybe we will just witness the emergence of a new, more advanced radio access solution which will then be connected to the evolving 3G network. As 3G evolution will continue for several years to come the research targets for any beyond 3G solutions must be set very high. When it comes to air interface, we should aim at 100 Mbps peak data rates for wide area access with high mobility, and at 1 Gbps for local area access with low mobility. Regarding possible commercial launches of any beyond 3G systems or solutions they could then

  20. Wireless Fidelity Networks

    Jäger, Vítězslav

    2009-01-01

    This work deals with main problems of wireless fidelity networks. In details it’s showing the terminology, used technical standards, network’s architecture and built-in security of wireless fidelity networks. For the question of the network’s security it’s handled regarding to VPN (Virtual Private Network) technology. Based on these theoretical assumptions there is new company’s network designed. This designed network offers combination of free wireless network with internet access and secure...

  1. Community Wireless Networks

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  2. Power consumption analysis of constant bit rate video transmission over 3G networks

    Ukhanova, Ann; Belyaev, Evgeny; Wang, Le;

    2012-01-01

    This paper presents an analysis of the power consumption of video data transmission with constant bit rate over 3G mobile wireless networks. The work includes the description of the radio resource control transition state machine in 3G networks, followed by a detailed power consumption analysis and...... measurements of the radio link power consumption. Based on this description and analysis, we propose our power consumption model. The power model was evaluated on a smartphone Nokia N900, which follows 3GPP Release 5 and 6 supporting HSDPA/HSUPA data bearers. We also propose a method for parameter selection...

  3. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Fei Liu; Ruizhen Han; Yong He

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classif...

  4. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Moon Bongkyo

    2010-01-01

    The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, a...

  5. Architecture of Wireless Network

    Ram Kumar Singh; Shweta Singh

    2012-01-01

    To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre). The mobile switching centre allow connectivity among the PSTN (public switched telephone network) and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a sys...

  6. Security for multihop wireless networks

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  7. Wireless rechargeable sensor networks

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  8. Wireless network pricing

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  9. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Moon Bongkyo

    2010-01-01

    Full Text Available The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, and the other is that most of the fields in request messages as well as response messages are duplicated when a set of SIP messages are exchanged during session re-setup procedure. In this scheme, no change is required in the SIP message processing except for the proxy agents in both BS and MH.

  10. Architecture of Wireless Network

    Ram Kumar Singh

    2012-03-01

    Full Text Available To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre. The mobile switching centre allow connectivity among the PSTN (public switched telephone network and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a system. The global telecommunications control grid of PSTN which associate with conventional (landline telephone switching centre (called central office with MSCs all around the world.

  11. Sustainable wireless networks

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  12. Energy efficiency in wireless networks

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  13. Miniaturized wireless sensor network

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  14. Wireless networked music performance

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  15. Wireless networks; Traadloese nettverk

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  16. Wireless Sensors Network (Sensornet)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  17. Evolution of Heterogeneous Wireless Networks

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  18. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Fei Liu

    2012-03-01

    Full Text Available This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP, which uses a digital signal processor (DSP as a core CPU, and a host control platform (HCP. The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests’ pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture.

  19. Feasibility study on a portable field pest classification system design based on DSP and 3G wireless communication technology.

    Han, Ruizhen; He, Yong; Liu, Fei

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests' pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture. PMID:22736996

  20. Insecurity of Wireless Networks

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  1. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    Shankar, R; Dananjayan, P; 10.5121/iju.2010.1303

    2010-01-01

    The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results ob...

  2. Cognitive wireless networks

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  3. Autonomic wireless networking

    Velayos Muñoz, Héctor Luis

    2005-01-01

    Large-scale deployment of IEEE 802.11 wireless LANs (WLANs) remains a significant challenge. Many access points (APs) must be deployed and interconnected without a-priori knowledge of the demand. We consider that the deployment should be iterative, as follows. At first, access points are deployed to achieve partial coverage. Then, usage statistics are collected while the network operates. Overloaded and under-utilized APs would be identified, giving the opportunity to relocate, add or remove ...

  4. Wireless Sensor Network Topology Control

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  5. Wireless Networks: New Meaning to Ubiquitous Computing.

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  6. Views of wireless network systems.

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  7. Security in Wireless Sensor Networks

    Abdollah Doavi; Hossein Parvan

    2015-01-01

    Wireless sensor network (WSN) is an emerging important research area. The variety in and number of applications is growing in wireless sensor networks. These wireless sensor nodes are tiny devices with limited energy, memory, transmission range, and computational power. Because WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are har...

  8. Wireless sensor networks architectures and protocols

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  9. Wireless Internet over Heterogeneous Wireless Networks

    Wu, G.; Mizuno, M.

    2001-01-01

    One of the two keywords for the next generation wireless communications is seamless. Being involved in the essential e-Japan Plan promoted by the Japanese Government, the MIRAI (Multimedia Integrated network by Radio Access Innovation) project is responsible for the research and development on the s

  10. Wi-Fi Wireless Networks and Technology

    2008-01-01

    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  11. Building RNC in All-IP Wireless Networks using Network Processors

    CHENG Sheng; NI Xian-le; ZHU Xin-ning; DING Wei

    2004-01-01

    This paper describes a solution to build network-processor-based Radio Network Controller (RNC) in all-IP wireless networks, it includes the structure of the 3rd Generation (3G) wireless networks and the role of network nodes, such as Base Station (BS), RNC, and Packet-Switched Core Networks (PSCN). The architecture of IXP2800 network processor; the detailed implementation of the solution on IXP2800-based RNC are also covered. This solution can provide scalable IP forward features and it will be widely used in 3G RNCs.

  12. Mobility in Wireless Sensor Networks

    Mehta, Ankur Mukesh

    2012-01-01

    The combination of mobility with wireless networks greatly expands the application space of both robots and distributed sensor networks; such a pervasive system can enable seamless integration between the digital and physical worlds. However, there are a number of issues in both robotic and wireless sensor network (WSN) fields that demand research, and their integration generates further challenges. A fundamental open problem in robotic systems is the issue of self-contained localization. ...

  13. Rate allocation strategies for energy-efficient multipath routing in Ad-hoc networks towards B3G

    ZHAN Song-tao; XU Guo-xin

    2007-01-01

    Wireless mobile Ad-hoc network is a special network that all nodes can self-organize and work together. It is flexible to form a network and extend the coverage area dynamically without infrastructure, so Ad-hoc network is envisioned as cornerstones of future generation networking technologies (B3G or 4G). However, the dynamic network topology makes the communication cost not only the energy of source/destination nodes, but also the relay nodes. Another problem of the Ad-hoc network is it is hard to provide a stable and persistent quality of service (QoS), which is strongly required by the beyond 3rd generation (B3G) system. In this article, the authors establish a scenario that contains B3G cellular base station and Ad-hoc mobile nodes, and propose two algorithms minimum incremental rate algorithm and power feed-back rate allocation algorithm in multipath routing. The algorithms can maintain a constant total transmission rate and bit error ratio (BER) to provide the QoS guarantee and reach the minimum power consumption of the relay nodes by adjusting the rate of each path in the multipath routing.

  14. Wireless home networking for dummies

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  15. MBMS—IP Multicast/Broadcast in 3G Networks

    Markus Kampmann

    2009-01-01

    Full Text Available In this article, the Multimedia Broadcast and Multicast Service (MBMS as standardized in 3GPP is presented. With MBMS, multicast and broadcast capabilities are introduced into cellular networks. After an introduction into MBMS technology, MBMS radio bearer realizations are presented. Different MBMS bearer services like broadcast mode, enhanced broadcast mode and multicast mode are discussed. Streaming and download services over MBMS are presented and supported media codecs are listed. Service layer components as defined in Open Mobile Alliance (OMA are introduced. For a Mobile TV use case capacity improvements achieved by MBMS are shown. Finally, evolution of MBMS as part of 3GPP standardization is presented.

  16. Wireless Ad Hoc Networks

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  17. Guide to wireless network security

    Vacca, John R

    2006-01-01

    A guide to key foundation topics and technology frameworks for designing and maintaining reliable operations. This work explains the concepts from basic concepts to designing principles to deployment. It covers wireless security testing techniques and prevention techniques for intrusion. It is aimed at wireless network administrators.

  18. Wireless network security theories and applications

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  19. Migrations amid Generations of Wireless networks

    Harpreet kaur

    2011-08-01

    Full Text Available This article presents an overview of migrations among various generations with emphasis on trends in the areas of wireless networking. Migrations from one type of network to another are being experienced due to advances in wireless communication since the days of ingenious inventions of Alexander Graham Bell and Guglielmo Marconi. Today’s wireless technology serves the plethora of person to person communication demands rather than point to point communication. These all advances are due to the technological growth, standards and services required. The nomenclature of the generations generally refers to a change in the nature of the service,non backwards compatible transmission technology and new frequency bands. The first move was from 1981 analogue (1G to digital(2G transmission in 1992. This was followed in 2002 by the 3G multi media support, spread spectrum transmission and at least 200kbit/s ,soon followed by 4G which refers to all IP packet-switched networks, mobile ultra-broadband (gigabit speed access and multi carrier transmission. Pre-4G technology such as mobile WiMAX and first release 3G Long Term Evolution (LTE have been available in market since 2006 and 2009 respectively.

  20. Wireless Sensor Networks: Issues & Challenges

    Indu; Sunita Dixit

    2014-01-01

    Wireless Sensor Networks (WSN) are highly distributed self organized systems. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, spread over a specific geographic area for some specific purposes like environmental monitoring, surveillance, target tracking etc. By combining sensing technology with processing power and wireless communication makes it lucrative for being exp...

  1. Secure positioning in wireless networks

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  2. Wireless Internet on Heterogeneous Networks

    Wu, G.

    2001-01-01

    The wide proliferation of wireless systems and the use of software radio technologies enable the employment of a heterogeneous network. In this concept services are delivered via the network that is most efficient for that service. The solution is based on a common core network that interconnects ac

  3. Breaking Free with Wireless Networks.

    Fleischman, John

    2002-01-01

    Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…

  4. 3G, 4G and beyond bringing networks, devices and the web together

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  5. Radio propagation and adaptive antennas for wireless communication networks

    Blaunstein, Nathan

    2014-01-01

    Explores novel wireless networks beyond 3G, and advanced 4G technologies, such as MIMO, via propagation phenomena and the fundamentals of adapted antenna usage.Explains how adaptive antennas can improve GoS and QoS for any wireless channel, with specific examples and applications in land, aircraft and satellite communications.Introduces new stochastic approach based on several multi-parametric models describing various terrestrial scenarios, which have been experimentally verified in different environmental conditionsNew chapters on fundamentals of wireless networks, cellular and non-cellular,

  6. Cooperative Diversity in Wireless Networks

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  7. Socially Aware Heterogeneous Wireless Networks.

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-01-01

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation. PMID:26110402

  8. Socially Aware Heterogeneous Wireless Networks

    Pavlos Kosmides

    2015-06-01

    Full Text Available The development of smart cities has been the epicentre of many researchers’ efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs, in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users’ locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  9. Design and security of small wireless network

    Cikánek, Svatopluk

    2014-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  10. Optimisation problems in wireless sensor networks

    Suomela, Jukka

    2009-01-01

    This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmit...

  11. Mobility Management in beyond 3G-Environments

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan

    2003-01-01

    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi

  12. Wireless wearable network and wireless body-centric network for future wearable computer

    2007-01-01

    The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.

  13. Centralized Routing for Prolonged Network Lifetime in Wireless Sensor Networks

    Hansen, Ewa

    2008-01-01

    In this thesis centralized routing methods for wireless sensor networks have been studied. The aim has been to prolong network lifetime by reducing the energy consumed by sensor-node communication. Wireless sensor networks are rapidly becoming common in application areas where information from many sensors is to be collected and acted upon. The use of wireless sensor networks adds flexibility to the network, and the cost of cabling can be avoided. Wireless sensor networks may consist of sever...

  14. Active Intrusion Detection for Wireless Multihop Networks

    do Carmo, Rodrigo Daniel

    2014-01-01

    This work focuses on network security and introduces an active-probing technique for intrusion detection in wireless multihop networks. Wireless networks have been the revolution of personal communications of the past decades. Millions of devices with wireless capabilities are sold to end customers every year: smartphones that enable access to the Internet almost everywhere, computers with wireless connections, personal watches, sports shoes, digital cameras, and even lenses with wirel...

  15. Wireless network security and cracking security key

    Bikov, Dusan; Bouyuklieva, Stefka; Stojanova, Aleksandra

    2014-01-01

    Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module), wireless security is an ever increasing issue for many organizations. In other words wireless networks add another entry point into a network for hackers. Because this technology is relatively new there is many security vulnerabilities. ...

  16. Interworking of Wireless LANs and Cellular Networks

    Song, Wei

    2012-01-01

    The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies. The popular cellular networks and wireless local area networks (WLANs) present perfectly complementary characteristics in terms of service capacity, mobility support, and quality-of-service (QoS) provisioning. The cellular/WLAN interworking is an effective way to promote the evolution of wireless networks. "Interworking of Wireless LANs and Cellular Networks" focuses on three aspects, namely access selection, call admission control and

  17. A Perspective of 3G Construction in China

    Beijing Norson Consulting Co.,Ltd

    2006-01-01

    @@ 1. The problems on hybrid network combining TD-SCDMA 1)Hybrid network is imperative in China At present, there are several major wireless networks in China,namely, GSM network of China Mobile, GSM network and CDMA network of China Unicom, PHS network of China Telecom and China Netcom, and therefore the seamless transition from the existent wireless network to 3G network is an inevitable factor must be taken into account. In view of the difference of release sequence and release target of 3G license, the hybrid network combining TD-SCDMA, WCDMA and CDMA2000 technology will be probably adopted in future 3G construction in China.

  18. Gigabit Wireless for Network Connectivity

    Schoedel, Eric

    2009-01-01

    Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…

  19. Multihop Wireless Networks Opportunistic Routing

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  20. Secure data aggregation for wireless sensor network

    Tran-Thi-Thuy, Trang

    2010-01-01

    Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires...

  1. Integrated Optical Wireless Network For Next Generation Wireless Systems

    Aditya Goel

    2009-03-01

    Full Text Available Next generation wireless networks need to support broadband wireless services at significantly reduced cost. The existing wireless systems can hardly provide transmission capacity of the order of few Mbps. However, millimeter waves and optical fiber can provide data capacity of the order of Gbps and Tbps respectively. Hence the requirements of broadband wireless system can be achieved through the integration of optical fiber and millimeter wireless systems. We suggest modified millimeter wireless system, with optical fiber as feeder network. Simulations have been carried out for AWGN and optical fiber channels using MATLAB code, so as to compare their individual performance. When compared it is observed that the performance of multimode optical fiber (MMOF link even for distance of 80 KM is better than that of the AWGN channel with SNR of 50 dB and above. Hence, an integrated fiber radio network is an excellent cost effective media for higher data rate (>100Mbps.

  2. Underwater optical wireless communication network

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  3. Dynamic wireless sensor networks

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  4. Security Issues & Challenges in Wireless Sensor Networks

    Anand Nayyar

    2012-01-01

    Wireless Sensor Network (WSN) is regarded as emerging futuristic technology which promises various applications development for people and military. Wireless Sensor Network technology is combined with processing power and wireless communications which makes it vulnerable for security breaches in the future. With the addition of Wireless Technology it is open to all types of security threats. This research paper is developed to research on various security issues cum challenges faced by Wirele...

  5. Tunneled data transmission over wireless sensor networks

    Yow, Thiam Poh

    2007-01-01

    A technique for terminal communication through transmission links established across a wireless sensor network is developed and tested. Using protocols established for conventional wireless communication networks as a guiding principle, different methodologies for link management, and segmentation and reassembly of information are explored. A protocol for sensor network encapsulation was designed and implemented across a network of terminals and wireless sensor motes. The study concludes ...

  6. Sybil attack in Wireless Sensor Network

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  7. Key Management in Wireless Sensor Networks

    Ismail Mansour; Gérard Chalhoub; Pascal Lafourcade

    2015-01-01

    Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take cont...

  8. Wireless Sensor Networks for Healthcare Applications

    Dishongh, Terrance J; Kuris, Ben

    2009-01-01

    This unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data collection and decision making, clinical deployment of wireless sensor networks, contextual awareness medication prompting field trials in homes, social health monitoring, and the future of wireless sensor networks in healthcare.

  9. Down-link power distributions for 2G and 3G mobile communication networks

    Knowledge of realistic power levels is key when conducting accurate EMF exposure assessments. In this study, down-link output power distributions for radio base stations in 2G and 3G mobile communication networks have been assessed. The distributions were obtained from network measurement data collected from the Operations Support System, which normally is used for network monitoring and management. Significant amounts of data were gathered simultaneously for large sets of radio base stations covering wide geographical areas and different environments. The method was validated with in situ measurements. For the 3G network, the 90. percentile of the averaged output power during high traffic hours was found to be 43 % of the maximum available power. The corresponding number for 2G, with two or more transceivers installed, was 65 % or below. (authors)

  10. Weaponizing Wireless Networks

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring...... of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and...... functionality of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security...

  11. R&D on wireless broadband communication systems: new generation ubiquitous mobile network

    Ogawa, Hiroyo

    2007-09-01

    R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.

  12. Distributed medium access control in wireless networks

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  13. Wireless Sensor Networks Approach

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  14. Indoor geolocation for wireless networks

    Ali, Shahid

    2011-01-01

    An ever growing demand for ‘location based services’ and the unprecedented growth of wireless local area networks (WLAN) has, in the past few years, attracted the focus of the research community to investigate and develop accurate indoor geolocation systems. Performance of any geolocation system is based upon the reported distance error . The accuracy required varies from application to application. For example an accurate geolocation system is required to appre...

  15. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  16. Mobility and Handoff Management in Wireless Networks

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of ...

  17. Wireless Sensor Networks Attacks and Solutions

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  18. Future wireless and optical networks

    Jiang, Shengming

    2012-01-01

    This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control prob

  19. Security Threats in Wireless Sensor Networks

    Sushma

    2011-05-01

    Full Text Available Wireless Sensor Network (WSN is an emergingtechnology that shows great promise for variousfuturistic applications both for mass public andmilitary. The sensing technology combined withprocessing power and wireless communication makesit lucrative for being exploited in abundance in future.Wireless sensor networks are characterized byseverely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN are currently receiving significant attention due to their unlimitedpotential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.

  20. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  1. Low-Power Wireless Sensor Network Infrastructures

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... in order to achieve the wanted lifetimes. Through more than a decade of wireless sensor network research, progress towards realizing wanted lifetimes have been made and wireless standards for packet formatting and routing have been proposed. With standards in place, the wide-span between programming...... environments and communication primitives in wireless sensor network and traditional network development are closing. However, fundamental differences in wireless technology and energy constraints are still to be considered at the lower levels of the software stack. To fulfill energy requirements hardware...

  2. Integration of RFID and Wireless Sensor Networks

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  3. Voice over IP in Wireless Heterogeneous Networks

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the...... deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality Vo......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality. The...

  4. The Security of Wireless Local Area Network

    林楠; 李翠霞

    2007-01-01

    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  5. Distributed Phased Arrays and Wireless Beamforming Networks

    David Jenn; Yong Loke; Tong Chin Hong Matthew; Yeo Eng Choon; Ong Chin Siang; Yeo Siew Yam

    2009-01-01

    Distributed phased arrays have advantages over conventional arrays in many radar and communication applications. Additional advantages are realized by replacing the microwave beamforming circuit by a wireless network, thus forming a wirelessly networked distributed sensor array. This article examines various aspects of a distributed phased array that incorporates wireless beamforming. First, the fundamental array theory and digital signal processing are reviewed. Basic equations are presented...

  6. Reliability of wireless sensor networks.

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  7. Distributed Greedy Scheduling for Multihop Wireless Networks

    Sunny, Albert; Kuri, Joy

    2010-01-01

    We consider the problem of scheduling in multihop wireless networks subject to interference constraints. We consider a graph based representation of wireless networks, where scheduled links adhere to the K-hop link interference model. We develop a distributed greedy heuristic for this scheduling problem. Further, we show that this distributed greedy heuristic computes the exact same schedule as the centralized greedy heuristic.

  8. Performance Analysis of IIUM Wireless Campus Network

    Abd Latif, Suhaimi; Masud, Mosharrof H.; Anwar, Farhat

    2013-12-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement.

  9. Performance Analysis of IIUM Wireless Campus Network

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  10. How to model wireless mesh networks topology

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  11. Distributed wireless quantum communication networks

    The distributed wireless quantum communication network (DWQCN) has a distributed network topology and transmits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum teleportation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entanglement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. (general)

  12. Wireless sensor networks in chemical industry

    Recent advances in wireless technology are a clear indication of the commercial promise of wireless networks. Industrial wireless sensing has now become more economical, efficient and secure as compared to traditional wired sensing. Wireless Sensor Networks (WSN) are successfully being used for process monitoring and control of many industrial plants. This paper explores how Chemical Industry in particular can benefit from the application of WSN technology. Various examples of successful implementation are cited. In order to address the industrial requirements, we propose a low power and low cost solution for process monitoring by implementing WSN. (author)

  13. Protocols for high-efficiency wireless networks

    Andreadis, Alessandro

    2007-01-01

    Preface. Part I: Mobile Communication Systems and Technologies. 1. Multiple access techniques for wireless systems. 2. The global system for mobile communications. 3. Mobile systems. 4. Satellite communications. 5. Mobile communications beyond 3G. Part II : Scheduling Techniques, Access Schemes and Mobile Internet Protocols for Wireless Communication Systems. 1. General concepts on radio resource management. 2. Traffic models. 3. RRM in GPS. 4. RRM in WCDMA. 5. RRM in UTRA-TDD. 6. RRM in wireless microcellular systems. 7. RRM in LEO-MSSS. 8. Analytical methods for RRM analysis and final consid

  14. Analyzing the Low Power Wireless Links for Wireless Sensor Networks

    Mamun, Md Mainul Islam; Kumar, Sumon; Islam, Md Zahidul

    2010-01-01

    There is now an increased understanding of the need for realistic link layer models in the wireless sensor networks. In this paper, we have used mathematical techniques from communication theory to model and analyze low power wireless links. Our work provides theoretical models for the link layer showing how Packet Reception Rate vary with Signal to Noise Ratio and distance for different modulation schemes and a comparison between MICA2 and TinyNode in terms of PRR.

  15. Contemporary Developments in Wireless Sensor Networks

    Sangeeta Mittal

    2012-04-01

    Full Text Available Wireless Sensor Networks (WSN since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software, Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent networks, sensor enabled smartness and role of artificial intelligence methods is elaborated. Insight into future directions & research avenues in all the above areas is provided

  16. Proxy SDN Controller for Wireless Networks

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  17. A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network

    2005-01-01

    OAM (Operations, Administration and Maintenance) system is a very important component of 3G cellular network. In order to acquire overall management, fast response and steady operation, an SCTP (Stream Control Transmission Protocol) based OAM, i. e. , SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its transport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experimental results prove the proposed SOAM system achieves better performance on signaling transmission compared with conventional TCP based OAM system.

  18. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai

    2011-08-01

    Full Text Available Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment channel, payment carrier and etc. After deep studying about previous payment methods and future 3G communication technology, this paper introduces a new mobile payment model by combining with IC chip, mobile phone and mobile internet, and then gives some improvement measures for current settlement mechanisms in the network transaction, which is entirely around payment channel, payment carrier, security authentication and other key issues in 3G environment. The real time processing of information flow, capital flow and logistics in mobile environment can be easily achieved, forming a complete and reliable business operation for mobile users, which can bring some great conveniences and profound influences for mobile payment industry.

  19. Resilient networking in wireless sensor networks

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  20. Location based Network Optimizations for Mobile Wireless Networks

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  1. The art of wireless sensor networks

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  2. Reliable Multihop Wireless Network Based on Neighbor Node Behavior

    Nobayashi, Daiki

    2011-01-01

    1 Introduction||2 Wireless LAN Technologies and Multihop Wireless Network||3 Access Point Evaluation with Packet Transfer Ratio in Multi-hop Wireless Network||4 Design and Implementation of Reputation Mechanism for Multihop Wireless Network||5 A Network Reconfiguring Scheme against Misbehaving Nodes||6 Concluding Remarks

  3. Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks

    Lu Lou

    2012-04-01

    Full Text Available Location-based services (LBS provide content that is dynamically customized according to the user's location. These services are commonly delivered to mobile devices. Due to wireless bandwidth limit, broadcasting based transmission technology is one of main methods to provide dynamic real-time information or public emergency for commercial LBS applications. Multimedia Broadcast and Multicast Services (MBMS is a broadcasting service offered via existing GSM and UMTS cellular networks. MBMS has the major benefit that the network infrastructure already exists for mobile network operators and the deployment can be cost effective compared with building a new network for the services. However, Location-based services historically were built as stand-alone applications that did not communicate easily with other applications and systems. Therefore, open standards will be a necessary catalyst for LBS growth. This paper proposes a novel LBS application framework based on the TPEG protocol (transport protocol experts group over MBMS and explains the implement of that using the stream delivery method and download delivery method. For download service, Results of performance tests for FLUTE protocol (File Delivery under unidirectional Transport and FEC (Forward error correction are also presented.

  4. Wireless Networks for Body-Centric Communications

    Martelli, Flavia

    2013-01-01

    Progress in miniaturization of electronic components and design of wireless systems paved the way towards ubiquitous and pervasive communications, enabling anywhere and anytime connectivity. Wireless devices present on, inside, around the human body are becoming commonly used, leading to the class of body-centric communications. The presence of the body with all its peculiar characteristics has to be properly taken into account in the development and design of wireless networks in this con...

  5. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  6. Energy-efficient adaptive wireless network design

    Havinga, Paul J. M.; Smit, Gerard J.M.; Bos, Martinus

    2000-01-01

    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an energy-efficient highly adaptive architecture of a network interface and novel data link layer protocol for wireless networks that provides quality of service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations are necessary to achieve energy efficiency and an acceptable quality of service. The paper provides a review of ideas and...

  7. Secure Multipath routing in Wireless Sensor Networks

    Ravindra Gupta; Hema Dhadhal

    2012-01-01

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possib...

  8. Forest Fire Prevention using Wireless Sensor Networks

    PRASHANTH; Prof. K ASHOK BABU

    2012-01-01

    Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messag...

  9. Wireless communications networks for the smart grid

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  10. Planning Wireless Networks by Shortest Path

    Carlo Mannino; Sara Mattia; Antonio Sassano

    2009-01-01

    Transmitters and receivers are the basic elements of wireless networks and are characterized by a number of radio-electrical parameters. The generic planning problem consists in establishing suitable values for these parameters so as to optimize some network performance indicator. The version here addressed, namely the Power Assignment Problem (PAP), is the problem of assigning transmission powers to the transmitters of a wireless network so as to maximize the satisfied demand. This problem h...

  11. Lightweight Intrusion Detection in Wireless Sensor Networks

    Riecker, Michael

    2015-01-01

    Wireless sensor networks have become a mature technology. They are increasingly being used in different practical applications. Examples include the monitoring of industrial environments and light adaptation in tunnels. For such applications, attacks are a serious concern. A disrupted sensor network may not only have a financial impact, but could also be safety-critical. Hence, the availability of a wireless sensor network is our key protection goal in this thesis. A special challenge lies in...

  12. Multilayer Statistical Intrusion Detection in Wireless Networks

    Noureddine Boudriga; Amel Meddeb-Makhlouf; Mohamed Hamdi

    2008-01-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The archite...

  13. Characterizing User Mobility in Wireless Networks

    Nunes, Bruno Astuto Arouche

    2012-01-01

    n this work we study mobile wireless networks by looking at mobility management and analysis of human mobility, focusing on the main goal of understanding human mobility and applying our findings on developing new realistic mobility models for simulations. In our work, we start by analyzing Wireless Local Area Networks (WLAN) and GPS traces that record mobility in a variety of network environments. We observe that from a macroscopic level, human mobility is symmetric. We also study the direct...

  14. Routing Security in Ad Hoc Wireless Networks

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  15. Approaches to Wireless Sensor Network: Security Protocols

    Harmandeep Singh; Garima Malik

    2011-01-01

    The advancement of electronics and wireless communication technologies have enabled the development of large scale wireless sensor network that consist of many low-power, low-cost and small size sensor nodes. With the help of sensor network we facilitate large scale and real time data processing even in complex environment. The proliferation of sensor application has increased the need of security in sensor network. At the beginning WSN were not built keeping the security in mind because sens...

  16. Analyzing multimode wireless sensor networks using the network calculus

    2015-01-01

    The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N...

  17. An Enhancement of Authentication Protocol and Key Agreement (AKA For 3G Mobile Networks

    Mustafa AL-Fayoumi

    2011-05-01

    Full Text Available This paper proposes a secure authentication mechanism by integrating the public key with the hash-chaining technique. The propose protocol satisfies the security requirements of third generation (3G mobile networks. Also provide the protection of the international mobile subscriber identity (IMSI to ensure subscriber un-traceability, key refreshment periodically, strong key management and a new non-repudiation service in a simple and elegant way. The proposed protocol is more secure protocol than the other available authentication protocols. To avoid the complicated synchronization as in universal mobile telecommunications system (UMTS the proposed protocol does not use sequence number (SEQ, the management of a hash chain is simple and elegant compared to that of SEQ. This proposed protocol is secure against network attacks, such as replay attacks, guessing attacks, and other attacks.

  18. New packet scheduling algorithm in wireless CDMA data networks

    Wang, Yu; Gao, Zhuo; Li, Shaoqian; Li, Lemin

    2002-08-01

    The future 3G/4G wireless communication systems will provide internet access for mobile users. Packet scheduling algorithms are essential for QoS of diversified data traffics and efficient utilization of radio spectrum.This paper firstly presents a new packet scheduling algorithm DSTTF under the assumption of continuous transmission rates and scheduling intervals for CDMA data networks . Then considering the constraints of discrete transmission rates and fixed scheduling intervals imposed by the practical system, P-DSTTF, a modified version of DSTTF, is brought forward. Both scheduling algorithms take into consideration of channel condition, packet size and traffic delay bounds. The extensive simulation results demonstrate that the proposed scheduling algorithms are superior to some typical ones in current research. In addition, both static and dynamic wireless channel model of multi-level link capacity are established. These channel models sketch better the characterizations of wireless channel than two state Markov model widely adopted by the current literature.

  19. Analysis and Testing of Mobile Wireless Networks

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  20. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective

    Alonso Zárate, Jesús; Kartsakli, Elli; Katz, Marcos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos

    2013-01-01

    Multi-Radio Cooperative Automatic Retransmission Request (MCARQ) schemes are introduced in this paper within the context of hybrid networks which combine long-range and short-range communications. Since the number of wireless devices is incessantly increasing, it is frequently possible to establish a spontaneous cooperative cluster in the close proximity of any wireless device. These devices forming the cluster are connected to both a cellular-based network such as WiMAX, 3G...

  1. Monitoring Greenhouse using Wireless Sensor Network

    Rohit.K.Nikhade

    2013-06-01

    Full Text Available Recent advances in science and technology havebeen ledto facilitate monitoring the environment,collecting data, processing the sensed data,threshold-decision making process and lastlyperforming of suitable actions by using ofdistributed wireless sensor networks and actornetworks. Wireless sensor actor networks (WSANis a combination of at least one coordinator nodewith sensors and actor nodes that communicatewirelessly to perform somespecifiedtasks ofsensing, monitoring and actuation.This papersummarizes an idea that can be carriedouttoprovide an efficient control mechanism ofmicroclimateinto greenhouses through theimplementation of aninfrastructure of WirelessSensors Network to control environmentalparameters.

  2. On computer vision in wireless sensor networks.

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  3. Securing radars using secure wireless sensor networking

    Tahmoush, David

    2014-06-01

    Radar sensors can be viewed as a limited wireless sensor network consisting of radar transmitter nodes, target nodes, and radar receiver nodes. The radar transmitter node sends a communication signal to the target node which then reflects it in a known pattern to the radar receiver nodes. This type of wireless sensor network is susceptible to the same types of attacks as a traditional wireless sensor network, but there is less opportunity for defense. The target nodes in the network are unable to validate the return signal, and they are often uncooperative. This leads to ample opportunities for spoofing and man-in-the-middle attacks. This paper explores some of the fundamental techniques that can be used against a limited wireless network system as well as explores the techniques that can be used to counter them.

  4. Coalitions in Cooperative Wireless Networks

    Mathur, Suhas; Mandayam, Narayan B

    2008-01-01

    Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coalition structure, i.e., set of coalitions from which users have no incentives to defect, depends on the manner in which the rate gains are apportioned among the cooperating users. Specifically, the stability of the grand coalition (GC), i.e., the coalition of all users, is studied. Transmitter and receiver cooperation in an interference channel (IC) are studied as illustrative cooperative models to determine the stable coalitions for both flexible (transferable) and fixed (non-transferable) apportioning schemes. It is shown that the stable sum-rate optimal coalition when only receivers cooperate by jointly decoding (transferable) is the GC. The stability of the GC depends on the detector when receivers cooperate using linear multiuser detectors (non-transferable). Transmitter cooperation is studied assuming that all receivers coopera...

  5. Mobility Management in beyond 3G-Environments

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan

    2003-01-01

    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi, GPRS, and UMTS networks. The GPRS and UMTS networks provide countrywide network access, while the WiFi networks provide network access in local areas such as city centres and airports. As a resul...

  6. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    Ramesh Babu H. S.

    2010-03-01

    Full Text Available The Call admission control (CAC is one of the Radio Resource Management (RRM techniques that plays influential role in ensuring the desired Quality of Service (QoS to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN. The proposed Fuzzy Neural call admission control (FNCAC scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compared to other two methods.

  7. Mobility and Handoff Management in Wireless Networks

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  8. Routing for wireless multi-hop networks

    Hamid, Sherin Abdel; Takahara, Glen

    2013-01-01

    The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

  9. Exposure optimization in indoor wireless networks by heuristic network planning

    Plets, David; Joseph, Wout; Vanhecke, Kris; Martens, Luc

    2013-01-01

    Due to the increased use of indoor wireless networks and the concern about human exposure to radio-frequency sources, exposure awareness has increased during recent years. However, current-day network planners rarely take into account electric-field strengths when designing networks. Therefore, in this paper, a heuristic indoor network planner for exposure calculation and optimization of wireless networks is developed, jointly optimizing coverage and exposure, for homogeneous or heterogeneous...

  10. 低辐射3G 网络基站选址优化∗%Optimized Planning of Low Electromagnetic Radiation 3G Network Base Station Location

    张英杰; 孙先佑; 毛赐平; 王镇道; 许伟; 汤龙波; 艾朝阳

    2015-01-01

    针对民众因担忧电磁辐射而投诉日益增多导致通信基站选址困难的现状,在考虑基站覆盖范围和建站成本的同时,兼顾基站电磁辐射对环境的影响,提出了面向低辐射的3G网络基站选址优化方案。通过对基站选址原则及其典型基站的电磁辐射模型分析,建立了基于多目标的基站评价模型,设计了基于改进的免疫优化算法3G 网络基站选址优化方案,并以模拟实验区域为对象进行了仿真实验测试。实验结果表明:本文提出的选址优化方案不仅能以较小的基站建设代价满足信号覆盖要求,同时也降低了基站电磁辐射的影响,获得了更好的社会效益。%Increasingly more people are worried about the electromagnetic radiation of the communica-tion network base station.The growing number of complaints has made base station siting difficult.This paper considered base station coverage and costs,while taking into account the impact of electromagnetic radiation on the environment of the base station.An optimized low electromagnetic radiation 3G network base stations site selection scheme was proposed in this paper.With the base station siting principles and an analysis of the electromagnetic radiation of typical base stations,this paper established a base station evaluation model based on multi-objective design optimization algorithm and proposed a 3G network base station site selection method based on improved immune optimization.A simulation area was set up for simulation tests.The results show that the proposed base station optimization program can not only meet the coverage requirements with relatively smaller construction cost,but also reduce the impact of electro-magnetic radiation for better social benefits.

  11. Performance Control in Wireless Sensor Networks

    Lindh, Thomas; Orhan, Ibrahim

    2009-01-01

    This paper presents an implementation of a method for performance control in wireless body sensor networks based on measurement feedback, especially targeted for demanding healthcare applications.

  12. An Enhancement of Authentication Protocol and Key Agreement (AKA For 3G Mobile Networks

    Mustafa AL-Fayoumi

    2011-05-01

    Full Text Available This paper proposes a secure authentication mechanism by integrating the public key with thehash-chaining technique. The propose protocol satisfies the security requirements of thirdgeneration (3G mobile networks. Also provide the protection of the international mobilesubscriber identity (IMSI to ensure subscriber un-traceability, key refreshment periodically,strong key management and a new non-repudiation service in a simple and elegant way. Theproposed protocol is more secure protocol than the other available authentication protocols. Toavoid the complicated synchronization as in universal mobile telecommunications system (UMTSthe proposed protocol does not use sequence number (SEQ, the management of a hash chain issimple and elegant compared to that of SEQ. This proposed protocol is secure against networkattacks, such as replay attacks, guessing attacks, and other attacks.

  13. Transmit Power Optimisation in Wireless Network

    Besnik Terziu

    2011-01-01

    Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS) for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Inter...

  14. Wireless Sensor Networks for Ambient Assisted Living

    Raúl Aquino-Santos; Diego Martinez-Castro; Arthur Edwards-Block; Andrés Felipe Murillo-Piedrahita

    2013-01-01

    This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very s...

  15. Emulating Wired Backhaul with Wireless Network Coding

    Thomsen, Henning; de Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first component of our solution consists of a two-way, two-phase communication between the macro base station and a user in a small cell through the small cell base station. The second component consists of a...

  16. ECDH power consumption in wireless sensor networks

    Kukuseva, Maja; Citkuseva Dimitrovska, Biljana

    2013-01-01

    Elliptic Curve Cryptography is cryptographic scheme that combines low power usage for key generation and high level of security in constrained Wireless Sensor Networks. Each sensor node is powered by a battery that should last for long period. This constrains wireless sensor networks in terms of energy usage. Another critical issue is secure communications ant thus, the development of cryptographic scheme is difficult and challenging task. Elliptic Curve Diffie- Hellman is secu...

  17. Intrusion detection and monitoring for wireless networks.

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  18. Audio coding in wireless acoustic sensor networks

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt;

    2015-01-01

    In this paper, we consider the problem of source coding for a wireless acoustic sensor network where each node in the network makes its own noisy measurement of the sound field, and communicates with other nodes in the network by sending and receiving encoded versions of the measurements. To make...

  19. A Survey on Energy Efficiency for Wireless Mesh Network

    Sarra Mamechaoui; Fedoua Didi; Guy Pujolle

    2013-01-01

    Reducing CO2 emissions is an important global environmental issue. Over the recent years, wireless and mobile communications have increasingly become popular with consumers. An increasingly popular type of wireless access is the so-called Wireless Mesh Networks (WMNs) that provide wireless connectivity through much cheaper and more flexible backhaul infrastructure compared with wired solutions. Wireless Mesh Network (WMN) is an emerging new technology which is being adopted as the wireless in...

  20. Forest Fire Prevention using Wireless Sensor Networks

    PRASHANTH

    2012-01-01

    Full Text Available Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messages to the control center through the network, thus we can achieve the remote control of the forest fire.

  1. 4G Wireless Networks: Opportunities and Challenges

    Gobjuka, Hassan

    2009-01-01

    With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions.

  2. Topological properties of random wireless networks

    Srikanth K Iyer; D Manjunath

    2006-04-01

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the issues of interest in random wireless networks. We then discuss some recent results for one-dimensional networks with the nodes distributed uniformly in $(0, z)$.We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally we discuss some recent generalisations in considering non uniform transmission ranges and non uniform node distributions. An annotated bibliography of some of the recent literature is also provided.

  3. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes. PMID:25379521

  4. Performance Analysis of Wireless Networks With MDQOS

    A. Leelavathi

    2014-07-01

    Full Text Available In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users. This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns

  5. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  6. Enhance Throughput in Wireless Sensor Network Using Topology Control Approach

    Parikha Chawla; Parmender Singh; Taruna Sikka

    2012-01-01

    This paper is associated with implementation of topology control approach to enhance throughput in wireless sensor network. A wireless sensor network is characterized by limited energy supply and large nodes. To maximise the network lifetime of wireless sensor network the topology control is the considered to be the important process. Every attempt is being made to reduce the energy consumption and to enhance throughput of the wireless sensor node. Topology Control aims at network-wide goals,...

  7. Case Study of Wireless Networking for Small Business

    Rehan Jamil, Irfan Jamil, Muhammad Ismail, Naveed Ur Rehman

    2015-01-01

    Mobile and wireless networks have undergone rapid changes and have seen an unprecedented growth during the last few years. Traditional ways of networking have changed to accommodate new lifestyles and newer ways of working. Wireless networks offer several advantages over fixed or wired networks through mobility, flexibility, ease of access, speed of deployment, and low cost. Flexibility of wireless networks facilitates rapid deployment. Finally, this paper identifies the benefits of wireless ...

  8. Routing in Wireless Networks with Position Trees

    Chavez, Edgar; Mitton, Nathalie; Tejeda, Hector

    2007-01-01

    Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing protocols are preferred because sensor networks have limited battery life. Location aware routing protocols are good candidates for sensor network applications, nevertheless they need either an external location service like GPS or Galileo (which are bulky, energy consuming devices) or internal location services prov...

  9. A Control and Management Network for Wireless ATM Systems

    Bush, Stephen F.; Jagannath, Sunil; Evans, Joseph B.; Frost, Victor; Minden, Gary; Shanmugan, K. Sam

    1999-01-01

    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reus...

  10. Wireless Sensor Networks for Ambient Assisted Living

    Raúl Aquino-Santos

    2013-11-01

    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  11. Agent routing algorithm in wireless sensor networks

    Zhang, Yuqing; Yang, Shuqun

    2013-03-01

    Wireless sensor networks are a new technology of information acquisition and processing, so they are widely used in all kinds of fields. In the paper we introduce Agent technology into the wireless sensor network, conduct a in-depth research on the four routing schemes, and propose a new improved routing scheme, which considers the energy consumption of both nodes and path. Furthermore, The scheme we proposed has efficient routing function, can balance the energy consumption of nodes and extends the lifetime of the network in a more efficient way.

  12. Wireless vehicular networks for car collision avoidance

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  13. Intelligent Communication Module for Wireless Biosensor Networks

    Naik, R.; Singh, J.; Le, H. P.

    2010-01-01

    This chapter presented a new paradigm of biosensors which have processing capability with an intelligent and adaptive wireless communication module. The adaptive communication module efficiently reconfigures its hardware components according to the changes in operating environment in order to reduce system power consumption and optimally utilise resources. The chapter presented several significant applications of wireless biosensor networks which hold enormous potential to benefit the communi...

  14. TCP Performance in Heterogeneous Wireless Networks

    Sarolahti, Pasi

    2007-01-01

    The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropri...

  15. Modeling Multistandard Wireless Networks in OPNET

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  16. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  17. Wireless Sensor Network Software Design Rules

    Strazdiņš, Ģirts

    2014-01-01

    Abstract In the last decade wireless sensor networks (WSNs) have evolved as a promising approach for smart investigation of our planet, providing solutions for environment and wild animal monitoring, security system development, human health telemonitoring and control, industrial manufacturing and other domains. Lack of unified standards and methodologies leads to limited sensor network solution interoperability and portability. Significant number of WSN operating systems...

  18. Service discovery in heterogeneous wireless networks

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible imple

  19. IPv6 for Future Wireless Networks

    Nielsen, Thomas Toftegaard

    2001-01-01

    enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...... wireless network....

  20. Energy-Harvesting Wireless Sensor Networks

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio;

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....

  1. Flexible network wireless transceiver and flexible network telemetry transceiver

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  2. Modify LEACH Algorithm for Wireless Sensor Network

    Mortaza

    2011-09-01

    Full Text Available Research on wireless sensor networks has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Prolonged network lifetime, scalability, and load balancing are important requirement for many sensor network applications. Clustering sensor nodes is an effective technique for achieving these goals. In this work, we introduce an energy efficient clustering algorithm for sensor networks based on the LEACH protocol. LEACH (Low Energy Adaptive Clustering Hierarchy is one of popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA based MAC protocol, and In order to maintain a balanced energy consumption. The proposed protocol adds feature to LEACH to reduce the consumption of the network resource in each round. The proposed protocol is simulated and the results show a significant reduction in network energy consumption compared to LEACH.

  3. Wireless local area network. A new technology of network

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  4. Intrusion detection in wireless ad-hoc networks

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  5. Spatial Throughput Maximization of Wireless Powered Communication Networks

    Che, Yue Ling; Duan, Lingjie; Zhang, Rui

    2014-01-01

    Wireless charging is a promising way to power wireless nodes' transmissions. This paper considers new dual-function access points (APs) which are able to support the energy/information transmission to/from wireless nodes. We focus on a large-scale wireless powered communication network (WPCN), and use stochastic geometry to analyze the wireless nodes' performance tradeoff between energy harvesting and information transmission. We study two cases with battery-free and battery-deployed wireless...

  6. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  7. Wireless sensor network for sodium leak detection

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  8. Ad hoc mobile wireless networks principles, protocols, and applications

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  9. An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

    A.Sandeep Kumar ,Second Author

    2012-01-01

    wireless mesh networks (WMNs) has been widely used for the new generation wireless network. The capability of self-organization in WMNs reduces the complexity of wireless network deployment and maintenance. So, the perfect estimation of the bandwidth available of the mesh nodes is the required to admission control mechanism which provides QOs confirmation in wireless mesh networks. The bandwidth estimation of schemes do not give clear output. Here we are proposing bandwidth scheme estimation ...

  10. Denial of service attacks and challenges in broadband wireless networks

    Khan, S.; Loo, KK; Naeem, T; Khan, MA

    2008-01-01

    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromis...

  11. Emulating Wired Backhaul with Wireless Network Coding

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... component of our solution consists of a two-way, two-phase communication between the macro base station and a user in a small cell through the small cell base station. The second component consists of an optimized adjustment of the transmit power from the macro base station during the multiple access phase......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  12. Integrating Wireless Networking for Radiation Detection

    Board, Jeremy; Barzilov, Alexander; Womble, Phillip; Paschal, Jon

    2006-10-01

    As wireless networking becomes more available, new applications are being developed for this technology. Our group has been studying the advantages of wireless networks of radiation detectors. With the prevalence of the IEEE 802.11 standard (``WiFi''), we have developed a wireless detector unit which is comprised of a 5 cm x 5 cm NaI(Tl) detector, amplifier and data acquisition electronics, and a WiFi transceiver. A server may communicate with the detector unit using a TCP/IP network connected to a WiFi access point. Special software on the server will perform radioactive isotope determination and estimate dose-rates. We are developing an enhanced version of the software which utilizes the receiver signal strength index (RSSI) to estimate source strengths and to create maps of radiation intensity.

  13. Teamwork and Collaboration in Cognitive Wireless Networks

    Doyle, Linda; NOLAN, KEITH EDWARD

    2007-01-01

    PUBLISHED This article looks at the principles and significant potential of teamwork in cognitive networks. These concepts represent a new evolutionary stage in the development of cognitive radio and cognitive networks, where wireless communication progresses from an individual, device-centric approach toward group and team behavior. This creates the potential for more effective and more robust communication solutions when deemed necessary. The key elements of effective cognitive network t...

  14. Dynamic Packet Scheduling in Wireless Networks

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference...

  15. Intrusion Detection Systems in Wireless Sensor Networks

    Vijay Kumar Mallarapu; K.V.D.Sagar

    2012-01-01

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their severe resource constrictions. In this paper, we describ...

  16. Stochastic petri nets for wireless networks

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  17. Future Wireless Networks and Information Systems Volume 1

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  18. A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure

    Biswajit Bhowmik

    2013-01-01

    Full Text Available Wireless and Mobile Network Infrastructure services generally examine how different infrastructure providers are positioning themselves to compete in wireless services. These services analyze the opportunities and challenges facing by the infrastructure providers selling to wireless and mobile network operators worldwide. The opportunities and challenges are the review of strategies, market positioning, and future direction in the market for wireless and mobile network infrastructure. The service covers all generations of wireless and mobile network infrastructure: 2G, 2.5G, 3G, and 4G so on global in scope. Majority of the users are mobile while availing these services. Mobility is the most important feature of any wireless and mobile network. Usually, continuous service is achieved by supporting handoff from one cell to another. Poorly designed handoff schemes tend to generate very heavy signaling traffic and, thereby, lead to a dramatic decrease in quality of service. In this paper we make a comparison study on some selective traffic models with priority handoff scheme. The study shows how a handoff procedure has a significant impact on wireless mobile network performance on the basis of two primary criteria – Blocking probability of originating calls and the forced termination probability of ongoing calls. In addition to this the study shows arrival rate of handoff calls, and approximate number of mobile users that get serviced by underlying base station.

  19. Network coding at different layers in wireless networks

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  20. Building new access network using reconfigurable optical grid network and wireless network

    Qiu, Yinghui; Wu, Runze; Ji, Yuefeng; Xu, Daxiong

    2007-11-01

    Recently wireless mesh network has been gaining increasing attention and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premise. In this paper, we propose a novel access network using reconfigurable optical burst switching grid network and wireless mesh network. The proposed access network architecture saves network deployment cost because fiber need not penetrate to each end user. We also propose a hierarchical routing protocol to enhance the routing efficiency.

  1. Secure Wireless Sensor Networks: Problems and Solutions

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  2. Load balancing in integrated optical wireless networks

    Yan, Ying; Dittmann, Lars; Wong, S-W.;

    2010-01-01

    In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely with the...... issues are outlined and a cost function based optimization model is developed for power management. In particularly, two alternative feedback schemes are proposed to report wireless network status. Simulation results show that our proposed load balancing mechanism improves network performances....... integrated control scheme so as to maximize overall network throughput in the integrated network architecture. To the best of our knowledge no load balancing mechanisms, especially based on the Multi-Point Control Protocol (MPCP) defined in the IEEE 802.3ah, have been proposed so far. The major research...

  3. Cooperative wireless networks for better green services

    Yang Yang; Zhang Wuxiong; Hu Honglin; Zhang Sihai; Wang Xin; Zhao Haitao; Zhou Wuyang; Wei Jibo

    2011-01-01

    In order to guarantee the overall return on investment ( ROI), improve user experience and quality of service (QoS), save energy, reduce electra magnetic interference (EMI) and radiation pollution, and enable the sustainable deployment of new profitable applications and services in heterogeneous wireless networks coexistence reality, this paper proposes a cross-network cooperation mechanism to effectively share network resources and infrastructures, and then adaptively control and match multi-network energy distribution characteristics according to actual user/service requirements in different geographic areas. Some idle or lightly-loaded base stations ( BS or BSs) will be temporally turned off for saving energy and reducing EMI. Initial simulation results show that the proposed approach can significantly improve the overall energy efficiency and QoS performance across multiple cooperative wireless networks.

  4. Quality of service for tactical wireless networks

    Ordower, Rick; Newman, Nisha; Myrtle, Jeremy

    2010-04-01

    Applications resident on tactical wireless networks are levying increasing offered loads. Tradeoffs can be made between range and throughput, but the wireless network is destined to be considered a limitation in information transfer. If managed correctly, the network can be an intelligent aid in ensuring the right information gets to the right place at the right time. Over the last 5 years, SAIC has worked with Natick Soldier Center (NSRDEC) to provide reliable communication with guaranteed service quality for the dismounted soldier. The effort utilizes a series of tools to mark, shape, condense, fragment and persist information for congestion and corruption control. The critical aspect of the congestion control solution is accomplished by adaptively throttling lower priority information at the sending node before it gets pushed to the wireless realm. Of note is that the solution adapts through passive processes without control messages. The solution also implements compression of messages and images, along with fragmentation techniques to alleviate congestion. Information corruption is purely a radio phenomenon and cannot be overcome through cognitive solutions. However, the solution mitigates corruption through information persistence and reliable retransmission. The implemented solution, unlike Transport Control Protocol, is optimized for wireless networks and demonstrates reduction of added signaling traffic. Combined congestion and corruption techniques have demonstrated how soldiers can get the right information at the right time during high traffic loads or network segmentation.

  5. Securing Wireless Sensor Networks: Security Architectures

    David Boyle

    2008-01-01

    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  6. Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays

    Whitbeck, John; Leguay, Jérémie; Conan, Vania; de Amorim, Marcelo Dias

    2010-01-01

    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. However, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-...

  7. Ad hoc mobile wireless networks principles, protocols and applications

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  8. Matching Theory for Future Wireless Networks: Fundamentals and Applications

    Gu, Yunan; Saad, Walid; Bennis, Mehdi; Debbah, Merouane; Han, Zhu

    2014-01-01

    The emergence of novel wireless networking paradigms such as small cell and cognitive radio networks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In this paper, the first comprehensive tutorial on the use of matching theory, a Nobelprize winning framework, for resource management in wireless networks is develop...

  9. Wireless Network Communications Overview for Space Mission Operations

    Fink, Patrick W.

    2009-01-01

    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  10. Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network

    Prof.N.Penchalaiah

    2010-08-01

    Full Text Available The convergence of mobile technologies will characterize the future telecommunication systems based on TCP/IP protocols. These Protocols can be used to build both wired and wireless parts on same platform. But TCP/IP headers overheads are large, so it utilizes more bandwidth even small services, whose payload is small. So it definitely needheader compression to save bandwidth, as we know bandwidth is the most expensive and scared resource in wireless systems.There are many approaches used to compress the headers overloads. Most commonly used approaches are, an adaptive robust TCP/IP header compression lgorithm for 3G wireless networks and an adaptive robust header compression algorithm based on UDP-RTS/CTS handshake for real-timestreams in wireless networks such a 3G platforms. But these approaches are not efficient in adaptive nature. So In this paper we are proposing one approach to solve the problem efficiently even in adaptive nature. The aim of this algorithm is to adjust the dimension of Variable Sliding Window (VSW in W-LSB encoding with the accurate estimation of wireless channel state to achieve the good balance of compression ratio and error-resistant robustness for the adaptive use in wireless link. We present simulation results that demonstrate theeffectiveness of this adaptive algorithm over wireless link and comparative study of existing approaches

  11. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Novarun Deb; Manali Chakraborty; Nabendu Chaki

    2011-01-01

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS) that are solely designed to de...

  12. Wireless Network Security Vulnerabilities and Concerns

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  13. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  14. Deploying a Wireless Sensor Network in Iceland

    K.; Martinez; Hart, J. K.; Ong, R.

    2009-01-01

    A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Advances in base station and sensor node design as well as initial results are described.

  15. Clock Synchronization for Multihop Wireless Sensor Networks

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  16. Problem solving for wireless sensor networks

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  17. Synchronized Data Aggregation for Wireless Sensor Network

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...

  18. Power Optimization in Wireless Sensor Networks

    Debmalya Bhattacharya

    2011-09-01

    Full Text Available Wireless Sensor Networks (WSNs consist of a network of wireless nodes that have the capability to sense a parameter of interest. Sensors of various types are deployed ubiquitously and pervasively in varied environments such as office buildings, wildlife reserves, battle fields, mobile networks, etc The sensed parameter is relayed to a base station through the network formed amongst these nodes. The devices used are typically characterized by low cost, low power and are rugged in operation. The node integrates programming, computation, communication, and sensing onto a single system and provides an easy user interface for operating and deploying it. The paper presents such a design which minimizes cost and power consumption, thus enhancing the life time of the node.

  19. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    Rung-Ching Chen

    2010-03-01

    Full Text Available Normal 0 0 2 false false false MicrosoftInternetExplorer4 A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject to very different types of attacks compare to wired networks. In this paper, we propose an isolation table to detect intrusion by hierarchical wireless sensor networks and to estimate the effect of intrusion detection. The primary experiment proves that isolation table intrusion detection can prevent attacks effectively.

  20. Survey of propagation Model in wireless Network

    Hemant Kumar Sharma; Sanjeev Sharma; Krishna Kumar Pandey

    2011-01-01

    To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, ref...

  1. Security Analysis in Wireless Sensor Networks

    Murat Dener

    2014-01-01

    In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. The paper also presents characteristics, security requir...

  2. Advanced routing protocols for wireless networks

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  3. Classification of Attacks in Wireless Sensor Networks

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  4. Enhanced Wireless Network Ad Hoc Pattern

    M. Kamalakannan; V. Khanaa

    2012-01-01

    Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns and detailed local radio interactions. This study examines these factors alone and in combination, using simulation and analysis from first principles. Our results include both specific constants and general relationship Scaling helpful in understanding t...

  5. Software Update Recovery for Wireless Sensor Networks

    Brown, Stephen; Sreenan, Cormac J.

    2009-01-01

    Updating software over the network is important for Wireless Sensor Networks in support of scale, remote deployment, feature upgrades, and fixes. The risk of a fault in the updated code causing system failure is a serious problem. In this paper, we identify a single, critical, symptom loss-of-control, that complements exception-based schemes, and supports failsafe recovery from faults in software updates. We present a new software update recovery mechanism that uses loss-ofc...

  6. Secure Multi-Purpose Wireless Sensor Networks

    Jacobi, Daniel

    2016-01-01

    Wireless sensor networks (WSNs) were made possible around the late 1990s by industry scale availability of small and energy efficient microcontrollers and radio interfaces. Application areas for WSNs range from agriculture to health care and emergency response scenarios. Depending on the scenario a sensor network can span from some rooms to an area of several square miles in size and so the number of sensor nodes can vary from a fistful of nodes to hundreds or thousands. Sensor nodes are comp...

  7. Performance Analysis of Asynchronous Multicarrier Wireless Networks

    Lin, Xingqin; Jiang, Libin; Andrews, Jeffrey G.

    2014-01-01

    This paper develops a novel analytical framework for asynchronous wireless networks deploying multicarrier transmission. Nodes in the network have different notions of timing, so from the viewpoint of a typical receiver, the received signals from different transmitters are asynchronous, leading to a loss of orthogonality between subcarriers. We first develop a detailed link-level analysis based on OFDM, based on which we propose a tractable system-level signal-to-interference-plus-noise ratio...

  8. Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks Coverage

    Bing Cheng

    2014-01-01

    Efficient network coverage and connectivity are the requisites for most Wireless Sensor Network deployments, particularly those concerned with area monitoring. The Coverage Control Technology is one of the basic technologies of wireless sensor network, and is mainly concerned about how to prolong the network lifetime on the basis of meeting users’ perception demand. To optimize wireless sensor networks coverage, an algorithm which is based on particle swarm optimization with dynamic clo...

  9. Review of Wireless Sensor Networks- Architecture and Applications

    Mr. Kuntal Saroha; Mrs. Ruchika Lochab; Mr. Puneet Garg

    2011-01-01

    Wireless sensor networks (WSN) are currently receiving significant attention due to their unlimited potential. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability. In this Paper, I Concentrate on Architecture and the applications of Wireless SensorNetworks .I have also mentioned future scope of WSN. The network must possess self-organizing capabilities since thepositions of individual nodes are not predetermined.

  10. Resource Allocation in Wireless Networks

    Jordan, Scott

    1996-01-01

    Wireless services are one of the strongest growth areas in telecommunications today. Dynamic channel allocation schemes have garnered a considerable amount of attention as methods for achieving efficient use of system resources. Various combinations of permanent channel assignment, channel borrowing, shared pools of channels, channel ordering, channel reassignment, and dynamic adjustment of parameters have been suggested. In this paper, we suggest a categorization of dynamic channel allocatio...

  11. Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

    Mutter, T.F.

    2009-01-01

    Traditional wireless networks form the wireless counterpart of wired networks, in which providing infrastructure is the main functionality. High bandwidth is the primary goal and the unlimited power supply is an important characteristic of traditional wireless networks. On the other hand, Wireless S

  12. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  13. Game theory for wireless communications and networking

    Zhang, Yan

    2011-01-01

    Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applica

  14. An underwater optical wireless communication network

    Arnon, Shlomi

    2009-08-01

    The growing need for underwater observation and sub-sea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, bio-geochemical, evolutionary and ecological changes in the sea, ocean and lake environments and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. We present models of three kinds of optical wireless communication links a) a line-of-sight link, b) a modulating retro-reflector link and c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered lighted it was possible to mitigate this decrease in some cases. We conclude from the analysis that a high data rate underwater optical wireless network is a feasible solution for emerging applications such as UUV to UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  15. Wireless sensor networks principles, design and applications

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  16. Wireless Sensor Network for Medical Applications

    Hanady S.Ahmed

    2015-06-01

    Full Text Available This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals.

  17. Quality of service in wireless networks over unlicensed spectrum

    Nahrstedt, Klara

    2011-01-01

    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireles

  18. Channel models for wireless body area networks.

    Takizawa, Kenichi; Aoyagi, Akahiro; Takada, Jun-Ichi; Katayama, Norihiko; Yekeh, Kamya; Takehiko, Yazdandoost; Kohno, Kobayashi Ryuji

    2008-01-01

    Wireless patient monitoring using wearable sensors is a promising application. This paper provides stochastic channel models for wireless body area network (WBAN) on the human body. Parameters of the channel models are extracted from measured channel transfer functions (CTFs) in a hospital room. Measured frequency bands are selected so as to include permissible bands for WBAN; ultra wideband (UWB), the industry, science and medical (ISM) bands, and wireless medical telemetry system (WMTS) bands. As channel models, both a path loss model and a power delay profile (PDP) model are considered. But, even though path loss models are derived for the all frequency bands, PDP model is only for the UWB band due to the highly frequency selectiveness of UWB channels. The parameters extracted from the measurement results are summarized for each channel model. PMID:19162968

  19. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li

    2011-01-01

    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  20. Worm epidemics in wireless ad hoc networks

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  1. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Mardiana Mohamad Noor

    2013-01-01

    Full Text Available This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM, Rogue Access Points (RAP, Denial Of Services (DoS and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD, devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

  2. Worm Epidemics in Wireless Adhoc Networks

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  3. Worm epidemics in wireless ad hoc networks

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  4. Cross-platform wireless sensor network development

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open-source dev......Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open......-source development environment that takes a holistic approach to implementing sensor network applications. Users build applications using a drag-and-drop visual programming language Open Blocks, a language that Google selected for its App Inventor for Android. Tinylnventor uses cross-platform programming concepts...

  5. Hack Recognition In Wireless Sensor Network

    B. Srinivasulu

    2014-09-01

    Full Text Available A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

  6. Priority image transmission in wireless sensor networks

    The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.

  7. Wireless Sensor Network Handles Image Data

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  8. STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK

    MANJU.V.C

    2011-10-01

    Full Text Available In recent years, the design and implementation of the wireless sensor networks is widely chosen for research as sensor networks enable application that connects the physical world to the virtual world. Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor networks are prone to more attacks than wired networks. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networksinfeasible. This paper studies the security aspects of wireless sensor networks. A survey with current threats and countermeasures is carried out, in particular, explored the protocol layer attack on sensor networks.

  9. Data aggregation in wireless sensor networks using the SOAP protocol

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  10. Data aggregation in wireless sensor networks using the SOAP protocol

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.