Sample records for 3g wireless networks

  1. Providing QoS guarantee in 3G wireless networks

    Chuah, MooiChoo; Huang, Min; Kumar, Suresh


    The third generation networks and services present opportunities to offer multimedia applications and services that meet end-to-end quality of service requirements. In this article, we present UMTS QoS architecture and its requirements. This includes the definition of QoS parameters, traffic classes, the end-to-end data delivery model, and the mapping of end-to-end services to the services provided by the network elements of the UMTS. End-to-end QoS of a user flow is achieved by the combination of the QoS control over UMTS Domain and the IP core Network. In the Third Generation Wireless network, UMTS bearer service manager is responsible to manage radio and transport resources to QoS-enabled applications. The UMTS bearer service consists of the Radio Access Bearer Service between Mobile Terminal and SGSN and Core Network bearer service between SGSN and GGSN. The Radio Access Bearer Service is further realized by the Radio Bearer Service (mostly air interface) and Iu bearer service. For the 3G air interface, one can provide differentiated QoS via intelligent burst allocation scheme, adaptive spreading factor control and weighted fair queueing scheduling algorithms. Next, we discuss the requirements for the transport technologies in the radio access network to provide differentiated QoS to multiple classes of traffic. We discuss both ATM based and IP based transport solutions. Last but not least, we discuss how QoS mechanism is provided in the core network to ensure e2e quality of service requirements. We discuss how mobile terminals that use RSVP as QoS signaling mechanisms can be are supported in the 3G network which may implement only IETF diffserv mechanism. . We discuss how one can map UMTS QoS classes with IETF diffserv code points. We also discuss 2G/3G handover scenarios and how the 2G/3G QoS parameters can be mapped.

  2. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny


    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results...

  3. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy


    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  4. Towards adaptive security for convergent wireless sensor networks in beyond 3G environments

    Mitseva, Anelia; Aivaloglou, Efthimia; Marchitti, Maria-Antonietta


    The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context......-aware adaptability, flexibility and scalability which allows customisation of wireless sensor networks to a diverse set of application spaces. Suitable protocols and mechanisms are identified, which when combined according to the framework form a complete toolbox solution which fits the architecture of Beyond 3G...... environments. Performance evaluation results demonstrate the feasibility and estimate the benefits of the security framework for a variety of scenarios. Copyright (C) 2008 John Wiley & Sons, Ltd....

  5. Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks

    Eminsoy, Sertac; Dogan, Safak; Kondoz, Ahmet M.


    Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing) of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the input compressed video streams while controlling the output rates to provide robust communications over error-prone and bandwidth-limited 3G wireless networks. The transcoder is also designed to employ a new adaptive intra-refresh algorithm, which is responsive to the detected scene activity inherently embedded into the video content and the reported time-varying channel error conditions of the wireless network. Comprehensive computer simulations demonstrate significant improvements in the received video quality performances using the new transcoding architecture without an extra computational cost.

  6. Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks

    Ahmet M. Kondoz


    Full Text Available Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the input compressed video streams while controlling the output rates to provide robust communications over error-prone and bandwidth-limited 3G wireless networks. The transcoder is also designed to employ a new adaptive intra-refresh algorithm, which is responsive to the detected scene activity inherently embedded into the video content and the reported time-varying channel error conditions of the wireless network. Comprehensive computer simulations demonstrate significant improvements in the received video quality performances using the new transcoding architecture without an extra computational cost.

  7. Call Admission Control performance model for Beyond 3G Wireless Networks

    Ramesh Babu H.S


    Full Text Available The Next Generation Wireless Networks (NGWN will be heterogeneous in nature where the different Radio Access Technologies (RATs operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN.Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireless network environment. In the proposed algorithm we have considered three classes of traffic having different QoS requirements and we have considered the heterogeneous network environment which includes the RATs that can effectively handle applications like voice calls, Web browsing and file transfer applications which are with varied QoS parameters. The paper presents the call blocking probabilities for all the three types of traffic both for fixed and varied traffic scenario.Keywords: Radio Access Technologies; Call admission control; Call blocking probability; Markov model; Heterogeneous wireless Networks.

  8. Portable emergency telemedicine system over wireless broadband and 3G networks.

    Hong, SungHye; Kim, SangYong; Kim, JungChae; Lim, DongKyu; Jung, SeokMyung; Kim, DongKeun; Yoo, Sun K


    The telemedicine system aims at monitoring patients remotely without limit in time and space. However the existing telemedicine systems exchange medical information simply in a specified location. Due to increasing speed in processing data and expanding bandwidth of wireless networks, it is possible to perform telemedicine services on personal digital assistants (PDA). In this paper, a telemedicine system on PDA was developed using wideband mobile networks such as Wi-Fi, HSDPA, and WiBro for high speed bandwidths. This system enables to utilize and exchange variety and reliable patient information of video, biosignals, chatting messages, and triage data. By measuring bandwidths of individual data of the system over wireless networks, and evaluating the performance of this system using PDA, we demonstrated the feasibility of the designed portable emergency telemedicine system.

  9. Call Admission Control performance model for Beyond 3G Wireless Networks

    Babu, H S Ramesh; Satyanarayana, P S


    The Next Generation Wireless Networks (NGWN) will be heterogeneous in nature where the different Radio Access Technologies (RATs) operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN. Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireles...

  10. The Research on Handoff Strategy in Beyond 3G Wireless Networks

    CUI Hong-yan; TIAN Hui; XU Hai-bo; ZHANG Ping


    One of the major challenges for beyond third generation mobile systems is efficient mobility management. This paper proposes a distributed dynamic management scheme of handoff based on B3G networks. This .scheme can reduce the of update signalling and transmitting packets, and improve the system capability. In this .scheme, the dynamic building network approach is adopted to deduce the update signalling cost. We implement the distributed dynamic management scheme of handoff in a simulation platform and compare its performance with that of general centralized handoff management schemes. Our simulation results indicate that our .scheme is capable of reducing the update handoff latency, and enhancing the performance.

  11. Design and Development of Broadband Inverted E-shaped Patch Microstrip Array Antenna For 3G Wireless Network

    Norbahiah Misran


    Full Text Available Microstrip patch antenna has been received tremendous attention since the last two decades and now it becomes a major component in the development of Smart Antenna System for Third-Generation Wireless Network proposed by the ITU-R under the banner of IMT-2000. Smart antenna consists of an array of antennas associated with it a base-band hardware and control unit (inclusive of the software algorithm that have the capability to change its radiation pattern according to the direction of the user. This paper describes the design and development of broadband Inverted E-shaped patch microstrip array antennas for 3G wireless network. The antenna was designed for the IMT-2000 operating frequency range of 1.885–2.200GHz and was built as an array of 4x4 inverted E-shaped patches. The beamforming feed network comprises of commercial variable attenuators (KAT1D04SA002, variable phase shifters (KPH35OSC000, and the corporate 16-ways Wilkinson power divider which was developed in-house. The antenna successfully achieves the bandwidth of 16.14% (at VSWR: 1.5 with respect to the center frequency of 2.045 GHz. The antenna is capable of scanning with the maximum scanning angle of ±30º and ±25º in azimuth and elevation respectively.


    胡俊华; 魏芳; 平金玉


    With the rapid development of wireless communication technology and computer network technology, it becomes the urgent need for broad range of users to fast and effectively access the internet with mobile portable devices, and the acquaintance and analysis on the behaviour pattern of wireless network user becomes very necessary. In this paper we record the data of users in a residential zone who surfing internet through 3G wireless network,the processed data is used as the basis to estimate the relations between the data and to derive potential relationship of time-varied network traffic,IP number and user number, then further work out the active index which reflects the behaviour habit of wireless internet users. The analyses results provide the base in data for the amelioration and improvement of performance of wireless internet as well as for the reasonable decision of wireless network service provider,therefore have significant commercial value.%随着无线通信技术和计算机网络技术的快速发展,通过移动手持设备快速有效地接入互联网成为广大用户的迫切需求,了解和分析无线用户的行为模式显得十分必要.对一个小区内通过3G无线上网用户的数据进行记录,处理后以此为基础估计数据之间的关系,得出流量、IP数和用户数之间随着时间变化的潜在关系,进一步得出反映无线互联网用户行为习惯的活跃指数.分析结果为无线互联网的性能的改进和提高,以及无线网络服务商合理决策提供了数据依据,具有重要的商业价值.

  13. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    To William


    Full Text Available This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  14. Development of the Intelligent Electric Meter System Based on Zigbee and 3G Wireless Network%基于Zigbee和3G无线网络的智能电表系统设计



      以智能电表为背景,设计开发了一种基于Zigbee和3G技术的无线智能电表数据采集系统。重点介绍了系统构架、智能电表与集中器网关的软硬件设计。最后采用嵌入式单片机3G Internet接入技术和互联网GAE后台应用技术,设计管理系统服务器网站,实现了Zigbee协议与HTTP协议的数据格式转换,为远程数据采集系统的应用提供了一个新的解决方案。%  Based on the intel igent electric meter,a wireless data acquisition system which can be linked to Zigbee and 3G network has been developed.The design principles of both software and hardware in the key circuit of intel igent electric meter and concentrator gateway are mainly elaborated.Using embedded chip 3G internet-connecting and GAE technology,the server website of the management system and the transformation of data form Zigbee protocol to HTTP protocol are achieved.This offers a new technique way to remote data acquisition system design.

  15. Emerging wireless networks concepts, techniques and applications

    Makaya, Christian


    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  16. Research on customer maintain service system based on 3G wireless communication network%基于3G无线通信网络的用户维系服务系统研究



    随着中国电信行业的不断发展,电信企业竞争由质量相当的网络资源转移到差异化的服务竞争,提高客户满意度和维系客户关系成为提升企业核心竞争力的有效手段之一.基于此提出了一种新的基于3G无线通信网络的用户维系服务系统架构,并基于此架构,提出了用户维系服务系统的主要功能设计思路,为电信运营商在新的3G业务模式下有效开展用户服务维系,进行了有益的探索和尝试.%With the development of China Telecom Industry, the competition in the telecommunications enterprises has been shifted from comparative quality in the usage pf network resources to differentiated quality of customer services. Improving customer satisfaction and maintaining customer relationships has become one of the effective means to enhance the core competitiveness of enterprises. To this issue, this paper proposed a new service system framework based on 3G wireless communication network for maintaining customer relationships and analyses the design ideas for the main function modes in the proposed scheme, which is benefit for telecommunications enterprises to develop the custom service under the business model with 3G.

  17. 基于3G无线网络的风电机组远程数据采集系统设计%Design of Data Acquisition System for Wind Turbine Based on 3G Wireless Network



    文章提出一种基于3G无线网络来实现风电机组远程数据采集的方法。结合风力发电机组环境特点和运行要求,利用Visual Studio 2010软件,设计开发适用于该数据采集系统的软件,实现机组各项参数的远距离实时采集,顺利实现了风电机组长距离跨地区的实时监控。%The method to realize remote data acquisition for wind turbine that based on 3G wireless network is proposed.Combined with the characteristics and running environment of wind turbine,the data acquisition system software is designed and developed using Visual Studio 2010 software.The system cans remote acquisition parameters real-time,and real time monitoring of wind turbine long distance and cross area is achieved.

  18. Optimisation Issues of High Throughput Medical Data and Video Streaming Traffic in 3G Wireless Environments.

    Istepanian, R S H; Philip, N


    In this paper we describe some of the optimisation issues relevant to the requirements of high throughput of medical data and video streaming traffic in 3G wireless environments. In particular we present a challenging 3G mobile health care application that requires a demanding 3G medical data throughput. We also describe the 3G QoS requirement of mObile Tele-Echography ultra-Light rObot system (OTELO that is designed to provide seamless 3G connectivity for real-time ultrasound medical video streams and diagnosis from a remote site (robotic and patient station) manipulated by an expert side (specialists) that is controlling the robotic scanning operation and presenting a real-time feedback diagnosis using 3G wireless communication links.

  19. Security Issues and Solutions in 3G Core Network

    Xuena Peng


    Full Text Available Nowadays, the 3G network plays a very important role in mobile communication system. But the security concern of such network, especially the core network, is far from being satisfied. With the continuously development in the security enhancement in RAN, core network would become the future target of attackers. GPRS Tunnel Protocol (GTP, which is one of the key protocols in the core network, is quite vulnerable to attacks in the flat, full IP environment. Therefore solving such problem properly is very urgent and important for the operation of 3G network. In this paper, the security challenges in the 3G core network and the security issues in GTP are discussed, a defense solution for these security threats and an event-based description language are proposed. The experiment result shows the potential of our solution.

  20. Power consumption analysis of constant bit rate video transmission over 3G networks

    Ukhanova, Ann; Belyaev, Evgeny; Wang, Le


    for the 3GPP transition state machine that allows to decrease power consumption on a mobile device taking signaling traffic, buffer size and latency restrictions into account. Furthermore, we discuss the gain in power consumption vs. PSNR for transmitted video and show the possibility of performing power......This paper presents an analysis of the power consumption of video data transmission with constant bit rate over 3G mobile wireless networks. The work includes the description of the radio resource control transition state machine in 3G networks, followed by a detailed power consumption analysis...... consumption management based on the requirements for the video quality....

  1. Wireless mesh networks

    Held, Gilbert


    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  2. Security for multihop wireless networks

    Khan, Shafiullah


    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  3. Error Protection for Scalable Image Over 3G-IP Network

    WANGGuijin; LINXinggang


    Digital media, like image and video, transmitred over third-generation wireless networks is a challenging task because the wireless networks present not only packet loss, but also bit errors. To address this problem, this paper proposes a novel error protection scheme for scalable image over 3G-IP networks. Taking into consideration of the scalable nature of the image data, error protection is provided by layered product channel codes to mitigate the effect of the packet loss and bit errors. Meanwhile, rate-distortion optimization is presented to determine the protection levels of both the row and the column codes so as to minimize the expected end-to-end distortion. Simulation results show that our proposed approach is very efficient at a wide range of bits budget and under different channel conditions.

  4. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Moon Bongkyo


    Full Text Available The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, and the other is that most of the fields in request messages as well as response messages are duplicated when a set of SIP messages are exchanged during session re-setup procedure. In this scheme, no change is required in the SIP message processing except for the proxy agents in both BS and MH.

  5. Green heterogeneous wireless networks

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin


    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  6. Wireless network pricing

    Huang, Jianwei


    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  7. Wireless rechargeable sensor networks

    Yang, Yuanyuan


    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  8. Architecture of Wireless Network

    Ram Kumar Singh


    Full Text Available To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre. The mobile switching centre allow connectivity among the PSTN (public switched telephone network and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a system. The global telecommunications control grid of PSTN which associate with conventional (landline telephone switching centre (called central office with MSCs all around the world.

  9. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    R Shankar; Timothy Rajkumar.K; P Dananjayan


    The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and...

  10. Sustainable wireless networks

    Zheng, Zhongming; Xuemin


    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  11. Energy efficiency in wireless networks

    Jumira, Oswald


    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  12. Wireless nanosensor network system

    Oh, Sechang; Kwon, Hyukjun; Kegley, Lauren; Yoon, Hargsoon; Varadan, Vijay K.


    Many types of wireless modules are being developed to enhance wireless performance with low power consumption, compact size, high data rates, and wide range coverage. However trade-offs must be taken into consideration in order to satisfy all aspects of wireless performance. For example, in order to increase the data rate and wide range coverage, power consumption should be sacrificed. To overcome these drawbacks, the paper presents a wireless client module which offers low power consumption along with a wireless receiver module that has the strength to provide high data rates and wide range coverage. Adopting Zigbee protocol in the wireless client module, the power consumption performance is enhanced so that it plays a part of the mobile device. On the other hand, the wireless receiver module, as adopting Zigbee and Wi-Fi protocol, provides high data rate, wide range coverage, and easy connection to the existing Internet network so that it plays a part of the portable device. This module demonstrates monitoring of gait analysis. The results show that the sensing data being measured can be monitored in any remote place with access to the Internet network.

  13. Miniaturized wireless sensor network

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert


    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  14. Wireless networked music performance

    Gabrielli, Leonardo


    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  15. Wireless Sensors Network (Sensornet)

    Perotti, J.


    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  16. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Fei Liu


    Full Text Available This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP, which uses a digital signal processor (DSP as a core CPU, and a host control platform (HCP. The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests’ pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture.

  17. Feasibility study on a portable field pest classification system design based on DSP and 3G wireless communication technology.

    Han, Ruizhen; He, Yong; Liu, Fei


    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests' pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture.

  18. Network planning study of the metro-optical-network-oriented 3G application

    Gong, Qian; Xu, Rong; Lin, Jin Tong


    To compare with the 2G mobile communication, 3G technologies can supply the perfect service scope and performance. 3G is the trend of the mobile communication. So now to build the transmission network, it is needed to consider how the transmission network to support the 3G applications. For the 3G network architecture, it include the 2 part: Utran access network and core network. So the metro optical network should consider how to build the network to adapt the 3G applications. Include the metro core and access layer. In the metro core, we should consider the network should evolved towards the Mesh architecture with ASON function to realize the fast protection and restoration, quick end-to-end service provision, and high capacity cross-connect matrix etc. In the access layer, the network should have the ability to access the 3G services such as ATM interface with IMA function. In addition, the traffic grooming should be provided to improve the bandwidth utility. In this paper, first we present the MCC network situation, the network planning model will be introduced. Then we present the topology architecture, node capacity and traffic forecast. At last, based on our analysis, we will give a total solution to MCC to build their metro optical network toward to the mesh network with the consideration of 3G services.

  19. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    Shankar, R; Dananjayan, P; 10.5121/iju.2010.1303


    The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results ob...

  20. Rapid Industrial Prototyping and SoC Design of 3G/4G Wireless Systems Using an HLS Methodology

    Andres Takach; Cavallaro, Joseph R.; Dennis McCain; Yuanbin Guo


    Many very-high-complexity signal processing algorithms are required in future wireless systems, giving tremendous challenges to real-time implementations. In this paper, we present our industrial rapid prototyping experiences on 3G/4G wireless systems using advanced signal processing algorithms in MIMO-CDMA and MIMO-OFDM systems. Core system design issues are studied and advanced receiver algorithms suitable for implementation are proposed for synchronization, MIMO equalization, and detectio...

  1. Caching in Wireless Networks

    Niesen, Urs; Wornell, Gregory


    We consider the problem of delivering content cached in a wireless network of $n$ nodes randomly located on a square of area $n$. In the most general form, this can be analyzed by considering the $2^n\\times n$-dimensional caching capacity region of the wireless network. We provide an inner bound on this caching capacity region and, in the high path-loss regime, a matching (in the scaling sense) outer bound. For large path-loss exponent, this provides an information-theoretic scaling characterization of the entire caching capacity region. Moreover, the proposed communication scheme achieving the inner bound shows that the problem of cache selection and channel coding can be solved separately without loss of order-optimality.

  2. Cognitive wireless networks

    Feng, Zhiyong; Zhang, Ping


    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  3. Wireless Network Security Using Randomness


    decision, unless so designated by other documentation. 12. DISTRIBUTION AVAILIBILITY STATEMENT Approved for public release; distribution is unlimited. UU...connectivity with the wireless network and the highly dynamic connections between nodes rule out the use of complex key distribution methods and make...Protected Access ( WPA and WPA2). WEP is a scheme used to secure IEEE 802.11 wireless networks, and is part of the IEEE 802.11 wireless networking standard

  4. Views of wireless network systems.

    Young, William Frederick; Duggan, David Patrick


    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  5. Wireless sensor networks architectures and protocols

    Callaway, Jr, Edgar H


    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  6. Wi-Fi Wireless Networks and Technology


    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  7. Rate allocation strategies for energy-efficient multipath routing in Ad-hoc networks towards B3G

    ZHAN Song-tao; XU Guo-xin


    Wireless mobile Ad-hoc network is a special network that all nodes can self-organize and work together. It is flexible to form a network and extend the coverage area dynamically without infrastructure, so Ad-hoc network is envisioned as cornerstones of future generation networking technologies (B3G or 4G). However, the dynamic network topology makes the communication cost not only the energy of source/destination nodes, but also the relay nodes. Another problem of the Ad-hoc network is it is hard to provide a stable and persistent quality of service (QoS), which is strongly required by the beyond 3rd generation (B3G) system. In this article, the authors establish a scenario that contains B3G cellular base station and Ad-hoc mobile nodes, and propose two algorithms minimum incremental rate algorithm and power feed-back rate allocation algorithm in multipath routing. The algorithms can maintain a constant total transmission rate and bit error ratio (BER) to provide the QoS guarantee and reach the minimum power consumption of the relay nodes by adjusting the rate of each path in the multipath routing.

  8. Penetration Testing in Wireless Networks

    Lamichhane, Shree


    This thesis illustrates the security measures and mechanisms behind the encryption and decryption of data while transmitting data in a wireless network. Furthermore, this thesis describes and demonstrates several security threats in a wireless network that are widely experienced. It also explains shortly the evolution of the widely implemented IEEE 802.11 standard and its amendments. Kali Linux tools were used to perform a penetration test in a WPA secured test network. In-formation on th...

  9. Building RNC in All-IP Wireless Networks using Network Processors

    CHENG Sheng; NI Xian-le; ZHU Xin-ning; DING Wei


    This paper describes a solution to build network-processor-based Radio Network Controller (RNC) in all-IP wireless networks, it includes the structure of the 3rd Generation (3G) wireless networks and the role of network nodes, such as Base Station (BS), RNC, and Packet-Switched Core Networks (PSCN). The architecture of IXP2800 network processor; the detailed implementation of the solution on IXP2800-based RNC are also covered. This solution can provide scalable IP forward features and it will be widely used in 3G RNCs.

  10. Wireless home networking for dummies

    Briere, Danny; Ferris, Edward


    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  11. Wireless network security theories and applications

    Chen, Lei; Zhang, Zihong


    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  12. Wireless Ad Hoc Networks

    Hong-Chuan Yang


    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  13. Wireless Centralized Meter Reading System Based on Short Distance Wireless Communication and 3G%基于短距无线通信与3G的无线集中抄表系统

    巩浩; 屈玉贵


    This paper analyzes the shortcomings of existing meter reading systems, proposes a wireless centralized meter reading system based on short distance wireless communication and 3G.The system combines the short distance wireless communication and 3G technology together with the data's collection and transmission through a wireless manner.The collected data of meter are transmitted through the 3G network to the billing department of the data management center.When compared with existing meter reading systems, this system has a more flexible layout, larger coverage, lower power consumption, higher real-time features, less interference and gets better results in practical application.%分析现有抄表系统存在的不足,介绍基于短距无线通信与3G的无线集中抄表系统.结合短距无线通信与3G技术,数据的汇聚与转发均通过无线方式进行.将采集到的计量表数据通过3G网络转发到计费部门的数据管理中心.与现有的抄表系统相比,该系统具有布置灵活、抄表范围大、功耗低、实时性好、干扰小等特点,在实际应用中有较好效果.

  14. 3G, 4G and beyond bringing networks, devices and the web together

    Sauter, Martin


    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  15. Secure positioning in wireless networks

    Capkun, Srdjan; Hubaux, Jean-Pierre


    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  16. Wireless Internet on Heterogeneous Networks

    Wu, G.


    The wide proliferation of wireless systems and the use of software radio technologies enable the employment of a heterogeneous network. In this concept services are delivered via the network that is most efficient for that service. The solution is based on a common core network that interconnects ac

  17. Radio propagation and adaptive antennas for wireless communication networks

    Blaunstein, Nathan


    Explores novel wireless networks beyond 3G, and advanced 4G technologies, such as MIMO, via propagation phenomena and the fundamentals of adapted antenna usage.Explains how adaptive antennas can improve GoS and QoS for any wireless channel, with specific examples and applications in land, aircraft and satellite communications.Introduces new stochastic approach based on several multi-parametric models describing various terrestrial scenarios, which have been experimentally verified in different environmental conditionsNew chapters on fundamentals of wireless networks, cellular and non-cellular,

  18. Securing underwater wireless communication networks

    Domingo Aladrén, Mari Carmen


    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  19. Rapid Industrial Prototyping and SoC Design of 3G/4G Wireless Systems Using an HLS Methodology

    Cavallaro JosephR


    Full Text Available Many very-high-complexity signal processing algorithms are required in future wireless systems, giving tremendous challenges to real-time implementations. In this paper, we present our industrial rapid prototyping experiences on 3G/4G wireless systems using advanced signal processing algorithms in MIMO-CDMA and MIMO-OFDM systems. Core system design issues are studied and advanced receiver algorithms suitable for implementation are proposed for synchronization, MIMO equalization, and detection. We then present VLSI-oriented complexity reduction schemes and demonstrate how to interact these high-complexity algorithms with an HLS-based methodology for extensive design space exploration. This is achieved by abstracting the main effort from hardware iterations to the algorithmic C/C++ fixed-point design. We also analyze the advantages and limitations of the methodology. Our industrial design experience demonstrates that it is possible to enable an extensive architectural analysis in a short-time frame using HLS methodology, which significantly shortens the time to market for wireless systems.

  20. Mobility Management in beyond 3G-Environments

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan


    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi

  1. Theoretical Foundations of Wireless Networks


    wireless networks. The interesting aspect of imperfect CSI in a networked setting is that different terminals are likely to have different perceptions ...Regarding asymptotic behaviors, observe that agents’ stage payoffs capture the kind of trade-off exemplified by the Keynesian beauty contest: each...imperfect CSI in a networked setting is that different terminals are likely to have different perceptions on the values of different channels. In

  2. Achieving a Seamless Mobility in the 3G and WLAN Networks Integration when the WLAN AP is Tightly Coupled to the SGSN of the 3G Network

    George Chukwudi Nganya


    Full Text Available The increase in demand for real-time applications such as video and audio streams data transfer has resulted in the need to find a means of managing the increasing numbers of users in the mobile wireless system without affecting the quality of service (QoS requirements. In their work, A. K. Salkintzis, C. Fors, and R. Pazhyannur, stated that one of the approaches to meeting the high user demands is to interwork two different but complementary networks, the Universal Mobile Telecommunication Systems (UMTS which has a high mobility but low-data rate circuit-switched and packet-switched services, and the Wireless Local Area Network (WLAN which has a high-data rate circuit-switched service but limited mobility coverage confined to a smaller area called the hot-spot [1]. The idea is to interwork the two networks such that seamless mobility could be achieved. In this paper, the tight coupling of the WLAN at the SGSN of the UMTS for the possibility of achieving a seamless mobility is examined. The performance of this integration approach is evaluated using this QoS parameters, namely buffer overflow, Ethernet delay, throughput and Ethernet load. A simulation of this integration approach using an OPNET Modeler 14.0 is performed and the simulation results analyzed. We performed a simulation of the WLAN AP tightly coupled to the SGSN node of the UMTS network. Also performed in this research are simulations of different scenarios of the tight coupling approach at the SGSN by varying the number of users in the integrated UMTS and WLAN network to show the effect the number of users connected to both networks has towards achieving seamless mobility in the interworked network. From our study review and the simulation results of this interworking approach, we propose that coupling the WLAN AP and the UMTS network at the SGSN of the UMTS, and using a suitable mobility protocol, has the possibility of providing a seamless mobility between these complementary

  3. Wireless wearable network and wireless body-centric network for future wearable computer


    The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.

  4. A Perspective of 3G Construction in China

    Beijing Norson Consulting Co.,Ltd


    @@ 1. The problems on hybrid network combining TD-SCDMA 1)Hybrid network is imperative in China At present, there are several major wireless networks in China,namely, GSM network of China Mobile, GSM network and CDMA network of China Unicom, PHS network of China Telecom and China Netcom, and therefore the seamless transition from the existent wireless network to 3G network is an inevitable factor must be taken into account. In view of the difference of release sequence and release target of 3G license, the hybrid network combining TD-SCDMA, WCDMA and CDMA2000 technology will be probably adopted in future 3G construction in China.

  5. Security procedures in wireless networks



    In the paper, we will introduce the mechanisms and the weaknesses of the Wired Equivalent Privacy (WEP) and 802.1 li security procedures in the wireless networks. After that, the Wi-Fi Protected Access (WPA), a standards-based security mechanism that can eliminate most of 802.11 security problems will be introduced.

  6. Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks

    Christian Makaya


    Full Text Available The major trend in next-generation or 4G wireless networks (NGWN/4G is the coexistence of diverse but complementary architectures and wireless access technologies. In this context, an appropriate integration and interworking of existing wireless networks are crucial to allow seamless roaming across those networks. Several integrated architectures have been proposed for 3G cellular networks and wireless local area networks (WLANs by both third generation wireless initiatives, 3GPP and 3GPP2. However, the proposed architectures have several drawbacks, the most significant being the absence of quality of service (QoS guarantees, seamless roaming and service continuity. This paper proposes a novel architecture, called Integrated InterSystem Architecture (IISA, which enables the integration and interworking of various wireless networks and hide their heterogeneities from one another. The IISA architecture aims provisioning of guaranteed seamless roaming and service continuity across different access networks. Performance evaluation shows that IISA together with the proposed handoff management scheme provide significant gains than existing interworking architectures and mobility management protocols.

  7. Multihop Wireless Networks Opportunistic Routing

    Zeng, Kai; Li, Ming


    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  8. Enabling multimode wireless access networks using remote radio heads

    Kardaras, Georgios; Soler, José; Dittmann, Lars


    The deployment of 4G networks is spreading rapidly providing mobile broadband services to the public. 4G technologies are designed to overlay existing 3G networks enabling reusability of several network components. In this way, the coexistence of 3G/4G standards is facilitated. This paper describes...... and management plane. Switching between wireless standards becomes easily feasible through firmware upgrading. Finally, real-time configuration of radio functionalities, such as transmit power, receiver gain, carrier frequency, channel bandwidth and others result in a modular software defined radio platform...

  9. Underwater optical wireless communication network

    Arnon, Shlomi


    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  10. A SIMO Fiber Aided Wireless Network Architecture

    Ray, Siddharth; Medard, Muriel; Zheng, Lizhong


    The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity by leveraging the speed of optical networks. In this paper, we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a SIMO wireless channel and an optical fiber channel, connected through wireless-optical interfaces. We propose a scheme where the received wireless signal at each interface is quantized and se...

  11. Dynamic wireless sensor networks

    Oteafy, Sharief M A


    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  12. Wireless Sensor Networks for Healthcare Applications

    Dishongh, Terrance J; Kuris, Ben


    This unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data collection and decision making, clinical deployment of wireless sensor networks, contextual awareness medication prompting field trials in homes, social health monitoring, and the future of wireless sensor networks in healthcare.

  13. Sybil attack in Wireless Sensor Network



    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  14. Distributed medium access control in wireless networks

    Wang, Ping


    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  15. R&D on wireless broadband communication systems: new generation ubiquitous mobile network

    Ogawa, Hiroyo


    R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.

  16. Wireless Sensor Networks Approach

    Perotti, Jose M.


    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  17. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Zhou, Shan


    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  18. Mobile Assisted Security in Wireless Sensor Networks


    Report: Mobile Assisted Security in Wireless Sensor Networks The aim of the project is to investigate ways for integrating mobile robots to improve and...reduce to complexity of providing security in wireless sensor networks . We worked on mobile assisted key management to distribute keys using mobile...Number of Papers published in non peer-reviewed journals: Final Report: Mobile Assisted Security in Wireless Sensor Networks Report Title The aim of the

  19. Weaponizing Wireless Networks

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.


    The pervasive interconnection of autonomous sensor devices has given birth to a broad class of exciting new applications. At the same time, however, the unattended nature and the limited resources of sensor nodes have created an equal number of vulnerabilities that attackers can exploit in order...... to gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring...... of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and functionality...

  20. Maximum Multiflow in Wireless Network Coding

    Zhou, Jin-Yi; Jiang, Yong; Zheng, Hai-Tao


    In a multihop wireless network, wireless interference is crucial to the maximum multiflow (MMF) problem, which studies the maximum throughput between multiple pairs of sources and sinks. In this paper, we observe that network coding could help to decrease the impacts of wireless interference, and propose a framework to study the MMF problem for multihop wireless networks with network coding. Firstly, a network model is set up to describe the new conflict relations modified by network coding. Then, we formulate a linear programming problem to compute the maximum throughput and show its superiority over one in networks without coding. Finally, the MMF problem in wireless network coding is shown to be NP-hard and a polynomial approximation algorithm is proposed.

  1. Future wireless and optical networks

    Jiang, Shengming


    This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control prob

  2. Security Threats in Wireless Sensor Networks



    Full Text Available Wireless Sensor Network (WSN is an emergingtechnology that shows great promise for variousfuturistic applications both for mass public andmilitary. The sensing technology combined withprocessing power and wireless communication makesit lucrative for being exploited in abundance in future.Wireless sensor networks are characterized byseverely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN are currently receiving significant attention due to their unlimitedpotential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.

  3. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Novarun Deb


    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  4. Programming Wireless Sensor Networks

    Lopes, Luís; Martins, Francisco; Barros, João

    Sensor networks can be viewed as a collection of tiny, low-cost devices programmed to sense the physical world and that communicate over radio links [12]. The devices are commonly called motes or smart dust [676], in allusion to their computational and sensing capabilities, as well as their increasingly small size.

  5. Wireless network topology for monitoring mobile agents

    Fraser, Matthew J.; James, Daniel A.; Thiel, David V.


    A wireless network of multiple sensor nodes for monitoring large numbers of mobile agents is described and investigated. Wireless monitoring provides time critical information from a number of data sources allowing near real-time analysis of the collected data. The developed wireless network provides a moderate data rate, is able to support many wireless nodes and is a low power solution. Novel network structures have been developed to satisfy all of these requirements. This paper evaluates a number of currently available wireless communication protocols, concluding that a Bluetooth wireless network satisfies the above criteria. To support a large number of devices, topologies using inter-piconet and piconet sharing methods have been developed. These network structures are outlined in detail and have been developed with the current Bluetooth hardware limitations in mind. The proposed wireless networks have been developed to be implemented with current Bluetooth hardware. A summary of network performance is included for each developed network structure, and from these figures an appropriate network structure has been chosen that satisfies the requirements of a wireless sensor network for monitoring mobile agents.

  6. Low-Power Wireless Sensor Network Infrastructures

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... in order to achieve the wanted lifetimes. Through more than a decade of wireless sensor network research, progress towards realizing wanted lifetimes have been made and wireless standards for packet formatting and routing have been proposed. With standards in place, the wide-span between programming...... environments and communication primitives in wireless sensor network and traditional network development are closing. However, fundamental differences in wireless technology and energy constraints are still to be considered at the lower levels of the software stack. To fulfill energy requirements hardware...

  7. Integration of RFID and Wireless Sensor Networks

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.


    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  8. Filtering and control of wireless networked systems

    Zhang, Dan; Yu, Li


    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. wireless networked systems for communication and control applications, the bo...

  9. The Security of Wireless Local Area Network

    林楠; 李翠霞


    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  10. ZigBee for wireless networking

    Lönn, Johan; Olsson, Jonas


    The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. However, there are many wireless monitoring and control applications for industrial and home environments which require longer battery life, lower data rates and less complexity than those from existing standards. What the market need is a globally defined standard that meets the requirement for reliability, security, lo...

  11. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Goshi Sato


    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  12. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang


    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  13. Wireless Network Penetration Testing and Security Auditing

    Wang Shao-Long


    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  14. New Technologies for Information and Communication, PWM Remote Experimenting and 3G Networks as Teaching Support

    Juarez B. Silva


    Full Text Available Remote experiments may be an important tool to implement new technologies in the teaching/learning process, since it enables experimenting with real plants, essential to consolidate the concepts acquired in the theoretical classes, especially in technical and scientific disciplines.This article presents the “modulator PWM” remote experiment, its operational architecture and construction. It seeks to demonstrate its integration with theory and the use of the 3G cellular network as a communications channel for remote experimenting. The PWM modulators are often used in disciplines of higher education courses in electrical engineering, telecommunications and electronics. This article shows that it is possible to perform the practical activity completely remotely, via 3G cellular networks or through the internet to access the experiment and perform the experiments needed to fully understand the theories of the PWM modulator.This article is a further initiative for remote experiments in the world of different engineering specialties, involving the cellular networks that are rapidly expanding at this time.

  15. DAWN: Dynamic Ad-hoc Wireless Network


    Wireless Networks, , ( ): . doi: Ning Li, Jennifer C. Hou. Localized Topology Control Algorithms for Heterogeneous Wireless Networks, IEEE ...Multi-User Diversity in Single-Radio OFDMA AdHoc Networks Based on Gibbs Sampling, IEEE Milcom . 03-NOV-10, . : , TOTAL: 1 Number of Peer-Reviewed...Networks, ( ) Hui Xu, , Xianren Wu, , Hamid R. Sadjadpour, , J.J. Garcia-Luna-Aceves, . A Unified Analysis of Routing Protocols inMANETs, IEEE

  16. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai


    Full Text Available Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment channel, payment carrier and etc. After deep studying about previous payment methods and future 3G communication technology, this paper introduces a new mobile payment model by combining with IC chip, mobile phone and mobile internet, and then gives some improvement measures for current settlement mechanisms in the network transaction, which is entirely around payment channel, payment carrier, security authentication and other key issues in 3G environment. The real time processing of information flow, capital flow and logistics in mobile environment can be easily achieved, forming a complete and reliable business operation for mobile users, which can bring some great conveniences and profound influences for mobile payment industry.

  17. Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks

    Lu Lou


    Full Text Available Location-based services (LBS provide content that is dynamically customized according to the user's location. These services are commonly delivered to mobile devices. Due to wireless bandwidth limit, broadcasting based transmission technology is one of main methods to provide dynamic real-time information or public emergency for commercial LBS applications. Multimedia Broadcast and Multicast Services (MBMS is a broadcasting service offered via existing GSM and UMTS cellular networks. MBMS has the major benefit that the network infrastructure already exists for mobile network operators and the deployment can be cost effective compared with building a new network for the services. However, Location-based services historically were built as stand-alone applications that did not communicate easily with other applications and systems. Therefore, open standards will be a necessary catalyst for LBS growth. This paper proposes a novel LBS application framework based on the TPEG protocol (transport protocol experts group over MBMS and explains the implement of that using the stream delivery method and download delivery method. For download service, Results of performance tests for FLUTE protocol (File Delivery under unidirectional Transport and FEC (Forward error correction are also presented.

  18. Analyzing the Low Power Wireless Links for Wireless Sensor Networks

    Mamun, Md Mainul Islam; Kumar, Sumon; Islam, Md Zahidul


    There is now an increased understanding of the need for realistic link layer models in the wireless sensor networks. In this paper, we have used mathematical techniques from communication theory to model and analyze low power wireless links. Our work provides theoretical models for the link layer showing how Packet Reception Rate vary with Signal to Noise Ratio and distance for different modulation schemes and a comparison between MICA2 and TinyNode in terms of PRR.

  19. Contemporary Developments in Wireless Sensor Networks

    Sangeeta Mittal


    Full Text Available Wireless Sensor Networks (WSN since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software, Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent networks, sensor enabled smartness and role of artificial intelligence methods is elaborated. Insight into future directions & research avenues in all the above areas is provided

  20. Proxy SDN Controller for Wireless Networks

    Won-Suk Kim


    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  1. The art of wireless sensor networks


    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  2. Location based Network Optimizations for Mobile Wireless Networks

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  3. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    Ramesh Babu H. S.


    Full Text Available The Call admission control (CAC is one of the Radio Resource Management (RRM techniques that plays influential role in ensuring the desired Quality of Service (QoS to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN. The proposed Fuzzy Neural call admission control (FNCAC scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compared to other two methods.

  4. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    S., Ramesh Babu H; S, Satyanarayana P


    The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural call admission control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compa...

  5. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.


    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  6. Wireless communications networks for the smart grid

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho


    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  7. BackTrack testing wireless network security

    Cardwell, Kevin


    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  8. Development of Time Synchronized Wireless Sensor Network

    Uchimura, Yutaka; Takahashi, Motoichi; Nasu, Tadashi

    Network based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard based TSF counter and sends the measured data with the counter value. It enables consistency on common clock among different wireless nodes. We describe the accuracy evaluation by simulation studies when the size of nodes increased. The hardware and software specifications of the developed wireless sensing system are shown. The experiments were conducted in a three-street reinforced concrete building and results showed the system performs more than sufficiently.

  9. New packet scheduling algorithm in wireless CDMA data networks

    Wang, Yu; Gao, Zhuo; Li, Shaoqian; Li, Lemin


    The future 3G/4G wireless communication systems will provide internet access for mobile users. Packet scheduling algorithms are essential for QoS of diversified data traffics and efficient utilization of radio spectrum.This paper firstly presents a new packet scheduling algorithm DSTTF under the assumption of continuous transmission rates and scheduling intervals for CDMA data networks . Then considering the constraints of discrete transmission rates and fixed scheduling intervals imposed by the practical system, P-DSTTF, a modified version of DSTTF, is brought forward. Both scheduling algorithms take into consideration of channel condition, packet size and traffic delay bounds. The extensive simulation results demonstrate that the proposed scheduling algorithms are superior to some typical ones in current research. In addition, both static and dynamic wireless channel model of multi-level link capacity are established. These channel models sketch better the characterizations of wireless channel than two state Markov model widely adopted by the current literature.

  10. Wireless Sensor Networks: Opportunities and Challenges

    Matthew N. O. Sadiku


    Full Text Available The popularity of cell phones, laptops, PDAs and intelligent electronics has made computing devices to become cheaper and more pervasive in daily life. The desire for connectivity among these devices has caused an exponential growth in wireless communication. Wireless sensor networks (WSNs provide an example of this phenomenon. WSNs belong to the general family of sensor networks that employ distributed sensors to collect information on entities of interest. This paper provides a brief introduction to wireless sensor networks. It addresses the opportunities and challenges of WSNs

  11. Distributed Algorithms in Wireless Sensor Networks

    Nieberg, Tim; Broersma, Hajo; Faigle, Ulrich; Hurink, Johann; Pickl, Stefan; Woeginger, Gerhard


    Wireless sensor networks (WSNs) are an emerging field of research which combines many challenges in distributed computing and network optimization. One important goal is to improve the functional lifetime of the sensor network using energy-efficient distributed algorithms, networking and routing tec

  12. Application for Measurement in Wireless Sensor Networks

    Miroslav MAHDAL


    Full Text Available This paper deals with wireless sensor networks, which are based on IEEE 802.15.4 standard. The development kit from Jennic company was used for wireless measuring of values and for creation of sensor network. For this purposes the sensor boards with wireless modules with marking JN5139 were used. These boards provide sensors (sensor of temperature, relative humidity and light sensor but also another interface, which helps to develop applications. Modules are programmed in Integrated Development Environment (IDE, which integrates C function library and C++ compiler and linker. The visualization application was created for monitoring of wireless sensor network. There is the possibility of local and wireless measurement. For creation of this application the SCADA/HMI system, Control Web 5 was used. This SCADA/HMI system enables to communicate with all wireless modules through base station (network's coordinator. The application also enables initialisation and network setting the any wireless module communicating with the base station. The advantage is the remote configuration and control of network. The application also enables the gathering, converting, viewing and archiving of incoming data from particular modules.

  13. On computer vision in wireless sensor networks.

    Berry, Nina M.; Ko, Teresa H.


    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  14. Wireless Laptops and Local Area Networks.

    Tolson, Stephanie Diane


    Describes experiences at St. Louis Community College at Florissant Valley (Missouri) with the use of wireless technology and a local area network for library bibliographic instruction. Discusses faculty input and attitudes; technical challenges; and experiences at other community colleges that have found wireless connections more economical than…

  15. Transmission capacity of wireless networks

    Weber, Steven


    Transmission capacity (TC) is a performance metric for wireless networks that measures the spatial intensity of successful transmissions per unit area, subject to a constraint on the permissible outage probability (where outage occurs when the SINR at a receiver is below a threshold). This volume gives a unified treatment of the TC framework that has been developed by the authors and their collaborators over the past decade. The mathematical framework underlying the analysis (reviewed in Ch. 2) is stochastic geometry: Poisson point processes model the locations of interferers, and (stable) shot noise processes represent the aggregate interference seen at a receiver. Ch. 3 presents TC results (exact, asymptotic, and bounds) on a simple model in order to illustrate a key strength of the framework: analytical tractability yields explicit performance dependence upon key model parameters. Ch. 4 presents enhancements to this basic model --- channel fading, variable link distances, and multi-hop. Ch. 5 presents four...

  16. Mobility and Handoff Management in Wireless Networks

    Sen, Jaydip


    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  17. Routing for wireless multi-hop networks

    Hamid, Sherin Abdel; Takahara, Glen


    The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

  18. Comparison of average global exposure of population induced by a macro 3G network in different geographical areas in France and Serbia.

    Huang, Yuanyuan; Varsier, Nadège; Niksic, Stevan; Kocan, Enis; Pejanovic-Djurisic, Milica; Popovic, Milica; Koprivica, Mladen; Neskovic, Aleksandar; Milinkovic, Jelena; Gati, Azeddine; Person, Christian; Wiart, Joe


    This article is the first thorough study of average population exposure to third generation network (3G)-induced electromagnetic fields (EMFs), from both uplink and downlink radio emissions in different countries, geographical areas, and for different wireless device usages. Indeed, previous publications in the framework of exposure to EMFs generally focused on individual exposure coming from either personal devices or base stations. Results, derived from device usage statistics collected in France and Serbia, show a strong heterogeneity of exposure, both in time, that is, the traffic distribution over 24 h was found highly variable, and space, that is, the exposure to 3G networks in France was found to be roughly two times higher than in Serbia. Such heterogeneity is further explained based on real data and network architecture. Among those results, authors show that, contrary to popular belief, exposure to 3G EMFs is dominated by uplink radio emissions, resulting from voice and data traffic, and average population EMF exposure differs from one geographical area to another, as well as from one country to another, due to the different cellular network architectures and variability of mobile usage. Bioelectromagnetics. 37:382-390, 2016. © 2016 Wiley Periodicals, Inc.

  19. TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks

    Wang, Zhiliang; Yin, Xia; Xiang, Yang; Zhu, Ruiping; Gao, Shirui; Wu, Xin; Liu, Shijian; Gao, Song; Zhou, Li; Li, Peng

    Mobile broadcast service is one of the emerging most important new services in 3G networks. To better operate and manage mobile broadcast services, mobile broadcast business management system (MBBMS) should be designed and developed. Such a system, with its distributed nature, complicated XML data and security mechanism, faces many challenges in testing technology. In this paper, we study the conformance testing methodology of MBBMS, and design and implement a MBBMS protocol conformance testing tool based on TTCN-3, a standardized test description language that can be used in black-box testing of reactive and distributed system. In this methodology and testing tool, we present a semi-automatic XML test data generation method of TTCN-3 test suite and use HMSC model to help the design of test suite. In addition, we also propose an integrated testing method for hierarchical MBBMS security architecture. This testing tool has been used in industrial level’s testing.

  20. A wireless robot for networked laparoscopy.

    Castro, Cristian A; Alqassis, Adham; Smith, Sara; Ketterl, Thomas; Sun, Yu; Ross, Sharona; Rosemurgy, Alexander; Savage, Peter P; Gitlin, Richard D


    State-of-the-art laparoscopes for minimally invasive abdominal surgery are encumbered by cabling for power, video, and light sources. Although these laparoscopes provide good image quality, they interfere with surgical instruments, occupy a trocar port, require an assistant in the operating room to control the scope, have a very limited field of view, and are expensive. MARVEL is a wireless Miniature Anchored Robotic Videoscope for Expedited Laparoscopy that addresses these limitations by providing an inexpensive in vivo wireless camera module (CM) that eliminates the surgical-tool bottleneck experienced by surgeons in current laparoscopic endoscopic single-site (LESS) procedures. The MARVEL system includes 1) multiple CMs that feature a wirelessly controlled pan/tilt camera platform, which enable a full hemisphere field of view inside the abdominal cavity, wirelessly adjustable focus, and a multiwavelength illumination control system; 2) a master control module that provides a near-zero latency video wireless communications link, independent wireless control for multiple MARVEL CMs, digital zoom; and 3) a wireless human-machine interface that gives the surgeon full control over CM functionality. The research reported in this paper is the first step in developing a suite of semiautonomous wirelessly controlled and networked robotic cyber-physical devices to enable a paradigm shift in minimally invasive surgery and other domains such as wireless body area networks.

  1. Topology Optimisation of Wireless Sensor Networks

    Thike Aye Min


    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  2. Noncommutative Lightweight Signcryption for Wireless Sensor Networks

    Lize Gu; Yun Pan; Mianxiong Dong; Kaoru Ota


    Key management techniques for secure wireless-sensor-networks-based applications must minimally incorporate confidentiality, authenticity, integrity, scalability, and flexibility. Signcryption is the proper primitive to do this. However, existing signcryption schemes are heavyweight and not suitable for resource-limited sensors. In this paper, we at first propose a braid-based signcryption scheme and then develop a key establishment protocol for wireless sensor networks. From the complexity v...

  3. Index Modulation Techniques for 5G Wireless Networks

    Basar, Ertugrul


    The increasing demand for higher data rates, better quality of service, fully mobile and connected wireless networks lead the researchers to seek new solutions beyond 4G wireless systems. It is anticipated that 5G wireless networks, which are expected to be introduced around 2020, will achieve ten times higher spectral and energy efficiency than current 4G wireless networks and will support data rates up to 10 Gbps for low mobility users. The ambitious goals set for 5G wireless networks requi...

  4. Intrusion detection and monitoring for wireless networks.

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie


    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  5. Load Balancing in Wireless Mesh Network: a Survey

    Maryam Asgari

    Full Text Available Wireless Mesh network (WMN is a state of the art networking standard for next generation of wireless network. The construction of these networks is basis of a network of wireless routers witch forwarding each other`s packets in a multi-hop manner. All us ...

  6. Comparison of 3G and 4G networks%3G和4G网络的对比



      3G, the full name of 3 rd Generation, the Chinese called the third Generation of digital communications. In order to provide the services, the wireless network must be able to support different data transmission speed, that is to say, in indoor, outdoor, and driving environment can support at least 2 MBPS respectively (megabytes per second), 384 KBPS (kilobytes per second) and the transmission speed of 144 KBPS. 4G, which is short for fourth generation mobile communication technology, is a collection of 3G and WLAN in one and be able to transmit high-quality video images, and almost the same quality of image transmission and high-definition television technology products. 4G system can download at a speed of 100 MBPS, 2000 times faster than dial-up Internet access, upload speed can reach 20 megabits per second, and be able to meet the requirements of almost all users of wireless services. Infrastructure based on 3G and 4G, multi-address access technology, performance, safety regulations, provide services, facing problems and the existing problems in performance, the existing problems in safety, etc, to carry out comparison and contrast.%  3G,全称3rd Generation,中文称第三代数字通信。为了提供这种服务,无线网络必须能够支持不同的数据传输速度,也就是说在室内、室外和行车的环境中能够分别至少支持2Mbps(兆字节/每秒)、384kbps(千字节/每秒)以及144kbps的传输速度。4G,简称第四代移动通信及其技术,下载速度达100Mbps,比拨号上网快2000倍,上传速度达20Mbps,可以满足几乎所有用户对无线服务的要求。集3G与WLAN于一体并能够传输高质量视频图像以及图像传输质量与高清度电视不相上下的技术产品。本文从3G和4G的基础设施、多地址接入技术、性能、安全规定、提供服务、面临问题、性能上存在的问题、安全上存在的问题等方面来进行对比和比较。

  7. Novel Concepts of Cooperative Wireless Networking

    Zhang, Qi


    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery...... for a cognitive radio MAC protocol. Finally, a novel modulation, hierarchical modulation, is used to facilitate the uplink transmission in cooperative networks. Simulation and analytical analysis has been conducted. Great potentials of cooperation are shown in improving the energy effciency, spectrum effciency......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device...

  8. Scalable Capacity Bounding Models for Wireless Networks

    Du, Jinfeng; Medard, Muriel; Xiao, Ming; Skoglund, Mikael


    The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper (resp. lower) bounding models, which can be used to calculate the outer (resp. inner) bounds for the capacity region of the original noisy network. Based on the network equivalence framework, this paper presents scalable upper and lower bounding models for wireless networks with potentially many nodes. A channel decoupling method is proposed...

  9. Genetic Algorithm for Hierarchical Wireless Sensor Networks

    Sajid Hussain


    Full Text Available Large scale wireless sensor networks (WSNs can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, environment and habitat monitoring. As hierarchical clusters can reduce the energy consumption requirements for WSNs, we investigate intelligent techniques for cluster formation and management. A genetic algorithm (GA is used to create energy efficient clusters for data dissemination in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique can extend the network lifetime for different network deployment environments.

  10. 3patial Load Balancing in Nide-Area Wireless Networks

    Kambiz Azarian; Ravindra Patwardhan; Chris Lott; Donna Ghosh; Radhika Gowaikar; Rashid Attar


    Load balancing is typically used in the frequency domain of cellular wireless networks to balance paging, access, and traffic load across the available bandwidth. In this paper, we extend load balancing into the spatial domain, and we develop two approaches--network load balancing and single-carrier multilink--for spatial load balancing. Although these techniques are mostly applied to cellular wireless networks and Wi-Fi networks, we show how they can be applied to EV-DO, a 3G cellular data network. When a device has more than one candidate server, these techniques can be used to determine the quality of the channel between a server and the device and to determine the Ipad on each server. The proposed techniques leverage the advantages of existing EV-DO network architecture and are fully backward compatible. Network operators can substantially increase network capacity and improve user experience by using these techniques. Combining load balancing in the frequency and spatial domains improves connectivity within a network and allows resources to be optimally allocated according to the p-fair criterion. Combined load balancing further improves performance.

  11. Topological properties of random wireless networks

    Srikanth K Iyer; D Manjunath


    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the issues of interest in random wireless networks. We then discuss some recent results for one-dimensional networks with the nodes distributed uniformly in $(0, z)$.We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally we discuss some recent generalisations in considering non uniform transmission ranges and non uniform node distributions. An annotated bibliography of some of the recent literature is also provided.

  12. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Li, Mingfu


    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  13. Performance Analysis of Wireless Networks With MDQOS

    A. Leelavathi


    Full Text Available In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users. This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns

  14. Voice over IP in Wireless Heterogeneous Networks

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  15. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.


    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  16. Robust resource allocation in future wireless networks

    Parsaeefard, Saeedeh; Mokari, Nader


    This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose spec...

  17. Secure Routing in Wireless Sensor Networks

    Soumyashree Sahoo


    Full Text Available Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks. Key Management is a major challenge to achieve security in wireless sensor networks. Key management includes the process of key setup, the initial distribution of keys and keys revocation. To provide security and proper routing or communication should be encrypted and authenticated. It is not easy to achieve secure key establishment without public key cryptography. In this thesis, some key management schemes have been purposed which will be valuable for secure routing between different sensor nodes.

  18. Multilayer Statistical Intrusion Detection in Wireless Networks

    Noureddine Boudriga


    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  19. Load balancing in integrated optical wireless networks

    Yan, Ying; Dittmann, Lars; Wong, S-W.;


    In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely with the in......In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely...... issues are outlined and a cost function based optimization model is developed for power management. In particularly, two alternative feedback schemes are proposed to report wireless network status. Simulation results show that our proposed load balancing mechanism improves network performances....

  20. Wireless Sensor Networks for Ambient Assisted Living

    Raúl Aquino-Santos


    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  1. Wireless vehicular networks for car collision avoidance


    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  2. Modeling Multistandard Wireless Networks in OPNET

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée


    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard sys...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  3. Hybrid RRM Architecture for Future Wireless Networks

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio


    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  4. Service discovery in heterogeneous wireless networks

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.


    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible imple

  5. Wireless Sensor Networks : Structure and Algorithms

    van Dijk, T.C.


    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected perform

  6. Energy-Harvesting Wireless Sensor Networks

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio


    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....

  7. Flexible network wireless transceiver and flexible network telemetry transceiver

    Brown, Kenneth D.


    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  8. Intrusion detection in wireless ad-hoc networks

    Chaki, Nabendu


    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  9. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee


    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  10. Data Dissemination in Wireless Networks with Network Coding

    Firooz, Mohammad H


    We investigate the use of network coding for information dissemination over a wireless network. Using network coding allows for a simple, distributed and robust algorithm where nodes do not need any information from their neighbors. In this paper, we analyze the time needed to diffuse information throughout a network when network coding is implemented at all nodes. We then provide an upper bound for the dissemination time for ad-hoc networks with general topology. Moreover, we derive a relation between dissemination time and the size of the wireless network. It is shown that for a wireless network with N nodes, the dissemination latency is between O(N) and O(N^2), depending on the reception probabilities of the nodes. These observations are validated by the simulation results.

  11. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Jehn-Ruey Jiang


    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  12. Ad hoc mobile wireless networks principles, protocols, and applications

    Sarkar, Subir Kumar


    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  13. Ultra wideband technology for wireless sensor networks

    Wang, Yue; Xiong, Weiming


    Wireless sensor networks (WSNs) have emerged as an important method for planetary surface exploration. To investigate the optimized wireless technology for WSNs, we summarized the key requirements of WSNs and justified ultra wideband (UWB) technology by comparing with other competitive wireless technologies. We also analyzed network topologies as well as physical and MAC layer designs of IEEE 802.15.4a standard, which adopted impulse radio UWB (IR-UWB) technology. Our analysis showed that IR-UWB-based 802.15.4a standard could enable robust communication, precise ranging, and heterogeneous networking for WSNs applications. The result of our present work implies that UWB-based WSNs can be applied to future planetary surface exploration.

  14. Emulating Wired Backhaul with Wireless Network Coding

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar


    of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  15. Wireless Mesh Network Routing Under Uncertain Demands

    Wellons, Jonathan; Dai, Liang; Chang, Bin; Xue, Yuan

    Traffic routing plays a critical role in determining the performance of a wireless mesh network. Recent research results usually fall into two ends of the spectrum. On one end are the heuristic routing algorithms, which are highly adaptive to the dynamic environments of wireless networks yet lack the analytical properties of how well the network performs globally. On the other end are the optimal routing algorithms that are derived from the optimization problem formulation of mesh network routing. They can usually claim analytical properties such as resource use optimality and throughput fairness. However, traffic demand is usually implicitly assumed as static and known a priori in these problem formulations. In contrast, recent studies of wireless network traces show that the traffic demand, even being aggregated at access points, is highly dynamic and hard to estimate. Thus, to apply the optimization-based routing solution in practice, one must take into account the dynamic and uncertain nature of wireless traffic demand. There are two basic approaches to address the traffic uncertainty in optimal mesh network routing (1) predictive routing that infers the traffic demand with maximum possibility based in its history and optimizes the routing strategy based on the predicted traffic demand and (2) oblivious routing that considers all the possible traffic demands and selects the routing strategy where the worst-case network performance could be optimized. This chapter provides an overview of the optimal routing strategies for wireless mesh networks with a focus on the above two strategies that explicitly consider the traffic uncertainty. It also identifies the key factors that affect the performance of each routing strategy and provides guidelines towards the strategy selection in mesh network routing under uncertain traffic demands.

  16. Mobile Health Care over 3G Networks: the MobiHealth Pilot System and Service

    Wac, Katarzyna; Bults, Richard; Konstantas, Dimitri; Halteren, van Aart; Jones, Val; Widya, Ing; Herzog, Rainer


    Health care is one of the most prominent areas for the application of wireless technologies. New services and applications are today under research and development targeting different areas of health care, from high risk and chronic patients’ remote monitoring to mobility tools for the medical perso

  17. Human-Centric Wireless Communication Networks

    Cavallari, Riccardo


    This thesis covers two main topics: the design and performance evaluation of Wireless Body Area Networks (WBANs), and the simulation and mathematical modeling of Delay Tolerant Networks (DTNs). Different Medium Access Control (MAC) protocols for WBANs are implemented on dedicated hardware in order to evaluate, through extensive measurement campaigns, the performance of the network in terms of packet loss rate, delay and energy consumption. Novel solutions to cope with bo...

  18. Energy Consumption of Wireless Network Access Points



    2nd International Conference on Green Communications and Networking, GreeNets 2012; Gandia; Spain; 25 October 2012 through 26 October 2012 The development of low cost technology based on IEEE 802.11 standard permits to build telecommunication networks at low cost, allowing providing Internet access in rural areas in developing countries. The lack of access to the electrical grid is a problem when the network is being developed in rural areas, so that wireless access points should operate u...

  19. Research in Wireless Networks and Communications


    mesh networks with British Telecom and other organizations. They use APs equipped with smart antennas and integrated routers . [2] Consider a set of...193. [15] Thomson , J., Baas, B., Cooper, E. M., Gilbert, J. M., Hsieh, G., Husted, P., Lokanathan, A., Kuskin, J. S., McCracken, D., McFarland, B., Meng...Radio Mesh Networking Testbed,” 1st workshop on Wireless Network Measurements (WiNMee 2005), Trento, Italy, April 2005 [20] Thomson , J., Baas, B., Cooper

  20. Stochastic Congestion Control in Wireless Sensor Networks

    Kim, Hyung Seok; Lee, Seok; Kim, Namhoon

    In this paper, an effective congestion control algorithm is proposed to increase the end-to-end delivery success ratio of upstream traffic by reduction of buffer drop probabilities and their deviation in wireless sensor networks. According to the queue length of parent and child nodes, each child node chooses one of the parents as the next hop to the sink and controls the delay before transmission begins. It balances traffics among parents and mitigates congestion based on congestion level of a node. Simulation results show that the proposed algorithm reduces buffer drop probabilities and their deviation and increases the end-to-end delivery success ratio in wireless sensor networks.

  1. Interference Alignment in Dense Wireless Networks

    Niesen, Urs


    We consider arbitrary dense wireless networks, in which $n$ nodes are placed in an arbitrary (deterministic) manner on a square region of unit area and communicate with each other over Gaussian fading channels. We provide inner and outer bounds for the $n\\times n$-dimensional unicast and the $n\\times 2^n$-dimensional multicast capacity regions of such a wireless network. These inner and outer bounds differ only by a factor $O(\\log(n))$, yielding a fairly tight scaling characterization of the entire regions. The communication schemes achieving the inner bounds use interference alignment as a central technique and are surprisingly simple.

  2. Stochastic petri nets for wireless networks

    Lei, Lei; Zhong, Zhangdui


    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  3. Future Wireless Networks and Information Systems Volume 1


    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  4. A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure

    Biswajit Bhowmik


    Full Text Available Wireless and Mobile Network Infrastructure services generally examine how different infrastructure providers are positioning themselves to compete in wireless services. These services analyze the opportunities and challenges facing by the infrastructure providers selling to wireless and mobile network operators worldwide. The opportunities and challenges are the review of strategies, market positioning, and future direction in the market for wireless and mobile network infrastructure. The service covers all generations of wireless and mobile network infrastructure: 2G, 2.5G, 3G, and 4G so on global in scope. Majority of the users are mobile while availing these services. Mobility is the most important feature of any wireless and mobile network. Usually, continuous service is achieved by supporting handoff from one cell to another. Poorly designed handoff schemes tend to generate very heavy signaling traffic and, thereby, lead to a dramatic decrease in quality of service. In this paper we make a comparison study on some selective traffic models with priority handoff scheme. The study shows how a handoff procedure has a significant impact on wireless mobile network performance on the basis of two primary criteria – Blocking probability of originating calls and the forced termination probability of ongoing calls. In addition to this the study shows arrival rate of handoff calls, and approximate number of mobile users that get serviced by underlying base station.

  5. Network coding at different layers in wireless networks


    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.


    Hasan Al-Refai


    Full Text Available Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation, communication, and sensing abilities, in a battery-powered sensor network, energy and communication bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the application in order to minimize the resources consumed and extend the life of the network. In this paper, we introduce a comparative study in different routing algorithms that propose vital solutions to the most important issues that should be taken into account when designing wireless network which are reliability, lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will introduce their algorithms and discuss how did they propose to solve such of these challenges and finally we will do some evaluation to each approach.

  7. On the Quality of Wireless Network Connectivity

    Dasgupta, Soura


    Despite intensive research in the area of network connectivity, there is an important category of problems that remain unsolved: how to measure the quality of connectivity of a wireless multi-hop network which has a realistic number of nodes, not necessarily large enough to warrant the use of asymptotic analysis, and has unreliable connections, reflecting the inherent unreliable characteristics of wireless communications? The quality of connectivity measures how easily and reliably a packet sent by a node can reach another node. It complements the use of \\emph{capacity} to measure the quality of a network in saturated traffic scenarios and provides a native measure of the quality of (end-to-end) network connections. In this paper, we explore the use of probabilistic connectivity matrix as a possible tool to measure the quality of network connectivity. Some interesting properties of the probabilistic connectivity matrix and their connections to the quality of connectivity are demonstrated. We argue that the la...

  8. Securing Wireless Sensor Networks: Security Architectures

    David Boyle


    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  9. Dialable Cryptography for Wireless Networks

    2008-03-01 3. Bandera , C., et al., Wireless Just-in-Time Training of Mobile Skilled Support Personnel. Proc. of SPIE, 2006. (62500R-1). 4. Basagni, S...where she stood up the Information Assurance Office for JSTARS. She later transferred to Kirtland Air Force Base, New Mexico to work with AFOTEC in

  10. Ad hoc mobile wireless networks principles, protocols and applications

    Sarkar, Subir Kumar; Puttamadappa, C


    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  11. Wireless Network Communications Overview for Space Mission Operations

    Fink, Patrick W.


    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  12. Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays

    Whitbeck, John; Leguay, Jérémie; Conan, Vania; de Amorim, Marcelo Dias


    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. However, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-...

  13. Wireless Network Security Vulnerabilities and Concerns

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  14. Problem solving for wireless sensor networks

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis


    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  15. Benchmarking Block Ciphers for Wireless Sensor Networks

    Law, Y.W.; Doumen, J.M.; Hartel, P.H.


    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for W

  16. Clock Synchronization for Multihop Wireless Sensor Networks

    Solis Robles, Roberto


    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  17. Lifetime Analysis of Reliable Wireless Sensor Networks

    Baydere, S.; Safkan, Y.; Durmaz Incel, O.


    A wireless sensor network is comprised of a large number of battery-limited sensor nodes communicating with unreliable radio links. The nodes are deployed in an ad hoc fashion and a reverse multicast tree is formed in the target domain. The sink node disseminates a query and collects responses from

  18. Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network



    Full Text Available The convergence of mobile technologies will characterize the future telecommunication systems based on TCP/IP protocols. These Protocols can be used to build both wired and wireless parts on same platform. But TCP/IP headers overheads are large, so it utilizes more bandwidth even small services, whose payload is small. So it definitely needheader compression to save bandwidth, as we know bandwidth is the most expensive and scared resource in wireless systems.There are many approaches used to compress the headers overloads. Most commonly used approaches are, an adaptive robust TCP/IP header compression lgorithm for 3G wireless networks and an adaptive robust header compression algorithm based on UDP-RTS/CTS handshake for real-timestreams in wireless networks such a 3G platforms. But these approaches are not efficient in adaptive nature. So In this paper we are proposing one approach to solve the problem efficiently even in adaptive nature. The aim of this algorithm is to adjust the dimension of Variable Sliding Window (VSW in W-LSB encoding with the accurate estimation of wireless channel state to achieve the good balance of compression ratio and error-resistant robustness for the adaptive use in wireless link. We present simulation results that demonstrate theeffectiveness of this adaptive algorithm over wireless link and comparative study of existing approaches

  19. Advanced routing protocols for wireless networks

    Campista , Miguel Elias Mitre


    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  20. Security Issues of Wireless Communication Networks

    Alimul Haque; Sinha, A. K.; Singh, K.M.; N. K. Sing


    Wireless Communication Networks have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks are vulnerable to numerous security threats that can adversely affect their performance. These issues become even more critical in w...

  1. Intelligent Joint Admission Control for Next Generation Wireless Networks

    Mohsen, Abdulqader M.; Al-Akwaa, Fadhl M.; Mohammed M. Alkhawlani


    The Heterogeneous Wireless Network (HWN) integrates different wireless networks into one common network. The integrated networks often overlap coverage in the same wireless service areas, leading to the availability of a great variety of innovative services based on user demands in a cost-efficient manner. Joint Admission Control (JAC) handles all new or handoff service requests in the HWN. It checks whether the incoming service request to the selected Radio Access Network (RAN) by the initia...

  2. An Integrated Mobile Phone Payment System Based on 3G Network

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li


    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  3. Study on Channel Estimate and Joint Detection in 3G Network

    Yanchun Shen


    Full Text Available In order to study the contribution of the channel estimation and joint measuring technology on the third generation mobile communications (3G, the channel estimation and joint detection model of the 3G system has been installed to analyze the channel estimation approaches grounded on emergency setups and training sequence. Pulse shaping filtering has been conducted by operations such as QPSK baseband modulation and Spread Spectrum on the User Data Source; then to channel estimate and joint measure the data received from base station via the Additive White Gaussian Noise channel. In line with the simulation results, with the increase of signal to noise ratio,the impulse response graph of the signal via the Steiner Estimator channel levels with that via the noise-free channel. Zero Forcing Block Linear Equalizer (ZF-BLE has a good effect on eliminating the multipath interference and the inter-symbol interference in the system, which prove the good effects on the 3G system of using both the channel estimation technology of the Steiner Estimator and the joint measuring technology of the ZF-BLE, which is of good application prospects.

  4. Wireless Local Area Networks: The Next Evolutionary Step.

    Wodarz, Nan


    The Institute of Electrical and Electronics Engineers recently approved a high-speed wireless standard that enables devices from different manufacturers to communicate through a common backbone, making wireless local area networks more feasible in schools. Schools can now use wireless access points and network cards to provide flexible…

  5. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Yu, Chao


    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  6. Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

    Mutter, T.F.


    Traditional wireless networks form the wireless counterpart of wired networks, in which providing infrastructure is the main functionality. High bandwidth is the primary goal and the unlimited power supply is an important characteristic of traditional wireless networks. On the other hand, Wireless S

  7. Game theory for wireless communications and networking

    Zhang, Yan


    Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applica

  8. Wireless Sensor Network for Medical Applications

    Hanady S.Ahmed


    Full Text Available This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals.

  9. Wireless sensor networks principles, design and applications

    Yang, Shuang-Hua


    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  10. Quality of service in wireless networks over unlicensed spectrum

    Nahrstedt, Klara


    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireles

  11. An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks

    Muhammad Raheel


    Full Text Available Wireless Mesh Network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented.WMNs are to provide high bandwidth broadband service to a large community of users through the use Internet Gateways which acts as a central point of internet attachment for the mesh routers, it is likely to be a potential bottleneck because of its limited wireless link capacity and security considerations of the Internet Gateways .By integrating Optical fiber network technologies with wireless mesh network we can achieve the Security and increase the capacity of the network, in this paper we define integration models with multiple gateways in the access network, which increases the capacity of wireless networks, increase security in network gateways, and decreases access point complexity through centralized management.

  12. 如何打造中国联通3G/4G一体化精品网络%How to Build China Unicom 3G/4G Integrated Network of Quality

    李萌; 闫震; 门里


    It analyses 3G/4G network of quality from the aspects of user and owner,explains 3G/4G integrated network of quality from 7 dimensions. Final y,for China Unicom,how to do the 7 dimensions wel ,it gives the macro analysis from the aspects of net-work construction scheme,coverage means,user perception,3G/4G interoperation,LTE voice solution,intel igent channel, power saving measures,network robustness,big data construction and the function of big data platform.%首先从使用者和拥有者的角度对3G/4G精品网进行了解读,然后通过7个维度对什么是3G/4G一体化精品网络进行了解释,最后对中国联通应该如何做好这7个维度从网络建设策略、覆盖手段、用户感知、3G/4G互操作、LTE语音解决演进、智能管道、节电措施、网络健壮性、大数据建设、大数据平台的作用等方面进行了宏观分析。

  13. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    Kaaniche, Heni


    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  14. Reliable Communication in Wireless Meshed Networks using Network Coding

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin; Heide, Janus; Rein, Stephan Alexander; Fitzek, Frank


    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performanceof the modified network codi...

  15. Hack Recognition In Wireless Sensor Network

    B. Srinivasulu


    Full Text Available A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

  16. MotionCast for mobile wireless networks

    Wang, Xinbing


    MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion “MotionCast” is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.

  17. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Xi Jin


    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  18. Wireless Sensor Network Handles Image Data


    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  19. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh


    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  20. 47 CFR 90.1405 - Shared wireless broadband network.


    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network....

  1. Scalable Video Streaming in Wireless Mesh Networks for Education

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang


    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  2. Power distribution and performance analysis for wireless communication networks

    Zhao, Dongmei


    This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless communicat

  3. Bridge monitoring using heterogeneous wireless sensor network

    Haran, Shivan; Kher, Shubhalaxmi; Mehndiratta, Vandana


    Wireless sensor networks (WSN) are proving to be a good fit where real time monitoring of multiple physical parameters is required. In many applications such as structural health monitoring, patient data monitoring, traffic accident monitoring and analysis, sensor networks may involve interface with conventional P2P systems and it is challenging to handle heterogeneous network systems. Heterogeneous deployments will become increasingly prevalent as it allows for systems to seamlessly integrate and interoperate especially when it comes to applications involving monitoring of large infrastructures. Such networks may have wireless sensor network overlaid on a conventional computer network to pick up data from one distant location and carry out the analysis after relaying it over to another distant location. This paper discusses monitoring of bridges using WSN. As a test bed, a heterogeneous network of WSN and conventional P2P together with a combination of sensing devices (including vibration and strain) is to be used on a bridge model. Issues related to condition assessment of the bridge for situations including faults, overloads, etc., as well as analysis of network and system performance will be discussed. When conducted under controlled conditions, this is an important step towards fine tuning the monitoring system for recommendation of permanent mounting of sensors and collecting data that can help in the development of new methods for inspection and evaluation of bridges. The proposed model, design, and issues therein will be discussed, along with its implementation and results.

  4. Influence of distortions of key frames on video transfer in wireless networks

    Sagatov, E S; Calyam, P


    In this paper it is shown that for substantial increase of video quality in wireless network it is necessary to execute two obligatory points on modernization of the communication scheme. The player on the received part should throw back automatically duplicated RTP packets, server of streaming video should duplicate the packets containing the information of key frames. Coefficients of the mathematical model describing video quality in wireless network have been found for WiFi and 3G standards and codecs MPEG-2 and MPEG-4 (DivX). The special experimental technique which has allowed collecting and processing the data has been developed for calculation of values of factors.

  5. Security for multi-hop wireless networks

    Mahmoud, Mohamed M E A


    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  6. Wireless sensor networks distributed consensus estimation

    Chen, Cailian; Guan, Xinping


    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  7. Joint Network Coding for Interfering Wireless Multicast Networks

    Qureshi, Jalaluddin; Cai, Jianfei


    Interference in wireless networks is one of the key-capacity limiting factor. The multicast capacity of an ad- hoc wireless network decreases with an increasing number of transmitting and/or receiving nodes within a fixed area. Digital Network Coding (DNC) has been shown to improve the multicast capacity of non-interfering wireless network. However recently proposed Physical-layer Network Coding (PNC) and Analog Network Coding (ANC) has shown that it is possible to decode an unknown packet from the collision of two packet, when one of the colliding packet is known a priori. Taking advantage of such collision decoding scheme, in this paper we propose a Joint Network Coding based Cooperative Retransmission (JNC- CR) scheme, where we show that ANC along with DNC can offer a much higher retransmission gain than that attainable through either ANC, DNC or Automatic Repeat reQuest (ARQ) based retransmission. This scheme can be applied for two wireless multicast groups interfering with each other. Because of the broa...

  8. Key Management in Wireless Sensor Networks

    Ismail Mansour


    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  9. Design implementation and analysis of wireless model based predictive networked control system over cooperative wireless network

    Ulusoy, Mehmet Alphan


    Owing to their distributed architecture, networked control systems are proven to be feasible in scenarios where a spatially distributed control system is required. Traditionally, such networked control systems operate over real-time wired networks over which sensors, controllers and actuators interact with each other. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment and maintainability, wireless networks such as IEEE 802.11 LANs are being preferred over d...

  10. Internet roaming: a WLAN/3G integration system for enterprises

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul


    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  11. Coal mine gas monitoring system based on wireless sensor network

    WANG Jian; WANG Ru-lin; WANG Xue-min; SHEN Chuan-he


    Based on the nowadays' is urgent that the gas detection cable communication system must be replaced by the wireless communication systems.The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system.Apply with multilayer data fuse to design working tactics,and import the artificial neural networks to analyze detecting result.The wireless sensors system communicates with the controI center through the optical fiber cable.All the gas sensor nodes distributed in coal mine are combined into an intelligent,flexible structure wireless network system.forming coal mine gas monitoring system based on wireless sensor network.

  12. Wireless Communication Networks' Planning in Underdeveloped Countries%Wireless Communication Networks' Planning in Underdeveloped Countries

    XU Rui


    The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general

  13. Wireless sensor networks in a maritime environment

    Kavelaars, W.; Maris, M.


    In the recent years, there has been a lot of research on sensor networks and their applications. In particular for monitoring large and potentially hostile areas these networks have proven to be very useful. The technique of land-based sensor networks can be extrapolated to sensing buoys at sea or in harbors. This is a novel and intriguing addition to existing maritime monitoring systems. At TNO, much research effort has gone into developing sensor networks. In this paper, the TNOdes sensor network is presented. Its practical employability is demonstrated in a surveillance application deploying 50 nodes. The system is capable of tracking persons in a field, as would be the situation around a military compound. A camera-system is triggered by the sensors and zooms into the detected moving objects. It is described how this system could be modified to create a wireless buoys network. Typical applications of a wireless (and potentially mobile) buoy network are bay-area surveillance, mine detection, identification and ship protection.




    Full Text Available Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in terms of spectrum usage can be realized. Cognitive radio system is one of the advancement that enhanced the adaptive capabilities of the systems that make the usage of spectrum more efficient, versatile and flexible. It also able to adapt their operations based on its internal and external factors by sensing its environment. The cognitive radio systems may be a solution for the spectrum scarcity faced by developer to tackle the issue of signal propagation and bigger coverage for broadband internet access. This paper will addressed the cognitive radio technology for ubiquitous broadband wireless internet access.

  15. Localization in Wireless Networks Foundations and Applications

    Sanford, Jessica Feng; Slijepcevic, Sasha


    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  16. Fundamental Tradeoffs on Green Wireless Networks

    Chen, Yan; Xu, Shugong; Li, Geoffrey Ye


    Traditional design of mobile wireless networks mainly focuses on ubiquitous access and large capacity. However, as energy saving and environmental protection become a global demand and inevitable trend, wireless researchers and engineers need to shift their focus to energy-efficiency oriented design, that is, green radio. In this paper, we propose a framework for green radio research and integrate the fundamental issues that are currently scattered. The skeleton of the framework consists of four fundamental tradeoffs: deployment efficiency - energy efficiency tradeoff, spectrum efficiency - energy efficiency tradeoff, bandwidth - power tradeoff, and delay - power tradeoff. With the help of the four fundamental tradeoffs, we demonstrate that key network performance/cost indicators are all stringed together.

  17. SITRUS: Semantic Infrastructure for Wireless Sensor Networks

    Kalil A. Bispo


    Full Text Available Wireless sensor networks (WSNs are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks, which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  18. Secure Communication in Stochastic Wireless Networks

    Pinto, Pedro C; Win, Moe Z


    Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, the intrinsically secure communications graph (iS-graph) is defined from the point of view of information-theoretic security. Conclusive results are provided for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. It is shown how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. Sectorized transmission and eavesdroppe...

  19. Application of Wireless Sensor Networks to Automobiles

    Tavares, Jorge; Velez, Fernando J.; Ferro, João M.


    Some applications of Wireless Sensor Networks (WSNs) to the automobile are identified, and the use of Crossbow MICAz motes operating at 2.4 GHz is considered together with TinyOS support. These WSNs are conceived in order to measure, process and supply to the user diverse types of information during an automobile journey. Examples are acceleration and fuel consumption, identification of incorrect tire pressure, verification of illumination, and evaluation of the vital signals of the driver. A brief survey on WSNs concepts is presented, as well as the way the wireless sensor network itself was developed. Calibration curves were produced which allowed for obtaining luminous intensity and temperature values in the appropriate units. Aspects of the definition of the architecture and the choice/implementation of the protocols are identified. Security aspects are also addressed.

  20. SITRUS: Semantic Infrastructure for Wireless Sensor Networks.

    Bispo, Kalil A; Rosa, Nelson S; Cunha, Paulo R F


    Wireless sensor networks (WSNs) are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks), which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  1. QoE management in wireless networks

    Wang, Ying; Zhang, Ping


    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  2. Caching Eliminates the Wireless Bottleneck in Video Aware Wireless Networks

    Andreas F. Molisch


    Full Text Available Wireless video is the main driver for rapid growth in cellular data traffic. Traditional methods for network capacity increase are very costly and do not exploit the unique features of video, especially asynchronous content reuse. In this paper we give an overview of our work that proposed and detailed a new transmission paradigm exploiting content reuse and the widespread availability of low-cost storage. Our network structure uses caching in helper stations (femtocaching and/or devices, combined with highly spectrally efficient short-range communications to deliver video files. For femtocaching, we develop optimum storage schemes and dynamic streaming policies that optimize video quality. For caching on devices, combined with device-to-device (D2D communications, we show that communications within clusters of mobile stations should be used; the cluster size can be adjusted to optimize the tradeoff between frequency reuse and the probability that a device finds a desired file cached by another device in the same cluster. In many situations the network throughput increases linearly with the number of users, and the tradeoff between throughput and outage is better than in traditional base-station centric systems. Simulation results with realistic numbers of users and channel conditions show that network throughput can be increased by two orders of magnitude compared to conventional schemes.

  3. Location Privacy Issues in Wireless Sensor Networks

    Kůr, Jiří; Stetsko, Andriy

    We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

  4. Frameless ALOHA Protocol for Wireless Networks

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan


    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesse...... process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme....

  5. Experiment of Wireless Sensor Network to Monitor Field Data

    Kwang Sik Kim


    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  6. Key handling in wireless sensor networks

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)


    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  7. Simultaneity Analysis In A Wireless Sensor Network

    Malović Miodrag


    Full Text Available An original wireless sensor network for vibration measurements was designed. Its primary purpose is modal analysis of vibrations of large structures. A number of experiments have been performed to evaluate the system, with special emphasis on the influence of different effects on simultaneity of data acquired from remote nodes, which is essential for modal analysis. One of the issues is that quartz crystal oscillators, which provide time reading on the devices, are optimized for use in the room temperature and exhibit significant frequency variations if operated outside the 20–30°C range. Although much research was performed to optimize algorithms of synchronization in wireless networks, the subject of temperature fluctuations was not investigated and discussed in proportion to its significance. This paper describes methods used to evaluate data simultaneity and some algorithms suitable for its improvement in small to intermediate size ad-hoc wireless sensor networks exposed to varying temperatures often present in on-site civil engineering measurements.

  8. Wireless Sensor Network for Wearable Physiological Monitoring

    P. S. Pandian


    Full Text Available Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wireless to a remote monitoring station. At the remote monitoring station the data is correlated to study the overall health status of the wearer. In the conventional wearable physiological monitoring system, the sensors are integrated at specific locations on the vest and are interconnected to the wearable data acquisition hardware by wires woven into the fabric. The drawbacks associated with these systems are the cables woven in the fabric pickup noise such as power line interference and signals from nearby radiating sources and thereby corrupting the physiological signals. Also repositioning the sensors in the fabric is difficult once integrated. The problems can be overcome by the use of physiological sensors with miniaturized electronics to condition, process, digitize and wireless transmission integrated into the single module. These sensors are strategically placed at various locations on the vest. Number of sensors integrated into the fabric form a network (Personal Area Network and interacts with the human system to acquire and transmit the physiological data to a wearable data acquisition system. The wearable data acquisition hardware collects the data from various sensors and transmits the processed data to the remote monitoring station. The paper discusses wireless sensor network and its application to wearable physiological monitoring and its applications. Also the problems associated with conventional wearable physiological monitoring are discussed.

  9. Network Management Framework for Wireless Sensor Networks

    Kim, Jaewoo; Jeon, Hahnearl; Lee, Jaiyong

    Network Management is the process of managing, monitoring, and controlling the network. Conventional network management was based on wired network which is heavy and unsuitable for resource constrained WSNs. WSNs can have large scale network and it is impossible to manage each node individually. Also, polling mechanism of Simple Network Management Protocol (SNMP) impose heavy management traffic overhead. Since management messages consume resources of WSNs, it can affect the performance of the network. Therefore, it is necessary for WSNs to perform energy efficient network management. In this paper, we will propose network management framework. We will introduce cluster-based network management architecture, and classify the Management Information Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.

  10. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Gyanendra Prasad Joshi


    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  11. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won


    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  12. HOWRAN: An Hybrid Optical Wireless Radio Access Network for WiMAX Antennas Backhauling

    Gagnaire, Maurice; Youssef, Tony

    In comparison to existing 3G or 3G+ wireless systems, fourth generation (4G), long-term evolution (LTE) or mobile Wimax are characterized by higher bit rates, highly fluctuant traffic matrices and higher antenna’s density. Current backhauling techniques federating radio antennas are not suited to these new characteristics. Several investigations are carried out for the design of new generation radio access networks (NG-RAN) in charge of concentrating radio cellular traffic from the base stations to the core network. In this paper, we propose an original approach based on an Hybrid Optical Wireless Radio Access Network (HOWRAN) exploiting the benefits of radio-over-fiber technologies and of recent advances in the field of optical devices and systems. As an illustration, we apply the HOWRAN concept to the backhauling of fixed or mobile WiMAX base stations. The two main innovative aspects of HOWRAN are depicted: its hardware architecture and its control plane.

  13. Interference Mitigation in Large Random Wireless Networks

    Aldridge, Matthew


    A central problem in the operation of large wireless networks is how to deal with interference -- the unwanted signals being sent by transmitters that a receiver is not interested in. This thesis looks at ways of combating such interference. In Chapters 1 and 2, we outline the necessary information and communication theory background, including the concept of capacity. We also include an overview of a new set of schemes for dealing with interference known as interference alignment, paying special attention to a channel-state-based strategy called ergodic interference alignment. In Chapter 3, we consider the operation of large regular and random networks by treating interference as background noise. We consider the local performance of a single node, and the global performance of a very large network. In Chapter 4, we use ergodic interference alignment to derive the asymptotic sum-capacity of large random dense networks. These networks are derived from a physical model of node placement where signal strength d...

  14. Synchronized Data Aggregation for Wireless Sensor Network

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee


    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...... mechanism. It provides network-wide time synchronization for sensor network. In the initial stage algorithm established the hierarchical structure in the network and then perform the pair - wise synchronization. SDA aggregate data with a global time scale throughout the network. The aggregated packets...... are scheduled using TDMA as the MAC layer protocol. Simulation results show that, SDA gives promising result of energy efficiency and delay as compared with state-of-the-art solutions....

  15. A Survey on Wireless Sensor Network Security

    Sen, Jaydip


    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

  16. Dynamic Packet Scheduling in Wireless Networks

    Kesselheim, Thomas


    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference-plus-noise ratio (SINR). It also covers virtually all other common interference models, for example the multiple-access channel, the radio-network model, the protocol model, and distance-2 matching. Packet-routing networks allowing each edge or each node to transmit or receive one packet at a time can be modeled as well. Starting from algorithms for the respective scheduling problem with static transmission requests, we build distributed stable protocols. This is more involved than in previous, similar approaches because...

  17. Multihop Routing In Self-Organizing Wireless Sensor Networks

    Rajashree V. Biradar; Sawant, S. R.; R. R. Mudholkar; V. C. Patil


    Wireless sensor networks have emerged in the past decade as a result of recent advances in microelectronic system fabrication, wireless communications, integrated circuit technologies, microprocessor hardware and nano-technology, progress in ad-hoc networking routing protocols, distributed signal processing, pervasive computing and embedded systems. As routing protocols are application specific, recent advances in wireless sensor networks have led to many new protocols specifically designed f...

  18. Industrial wireless sensor networks applications, protocols, and standards

    Güngör, V Çagri


    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  19. Security in wireless sensor networks

    Oreku, George S


    This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

  20. Simple, Reliable, Scalable and Energy Efficient Wireless Sensor Networks

    Guo, C.


    Wireless communication and networking technology has facilitated people to be connected with each other closely. Cellular network is evolving now from the third generation to the fourth generation. In the meanwhile we are experiencing the demand for wireless networks which can facilitate the communi

  1. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Breeding, Marshall


    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…


    Mukesh Singla


    Full Text Available Wireless networking is today’s glamour technology. Wecan hardly pick up a technology publication withoutencountering articles extolling its virtues or excoriating itsfaults. Wireless networking refers to technology thatenables two or more computers to communicate usingstandard network protocols, but without network cabling. Ifa user, application or company wishes to make dataportable, mobile and accessible then wireless networking isthe answer. A wireless networking system would rid of thedowntime you would normally have in a wired network dueto cable problems. It would also save time and money dueto the fact that you would spare the expense of installing alot of cables. Also, if a client computer needs to relocate toanother part of the office then all you need to do is movethe machine with the wireless network card [1].

  3. Wireless body sensor networks for health-monitoring applications.

    Hao, Yang; Foster, Robert


    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system.

  4. An Improved Wireless Sensor Network Routing Algorithm

    Shengmei Luo; Xue Li; Yiai Jin; Zhixin Sun


    High performance with low power consumption is an essential factor in wireless sensor networks (WSN). In order to address the issue on the lifetime and the consumption of nodes in WSNs, an improved ad hoc on⁃demand distance vector rout⁃ing (IAODV) algorithm is proposed based on AODV and LAR protocols. This algorithm is a modified on⁃demand routing al⁃gorithm that limits data forwarding in the searching domain, and then chooses the route on basis of hop count and power consumption. The simulation results show that the algorithm can effectively reduce power consumption as well as prolong the network lifetime.

  5. Survey of propagation Model in wireless Network

    Hemant Kumar Sharma


    Full Text Available To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, refraction, diffraction and scattering. This paper discuss free space model, two rays model, and cost 231 hata and its variants and fading model, and summarized the advantages and disadvantages of these model. This study would be helpful in choosing the correct propagation model.

  6. NEURON: Enabling Autonomicity in Wireless Sensor Networks

    Zafeiropoulos, Anastasios; Gouvas, Panagiotis; Liakopoulos, Athanassios; Mentzas, Gregoris; Mitrou, Nikolas


    Future Wireless Sensor Networks (WSNs) will be ubiquitous, large-scale networks interconnected with the existing IP infrastructure. Autonomic functionalities have to be designed in order to reduce the complexity of their operation and management, and support the dissemination of knowledge within a WSN. In this paper a novel protocol for energy efficient deployment, clustering and routing in WSNs is proposed that focuses on the incorporation of autonomic functionalities in the existing approaches. The design of the protocol facilitates the design of innovative applications and services that are based on overlay topologies created through cooperation among the sensor nodes. PMID:22399931

  7. NEURON: Enabling Autonomicity in Wireless Sensor Networks

    Anastasios Zafeiropoulos


    Full Text Available Future Wireless Sensor Networks (WSNs will be ubiquitous, large-scale networks interconnected with the existing IP infrastructure. Autonomic functionalities have to be designed in order to reduce the complexity of their operation and management, and support the dissemination of knowledge within a WSN. In this paper a novel protocol for energy efficient deployment, clustering and routing in WSNs is proposed that focuses on the incorporation of autonomic functionalities in the existing approaches. The design of the protocol facilitates the design of innovative applications and services that are based on overlay topologies created through cooperation among the sensor nodes.

  8. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    YanLiang Jin


    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  9. Flight Testing of Wireless Networking for Nanosat Launch Vehicles Project

    National Aeronautics and Space Administration — The innovation proposed here addresses the testing and evaluation of wireless networking technologies for small launch vehicles by leveraging existing nanosat launch...

  10. Condition monitoring of 3G cellular networks through competitive neural models.

    Barreto, Guilherme A; Mota, João C M; Souza, Luis G M; Frota, Rewbenio A; Aguayo, Leonardo


    We develop an unsupervised approach to condition monitoring of cellular networks using competitive neural algorithms. Training is carried out with state vectors representing the normal functioning of a simulated CDMA2000 network. Once training is completed, global and local normality profiles (NPs) are built from the distribution of quantization errors of the training state vectors and their components, respectively. The global NP is used to evaluate the overall condition of the cellular system. If abnormal behavior is detected, local NPs are used in a component-wise fashion to find abnormal state variables. Anomaly detection tests are performed via percentile-based confidence intervals computed over the global and local NPs. We compared the performance of four competitive algorithms [winner-take-all (WTA), frequency-sensitive competitive learning (FSCL), self-organizing map (SOM), and neural-gas algorithm (NGA)] and the results suggest that the joint use of global and local NPs is more efficient and more robust than current single-threshold methods.

  11. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Nishi Sharma


    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  12. AN Enhanced SINR-Based Call Admission Control in 3G Networks

    Moses Ekpenyong


    Full Text Available This paper presents the signal-to-interference plus noise ratio (SINR-based call admission control (CAC as an effective technique that guarantees signal quality for admitted users. We propose a CAC model that admits users as long as the SINR exceeds a threshold (th SINR . To reduce blocking, we ensure that the threshold level is maintained at a lower bound (lb thSINR −, convenient to keep the blocking probability ( Pb below a maximum value ( Pb−max. We simulate the CAC model with the Java programming language and evaluate the performance of the model. Simulation results show that our CAC scheme produce the expected performance that improves the network quality.


    Juan Carlos Plaza


    Full Text Available Convergent service environments are required to deal with current tendency to heterogeneity in networkcontents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management architectures are required to tackle issues regarding: media content, subscriber reachability and subscriptions information coming from different types of networks in order to enable well organized communications among different environments such as: IMS, IPTv and subscribers management repositories. This paper describes the work of Eureka Mobicome project on the definition of an architecture to manage and provide services among distinct service delivery platforms (IPTV and ENUM using IMS as a common core and proposes a compound modular architecture to set the basis for Future Internet converging service provision. The proposed architecture has been validated by the Interconnection of different prototypes deployed at Madrid (Spain and Oslo (Norway.

  14. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Yang, Yinying


    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  15. Energy Consumption in Wireless Sensor Networks

    JIN Yan; WANG Ling; YANG Xiao-zong; WEN Dong-xin


    Wireless sensor networks (WSNs) can be used to collect surrounding data by multi-hop. As sensor networks have the constrained and not rechargeable energy resource, energy efficiency is an important design issue for its topology. In this paper, the energy consumption issue under the different topology is studied. We derive the exact mathematical expression of energy consumption for the fiat and clustering scheme, respectively. Then the energy consumptions of different schemes are compared. By the comparison, multi-level clustering scheme is more energy efficient in large scale networks. Simulation results demonstrate that our analysis is correct from the view of prolonging the large-scale network lifetime and achieving more power reductions.

  16. Wireless traffic steering for green cellular networks

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)


    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  17. Graphical Model Theory for Wireless Sensor Networks

    Davis, William B.


    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  18. Enhanced Network Throughput of Wireless Network for Digital Video Transmission

    S.M. Koli


    Full Text Available Digital video transmission using wireless technology is an important functionality in multimediacommunication. Such wireless transmission considers various parameters of channel like reliability,quality of service (QoS, transmission rate, transmission delay etc. User datagram protocol (UDP is afast transmission protocol used by most of the real-time applications as it is suitable for delay sensitiveapplications like video and audio transmission. UDP does not provide flow control or error recovery anddoes not require connection management. Since more applications with real-time constraints areintroduced day by day, both over wired and over wireless, some improvements should be made in orderto obtain better end to end performance. This paper surveys the literature on real time communicationover wireless and suggests an intermediate solution providing more reliability in transmission usingadaptive error control mechanism. The idea used is to inject an adaptive amount of redundant packets(RPs in every sent block (or datagram in order to achieve a desired recovery rate at the receiverwithout using any retransmission mechanism. The technique used is called adaptive forward errorcontrol (AFEC and is implemented at physical layer. The network simulator NS-2 is used to evaluateAFEC and the simulation results indicate that the suggested methods can guarantee enhanced networkthroughput for video transmission in the high packet loss wireless network.

  19. High availability of hybrid wireless networks

    Leitgeb, Erich; Gebhart, Michael; Birnbacher, Ulla; Kogler, Wolfgang; Schrotter, Peter


    Free Space Optical (FSO) links offer high bandwidth and the flexibility of wireless communication links. However, the availability of FSO links is limited by weather patterns like fog and heavy snowfall. Microwave based communication links operating at high frequencies (40 - 43 GHz) have similar characteristics like high data rates and needed line-of-sight. Link availability for microwave systems is limited by heavy rain. Combining FSO links with microwave links within a hybrid FSO/microwave communication network has the advantage of added redundancy and higher link availability. Measurements over a period of one year show a combined availability of 99.93% for the climatic region of Graz, Austria) which proves that the combination of both technologies leads to a highly available wireless connection offering high bandwidth.

  20. Proportional Fair Coding for Wireless Mesh Networks

    Karumbu, Premkumar; Leith, Douglas


    We consider multi--hop wireless networks carrying unicast flows for multiple users. Each flow has a specified delay deadline, and the lossy wireless links are modelled as binary symmetric channels (BSCs). Since transmission time, also called airtime, on the links is shared amongst flows, increasing the airtime for one flow comes at the cost of reducing the airtime available to other flows sharing the same link. We derive the joint allocation of flow airtimes and coding rates that achieves the proportionally fair throughput allocation. This utility optimisation problem is non--convex, and one of the technical contributions of this paper is to show that the proportional fair utility optimisation can nevertheless be decomposed into a sequence of convex optimisation problems. The solution to this sequence of convex problems is the unique solution to the original non--convex optimisation. Surprisingly, this solution can be written in an explicit form that yields considerable insight into the nature of the proporti...

  1. Design and Implementation of Large Wireless Network

    Bujnoch, Aleš


    Tato bakalářská práce se zabývá technologiemi bezdrátové komunikace a realizací bezdrátové sítě postavené na technologii 4. generace WiFi. Obsahem jsou informace o technologiích bezdrátového přenosu dat, praktickou částí je návrh a vybudování rozsáhlé WiFi sítě pomocí blanket technologie prostřednictvím produktů Extricom. The topic of this Bachelor Thesis is wireless technology and realization of wireless networks built on fourth generation WiFi technology.The work contains information abo...

  2. EESA Algorithm in Wireless Sensor Networks

    Pei Zhang


    Full Text Available Since there are many problems of traditional extended clustering algorithm in wireless sensor network like short extended time, over energy consumption, too many deviated position the of cluster head nodes and so on, this paper proposes the EESA algorithm. The algorithm makes many improvements on the way of dividing clusters, strategy of electing the cluster head and construction method of data relay path, the two aspects of inter-cluster energy balance and energy balance among the cluster are taken into account at the same time. Detailed simulation results are taken in this thesis to compare network lifetime, average residual energy, energy consumption standard deviation of cluster head node and changes of average remaining energy between the EESA algorithm and ACT algorithm, EECA algorithm and MR-LEACH algorithm; the simulation results show that: the proposed algorithm reduces the load of hot regional cluster head, balances the energy consumption of the entire network nodes and extends the networks lifetime of wireless sensor

  3. Crystallization in large wireless networks

    Morgenshtern, Veniamin I


    We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K single-antenna relays using half-duplex two-hop relaying. Assuming that the relays have channel state information (CSI), it is shown that in the large-M limit, provided K grows fast enough as a function of M, the network "decouples" in the sense that the individual source-destination terminal pair capacities are strictly positive. The corresponding required rate of growth of K as a function of M is found to be sufficient to also make the individual source-destination fading links converge to nonfading links. We say that the network "crystallizes" as it breaks up into a set of effectively isolated "wires in the air". A large-deviations analysis is performed to characterize the "crystallization" rate, i.e., the rate (as a function of M,K) at which the decoupled links converge to nonfading links. In the course of this analysis, we develo...

  4. Reliable Communication in Wireless Meshed Networks using Network Coding

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin


    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  5. A tutorial survey of topics in wireless networking: Part I

    Anurag Kumar; D Manjunath


    In this two part paper, we provide a survey of recent and emerging topics in wireless networking. We view the area of wireless networking as dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In the first part of the paper, we first survey the area by providing a taxonomy of wireless networks as they have been deployed. Then, we provide a quick tutorial on the main issues in the wireless ‘physical’ layer, which is concerned with transporting bits over the radio frequency spectrum. Then, we proceed to discuss some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In the second part of the paper, we first analyse random access wireless networks and pay special attention to 802·11 (Wi-Fi) networks. We then survey some topics in ad hoc multihop wireless networks, where we discuss arbitrary networks, as well as some theory of dense random networks. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  6. A tutorial survey of topics in wireless networking: Part II

    Anurag Kumar; D Manjunath


    This is the second part of the survey of recent and emerging topics in wireless networking. We provide an overview of the area of wireless networking as that of dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In Part I we provided a taxonomy of wireless networks as they have been deployed. We then provided a quick survey of the main issues in the wireless 'physical' layer. We then discussed some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In this part we begin with a discussion of random access wireless networks. We first provide an overview of the evolution of random access networks from Aloha to the currently popular 802·11 (Wi-Fi) networks. We then analyse the performance of the 802·11 random access protocol. We briefly discuss the problem of optimal association of nodes to Wi-Fi access points. Next, we consider topics in ad hoc multihop wireless networks. We first discuss topology and cross layer control. For the latter, we describe the important maximum weight link scheduling algorithm. The connectivity and capacity of randomly deployed networks are then analysed. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  7. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank


    link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our......Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  8. Seamless Mobility in Heterogeneous Wireless Networks

    Faouzi Zarai


    Full Text Available In next generation of wireless networks, different technologies belonging to one or more operators should be integrated to form a heterogeneous environment based on an IP core network infrastructure. This ensures user mobility and service continuity by maintaining connections when switching between varioustechnologies and it introduces new resources and possibilities for applications. In this context, an automatic interface selection based on instantaneous and practical constraints and user preferences (Quality of Service (QoS parameters, available resources, security, power consumption, etc is therefore required. The different network selection and handover schemes proposed in the literature can be classified into three approaches according to who is responsible for making the handover decision: the terminal, the network or thanks to a cooperation between both of them. However, these approaches keep presenting some drawbacks; namely the problem of resources management and network load balancing whenever the selection is controlled by the mobile terminal (MT and the problem of scalability and unknown operator’s management policy whenever the selection is rather controlled by the network. In this article, first we propose a new architecture and new network selection scheme that explicitly take into account the current resource usage and the user preferences. Furthermore, our solution ensures the selection of the most suitable network for each flow while taking into consideration its expectations in terms of QoS. A feasibility study of our architecture is then triggered on a single MT by using typical scenarios and using various algorithms to evaluate their performances.

  9. Audio coding in wireless acoustic sensor networks

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt;


    use of the correlation between the sources available at the nodes, we consider the possibility of combining the measurement and the received messages into one single message at each node instead of forwarding the received messages and separate encoding of the measurement. Moreover, to exploit...... the correlation between the messages received by a node and the node's measurement of the source, we propose to use the measurement as side information and thereby form a distributed source coding (DSC) problem. Assuming that the sources are Gaussian, we then derive the rate-distortion function (RDF......In this paper, we consider the problem of source coding for a wireless acoustic sensor network where each node in the network makes its own noisy measurement of the sound field, and communicates with other nodes in the network by sending and receiving encoded versions of the measurements. To make...

  10. Fractional Power Control for Decentralized Wireless Networks

    Jindal, Nihar; Andrews, Jeffrey G


    We propose and analyze a new paradigm for power control in decentralized wireless networks, termed fractional power control. Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. Choosing s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0, 1) allows all intermediate policies between these two extremes to be evaluated, and we see that neither extreme is ideal. We prove that using an exponent of s = 1/2 optimizes the transmission capacity of an ad hoc network, meaning that the inverse square root of the channel strength is the optimal transmit power scaling. Intuitively, this choice achieves the optimal balance between helping disadvantaged users while making sure they do not flood the network with interference.

  11. Wireless Secrecy in Large-Scale Networks

    Pinto, Pedro C; Win, Moe Z


    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of this new class of random graphs. We first analyze the local properties of the iS-graph, namely the degree distributions and their dependence on fading, target secrecy rate, and eavesdropper collusion. To mitigate the effect of the eavesdroppers, we propose two techniques that improve secure connectivity. Then, we analyze the global properties of the iS-graph, namely percolation on the infinite plane, and full connectivity on a finite region. These results help clarify how the presence of eavesdroppers can compromise secure communication in a large-scale network.

  12. Security Threats in Wireless Sensor Networks

    Giannetsos, Athanasios


    intrusions forms an important part of an integrated approach to network security. In this work, we start by considering the problem of cooperative intrusion detection in WSNs and develop a lightweight ID system, called LIDeA, which follows an intelligent agent-based architecture. We show how such a system....... Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... networks are. Motivated by this unexplored security aspect, we investigate a new set of memory related vulnerabilities for sensor embedded devices that, if exploited, can lead to the execution of software-based attacks. We demonstrate how to execute malware on wireless sensor nodes that are based...

  13. Fiber Optic Infrastructure for Wireless Communication Networks

    Lau, Kam Y.; Cutrer, David M.; Georges, John B.; Yeung, Simon

    It is clear that to meet the new demands of wireless customers, conventional cellular service providers and upcoming Personal Communication Service (PCS) providers for conventional phone service and high bandwidth wireless LAN must upgrade their networks to provide complete radio coverage. This evolution has motivated the need for low-cost systems that transport radio signals to and from areas of poor signal coverage. The most important area where this problem must be solved is inside of buildings, since this is where people spend most of their time. Unfortunately, the in-building environment is also the most challenging area to provide radio coverage due to severe attenuation and multi-path effects. The problem must be tackled from the viewpoint of optimization of performance/cost ratio of the network. In this paper, we describe a system-level approach to tackle this problem. We demonstrate how one can trade-off hardware performance, which represent cost, with proper choice of system architecture which includes, among other factors, in-building radio environment, to arrive at an optimum network solution technically and economically.

  14. Wireless sensor networks and ecological monitoring

    Jiang, Joe-Air


    This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.  

  15. Wireless sensors networks MAC protocols analysis

    Chaari, Lamia


    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  16. Wireless sensor networks from theory to applications

    El Emary, Ibrahiem M M


    Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and consider


    G. Rajesh


    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  18. Artificial intelligence based event detection in wireless sensor networks

    Bahrepour, Majid


    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more r

  19. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong


    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  20. Utilising eduroam[TM] Architecture in Building Wireless Community Networks

    Huhtanen, Karri; Vatiainen, Heikki; Keski-Kasari, Sami; Harju, Jarmo


    Purpose: eduroam[TM] has already been proved to be a scalable, secure and feasible way for universities and research institutions to connect their wireless networks into a WLAN roaming community, but the advantages of eduroam[TM] have not yet been fully discovered in the wireless community networks aimed at regular consumers. This aim of this…

  1. Transmit Power Optimisation in Wireless Network

    Besnik Terziu


    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  2. Convergence of wireless, wireline, and photonics next generation networks

    Iniewski, Krzysztof


    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  3. 802.11 Wireless Networks The Definitive Guide

    Gast, Matthew S


    As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware avail

  4. Coexistence of 3G repeaters with LTE base stations.

    Yeo, Woon-Young; Lee, Sang-Min; Hwang, Gyung-Ho; Kim, Jae-Hoon


    Repeaters have been an attractive solution for mobile operators to upgrade their wireless networks at low cost and to extend network coverage effectively. Since the first LTE commercial deployment in 2009, many mobile operators have launched LTE networks by upgrading their 3G and legacy networks. Because all 3G frequency bands are shared with the frequency bands for LTE deployment and 3G mobile operators have an enormous number of repeaters, reusing 3G repeaters in LTE networks is definitely a practical and cost-efficient solution. However, 3G repeaters usually do not support spatial multiplexing with multiple antennas, and thus it is difficult to reuse them directly in LTE networks. In order to support spatial multiplexing of LTE, the role of 3G repeaters should be replaced with small LTE base stations or MIMO-capable repeaters. In this paper, a repeater network is proposed to reuse 3G repeaters in LTE deployment while still supporting multilayer transmission of LTE. Interestingly, the proposed network has a higher cluster throughput than an LTE network with MIMO-capable repeaters.

  5. Analysis on China 3G Development

    Shen Zixin


    @@ Foreword: Forecast of 3G and 3G Evolution International Market Size According to UMTS forecast, by 2010, global annual 3G income could reach USD 320 billion, while that from Asia-Pacific region will be around USD 118 billion.China's selection of 3G standards will affect all global wireless equipment suppliers, while how to select TD-SCDMA most crucial.




    Full Text Available Advances in mobile communication theory have enabled the development of different wireless access technologies. Alongside the revolutionary progress in wireless access technologies, advances in wireless access devices such as laptops, palmtops, and cell phones and mobile middleware have paved the way for the deliveryof beyond-voice-type services while on the move. This sets the platform for high-speed mobile communications that provide high-speed data and both real and non-real time multimedia to mobile users. Today's wireless world uses several communication infrastructures such as Bluetooth for personal area, IEEE 802.11 for local area,Universal Mobile Telecommunication System (UMTS for wide area, and Satellite networks for global networking other hand, since these wireless networks are complementary to each other, their integration and coordinated operation can provide ubiquitous “always best connection" quality mobile communications to the users. This paper discusses the different architectures of wireless networks and the different factors to be considered while designing a hybrid wireless network. The different factors to be considered for design of ahybrid wireless network and the different networks have been explored in this paper.

  7. Lifetime maximization routing with network coding in wireless multihop networks

    DING LiangHui; WU Ping; WANG Hao; PAN ZhiWen; YOU XiaoHu


    In this paper, we consider the lifetime maximization routing with network coding in wireless mul- tihop networks. We first show that lifetime maximization with network coding is different from pure routing, throughput maximization with network coding and energy minimization with network coding. Then we formulate lifetime maximization problems in three different cases of (i) no network coding, (ii) two-way network coding, and (iii) overhearing network coding. To solve these problems, we use flow augmenting routing (FA) for the first case, and then extend the FA with network coding (FANC) by using energy minimized one-hop network coding. After that, we investigate the influence of parameters of FANC, evaluate the performance of FANC with two-way and overhearing network coding schemes and compare it with that without network coding under two different power control models, namely, protocol and physical ones. The results show that the lifetime can be improved significantly by using network coding, and the performance gain of network coding decreases with the increase of flow asymmetry and the power control ability.

  8. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Zhaoming Lu


    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  9. Energy-efficient multipath routing in wireless sensor network considering wireless interference


    Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), design of energy-efficient multipath routing protocols is a crucial concern for WSN applications. To provide high-quality monitoring information, many WSN applications require high-rate data transmission. Multipath routing protocols are often used to increase the network transmission rate and throughput. Although large-scale WSN can be supported by high bandwidth backbone network, the WSN remains the bot...

  10. An Efficient ECDSA-Based Signature Scheme for Wireless Networks

    XU Zhong; DAI Guanzhong; YANG Deming


    Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.

  11. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    Yu, Xianbin; Zhao, Ying; Deng, Lei;


    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  12. A Formal Evaluation of the Security Schemes for Wireless Networks

    Shadi R. Masadeh


    Full Text Available Information security is a critical issue in the wireless network, because the transmission media is open (no physical control on the air. Any wireless device equipped with wireless interface can use and share the airwave transmission medium with other users. For protection purposes, several security mechanisms have been developed over years. This paper provides systematic evaluation of different security schemes used in wireless networks: WEP, TKIP, WPA, AES and WPA2. A formal comparison is made between these security algorithms for different settings such as different data types, different packet sizes and traffic loads.


    Mahadevi G


    Full Text Available Localization is one of the supporting technologies in wireless sensor networks. To identify the exact location of each and every sensor may not be feasible. In most of the sensor network application gathered by sensor will be meaningless without the location of sensor nodes. The researchers involve identifying localization of sensor node for the past years. The localization places a vital role in wireless sensor network. Exchange information with the environment through sensor and implement the function of collecting and delaying with data. Various techniques are available to locate the sensor node from the network. As sensor node is tiny device, it is not easy to develop an application for wireless sensor network security. In this paper we describe the different type of approaches of node localization discovery in wireless sensor networks and we describe the architecture of elliptic curve cryptography processor for network security.

  14. Node Clustering for Wireless Sensor Networks

    Sania Bhatti


    Full Text Available Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted.

  15. Suppressing Redundancy in Wireless Sensor Network Traffic

    Abe, Rey; Honiden, Shinichi

    Redundancy suppression is a network traffic compression technique that, by caching recurring transmission contents at receiving nodes, avoids repeatedly sending duplicate data. Existing implementations require abundant memory both to analyze recent traffic for redundancy and to maintain the cache. Wireless sensor nodes at the same time cannot provide such resources due to hardware constraints. The diversity of protocols and traffic patterns in sensor networks furthermore makes the frequencies and proportions of redundancy in traffic unpredictable. The common practice of narrowing down search parameters based on characteristics of representative packet traces when dissecting data for redundancy thus becomes inappropriate. Such difficulties made us devise a novel protocol that conducts a probabilistic traffic analysis to identify and cache only the subset of redundant transfers that yields most traffic savings. We verified this approach to perform close enough to a solution built on exhaustive analysis and unconstrained caching to be practicable.

  16. Clustering in Wireless Sensor Networks- A Survey

    Sukhkirandeep Kaur


    Full Text Available Increased demand of Wireless Sensor Networks (WSN in various applications has made it a hot research area. Several challenges imposed which include energy conservation, scalability, limited network resources etc. with energy conservation being the most important. Clustering improves the energy efficiency by making high power nodes as cluster heads (CHs which reduces the chance of energy depletion of nodes. Scalability, fault tolerance, data aggregation, energy efficiency are some of the main objectives of clustering. This paper discusses various challenges associated with clustering and different methods or techniques developed to overcome these challenges. Various clustering approaches have been summarized and few prominent Quality of service (QoS based clustering routing protocols for WSN have been identified. Comparison of these approaches and protocols is discussed based on some parameters.

  17. An Algebraic Watchdog for Wireless Network Coding

    Kim, MinJi; Barros, Joao; Koetter, Ralf


    In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et al's watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection. Detailed description of the graphical mode...

  18. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    Hekmat, R.


    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  19. 基于3G 无线传输的测震台站监控设备的研制%The Design and Realization of a Type of Monitoring Equipment for Seismic Stations Based on 3G Wireless Data Transmission

    孙宏志; 王学成; 刘一萌; 卢山; 赵龙梅; 孙恺微


    介绍了一种基于3G(第三代移动通信技术)和 SMS(短信业务)的无线数据传输测震台监控仪的工作原理、设计和实现。可实现对相关设备进行断电、上电、重启和备用设备切换等控制;具有通过网口和串口监控数据采集器工作状态的功能;具有通过3G 无线传输测震数据的功能。%Quickly recovering the seismic signals channel or solving problems with seismic station equipment is a major challenge once they are damaged or experience sudden failure.In our study, we designed and constructed wireless data transmitting and monitoring equipment for seismic sta-tions based on the global system for mobile communication(GSM),third generation mobile com-munication technology(3G)and short message service(SMS).This equipment can control(shut down,switch on,restart,and enable the backup device)remote equipment easily,monitor the earthquake data acquisition system (EDAS)by the serial port and network,and transmit the seis-mic data by 3G.The hardware is composed of a core interfacing circuit board and a driving circuit board.The core circuit board includes one LAN port,two COM ports,and a number of I/O inter-faces.The working status of the EDAS at a local seismic station is real-time monitored through the LAN port and COM port.When abnormal data is outputted from the EDAS,the data output stops or is unable to be recognized.Abnormal information of the EDAS is sent to the earthquake monitoring center as short messages,and the center staff is able to make a judgment and take the correct action according to the messages.We designed two CPUs on the core circuit board,one a P89c668 and the other an STC12C5A60S2.The device can make data exchanges with the EDAS-24IP through the LAN chip.Meanwhile,P89c668 can monitor the real-time data flow of the EDAS-24IP,and analyze the correctness of the seismic data flow of the EDAS-24IP as well.In or-der to store parameter data,we used an electrically erasable

  20. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    Santi, Paolo


    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  1. Guest Editorial: Special Issue on Wireless Mobile Computing and Networking

    Yu Wang; Yanwei Wu; Fan Li; Bin Xu; Teresa Dahlberg


    Recent convergence of information communications technology and computing is creating new demands and opportunities for ubiquitous computing via wireless and mobile equipments.The demanding networking environment of wireless communications and the fast-growing number of mobile users impose several challenges in terms of channel estimation,network protocol design,resource management,systematic design,application development,and security.The objective of this special issue is to gather recent advances addressing networks,systems,algorithms,and applications that support the symbiosis of mobile computers and wireless networks.


    V. Anantha Narayanan


    Full Text Available The Next Generation Wireless Networks (NGWN should be compatible with other communication technologies to offer the best connectivity to the mobile terminal which can access any IP based services at any time from any network without the knowledge of its user. It requires an intelligent vertical handover decision making algorithm to migrate between technologies that enable seamless mobility, always best connection and minimal terminal power consumption. Currently existing decision engines are simple, proprietary and its handover is only based on the received signal strength which has been proven unintelligent. The proposed decision algorithm gains intelligence by combining fuzzy logic system to handle imprecise data, multiple attribute decision making to handle multiple attributes for decision making and context aware strategies to reduce unnecessary handover. The proposed intelligent decision algorithm detects new network which offers best connectivity than current network and does authentication and mobile IP registration before making the handover; thereby reducing the packet loss to ensure high quality of service. This algorithm is capable of forwarding data packets to appropriate attachment point to maximize battery lifetime and also to maintain load balancing. The performance analysis shows that the proposed algorithm efficiently uses the network resources by switching between 3G and Wi-Fi under the different RF environmental conditions to offer best connectivity with minimal service cost to the users. It is observed that average handover delay for the experiment is 30-40ms and the integration of cellular network with WLAN using the proposed intelligent decision algorithm reduces the call dropping rate (<0.006 and call blocking probability (<0.00607 as well as unnecessary handover in heterogeneous networks.


    Priyanka Bhatia


    Full Text Available Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys

  4. Association Analaysis in Wireless Network using Trace data



    Full Text Available With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been proposed, a better way is to study wireless mobility traces which gives more accurate movement information for a population. An accurate location predictor can significantly improve the performance or reliability of wireless network protocols and the wireless network infrastructure itself. These improvements lead to a better user experience to a more cost-effective infrastructure or both. In this work, it is proposed to study mobility traces and generate rules for mobility of users which was previously unknown in campus wide wireless network. We also study analyze and show that atcertain locations access points are very rarely used.

  5. Throughput Maximization for Wireless Multimedia Sensor Networks in Industrial Applications



    Full Text Available n recent years, there has been growing interests in wireless sensor networks. Wireless sensor network is an autonomous system of sensor connected by wireless devices without any fixed infrastructure support. To meet the challenge paradigms of wireless sensor networks like Energy efficiency, Delay constraints, Reliability and adaptive mechanis m the sensor nodes are enhanced with multimedia support. The Wireless multimedia sensor nodes (WMSN enable to streamline the data that will control and monitor the industrial activities within the sensing area. The adaptive sleepless protocol will address the following issues: First, this protocol mainly designed for desired packet delivery and delay probabilities while reducing the energy consumption of the network. Second, this protocol is based on demand based dynamic sleep scheduling scheme for data communication. In this packets are transmitted through the cross layer interaction. In this cross layer interaction enables to reach a maximum efficiency.

  6. Attacks on IEEE 802.11 wireless networks

    Dejan Milan Tepšić


    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  7. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Sanjeev Prakash


    Full Text Available Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G. It is become possible to reduce the size of mobile nodes (MNs with manifold network interfaces and development in IP-based applications. 4G mobile/wireless computing and communication heterogeneous environment consist of various access technologies that differ in bandwidth, network conditions, service type, latency and cost. A major challenge of the 4G wireless network is seamless vertical handoff across the heterogeneous wireless access network as the users are roaming in the heterogeneous wireless network environment. Today communication devices are portable and equipped with manifold interfaces and are capable to roam seamlessly among the various access technology networks for maintaining the network connectivity, since no single-interface technology provides ubiquitous coverage and quality-of-service (QoS. This paper reports a mobile agent based heterogeneous wireless network management system. In this system agent’s decision focuses on multi parameter system (MPS. This system works on the parameters- network delay, received signal strength, network latency and study of the collected information about adjoining network cells viz., accessible channel. System is simulated and a comparative study is also made. From results it is observed that system improves the performance of wireless network.

  8. Handbook of sensor networks compact wireless and wired sensing systems

    Ilyas, Mohammad


    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl


    Dai Qinyun; Yao Wangsheng; Peng Jianmin; Su Gang


    Network capacity is a key characteristic to evaluate the performance of wireless networks. The goal of this paper is to study the capacity of wireless ad hoc relay network. In the model, there is at most ns source nodes transmitting signal simultaneously in the network and the arbitrarily complex network coding is allowed. The upper capacity bound of the network model are derived from the max-flow min-cut theorem and the lower capacity bound are obtained by the rate-distortion function for the Gaussian source. Finally, simulation results show that the upper network capacity will decrease as the number of source nodes is increased.

  10. Energy management in wireless cellular and ad-hoc networks

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios


    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  11. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Marjan Radi


    Full Text Available A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  12. Multipath routing in wireless sensor networks: survey and research challenges.

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey


    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  13. Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model


    THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION Wireless mesh networks (WMNs) are interconnected systems of wireless access points (APs...2004). Channel surfing and spatial retreats: defenses against wireless denial of service. Proceedings of 3rd ACM Workshop on Wireless Security, 80...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DESIGNING INTERFERENCE-ROBUST WIRELESS MESH NETWORKS USING A DEFENDER-ATTACKER-DEFENDER MODEL

  14. Energy Monitoring and Management Mechanism for Wireless Sensor Networks

    Papadakis Andreas


    Full Text Available In this work we discuss a mechanism for the monitoring and management of energy consumption in Wireless Sensor Networks. We consider that the Wireless Sensor Network consists of nodes that operate individually and collaborate with each other. After briefly discussing the typical network topologies and associating with the expected communications needs, we describe a conceptual framework for monitoring and managing the energy consumption on per process basis.

  15. An energy efficient clustering routing algorithm for wireless sensor networks

    LI Li; DONG Shu-song; WEN Xiang-ming


    This article proposes an energy efficient clustering routing (EECR) algorithm for wireless sensor network. The algorithm can divide a sensor network into a few clusters and select a cluster head base on weight value that leads to more uniform energy dissipation evenly among all sensor nodes.Simulations and results show that the algorithm can save overall energy consumption and extend the lifetime of the wireless sensor network.

  16. Embedding of Virtual Network requests over heterogeneous wireless and wired networks

    Bellot Aubanell, Montserrat


    This project implements an embedding algorithm to serve Virtual network requests over a heterogeneous network that integrates wired an wireless mesh networks. [ANGLÈS] Implementation of an embedding algorithm to serve Virtual network requests over a heterogeneous network that integrates wired an wireless mesh networks.This project integrates Sofware Defined Networking and Network Functions virtualization principles. [CASTELLÀ] Creación de un algoritmo de incrustación, para la provisión ...

  17. Control of Wireless Networks with Secrecy

    Koksal, C Emre; Sarikaya, Yunus


    We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks, and incorporate information theoretic secrecy as a Quality of Service constraint. Specifically, each node in the network injects two types of traffic, private and open, at rates chosen in order to maximize a global utility function, subject to network stability and secrecy constraints. The secrecy constraint enforces an arbitrarily low mutual information leakage from the source to every node in the network, except for the sink node. We first obtain the achievable rate region for the problem for single and multi-user systems assuming that the nodes have full CSI of their neighbors. Then, we provide a joint flow control, scheduling and private encoding scheme, which does not rely on the knowledge of the prior distribution of the gain of any channel. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility. Numerical experiments are performed to verify the analytical resu...

  18. A Survey on Energy Efficiency for Wireless Mesh Network

    Sarra Mamechaoui


    Full Text Available Reduction of CO2 emissions is a major global environmental issue. Over the past few years, wireless andmobile communications are becoming increasingly popular with consumers. The Most popular kind ofwireless access is known as Wireless Mesh Networks (WMNs that provide wireless connectivity throughlot cheaper and more supple backhaul infrastructure relative to wired solutions. Wireless Mesh Network(WMN is a new emerging technology which has been adopted as the wireless internetworking solution forthe near future. Due to higher energy consumption in the information and communication technology (ICTindustries, and which would have an impact on the environment, energy efficiency has become a key factorto evaluate the performance of a communication network.This paper primarily focuses on the classification layer the greatest existing approaches devoted to theconservation of energy. It is also discussing the most interesting works on energy saving in WMNsnetworks.

  19. Time Synchronized Wireless Sensor Network for Vibration Measurement

    Uchimura, Yutaka; Nasu, Tadashi; Takahashi, Motoichi

    Network based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard based TSF counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on the synchronization accuracy and the effect is evaluated by stochastic analysis and simulation studies. A new wireless sensing system is developed and the hardware and software specifications are shown. The experiments are conducted in a reinforced concrete building and results show good performance enough for vibration measurement purpose.

  20. Protocol design and analysis for cooperative wireless networks

    Song, Wei; Jin, A-Long


    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  1. Development of a Testbed for Wireless Underground Sensor Networks

    Mehmet C. Vuran


    Full Text Available Wireless Underground Sensor Networks (WUSNs constitute one of the promising application areas of the recently developed wireless sensor networking techniques. WUSN is a specialized kind of Wireless Sensor Network (WSN that mainly focuses on the use of sensors that communicate through soil. Recent models for the wireless underground communication channel are proposed but few field experiments were realized to verify the accuracy of the models. The realization of field WUSN experiments proved to be extremely complex and time-consuming in comparison with the traditional wireless environment. To the best of our knowledge, this is the first work that proposes guidelines for the development of an outdoor WUSN testbed with the goals of improving the accuracy and reducing of time for WUSN experiments. Although the work mainly aims WUSNs, many of the presented practices can also be applied to generic WSN testbeds.

  2. 2014 International Conference on Wireless Communications, Networking and Applications


    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  3. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Chwen-Fu Horng


    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  4. Security Analysis of Routing Protocols in Wireless Sensor Networks

    Mohammad Sadeghi


    Full Text Available In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of these protocols to meet their security requirements. At last some simulation results of these protocols that have been done by their designer are mentioned.

  5. Security Attacks and its Countermeasures in Wireless Sensor Networks



    Full Text Available Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Network.

  6. Performance of the hybrid wireless mesh protocol for wireless mesh networks

    Boye, Magnus; Staalhagen, Lars


    Wireless mesh networks offer a new way of providing end-user access and deploying network infrastructure. Though mesh networks offer a price competitive solution to wired networks, they also come with a set of new challenges such as optimal path selection, channel utilization, and load balancing....... These challenges must first be overcome before satisfactory network stability and throughput can be achieved. This paper studies the performance of the Hybrid Wireless Mesh Protocol, the proposed routing protocol for the upcoming IEEE 802.11s standard. HWMP supports two modes of path selection: reactive...

  7. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Messinger, Gioia; Goldberg, Giora


    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  8. Impact of reduced scale free network on wireless sensor network

    Keshri, Neha; Gupta, Anurag; Mishra, Bimal Kumar


    In heterogeneous wireless sensor network (WSN) each data-packet traverses through multiple hops over restricted communication range before it reaches the sink. The amount of energy required to transmit a data-packet is directly proportional to the number of hops. To balance the energy costs across the entire network and to enhance the robustness in order to improve the lifetime of WSN becomes a key issue of researchers. Due to high dimensionality of an epidemic model of WSN over a general scale free network, it is quite difficult to have close study of network dynamics. To overcome this complexity, we simplify a general scale free network by partitioning all of its motes into two classes: higher-degree motes and lower-degree motes, and equating the degrees of all higher-degree motes with lower-degree motes, yielding a reduced scale free network. We develop an epidemic model of WSN based on reduced scale free network. The existence of unique positive equilibrium is determined with some restrictions. Stability of the system is proved. Furthermore, simulation results show improvements made in this paper have made the entire network have a better robustness to the network failure and the balanced energy costs. This reduced model based on scale free network theory proves more applicable to the research of WSN.

  9. Overlapping coalition formation games in wireless communication networks

    Wang, Tianyu; Saad, Walid; Han, Zhu


    This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...

  10. Software-defined Radio Based Measurement Platform for Wireless Networks.

    Chao, I-Chun; Lee, Kang B; Candell, Richard; Proctor, Frederick; Shen, Chien-Chung; Lin, Shinn-Yan


    End-to-end latency is critical to many distributed applications and services that are based on computer networks. There has been a dramatic push to adopt wireless networking technologies and protocols (such as WiFi, ZigBee, WirelessHART, Bluetooth, ISA100.11a, etc.) into time-critical applications. Examples of such applications include industrial automation, telecommunications, power utility, and financial services. While performance measurement of wired networks has been extensively studied, measuring and quantifying the performance of wireless networks face new challenges and demand different approaches and techniques. In this paper, we describe the design of a measurement platform based on the technologies of software-defined radio (SDR) and IEEE 1588 Precision Time Protocol (PTP) for evaluating the performance of wireless networks.

  11. Study on Sinkhole Attacks in Wireless Ad hoc Networks



    Full Text Available Wireless ad hoc network is a collection of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. As compared to conventional network, wireless ad hocnetwork are more vulnerable to the security attacks. The nature and structure of wireless ad hoc network makes it very attractive to attackers, because there is no fixed infrastructure and administrativeapproach in it. “Sinkhole attack” is one of the severe attacks in this type of network; this makes trustable nodes to malicious nodes that result in loss of secure information. This paper focuses on sinkhole attacks on routing protocols such as DSR, AODV. To overcome the problems occur due to sinkhole we discuss about Security-aware routing (SAR which helps to reduce the impact of such attack.

  12. An energy efficient multipath routing algorithm for wireless sensor networks

    Dulman, Stefan; Wu, Jian; Havinga, Paul


    In this paper we introduce a new routing algorithm for wireless sensor networks. The aim of this algorithm is to provide on-demand multiple disjoint paths between a data source and a destination. Our Multipath On-Demand Routing Algorithm (MDR) improves the reliability of data routing in a wireless m

  13. Collaborative wireless sensor networks in industrial and business processes

    Marin-Perianu, Mihai


    Wireless Sensor Networks (WSNs) create the technological basis for building pervasive, large-scale distributed systems, which can sense their environment in great detail, communicate the relevant information via the wireless medium, reason collectively upon the observed situation and react according

  14. WISER: realistic and scalable wireless mobile IP network emulator

    Kaplan, M. A.; Cichocki, A.; Demers, S.; Fecko, M. A.; Hokelek, I.; Samtani, S.; Unger, J. W.; Uyar, M. U.; Greear, B.


    WISER is a scalable network emulation tool for networks with several hundred heterogeneous wireless nodes. It provides high-fidelity network modeling, exchanges packets in real-time, and faithfully captures the complex interactions among network entities. WISER runs on inexpensive COTS platforms and represents multiple full network stacks, one for each individual virtual node. It supports a flexible open source router platform (XORP) to implement routing protocol stacks. WISER offers wireless MAC emulation capabilities for different types of links, waveforms, radio devices, etc. We present experiments to demonstrate WISER's capabilities enabling a new paradigm for performance evaluation of mobile sensor and ad-hoc networks.

  15. Intrusion Detection in Wireless Body Sensor Networks

    Nadya El MOUSSAID


    Full Text Available The recent advances in electronic and robotics industry have enabled the manufacturing of sensors capable of measuring a set of application-oriented parameters and transmit them back to the base station for analysis purposes. These sensors are widely used in many applications including the healthcare systems forming though a Wireless Body Sensor Networks. The medical data must be highly secured and possible intrusion has to be fully detected to proceed with the prevention phase. In this paper, we propose a new intrusion superframe schema for 802.15.6 standard to detect the cloning attack. The results proved the efficiency of our technique in detecting this type of attack based on 802.15.6 parameters performances coupled with frequency switching at the radio model.

  16. Greedy Maximal Scheduling in Wireless Networks

    Li, Qiao


    In this paper we consider greedy scheduling algorithms in wireless networks, i.e., the schedules are computed by adding links greedily based on some priority vector. Two special cases are considered: 1) Longest Queue First (LQF) scheduling, where the priorities are computed using queue lengths, and 2) Static Priority (SP) scheduling, where the priorities are pre-assigned. We first propose a closed-form lower bound stability region for LQF scheduling, and discuss the tightness result in some scenarios. We then propose an lower bound stability region for SP scheduling with multiple priority vectors, as well as a heuristic priority assignment algorithm, which is related to the well-known Expectation-Maximization (EM) algorithm. The performance gain of the proposed heuristic algorithm is finally confirmed by simulations.

  17. Wildfire safety with wireless sensor networks

    Andrey Somov


    Full Text Available Nowadays, the Wireless Sensor Network (WSN paradigm is extensively used for the environmental monitoring including wildfires. Like other disasters, this phenomenon, if not detected early, may have grave consequences, e.g. a significant pecuniary loss, or even lead to human victims. This paper surveys the approaches to early wildfire detection using WSN facilities with a special focus on real deployments and hardware prototypes. In our work we propose not merely a description, but a classification of the fire detection methods which are divided into three groups: gas sensing, sensing of environmental parameters, and video monitoring. Then the methods are comparatively analyzed from the viewpoints of the cost, power consumption, and implementation complexity. Finally, we summarize our vision of the prospects of resolving the wildfire detection problem using WSNs.

  18. DSTC Layering Protocols in Wireless Cooperative Networks

    Elamvazhuthi, P S; Dey, B K


    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  19. The Capacity Region of Large Wireless Networks

    Niesen, Urs; Shah, Devavrat


    The capacity region of a wireless network with n nodes is the set of all simultaneously achievable rates between all possible n^2 node pairs. In this paper, we consider the question of determining the scaling, with respect to the number of nodes n, of the capacity region when the nodes are placed uniformly at random in a square region of area n and they communicate over Gaussian fading channels. We identify this scaling of the capacity region in terms of \\Theta(n), out of 2^n total possible, cuts. Our results are constructive and provide optimal (in the scaling sense) communication schemes. In the case of a restricted class of traffic requirement (permutation traffic), we determine the precise scaling in terms of a natural generalization of the transport capacity. We illustrate the strength of these results by computing the capacity scaling in a number of scenarios with non-uniform traffic patterns for which no such results have been available before.

  20. A Wireless Sensor Network For Soil Monitoring

    Szlavecz, K.; Cogan, J.; Musaloiu-Elefteri, R.; Small, S.; Terzis, A.; Szalay, A.


    The most spatially complex stratum of a terrestrial ecosystem is its soil. Among the major challenges of studying the soil ecosystem are the diversity and the cryptic nature of biota, and the enormous heterogeneity of the soil substrate. Often this patchiness drives spatial distribution of soil organisms, yet our knowledge on the spatio-temporal patterns of soil conditions is limited. To monitor the environmental conditions at biologically meaningful spatial scales we have developed and deployed a wireless sensor network of thirty nodes. Each node is based on a MICAz mote connected to a custom-built sensor suite that includes a Watermark soil moisture sensor, an Irrometer soil temperature sensor, and sensors capable of recording ambient temperature and light intensity. To assess CO2 production at the ground level a subset of the nodes is equipped with Telaire 6004 CO2 sensor. We developed the software running on the motes from scratch, using the TinyOS development environment. Each mote collects measurements every minute, and stores them persistently in a non-volatile memory. The decision to store data locally at each node enables us to reliably retrieve the data in the face of network losses and premature node failures due to power depletion. Collected measurements are retrieved over the wireless network through a PC-class computer acting as a gateway between the sensor network and the Internet. Considering that motes are battery powered, the largest obstacle hindering long-term sensor network deployments is power consumption. To address this problem, our software powers down sensors between sampling cycles and turns off the radio (the most energy prohibitive mote component) when not in use. By doing so we were able to increase node lifetime by a factor of ten. We collected field data over several weeks. The data was ingested into a SQL Server database, which provides data access through a .NET web services interface. The database provides functions for spatial

  1. Reliability Analysis of Wireless Sensor Networks Using Markovian Model

    Jin Zhu


    Full Text Available This paper investigates reliability analysis of wireless sensor networks whose topology is switching among possible connections which are governed by a Markovian chain. We give the quantized relations between network topology, data acquisition rate, nodes' calculation ability, and network reliability. By applying Lyapunov method, sufficient conditions of network reliability are proposed for such topology switching networks with constant or varying data acquisition rate. With the conditions satisfied, the quantity of data transported over wireless network node will not exceed node capacity such that reliability is ensured. Our theoretical work helps to provide a deeper understanding of real-world wireless sensor networks, which may find its application in the fields of network design and topology control.

  2. Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

    Chakrapani gadde


    Full Text Available In the last decade wireless mesh networks (WMNs have emerged as a key technology for next generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. One such application is to provide peer-to-peer communication for all the users who are distributed over some area. Since the users are connected in awireless multi-hop passion complete ubiquity is provided. But as the number of users accessing the network is increasing there could be a chance of experiencing more interference by each user due to the communication link of every other user. So in a wireless mesh network as the load increases the throughput of network is going to be decreased due to wireless interference by other users. To sustain this problem we are going to integrate the WMN with passive optical network (PON. The resulting hybrid network (Optical-wireless network could reduce the wireless hops of each user, so that we can reduce the total wireless interference experienced by each user resulting in improved network throughput. This paper aims to study the network throughput gain in Optical-wireless network subject to peer-to-peer communications.

  3. Wireless Sensor Networks Formation: Approaches and Techniques

    Miriam Carlos-Mancilla


    Full Text Available Nowadays, wireless sensor networks (WSNs emerge as an active research area in which challenging topics involve energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, efficiency, and so forth. Despite the open problems in WSNs, there are already a high number of applications available. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. A key factor in this is the way the network is formed. This survey presents most recent formation techniques and mechanisms for the WSNs. In this paper, the reviewed works are classified into distributed and centralized techniques. The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not. We focus on recent works and present a discussion of their advantages and drawbacks. Finally, the paper overviews a series of open issues which drive further research in the area.

  4. Wireless Sensor Networks for Environmental Monitoring

    Liang, X.; Liang, Y.; Navarro, M.; Zhong, X.; Villalba, G.; Li, Y.; Davis, T.; Erratt, N.


    Wireless sensor networks (WSNs) have gained an increasing interest in a broad range of new scientific research and applications. WSN technologies can provide high resolution for spatial and temporal data which has not been possible before, opening up new opportunities. On the other hand, WSNs, particularly outdoor WSNs in harsh environments, present great challenges for scientists and engineers in terms of the network design, deployment, operation, management, and maintenance. Since 2010, we have been working on the deployment of an outdoor multi-hop WSN testbed for hydrological/environmental monitoring in a forested hill-sloped region at the Audubon Society of Western Pennsylvania (ASWP), Pennsylvania, USA. The ASWP WSN testbed has continuously evolved and had more than 80 nodes by now. To our knowledge, the ASWP WSN testbed represents one of the first known long-term multi-hop WSN deployments in an outdoor environment. As simulation and laboratory methods are unable to capture the complexity of outdoor environments (e.g., forests, oceans, mountains, or glaciers), which significantly affect WSN operations and maintenance, experimental deployments are essential to investigate and understand WSN behaviors and performances as well as its maintenance characteristics under these harsh conditions. In this talk, based on our empirical studies with the ASWP WSN testbed, we will present our discoveries and investigations on several important aspects including WSN energy profile, node reprogramming, network management system, and testbed maintenance. We will then provide our insight into these critical aspects of outdoor WSN deployments and operations.

  5. Optimizing Retransmission Threshold in Wireless Sensor Networks.

    Bi, Ran; Li, Yingshu; Tan, Guozhen; Sun, Liang


    The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission threshold for all sensor nodes in advance. The method did not take link quality and delay requirement into account, which decreases the probability of a packet passing its delivery path within a given deadline. This paper investigates the problem of finding optimal retransmission thresholds for relay nodes along a delivery path in a sensor network. The object of optimizing retransmission thresholds is to maximize the summation of the probability of the packet being successfully delivered to the next relay node or destination node in time. A dynamic programming-based distributed algorithm for finding optimal retransmission thresholds for relay nodes along a delivery path in the sensor network is proposed. The time complexity is O n Δ · max 1 ≤ i ≤ n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path, n is the length of the delivery path and Δ is the given upper bound of the transmission delay of the delivery path. If Δ is greater than the polynomial, to reduce the time complexity, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, when the ranges of the upper and lower bounds of retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results show that the proposed algorithms have better performance.

  6. Mobility management techniques for the next-generation wireless networks

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.


    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  7. On the Capacity of Hybrid Wireless Networks with Opportunistic Routing

    Tan Le


    Full Text Available This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR. We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure network through base stations. We then develop linear programming models to calculate the end-to-end throughput bounds from multiple source nodes to single as well as multiple destination nodes. The developed models are applied to study several hybrid wireless network examples. Through case studies, we investigate several factors that have significant impacts on the hybrid wireless network capacity under opportunistic routing, such as node transmission range, density and distribution pattern of base stations (BTs, and number of wireless channels on wireless nodes and base stations. Our numerical results demonstrate that opportunistic routing could achieve much higher throughput on both ad hoc and hybrid networks than traditional unicast routing (UR. Moreover, opportunistic routing can efficiently utilize base stations and achieve significantly higher throughput gains in hybrid wireless networks than in pure ad hoc networks especially with multiple-channel base stations.

  8. Dynamic Vehicle Routing for Data Gathering in Wireless Networks

    Çelik, Güner D


    We consider a dynamic vehicle routing problem in wireless networks where messages arriving randomly in time and space are collected by a mobile receiver (vehicle or a collector). The collector is responsible for receiving these messages via wireless communication by dynamically adjusting its position in the network. Our goal is to utilize a combination of wireless transmission and controlled mobility to improve the delay performance in such networks. We show that the necessary and sufficient condition for the stability of such a system (in the bounded average number of messages sense) is given by {\\rho}<1 where {\\rho} is the average system load. We derive fundamental lower bounds for the delay in the system and develop policies that are stable for all loads {\\rho}<1 and that have asymptotically optimal delay scaling. Furthermore, we extend our analysis to the case of multiple collectors in the network. We show that the combination of mobility and wireless transmission results in a delay scaling of {\\The...

  9. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Sun Baolin; Li Layuan


    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  10. Time synchronization in ad-hoc wireless sensor networks

    Sharma, Nishant


    Advances in micro-electronics and developments in the various technologies have given birth to this era of wireless sensor networks. A sensor network is the one which provides information about the surrounding environment by sensing it and clock synchronization in wireless sensor networks plays a vital role to maintain the integrity of entire network. In this paper two major low energy consumption clock synchronization algorithms, Reference Broadcast Synchronization (RBS) and Timing-Sync Protocol for Sensor Networks (TPSN) are simulated, which result in high level of accuracy, reliability, handles substantially greater node densities, supports mobility, and hence perform well under all possible conditions.

  11. A Survey of Encroachment Disclosure in Wireless Sensor Network

    Sushma J. Gaurkar


    Full Text Available In wireless sensor network (WSN security is the major issuebecause of its hostile nature. The traditional intrusion detectiontechnique and traditional access control will not providereliability and security if they do not work cooperatively. If thesecurity is compromised, there could be serious consequencesstarting from theft of information, loss of privacy and reachingeven bankruptcy of that institution. In this paper a brief surveyon some recent intrusion detection technique & access controlmechanism in wireless sensor network is presented anddiscusses them in detail.

  12. Implementation of Low Power Multi-hop Wireless Sensor Network

    Zhou Jianhong; Ma Maode; Fengyong


    In this paper, the multi-hop wireless sensor network is created, which is realized by Micaz and Mib520 Board using TinyOS and Cygwin. The mote transmission mode is engaged and off-the-shelf protocols and algorithm, RSSI and PDR, are applied in this wireless network and the performance is improved. Several experiments are proposed to set standard RSSI threshold value to allow the user to send packet with efficient power level.

  13. Communication patterns in mean field models for wireless sensor networks


    Wireless sensor networks are usually composed of a large number of nodes, and with the increasing processing power and power consumption efficiency they are expected to run more complex protocols in the future. These pose problems in the field of verification and performance evaluation of wireless networks. In this paper, we tailor the mean-field theory as a modeling technique to analyze their behavior. We apply this method to the slotted ALOHA protocol, and establish results on the long term...

  14. Enhancements of LEACH Algorithm for Wireless Networks: A Review

    M. Madheswaran


    Full Text Available Low Energy Adaptive Clustering Hierarchy (LEACH protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN. In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.

  15. Coverage and Connectivity Issue in Wireless Sensor Networks

    Rachit Trivedi


    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  16. Seamless and secure communications over heterogeneous wireless networks

    Cao, Jiannong


    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  17. High Fidelity Simulations of Large-Scale Wireless Networks

    Onunkwo, Uzoma [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Benz, Zachary [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)


    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.

  18. Effects of the Wireless Channel, Signal Compression and Network Architecture on Speech Quality in Voip Networks


    the connection. [11] With the advances of wireless communications and the increasing use of WiFi (Wireless Fidelity) and satellite networks, there...802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications,” ISO/IEC 802-11-1999, 1999. [38] S. McClure et al, Hacking

  19. Loss Discrimination Algorithm for Wired/Wireless Networks

    Liw J. Seng


    Full Text Available Problem statement: Wireless technology has far growing with an increasing demand of the Wireless networking technologies recent years. The wireless access network and cellular networks are being used to support their need. It is usually connected to a wired backbone network. TCP is used to handle the congestion in wired network. However, it is not well suited for hybrid network consisting of wired and wireless networks. Packet loss occurs in wireless network mostly due to high bit error rate, varying in transmission length, or link failure. These scenarios are always misinterpreted by conventional TCP as a congestion loss. Hence, TCP sender performs congestion control which is unnecessary and leads to a poor network performance. Approach: A new algorithm proposed in this study is to differentiate the types of packet loss accurately. The algorithm will classify the packet loss and invoke proper correction mechanisms. Results: Our simulation results show the improvement of TCP performance as compared to the existing Selective-TCP and TCP NewReno. Conclusion: The proposed algorithm on classifying packet loss shows the improvement of TCP performance.

  20. On Radio over Fiber for Heterogeneous Wireless Networks

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup


    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...

  1. Survey on Routing Protocol in Wireless Sensor Network



    Full Text Available The Wireless Sensor Network (WSN is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. WSN are generally used to monitor activities and report events, such as fire, overheating etc. in a specific area or environment. It routs data back to the Base Station (BS. Data transmission is usually a multi-hop from node to nodetowards the BS. Sensor nodes are limited in power, computational and communication bandwidth. Primary goal of researchers is to find the energy efficient routing protocol. This study highlights the different routing protocol with advantages and limitations.

  2. Wireless sensor and ad hoc networks under diversified network scenarios

    Sarkar, Subir Kumar


    Due to significant advantages, including convenience, efficiency and cost-effectiveness, the implementation and use of wireless ad hoc and sensor networks have gained steep growth in recent years. This timely book presents the current state-of-the-art in these popular technologies, providing you with expert guidance for your projects in the field. You find broad-ranging coverage of important concepts and methods, definitions of key terminology, and a look at the direction of future research. Supported with nearly 150 illustrations, the book discusses a variety of critical topics, from topology

  3. Fast notification architecture for wireless sensor networks

    Lee, Dong-Hahk


    In an emergency, since it is vital to transmit the message to the users immediately after analysing the data to prevent disaster, this article presents the deployment of a fast notification architecture for a wireless sensor network. The sensor nodes of the proposed architecture can monitor an emergency situation periodically and transmit the sensing data, immediately to the sink node. We decide on the grade of fire situation according to the decision rule using the sensing values of temperature, CO, smoke density and temperature increasing rate. On the other hand, to estimate the grade of air pollution, the sensing data, such as dust, formaldehyde, NO2, CO2, is applied to the given knowledge model. Since the sink node in the architecture has a ZigBee interface, it can transmit the alert messages in real time according to analysed results received from the host server to the terminals equipped with a SIM card-type ZigBee module. Also, the host server notifies the situation to the registered users who have cellular phone through short message service server of the cellular network. Thus, the proposed architecture can adapt an emergency situation dynamically compared to the conventional architecture using video processing. In the testbed, after generating air pollution and fire data, the terminal receives the message in less than 3 s. In the test results, this system can also be applied to buildings and public areas where many people gather together, to prevent unexpected disasters in urban settings.

  4. Deterministic Secure Positioning in Wireless Sensor Networks

    Delaët, Sylvie; Rokicki, Mariusz; Tixeuil, Sébastien


    Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identification of faking sensors in a WSN. Our scheme does \\emph{not} rely on a subset of \\emph{trusted} nodes that are not allowed to misbehave and are known to every node in the network. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\\lfloor \\frac{n}{2} \\rfloor-2$ faking sensors. Also, when the time of flight (ToF) technique is used, our protocol manages at most $\\lfloor \\frac{n}{2} \\rfloor...

  5. Scaleable wireless web-enabled sensor networks

    Townsend, Christopher P.; Hamel, Michael J.; Sonntag, Peter A.; Trutor, B.; Arms, Steven W.


    Our goal was to develop a long life, low cost, scalable wireless sensing network, which collects and distributes data from a wide variety of sensors over the internet. Time division multiple access was employed with RF transmitter nodes (each w/unique16 bit address) to communicate digital data to a single receiver (range 1/3 mile). One thousand five channel nodes can communicate to one receiver (30 minute update). Current draw (sleep) is 20 microamps, allowing 5 year battery life w/one 3.6 volt Li-Ion AA size battery. The network nodes include sensor excitation (AC or DC), multiplexer, instrumentation amplifier, 16 bit A/D converter, microprocessor, and RF link. They are compatible with thermocouples, strain gauges, load/torque transducers, inductive/capacitive sensors. The receiver (418 MHz) includes a single board computer (SBC) with Ethernet capability, internet file transfer protocols (XML/HTML), and data storage. The receiver detects data from specific nodes, performs error checking, records the data. The web server interrogates the SBC (from Microsoft's Internet Explorer or Netscape's Navigator) to distribute data. This system can collect data from thousands of remote sensors on a smart structure, and be shared by an unlimited number of users.

  6. Fair packet scheduling in Wireless Mesh Networks

    Nawab, Faisal


    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  7. On the Design and Implementation of Wireless Multimedia Sensor Networks

    Qing Pang


    Full Text Available Wireless Sensor Networks (WSN mainly deal with scalar data such as temperature, humidity, and lightwhich are very suitable for low rate and low power IEEE 802.15 based networking technology. Thecommercial off-the-shelf (COTS CMOS camera has fostered researchers to push WSN a step further.The unique properties of multimedia data delivery pose fresh challenges for resource constrained sensornetworks. Transmitting raw data is very costly while limited processing power prevents sophisticatedmultimedia processing at the sensor nodes. Wireless sensor networks offer an attractive choice for lowcost solutions for transmitting data wirelessly to a database to be evaluated. Wireless networks of visualsensors have recently emerged as a new type of sensor-based intelligence system. The goal of the visualsensor network is to provide a user with visual information from an arbitrary viewpoint within themonitored field. Wireless networks in combination with image sensors open up a multitude of previouslyunthinkable sensing applications. In an on-going project, we are designing and implementing a sensornode with a camera which would be capable of acquiring still images, transfer the data onto a personalcomputer through wireless communication, and store the image on a personal computer. This paperexplains the process of capturing the raw image data with a camera sensor and the interfacing of thecamera with the Overo Air computer-on-module (COM. Camera visibility and resolution will also beexplained in this paper along with the procedure taken to configure the sensor node.

  8. Open 3G Network Remote Monitoring System in Digital City%开放式3G网络远程监控系统在数字城市中的应用



    3G remote monitoring technology for the current existence of open weak,poor reliability,lack of application development difficult,this paper intends to build an open 3G network remote monitoring system in terms of the overall architecture of the system and openness,compatibility,reliability of data transmission,etc. and apply it to the dynamic monitoring of digital urban infrastructure and public utilities go,and promote the development of 3G technology and wireless network monitoring,promoting several city urban construction,sharing of information resources.%针对目前3G远程监控技术存在开放性弱、可靠性差、应用开发难的不足,本文拟从系统的整体架构及开放性、兼容性、数据传输的可靠性等方面构建开放式3G网络远程监控系统,并将其应用到数字城市基础设施与公共事业的动态监控中去,推进3G技术在无线网络监控中的应用和发展,促进数市化城市建设,实现信息资源共享。

  9. Wireless Sensor Network Metrics for Real-Time Systems


    time measurement system . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Real-time networked control system . . . . . . . . . . . . . . . . . . . . . . 5...topology with GMM2 and APLM . . . . . . . . . . 103 4.1 Networked control system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 4.2 One / two...4.1. The key issue in designing a wireless networked control system is addressing how to guarantee system performance and stability when the

  10. Strategic Vision on Convergence of Wired and Wireless Networks

    Prasad, Ramjee; Olsen, Rasmus Løvenstein; Saarnio, Juha


    less structure within wireless communication. Furthermore we discuss some of the important aspects in personalisation of future network paradigms with focus on how networks and network services will be able to sense the user’s environment and adapt to this. Finally we discuss one of the most important...

  11. Low-power Radar for Wireless Sensor Networks

    Ditzel, M.; Elferink, F.H.


    Abstract—This paper presents the results of a short study on the feasibility of radars as the primary means of sensing in ad-hoc wireless sensor networks. Radar offers distinct advantages over others means of sensing, normally found in this kind of networks. The sensor networks being considered cons

  12. Intelligent Routing using Ant Algorithms for Wireless Ad Hoc Networks

    S. Menaka


    Full Text Available Wireless network is one of the niche areas and has been a growing interest owing to their ability to control the physical environment even from remote locations. Intelligent routing, bandwidth allocation and power control techniques are the known critical factors for this network communication. It is customary to find a feasible path between the communication end point which is a challenging task in this type of network. The present study proposes an Ant Mobility Model (AMM, an on-demand, multi-path routing algorithm that exercises power control and coordinate the nodes to communicate with one another in wireless network. The main goal of this protocol is to reduce the overhead, congestion, and stagnation, while increasing the throughput of the network. It can be realized from the simulation results that AMM proves to be a promising solution for the mobility pattern in wireless networks like MANETs.

  13. Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic

    Huang, Qian; Ko, King-Tim; Iversen, Villy Bæk


    Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireless networks, where different networks have different statistical characteristics in service and traffic models....... Multiservice loss analysis based on multi-dimensional Markov chain becomes intractable in these networks due to intensive computations required. This paper focuses on performance modeling for heterogeneous wireless networks based on a hierarchical overlay infrastructure. A method based on decomposition...... of the correlated traffic is used to achieve an approximate performance modeling for multiservice in hierarchical heterogeneous wireless networks with overflow traffic. The accuracy of the approximate performance obtained by our proposed modeling is verified by simulations....

  14. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Tu-Liang Lin


    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  15. Capturing of HTTP Protocol Packets in a Wireless Network

    Chetan Soni


    Full Text Available The word wide revolution in wireless technology is changing our lives in term of the way we learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area.The main objective of this paper is to create a fake access point in a wireless network and transfer the fake ARP (Address Resolution Protocol Packets on the same Wi-Fi Network in which users are connected and the name of fake access point also known as ESSID (Extended Service Set Identification is same as the name of the wireless network. So when a fake access point is created with same wireless network name then the user gets disconnected to original network and connects with the fake access point, so all the traffic goes through out your network and you can hijack the details, important information, and secret credentials of that user which is connected to your fake access point network

  16. Performance Evaluation and Optimization of Wireless Sensor Networks

    Dr Jayant Dubey


    Full Text Available A wireless sensor network (WSN is an ad-hoc network composed of small sensor nodes deployed in large numbers to sense the physical world. Wireless sensor networks have very broad application prospects including both military and civilian usage. They include surveillance, tracking at critical facilities, or monitoring animal habitats. Sensor networks have the potential to radically change the way people observe and interact with their environment. With current wireless sensor network technology, people will gain advanced knowledge of physical and social systems, and the advent of a ubiquitous sensing era is coming. In-network processing or data aggregation is an essential function of WSNs to collect raw sensory data and get aggregated statistics about the measured environment, and help queries capture the major feature or changes of the measured systems. As more and more applications of WSNs collect sensitive measurements of people’s everyday life, privacy and security concerns draw more and more attention. If privacy of sensory content is not preserved, it is not feasible to deploy the WSNs for information collection. On the other hand, if integrity of the collected sensory information is not protected, no queries or users can trust and/or use the collected information. Hence, two important issues should be addressed before wireless sensor network systems can realize their promise in civilian applications: (1 protect data privacy, so the deployment of the wireless sensor network systems is feasible; (2 enforce integrity, so users can trust the collected or aggregated information.

  17. Information Security of PHY Layer in Wireless Networks

    Weidong Fang


    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  18. Ubiquitous map-image access through wireless overlay networks

    Cai, Jianfei; Huang, Haijie; Ni, Zefeng; Chen, Chang Wen


    With the availability of various wireless link-layer technologies, such as Bluetooth, WLAN and GPRS, in one wireless device, ubiquitous communications can be realized through managing vertical handoff in the environment of wireless overlay networks. In this paper, we propose a vertical handoff management system based on mobile IPv6, which can automatically manage the multiple network interfaces on the mobile device, and make decisions on network interface selection according to the current situation. Moreover, we apply our proposed vertical handoff management with JPEG-2000 codec to the wireless application of map image access. The developed system is able to provide seamless communications, as well as fast retrieve any interested map region with any block size, in different resolutions and different color representations directly from the compressed bitstream.

  19. Dynamic Session-Key Generation for Wireless Sensor Networks

    Chen Chin-Ling


    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  20. Cross-Layer Protocols for Multimedia Communications over Wireless Networks

    Sen, Jaydip


    In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality-of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional Internet protocol (IP)-based best effort service is not able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer and link layer. Cross layer design i...

  1. Wireless Sensor Networks for Resources Tracking at Building Construction Sites

    SHEN Xuesong; CHEN Wu; LU Ming


    We evaluate the technical feasibility of applying emerging wireless network technologies for re-sources tracking at building construction sites.We first identify practical constraints in solving resource-tracking problems in an enclosed or partially covered environment.We then compare pros and cons of available localization principles and examine the latest wireless communication technologies,including Wi-Fi,Bluetooth,Ultra-Wideband(UWB)and ZigBee.We find that the ZigBee-based wireless sensor network and the received signal strength indicator(RSSI)localization method are most promising to tackle on-site tracking of construction resources.Finally,we anticipate some application challenges associated with deploying wireless sensor networks for resources tracking in the practical context.

  2. UWIN: a universal wireless infrared network system

    Medved, David B.; Halpern, Ron


    Wireless data communications are currently being implemented by the complementary technologies of RF and IR. The RF options provide larger area coverage than wireless optical communications but are limited in full bandwidth throughput to about 5 Mbps whereas infrared systems using IR-LED have achieved data rates up to 125 Mbps which makes them suitable for use in FDDI, Fast Ethernet and ATM wireless connectivity as well as Token Ring, Ethernet and PABX (voice).

  3. Quality of Service in Wireless Sensor Networks (QOS in WSN)

    Zolhavarieh, Seyedjamal; Barati, Molood


    In this paper, we discuss about concept of Quality of Service (QoS) in Wireless Sensor Networks (WSN) and different methods to improve data security network. The most useful methods for network traffic control are Differentiated Services (DS), Integrated Services, Multi-Protocol Labeled Switching (MPLS), Resource Reservation Protocol (RSVP) and Traffic Engineering. Quality of Service is responsible for data transfer between different parts of the network and it guarantees some series of transport properties on the network [14].

  4. Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

    Mohammed A. Abuhelaleh


    Full Text Available Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocolsfor routing organization have been proposed in much research for increasing system throughput,decreasing system delay and saving energy. Even these algorithms have proposed some levels of security,but because of their dynamic nature of communication, most of their security solutions are not suitable. Inthis paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For ourproposal to be more effective and applicable to a large number of wireless sensor networks applications,we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensornetworks and we pick one of the most interesting protocols that have been proposed for this kind ofarchitecture, which is LEACH. This proposal is a module of a complete solution that we are developing tocover all the aspects of wireless sensor networks communication which is labeled Secure Object OrientedArchitecture for Wireless Sensor Networks (SOOAWSN .

  5. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106


    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  6. Multiuser Cooperation with Hybrid Network Coding in Wireless Networks

    G. Wang


    Full Text Available In this paper a hybrid Network Coding Cooperation (hybrid-NCC system is proposed to achieve both reliable transmission and high throughput in wireless networks. To balance the transmission reliability with throughput, the users are divided into cooperative sub-networks based on the geographical information, and the cooperation is implemented in each sub-network. After receiving signals from the cooperative partners, each user encodes them by exploiting hybrid network coding and then forwards the recoded symbols via the Link-Adaptive Regenerative (LAR relaying. First, the Diversity-Multiplexing Tradeoff (DMT is analyzed to demonstrate that the proposed system is bandwidth-efficient. Second, the Symbol Error Probability (SEP is also derived, which shows that the proposed system achieves a higher reliability as compared to the traditional Complex Field Network Coding Cooperation (CFNCC. Moreover, because dedicated relays are not required, our proposed system can both reduce the costs and enhance the flexibility of the implementation. Finally, the analytical results are supported and validated by numerical simulations.

  7. Protocols for Wireless Sensor Networks and Its Security

    Dr. Adil Jamil Zaru


    Full Text Available This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network.

  8. Energy Aware Clustering Algorithms for Wireless Sensor Networks

    Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian


    The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.

  9. Wireless ad hoc and sensor networks management, performance, and applications

    He, Jing


    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  10. An Extended Hierarchical Trusted Model for Wireless Sensor Networks

    DU Ruiying; XU Mingdi; ZHANG Huanguo


    Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance.

  11. Improvement Of Aodv Routing Protocol Based On Wireless Networks

    Baria Vanrajkumar Dineshkumar


    For wireless networks has no support infrastructure and shows a highly dynamic feature, routing becomes a key problem to be solved. Data packets are transmitted on a path that had least hops in AODV protocol. It couldn't consider the path stability. When the node of wireless networks moved quickly and the path had short lifetime, the path recovery and routing again is caused. It is a lot of network resource. For network performance, AODV_V that improvement of AODV protocol in the paper. Opnet...

  12. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar


    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  13. Performance and energy efficiency in wireless self-organized networks

    Gao, C.


    Self-organized packet radio networks (ad-hoc networks) and wireless sensor networks have got massive attention recently. One of critical problems in such networks is the energy efficiency, because wireless nodes are usually powered by battery. Energy efficiency design can dramatically increase the survivability and stability of wireless ad-hoc/sensor networks. In this thesis the energy efficiency has been considered at different protocol layers for wireless ad-hoc/sensor networks. The energy consumption of wireless nodes is inspected at the physical layer and MAC layer. At the network layer, some current routing protocols are compared and special attention has been paid to reactive routing protocols. A minimum hop analysis is given and according to the analysis result, a modification of AODV routing is proposed. A variation of transmit power can be also applied to clustering algorithm, which is believed to be able to control the scalability of network. Clustering a network can also improve the energy efficiency. We offer a clustering scheme based on the link state measurement and variation of transmit power of intra-cluster and inter-cluster transmission. Simulation shows that it can achieve both targets. In association with the clustering algorithm, a global synchronization scheme is proposed to increase the efficiency of clustering algorithm. The research attention has been also paid to self-organization for multi-hop cellular networks. A 2-hop 2-slot uplink proposal to infrastructure-based cellular networks. The proposed solution can significantly increase the throughput of uplink communication and reduce the energy consumption of wireless terminals. (orig.)

  14. Black Hole and Greyhole Attack in Wireless Mesh Network

    Rupinder Kaur


    Full Text Available Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different types of communication devices in technology by which performance is measured.There is a major issue which take part in network and provide security from various kinds of malicious attacks.There are various attacks such as black hole attack,wormhole attack,Greyhole attack, and evesdropping attack.Black hole and Greyhole attacks are network layer attacks that spoils the performance by falling the packets.The black hole and Grey hole are the problem of security that consider in wireless networks.Black hole and Greyhole attack is one type of way of interrupting attack and can cause large amount of damage to network.Black hole attack is act like ad-hoc network; which create network and attack on packets.In black hole attack where a false node not make correct paths in public to receiver node during the direction finding process. Theattacker achieves this attack when all the similar kinds of nodes communicate and make network to each other. It is very important to protectthe network layer from these attack which is also a great issues in wireless mesh network. Greyhole attack is very difficult to detect in wireless mesh network.In this paper,its an overview about black hole attack and grey hole in wireless mesh network and define problem statement about them. Secondly, its take study about related work in which many authors perform on these attacks and then its discuss about proposed method.Thirdly,the results are simulated carried out in OPNET simulator where black hole attack and grey hole attack shows the performance and Its analysis the throughput in network.

  15. Integrated control platform for converged optical and wireless networks

    Yan, Ying

    control platform design. To achieve an integrated and unified control platform, enhanced signalling protocol plays an important role in gluing the two different technologies. Consequently, an integrated resource management system is developed. Furthermore, and admission control scheme for connections......The next generation of broadband access networks is expected to be heterogeneous. Multiple wired and wireless systems can be integrated, in order to simultaneously provide seamless access with an appropriate Quality of Service (QoS). Wireless networks support ubiquitous connectivity yet low data...... the complementary characteristics of the optical networks and the wireless networks, addresses motivations for their interworking, discusses the current progress in hybrid network architectures as well as the functionalities of a control system, and identifies the achieved research contributions in the integrated...

  16. On the Support of Multimedia Applications over Wireless Mesh Networks

    Chemseddine BEMMOUSSAT


    Full Text Available For next generation wireless networks, supporting quality of service (QoS in multimedia application likevideo, streaming and voice over IP is a necessary and critical requirement. Wireless Mesh Networking isenvisioned as a solution for next networks generation and a promising technology for supportingmultimedia application.With decreasing the numbers of mesh clients, QoS will increase automatically. Several research arefocused to improve QoS in Wireless Mesh networks (WMNs, they try to improve a basics algorithm, likerouting protocols or one of example of canal access, but in moments it no sufficient to ensure a robustsolution to transport multimedia application over WMNs.In this paper we propose an efficient routing algorithm for multimedia transmission in the mesh networkand an approach of QoS in the MAC layer for facilitated transport video over the network studied.

  17. Sending policies in dynamic wireless mesh using network coding

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe;


    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures...... of appropriate relays. Finally, various sending policies that can be employed by the nodes in order to improve the overall transmission efficiency in a dynamic wireless mesh network are discussed and their performance is analysed on the constructed simulation setup....... simulated on the constructed test-bed, the advantage of network coding over state of the art routing schemes and the challenges of this new technology are shown. By providing maximum control of the network coding parameters and the simulation environment to the user, the test-bed facilitates quick...

  18. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks



    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  19. Ninth International Conference on Wireless Communication and Sensor Networks

    Tiwari, Murlidhar; Arora, Anish


    Wireless communication and sensor networks would form the backbone to create pervasive and ubiquitous environments that would have profound influence on the society and thus are important to the society. The wireless communication technologies and wireless sensor networks would encompass a wide range of domains such as HW devices such as motes, sensors and associated instrumentation, actuators, transmitters, receivers, antennas, etc., sensor network aspects such as topologies, routing algorithms, integration of heterogeneous network elements and topologies, designing RF devices and systems for energy efficiency and reliability etc. These sensor networks would provide opportunity to continuously and in a distributed manner monitor the environment and generate the necessary warnings and actions. However most of the developments have been demonstrated only in controlled and laboratory environments. So we are yet to see those powerful, ubiquitous applications for the benefit of the society. The conference and con...

  20. Analysis of distribution uniformity of nodes in wireless sensor networks

    Zhang Zhenjiang


    Wireless sensor networks have several special characteristics which make against the network coverage, such as shortage of energy, difficulty with energy supply and so on. In order to prolong the lifetime of wireless sensor networks, it is necessary to balance the whole network load. As the energy consumption is related to the situation of nodes, the distribution uniformity must be considered. In this paper, a new model is proposed to evaluate the nodes distribution uniformity by considering some parameters which include compression discrepancy, sparseness discrepancy, self discrepancy, maximum cavity radius and minimum cavity radius. The simulation results show that the presented model could be helpful for measuring the distribution uniformity of nodes scattered randomly in wireless sensor networks.

  1. Ultra wideband wireless body area networks

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit


    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  2. Target Tracking In Wireless Sensor Networks

    Sunita Gola


    Full Text Available The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. In the tracking scheme illustrated, sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. The technique used for detection is the trilateration technique in which intersection of three circles is used to determine the object location. While the object is being tracked by three sensors, distance to it from a fourth sensor is also being calculated simultaneously. The difference is that closest three sensors detect at a frequency of one second while the fourth sensor detects the object location at twice the frequency. Using the distance information from the fourth sensor and a simple mathematical technique, location of object ispredicted for every half second as well. The key thing to note is that the forth sensor node is not used for detection but only for estimation of the object at half second intervals and hence does not utilize much power. Using this technique, tracking capability of the system is increased.

  3. Wireless sensor networks for structural health monitoring

    Cao, Jiannong


    This brief covers the emerging area of wireless sensor network (WSN)-based structural health monitoring (SHM) systems, and introduces the authors’ WSN-based platform called SenetSHM. It helps the reader differentiate specific requirements of SHM applications from other traditional WSN applications, and demonstrates how these requirements are addressed by using a series of systematic approaches. The brief serves as a practical guide, explaining both the state-of-the-art technologies in domain-specific applications of WSNs, as well as the methodologies used to address the specific requirements for a WSN application. In particular, the brief offers instruction for problem formulation and problem solving based on the authors’ own experiences implementing SenetSHM. Seven concise chapters cover the development of hardware and software design of SenetSHM, as well as in-field experiments conducted while testing the platform. The brief’s exploration of the SenetSHM platform is a valuable feature for civil engine...

  4. Green Modulation in Proactive Wireless Sensor Networks

    Abouei, Jamshid; Pasupathy, Subbarayan


    Due to unique characteristics of sensor nodes, choosing energy-efficient modulation scheme with low-complexity implementation (refereed to as green modulation) is a critical factor in the physical layer of Wireless Sensor Networks (WSNs). This paper presents (to the best of our knowledge) the first in-depth analysis of energy efficiency of various modulation schemes using realistic models in IEEE 802.15.4 standard and present state-of-the art technology, to find the best scheme in a proactive WSN over Rayleigh and Rician flat-fading channel models with path-loss. For this purpose, we describe the system model according to a pre-determined time-based process in practical sensor nodes. The present analysis also includes the effect of bandwidth and active mode duration on energy efficiency of popular modulation designs in the pass-band and Ultra-WideBand (UWB) categories. Experimental results show that among various pass-band and UWB modulation schemes, Non-Coherent M-ary Frequency Shift Keying (NC-MFSK) with sm...

  5. Industrial wireless networking with resource constraint devices

    Das, Kallol


    During the last decade, wireless technologies have revolutionized the industrial automation sector by enabling wireless sensing and actuation for industrial applications. Most of these recently developed industrial standards are built on top of IEEE802.15.4 interface, which uses 2.4GHz frequency ban

  6. A Developed Network Layer Handover Based Wireless Networks

    Ali Safa Sadiq


    Full Text Available This paper proposes an Advanced Mobility Handover (AMH scheme based on Wireless Local Area Networks (WLANs by developing a network layer handover procedure which triggers messages to be sent to the next access point. The proposed AMH scheme performs the network handover process, which is represented by binding update procedure in advance during the time mobile node is still connected to the current AP in the link layer. Furthermore, a unique home IPv6 address is developed to maintain an IP communication with other corresponding nodes without a care-of-address during mobile node$'$s roaming process. This can contribute significantly to reducing network layer handover delays and signaling costs by eliminate the process of obtaining a new care-of-address and processing the handover of network layer in advance while the mobile node is still communicating with the current access point. Eventually, the conducted OMNET++ simulated scenario shows that the proposed AMH scheme performs the best in terms of reducing the handover delay as compared to the state of the art.

  7. Wireless Sensors and Networks for Advanced Energy Management

    Hardy, J.E.


    Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

  8. A Survey of Wireless Sensor Network Security and Routing Techniques

    Raja Waseem Anwar


    Full Text Available The main purpose of the study is to review the evolution of wireless sensor network security and routing techniques. Recent years have seen tremendous growth in Wireless Sensor Networks (WSNs. As WSN’s become more and more crucial to everyday life, their security and trust become a primary concern. However because of the nature of WSNs, security design can be challenging. Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs. The review study provides an overview of Wireless Sensor Network (WSN and discusses security issues and the routing techniques for high quality of service and efficient performance in a WSN. In order to identify gaps and propose research directions in WSN security and routing techniques, the study surveys the existing body of literature in this area. The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs. The trust and security are interchangeable with each other when we elaborate a secure system and not same. Various surveys conducted about trust and reputation systems in ad hoc and sensor networks are studied and compared. Finally we summarize the different trust aware routing schemes.

  9. An Efficient Management System for Wireless Sensor Networks

    Mei-Yu Lee


    Full Text Available Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP-based sensor network management system was developed that is a convenient and effective way for managers to monitor and control sensor network operations. This paper proposes a novel WSNManagement system that can show the connections stated of relationships among sensor nodes and can be used for monitoring, collecting, and analyzing information obtained by wireless sensor networks. The proposed network management system uses collected information for system configuration. The function of performance analysis facilitates convenient management of sensors. Experimental results show that the proposed method enhances the alive rate of an overall sensor node system, reduces the packet lost rate by roughly 5%, and reduces delay time by roughly 0.2 seconds. Performance analysis demonstrates that the proposed system is effective for wireless sensor network management.

  10. An efficient management system for wireless sensor networks.

    Ma, Yi-Wei; Chen, Jiann-Liang; Huang, Yueh-Min; Lee, Mei-Yu


    Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP)-based sensor network management system was developed that is a convenient and effective way for managers to monitor and control sensor network operations. This paper proposes a novel WSNManagement system that can show the connections stated of relationships among sensor nodes and can be used for monitoring, collecting, and analyzing information obtained by wireless sensor networks. The proposed network management system uses collected information for system configuration. The function of performance analysis facilitates convenient management of sensors. Experimental results show that the proposed method enhances the alive rate of an overall sensor node system, reduces the packet lost rate by roughly 5%, and reduces delay time by roughly 0.2 seconds. Performance analysis demonstrates that the proposed system is effective for wireless sensor network management.

  11. A Novel Approach to Fair Routing in Wireless Mesh Networks

    Määttä Juho


    Full Text Available Multiradio wireless mesh network (WMN is a feasible choice for several applications, as routers with multiple network interface cards have become cheaper. Routing in any network has a great impact on the overall network performance, thus a routing protocol or algorithm for WMN should be carefully designed taking into account the specific characteristics of the network. In addition, in wireless networks, serious unfairness can occur between users if the issue is not addressed in the network protocols or algorithms. In this paper, we are proposing a novel centralized routing algorithm, called Subscriber Aware Fair Routing in WMN (SAFARI, for multiradio WMN that assures fairness, leads to a feasible scheduling, and does not collapse the aggregate network throughput with a strict fairness criterion. We show that our protocol is feasible and practical, and exhaustive simulations show that the performance is improved compared to traditional routing algorithms.

  12. Robust message routing for mobile (wireless) ad hoc networks.

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie (Sandia National Laboratories, Albuquerque, NM); Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M. (University of Illinois, Urbana, IL)


    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  13. Patient Health Monitoring Using Wireless Body Area Network

    Hsu Myat Thwe


    Full Text Available Abstract Nowadays remote patient health monitoring using wireless technology plays very vigorous role in a society. Wireless technology helps monitoring of physiological parameters like body temperature heart rate respiration blood pressure and ECG. The main aim of this paper is to propose a wireless sensor network system in which both heart rate and body temperature ofmultiplepatients can monitor on PC at the same time via RF network. The proposed prototype system includes two sensor nodes and receiver node base station. The sensor nodes are able to transmit data to receiver using wireless nRF transceiver module.The nRF transceiver module is used to transfer the data from microcontroller to PC and a graphical user interface GUI is developed to display the measured data and save to database. This system can provide very cheaper easier and quick respondent history of patient.


    Saiyad Tausif Ali *; Gaurav Pawar; Pragati Rathi; Mandar Pathak


    3G Power grid system is dual side stream of electricity and automated construct information and distributed advanced energy delivery network. In this 3G Power grid system avoided the thermal and hydro sources of energy. By using the solar power and wind power energy will generate electricity according with the condition of nature. 3G Power grid system provides the facility of generating as well as marketing of electricity not only for the producers but also for consumers. By using megabytes o...

  15. Interference in wireless ad hoc networks with smart antennas

    Alabdulmohsin, Ibrahim


    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  16. Path Loss Exponent Estimation in Large Wireless Networks

    Srinivasa, Sunil


    Even though the analyses in many wireless networking problems assume that the value of the path loss exponent (PLE) is known a priori, this is often not the case, and an accurate estimate is crucial for the study and design of wireless systems. In this paper, we address the problem of estimating the PLE in large wireless networks, which is relevant to several important issues in communications such as localization, energy-efficient routing, and channel access. We consider a large ad hoc network where nodes are distributed as a homogeneous Poisson point process on the plane, and the channels are subject to Nakagami-m fading. We propose and discuss three algorithms for PLE estimation under these settings that explicitly take into account the interference in the network. Simulation results are provided to demonstrate the performance of the algorithms and quantify the estimation errors.

  17. System-level Modeling of Wireless Integrated Sensor Networks

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan


    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...


    Shuang Song


    Full Text Available Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.

  19. Evaluation of Communication Overheads in Wireless Sensor Networks

    Shiv Prasad Kori1 , Dr. R. K . Baghel2


    Full Text Available Wireless sensor network are collection of small sensing self powered nodes organized into a cooperative network which have certain processing capabilities and the nodes communicate wirelessly. Sensing, processing and communication are three key elements whose combination in one node gives rise to a vast number of applications of wireless sensor networks in areas such as environmental monitoring, warfare, education, agriculture to name a few. In the present work, the comparative evaluation of communication overhead due to sink mobility with speed variations, the effect of update time variation, the effect of number of nodes used in the wirelesssensor networks is carried out. It has been observed that communication overheads increasesignificantly when sink mobility is high. The communication overheads can be reduced by increasing update time

  20. Distributed Source Localization in Wireless Underground Sensor Networks

    Chen, Hongyang; Wang, Chen


    Node localization plays an important role in many practical applications of wireless underground sensor networks (WUSNs), such as finding the locations of earthquake epicenters, underground explosions, and microseismic events in mines. It is more difficult to obtain the time-difference-of-arrival (TDOA) measurements in WUSNs than in terrestrial wireless sensor networks because of the unfavorable channel characteristics in the underground environment. The robust Chinese remainder theorem (RCRT) has been shown to be an effective tool for solving the phase ambiguity problem and frequency estimation problem in wireless sensor networks. In this paper, the RCRT is used to robustly estimate TDOA or range difference in WUSNs and therefore improves the ranging accuracy in such networks. After obtaining the range difference, distributed source localization algorithms based on a diffusion strategy are proposed to decrease the communication cost while satisfying the localization accuracy requirement. Simulation results c...

  1. Security Routing Protocol For The Wireless Mesh Networks (WMNs)

    王五妹; 赵彩丹; 黄联芬; 姚彦


    The pretty promising Wireless Mesh Networking technique, which is regarded as the next generation wireless Internet, not only possesses the normal features of wireless networks, but also has the advantages of multi-hop, self-organizing, etc. However, the great strength of the Mesh Networks also lead to a serious problem in the perspective of network security. This paper starts with the security issue of WMN routing and puts forward the corresponding solutions to the two kinds of routings’ security, such as adding the public/private (Pi/Si) key to the AODV to solve the problem of black hole and adding the credit value of nodes to the DSR to improve the security.

  2. Small Worlds in the Tree Topologies of Wireless Sensor Networks

    Qiao, Li; Lingguo, Cui; Baihai, Zhang


    In this study, the characteristics of small worlds are investigated in the context of the tree topologies of wireless sensor networks. Tree topologies, which construct spatial graphs with larger characteristic path lengths than random graphs and small clustering coefficients, are ubiquitous...... in wireless sensor networks. Suffering from the link rewiring or the link addition, the characteristic path length of the tree topology reduces rapidly and the clustering coefficient increases greatly. The variety of characteristic path length influences the time synchronization characteristics of wireless...... sensor networks greatly. With the increase of the link rewiring or the link addition probability, the time synchronization error decreases drastically. Two novel protocols named LEACH-SW and TREEPSI-SW are proposed to improve the performances of the sensor networks, in which the small world...


    Nada Alamri


    Full Text Available The vision of next generation wireless network (NGWN is to integrate different wireless accesstechnologies, each with its own characteristics, into a common IP-based core network to provide mobileuser with service continuity and seamless roaming. One of the major issues for the convergedheterogeneous networks is providing a seamless vertical handover (VHO with QoS support. In this paperwe have reviewed the various interworking architectures and handover scenarios between UMTS andWiMAX. Also, we have compared the proposed solutions based on different criteria and revealed the prosand cons of each scheme. The comparison aids to adopt a better interworking and handover mechanismin NGWN.

  4. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Sanjeev Prakash; R. B. Patel; Jain, V.K.


    Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G). It is become possible to red...


    Indra Dwi Rianto


    Full Text Available WiFi Protected Setup (WPS is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute force attack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.

  6. Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks

    Wang, Junfang; Xie, Bin; Agrawal, Dharma P.

    A wireless mesh network (WMN) is a particular type of mobile ad hoc network (MANET), which aims to provide ubiquitous high bandwidth access for a large number of users. A pure MANET is dynamically formed by mobile devices without the requirement of any existing infrastructure or prior network configuration. Similar to MANETs, a WMN also has the ability of self-organization, self-discovering, self-healing, and self-configuration. However, a WMN is typically a collection of stationary mesh routers (MRs) with each employing multiple radios. Some MRs have wired connections and act as the Internet gateways (IGWs) to provide Internet connectivity for other MRs. These new features of WMNs over MANETs enable them to be a promising alternative for high broadband Internet access. In this chapter, we elaborate on the evolution from MANETs to WMNs and provide a comprehensive understanding of WMNs from theoretical aspects to practical protocols, while comparing it with MANETs. In particular, we focus on the following critical issues with respect to WMN deployment: Network Capacity, Positioning Technique, Fairness Transmission and Multiradio Routing Protocols. We end this chapter with some open problems and future directions in WMNs.

  7. Low Cost Wireless Sensor Network for Continuous Bridge monitoring

    Han, Bo; Kalis, A; Tragas, P;


    Continuous monitoring wireless sensor networks (WSN) are considered as one of the most promising means to harvest information from large structures in order to assist in structural health monitoring and management. At the same time, continuous monitoring WSNs suffer from limited network lifetimes...

  8. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security


    vulnerability assessment capability within the Marine Corps. 15. NUMBER OF PAGES 177 14. SUBJECT TERMS Wireless Local Area Network (WLAN), WiFi ... WiFi Protected Access xviii THIS PAGE INTENTIONALLY LEFT BLANK xix...intelligence officers in how to hack into U.S. computers2. Government networks, proprietary commercial information, and scientific research are all

  9. Reliable Uplink Communication through Double Association in Wireless Heterogeneous Networks

    Kim, Dong Min; Popovski, Petar


    We investigate methods for network association that improve the reliability of uplink transmissions in dense wireless heterogeneous networks. The stochastic geometry analysis shows that the double association, in which an uplink transmission is transmitted to a macro Base Station (BS) and small B...

  10. Self Reconfigurable Wireless Networks With Dsdv Protocol Implementation

    K. Muthulakshmi


    Full Text Available In multi hop wireless networks experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications’ bandwidth demands. These failures cause severe performance degradation in wireless networks or require expensive manual network management for their real-time recovery. This paper presents an autonomous network reconfiguration system (ARS with destination sequence distance vector (DSDV protocol that enables a multi radio Wireless network to autonomously recover from local link failures to preserve network performance. By using channel and radio diversities in Wireless networks, ARS generates necessary changes in local radio and channel assignments in order to recover from failures. Next, based on the thus-generated configuration changes, the system cooperatively reconfigures network settings among local mesh router. In this concept during the data transmission if the link fails in between the nodes, the previous node act as the header node. The header node, creating the loop around the neighboring nodes and find the energy efficient path, after finding the path send the data’s towards it to reach the destination. Because of this there is no chance for data losing, Here ARS has been implemented and evaluated extensively on through ns2-based simulation. Our evaluation results show that ARS outperforms existing failure recovery schemes in improving channel-efficiency .

  11. Data aggregation for target tracking in wireless sensor networks

    Lageweg, C.R; Janssen, J.A.A.J.; Ditzel, M.


    This paper presents the results of a study on the effects of data aggregation for target tracking in wireless sensor networks. In these networks energy, computing power and communication bandwidth are scarce. A novel approach towards data aggregation is proposed. It is tested in a simulation environ

  12. Distributed Service Discovery for Heterogeneous Wireless Sensor Networks

    Marin-Perianu, R.S.; Scholten, J.; Havinga, P.J.M.


    Service discovery in heterogeneous Wireless Sensor Networks is a challenging research objective, due to the inherent limitations of sensor nodes and their extensive and dense deployment. The protocols proposed for ad hoc networks are too heavy for sensor environments. This paper presents a resourcea

  13. Seamless integrated network system for wireless communication systems

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.


    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly i

  14. Seamless integrated network system for wireless communication systems

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.


    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly i

  15. The Use of Wireless Sensor Network for Increasing Airport Safety

    Jakub Kraus


    Full Text Available This article deals with the use of wireless sensor networks for increasing safety at airports, respectively for replacing the current monitoring system to ensure safety. The article describes sensor networks and their applications to the identified processes and consideration of financial and safety benefits.

  16. Sustainable Performance in Energy Harvesting - Wireless Sensor Networks

    Fafoutis, Xenofon; Di Mauro, Alessio; Dragoni, Nicola


    In this practical demo we illustrate the concept of "sustainable performance" in Energy-Harvesting Wireless Sensor Networks (EH-WSNs). In particular, for different classes of applications and under several energy harvesting scenarios, we show how it is possible to have sustainable performance when...... nodes in the network are powered by ambient energy....

  17. Connected Dominating Set Based Topology Control in Wireless Sensor Networks

    He, Jing


    Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…

  18. Performance analysis of wireless sensor networks in geophysical sensing applications

    Uligere Narasimhamurthy, Adithya

    Performance is an important criteria to consider before switching from a wired network to a wireless sensing network. Performance is especially important in geophysical sensing where the quality of the sensing system is measured by the precision of the acquired signal. Can a wireless sensing network maintain the same reliability and quality metrics that a wired system provides? Our work focuses on evaluating the wireless GeoMote sensor motes that were developed by previous computer science graduate students at Mines. Specifically, we conducted a set of experiments, namely WalkAway and Linear Array experiments, to characterize the performance of the wireless motes. The motes were also equipped with the Sticking Heartbeat Aperture Resynchronization Protocol (SHARP), a time synchronization protocol developed by a previous computer science graduate student at Mines. This protocol should automatically synchronize the mote's internal clocks and reduce time synchronization errors. We also collected passive data to evaluate the response of GeoMotes to various frequency components associated with the seismic waves. With the data collected from these experiments, we evaluated the performance of the SHARP protocol and compared the performance of our GeoMote wireless system against the industry standard wired seismograph system (Geometric-Geode). Using arrival time analysis and seismic velocity calculations, we set out to answer the following question. Can our wireless sensing system (GeoMotes) perform similarly to a traditional wired system in a realistic scenario?

  19. Multipath Routing of Multiple Description Coded Images in Wireless Networks

    徐缓缓; 朱策; 虞露


    Multiple description coding (MDC) generates multiple decodable bitstreams for a source to combat informa-tion loss. In this paper, multipath routing problem for two-description coded images is investigated for traditional and coded wireless networks without and with coding capability at intermediate nodes, respectively. Firstly, we formulate an interference-aware MDC multipath routing for traditional networks by employing a time-division link scheduling method to eliminate wireless interference, and ultimately obtain an optimal path selection corresponding to the minimum achievable distortion. Secondly, for coded networks, we evaluate practical wireless network coding (NC) in delivering descriptions of multiple unicast sessions. While NC increases maximum supporting flow rate of MDC descriptions in wireless networks, possible undecodability of NC mixed information is alleviated by MDC. To minimize achievable distortion, a proposed interference-and-coding-aware MDC multipath routing strikes a good balance between minimizing side effect of wireless interference avoidance and maximizing NC opportunity. Simulation results validate the effectiveness of the two proposed schemes.

  20. Utility-based bandwidth allocation algorithm for heterogeneous wireless networks

    CHAI Rong; WANG XiuJuan; CHEN QianBin; SVENSSON Tommy


    In next generation wireless network (NGWN), mobile users are capable of connecting to the core network through various heterogeneous wireless access networks, such as cellular network, wireless metropolitan area network (WMAN), wireless local area network (WLAN), and ad hoc network. NGWN is expected to provide high-bandwidth connectivity with guaranteed quality-of-service to mobile users in a seamless manner; however, this desired function demands seamless coordination of the heterogeneous radio access network (RAN) technologies. In recent years, some researches have been conducted to design radio resource management (RRM) architectures and algorithms for NGWN; however, few studies stress the problem of joint network performance optimization, which is an essential goal for a cooperative service providing scenario. Furthermore, while some authors consider the competition among the service providers, the QoS requirements of users and the resource competition within access networks are not fully considered. In this paper, we present an interworking integrated network architecture, which is responsible for monitoring the status information of different radio access technologies (RATs) and executing the resource allocation algorithm. Within this architecture, the problem of joint bandwidth allocation for heterogeneous integrated networks is formulated based on utility function theory and bankruptcy game theory. The proposed bandwidth allocation scheme comprises two successive stages, i.e., service bandwidth allocation and user bandwidth allocation. At the service bandwidth allocation stage, the optimal amount of bandwidth for different types of services in each network is allocated based on the criterion of joint utility maximization. At the user bandwidth allocation stage, the service bandwidth in each network is optimally allocated among users in the network according to bankruptcy game theory. Numerical results demonstrate the efficiency of

  1. Architecture Aware Key Management Scheme for Wireless Sensor Networks

    Mohammed FEHAM


    Full Text Available The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.

  2. Maximizing lifetime of wireless sensor networks using genetic approach

    Wagh, Sanjeev; Prasad, Ramjee


    The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor...... nodes are deployed in an inaccessible location for particular mission, it is difficult to exchange or recharge the nodes battery. Hence the important issues to design the sensor network for maximum time duration of network and also for low power operation of the nodes. The proposal is to select...... the cluster head intelligently using auction data of node i.e. its local battery power, topology strength and external battery support. The network lifetime is the centre focus of the research paper which explores intelligently selection of cluster head using auction based approach. The multi...

  3. Energy Harvesting Wireless Strain Networks Project

    National Aeronautics and Space Administration — Prime Research LC (PPLC) and Virginia Tech (VT) propose to develop an energy harvesting wireless strain node technology that utilizes single-crystal piezoelectric...

  4. Efficient Electronic Payment Fit for Wireless Network

    HUANGZheng; CHENKefei; ZHENGDong


    David Chaum and Stefan Brands have proposed famous electronic cash schemes. Both schemes offer multi-party security as well as unconditional privacy of payments. We can see that Brands has managed to design a new kind of payment system without the inefficient features of Chaum's electronic cash while still matching most of the requirements placed on electronic cash. Brands' scheme uses simpler signature mechanisms,shorter messages and has smaller storage requirements,which make it very easy and feasible to implement in a wireless network. Both Chaum and Brands' electronic cash schemes are off-line electronic schemes. Unfortunately, to prevent Double-Spending from happening, the security of Brands' scheme relies heavily on the tamper-resistance device. The best way to prevent Double-Spending is to use some kind of on-line system.The on-line electronic payment system has been criticized mostly for its cost inefficiency and its inconvenience. But with the high developing speed of mobile techniques, many people like to use their mobile phone to navigate the Internet or send short messages, for example, NTT's Docomo.People nowadays like to be on-line everywhere and it is a trivial thing to require the user to be on-line when doing the electronic payment in the near future. This paper introduces an electronic payment system that implements Brands' efficient technology (restrictive blinding signature) into the user's mobile phone or user's PDA. The system is very efficient because of using restrictive blinding signature scheme and offers multi-party security as well as unconditional privacy of payments. This system has some features of on-line system, so it can prevent double-spending from happening.

  5. SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

    Khaled Zeraoulia


    Full Text Available Next-generation wireless networks (NGN and internet of Thing (IoT become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment. SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.


    Sharvani G S


    Full Text Available A wireless ad-hoc network is a collection of nodes which are selfconfiguring, connected by wireless links. The nodes are free to move randomly and organize themselves arbitrarily; thus, the network's topology may change rapidly and unpredictably. These kinds of networks are very flexible and they do not require any existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary communication links. The biggest challenge in these kinds of networks is to find a path between the communication end points of nodes that are mobile. Due to the limited transmission range of wireless interfaces, the communication traffic has to be relayed over several intermediate nodes to enable the communication between two nodes. Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The proposed model is designed to improve the problems of real-time event-based communication. It improves the packet delivery ratio by prior prediction and reduces end-to-end packet delay. This in turn improves performance of the routing process significantly and increases the Quality of Service (QoS.

  7. A Unifying Framework for Local Throughput in Wireless Networks

    Pinto, Pedro C


    With the increased competition for the electromagnetic spectrum, it is important to characterize the impact of interference in the performance of a wireless network, which is traditionally measured by its throughput. This paper presents a unifying framework for characterizing the local throughput in wireless networks. We first analyze the throughput of a probe link from a connectivity perspective, in which a packet is successfully received if it does not collide with other packets from nodes within its reach (called the audible interferers). We then characterize the throughput from a signal-to-interference-plus-noise ratio (SINR) perspective, in which a packet is successfully received if the SINR exceeds some threshold, considering the interference from all emitting nodes in the network. Our main contribution is to generalize and unify various results scattered throughout the literature. In particular, the proposed framework encompasses arbitrary wireless propagation effects (e.g, Nakagami-m fading, Rician fa...


    S. Sharmila


    Full Text Available Wireless Sensor Networks are extremely vulnerable to any kind of routing attacks due to several factors such as wireless transmission and resource-constrained nodes. In this respect, securing the packets is of great importance when designing the infrastructure and protocols of sensor networks. This paper describes the hardware architecture of secure routing for wireless sensor networks. The routing path is selected using Ad-hoc on demand distance vector routing protocol (AODV. The data packets are converted into digest using hash functions. The functionality of the proposed method is modeled using Verilog HDL in MODELSIM simulator and the performance is compared with various target devices. The results show that the data packets are secured and defend against the routing attacks with minimum energy consumption.

  9. Lifting Scheme DWT Implementation in a Wireless Vision Sensor Network

    Ong, Jia Jan; Ang, L.-M.; Seng, K. P.

    This paper presents the practical implementation of a Wireless Visual Sensor Network (WVSN) with DWT processing on the visual nodes. WVSN consists of visual nodes that capture video and transmit to the base-station without processing. Limitation of network bandwidth restrains the implementation of real time video streaming from remote visual nodes through wireless communication. Three layers of DWT filters are implemented to process the captured image from the camera. With having all the wavelet coefficients produced, it is possible just to transmit the low frequency band coefficients and obtain an approximate image at the base-station. This will reduce the amount of power required in transmission. When necessary, transmitting all the wavelet coefficients will produce the full detail of image, which is similar to the image captured at the visual nodes. The visual node combines the CMOS camera, Xilinx Spartan-3L FPGA and wireless ZigBee® network that uses the Ember EM250 chip.

  10. A Wireless Sensor Network Air Pollution Monitoring System

    Khedo, Kavi K; Mungur, Avinash; Mauritius, University of; Mauritius,; 10.5121/ijwmn.2010.2203


    Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of dat...

  11. Energy parameter estimation in solar powered wireless sensor networks

    Mousa, Mustafa


    The operation of solar powered wireless sensor networks is associated with numerous challenges. One of the main challenges is the high variability of solar power input and battery capacity, due to factors such as weather, humidity, dust and temperature. In this article, we propose a set of tools that can be implemented onboard high power wireless sensor networks to estimate the battery condition and capacity as well as solar power availability. These parameters are very important to optimize sensing and communications operations and maximize the reliability of the complete system. Experimental results show that the performance of typical Lithium Ion batteries severely degrades outdoors in a matter of weeks or months, and that the availability of solar energy in an urban solar powered wireless sensor network is highly variable, which underlines the need for such power and energy estimation algorithms.

  12. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Md. Golam Rashed


    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  13. 7th China Conference on Wireless Sensor Networks

    Cui, Li; Guo, Zhongwen


    Advanced Technologies in Ad Hoc and Sensor Networks collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China.

  14. Open-WiSe: a solar powered wireless sensor network platform.

    González, Apolinar; Aquino, Raúl; Mata, Walter; Ochoa, Alberto; Saldaña, Pedro; Edwards, Arthur


    Because battery-powered nodes are required in wireless sensor networks and energy consumption represents an important design consideration, alternate energy sources are needed to provide more effective and optimal function. The main goal of this work is to present an energy harvesting wireless sensor network platform, the Open Wireless Sensor node (WiSe). The design and implementation of the solar powered wireless platform is described including the hardware architecture, firmware, and a POSIX Real-Time Kernel. A sleep and wake up strategy was implemented to prolong the lifetime of the wireless sensor network. This platform was developed as a tool for researchers investigating Wireless sensor network or system integrators.

  15. CORMEN: Coding-Aware Opportunistic Routing in Wireless Mess Network

    Islam, Jeherul


    These Network Coding improves the network operation beyond the traditional routing or store-and-forward, by mixing of data stream within a network. Network coding techniques explicitly minimizes the total no of transmission in wireless network. The Coding-aware routing maximizes the coding opportunity by finding the coding possible path for every packet in the network. Here we propose CORMEN: a new coding-aware routing mechanism based on opportunistic routing. In CORMEN, every node independently can take the decision whether to code packets or not and forwarding of packets is based on the coding opportunity available.

  16. A novel mathematical model for coverage in wireless sensor network

    YAN Zhen-ya; ZHENG Bao-yu


    Coverage problem is one of the fundamental issues in the design of wireless sensor network, which has a great impact on the performance of sensor network. In this article,coverage problem was investigated using a mathematical model named Birth-death process. In this model, sensor nodes joining into networks at every period of time is considered as the rebirth of network and the quitting of sensor nodes from the networks is considered as the death of the network. In the end, an analytical solution is used to investigate the appropriate rate to meet the coverage requirement.

  17. Private synchronization technique for heterogeneous wireless network (WiFi and WiMAX)

    Al-Sherbaz, Ali; Adams, Chris; Jassim, Sabah


    Horizontal developments in communication systems have led to the emergence of new wireless technologies like WiMAX, 3G and 4G. These expansions can provide new opportunities for further advances and exciting applications in particular if we can integrate different technology standards into heterogeneous wireless networks. WiMAX and WiFi wireless networks are two examples of different standard technologies that cannot communicate with each other using existing protocols. These two standards differ in frequency, protocol and management mechanisms, and hence to construct a heterogeneous network using WiFi and WiMAX devices these differences need to be harmonised and resolved. Synchronization is the first step towards in such a process. In this paper we propose a private synchronization technique that enables WiFi and WiMAX devices to communicate with each other. Precise time synchronization in the micro second resolution range is required. The CPU clock is used as a reference for this private synchronization. Our private synchronization solution is based on interposing an extra thin layer between MAC and PHY layers in both WiFi and WiMAX. This extra thin layer will assign alternate synchronization and other duties to the two systems.

  18. Resource optimization scheme for multimedia-enabled wireless mesh networks.

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md Jalil; Suh, Doug Young


    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment.

  19. Potential Security Attacks on Wireless Networks and their Countermeasure

    Sreedhar. C


    Full Text Available The security of wireless networks has been a constant topic in the recent years. With the advance ofwireless networks, building reliable and secured communication is becoming extremely important.Wireless security is a mechanism of preventing unauthorized access or damage to computers usingwireless networks. A mobile ad-hoc network (MANET is a self-organizing system of mobile nodes thatcommunicate with each other through wireless links with no fixed infrastructure or centralizedadministration. This paper presents potential security attacks on Ad-hoc On-demand Distance Vector(AODV routing protocol and their countermeasure. IETF standardized AODV and considered as one ofthe most popular and promising on-demand routing protocols because of its lower network overhead andalgorithm complexity. AODV protocol does not store all the routing information in its routing table andthis causes potential security threat to the wireless networks. In this paper, we consider various knownsecurity attacks and in- specific blackhole attack on AODV and propose a countermeasure to thwartblackhole attack.

  20. Key Management for Secure Multicast over IPv6 Wireless Networks

    Siddiqi Mohammad Umar


    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  1. Transmission Delay Based Control over Networks with Wireless Links


    To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission error is much different from congestion control. The paper analyzes the side effect of RTT estimation while making the TCP source to handle congestion and wireless error losses properly. Then present a strategy using information feedback by the last hop acknowledgement and monitoring the queuing level of the wired bottleneck link by calculating the changes in transmission delay along the path. With the identification of the early stage of congestion, it can respond to wired congestion quickly while keeping wireless link more reliable, and make TCP react to the different packets losses more appropriately.

  2. The Effect of Physical Topology on Wireless Sensor Network Lifetime

    Debdhanit Yupho; Joseph Kabara


    Wireless sensor networks must measure environmental conditions, such as temperature, over extended periods and therefore require a long system lifetime. The design of long lifetime networks in turn requires efficient sensor node circuits, algorithms, and protocols. Protocols such as GSP (Gossip-based Sleep Protocol) have been shown to mitigate energy consumption in idle listening and receiving, by turning off the receiver circuit. However, previous studies of network lifetime have been based ...

  3. Real-time performance analysis of wireless multimedia networks based on partially observed multivariate point processes

    Hortos, William S.


    Third-generation (3G) wireless networks will support integrated multimedia services based on a cellular extension of a packet-switched architecture using variants of the Internet protocol (IP). Services can be categorized as real- time and delay-sensitive, or non-real-time and delay- insensitive. Each call, arriving to or active within the network, carries demand for one or more services in parallel; each service type with a guaranteed quality of service (QoS). Admission of new calls to the wireless IP network (WIN) from the gateway of a wired network or from a mobile subscriber (MS) is allowed by call admission control procedures. Roaming of the MSs among the nodes of the WIN is controlled by handoff procedures between base stations (BSs), or BS controllers, and the MSs. Metrics such as the probabilities of call blocking and dropping, handoff transition time, processing latency of a call, throughput, and capacity are used to evaluate the performance of network control procedures. The metrics are directly related to the network resources required to provide the QoS for the integrated services.

  4. Energy-efficient scheduling under delay constraints for wireless networks

    Berry, Randal; Zafer, Murtaza


    Packet delay and energy consumption are important considerations in wireless and sensor networks as these metrics directly affect the quality of service of the application and the resource consumption of the network; especially, for a rapidly growing class of real-time applications that impose strict restrictions on packet delays. Dynamic rate control is a novel technique for adapting the transmission rate of wireless devices, almost in real-time, to opportunistically exploit time-varying channel conditions as well as changing traffic patterns. Since power consumption is not a linear function

  5. 1-Bit Compressive Data Gathering for Wireless Sensor Networks

    Jiping Xiong


    Full Text Available Compressive sensing (CS has been widely used in wireless sensor networks for the purpose of reducing the data gathering communication overhead in recent years. In this paper, we firstly apply 1-bit compressive sensing to wireless sensor networks to further reduce the communication overhead that each sensor needs to send. Furthermore, we propose a novel blind 1-bit CS reconstruction algorithm which outperforms other state-of-the-art blind 1-bit CS reconstruction algorithms under the settings of WSN. Experimental results on real sensor datasets demonstrate the efficiency of our method.

  6. Efficient Evaluation of Wireless Real-Time Control Networks

    Peter Horvath


    Full Text Available In this paper, we present a system simulation framework for the design and performance evaluation of complex wireless cyber-physical systems. We describe the simulator architecture and the specific developments that are required to simulate cyber-physical systems relying on multi-channel, multihop mesh networks. We introduce realistic and efficient physical layer models and a system simulation methodology, which provides statistically significant performance evaluation results with low computational complexity. The capabilities of the proposed framework are illustrated in the example of WirelessHART, a centralized, real-time, multi-hop mesh network designed for industrial control and monitor applications.

  7. Wireless networks and security issues, challenges and research trends

    Pathan, Al-Sakib


     “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting  for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.  

  8. The UWB Solution for Multimedia Traffic in Wireless Sensor Networks

    Boudhir, A A; Ahmed, M Ben; Said, Elbrak; 10.5121/ijwmn


    Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications. The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.

  9. Link-Quality Measurement and Reporting in Wireless Sensor Networks

    Byoungjo Choi


    Full Text Available Wireless Sensor networks (WSNs are created by small hardware devices that possess the necessary functionalities to measure and exchange a variety of environmental data in their deployment setting. In this paper, we discuss the experiments in deploying a testbed as a first step towards creating a fully functional heterogeneous wireless network-based underground monitoring system. The system is mainly composed of mobile and static ZigBee nodes, which are deployed on the underground mine galleries for measuring ambient temperature. In addition, we describe the measured results of link characteristics such as received signal strength, latency and throughput for different scenarios.

  10. Virtual reality mobility model for wireless ad hoc networks

    Yu Ziyue; Gong Bo; He Xingui


    For wireless ad hoc networks simulation.node's mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment,and the model uses the path planning method to avoid obstacles and to compute the node's moving path.Obstacles also affect node's signal propagation.Considering these factors,this study implements the mobility model for wireless ad hoc networks.Simulation results show that the model has a significant impact on the performance of protocols.


    M. Salamah


    Full Text Available Transmitter range assignment in clustered wireless networks is the bottleneck of the balance between energy conservation and the connectivity to deliver data to the sink or gateway node. The aim of this research is to optimize the energy consumption through reducing the transmission ranges of the nodes, while maintaining high probability to have end-to-end connectivity to the network’s data sink. We modified the approach given in [1] to achieve more than 25% power saving through reducing cluster head (CH transmission range of the backbone nodes in a multihop wireless sensor network with ensuring at least 95% end-to-end connectivity probability.

  12. Model-Based Event Detection in Wireless Sensor Networks

    Gupchup, Jayant; Burns, Randal; Szalay, Alex


    In this paper we present an application of techniques from statistical signal processing to the problem of event detection in wireless sensor networks used for environmental monitoring. The proposed approach uses the well-established Principal Component Analysis (PCA) technique to build a compact model of the observed phenomena that is able to capture daily and seasonal trends in the collected measurements. We then use the divergence between actual measurements and model predictions to detect the existence of discrete events within the collected data streams. Our preliminary results show that this event detection mechanism is sensitive enough to detect the onset of rain events using the temperature modality of a wireless sensor network.

  13. Hybrid positioning with lighting LEDs and Zigbee multihop wireless network

    Lee, Y. U.; Baang, S.; Park, J.; Zhou, Z.; Kavehrad, M.


    A simple, accurate, secure, long-lasting, and portable hybrid positioning system is proposed and designed in this paper. It consists of a lighting LED that generates visible light data corresponding to position information of a target and a Zigbee wireless network communication module with low power, security, and service area expansion characteristics. Under an indoor environment where there is 23.62m distance between an observer and the target, the presented hybrid positioning system is tested and is verified with the functions of Zigbee three hop wireless networking and visible light communication (VLC) scheme. The test results are analyzed and discussed.

  14. Characteristics of Key Update Strategies for Wireless Sensor Networks

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming


    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys...... is one of the essential points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we investigate key update methods that may be used in wireless sensor networks, and benefiting from stochastic model checking we derive characteristics...

  15. An Air-Ground Wireless Sensor Network for Crop Monitoring

    Claudio Rossi


    Full Text Available This paper presents a collaborative system made up of a Wireless Sensor Network (WSN and an aerial robot, which is applied to real-time frost monitoring in vineyards. The core feature of our system is a dynamic mobile node carried by an aerial robot, which ensures communication between sparse clusters located at fragmented parcels and a base station. This system overcomes some limitations of the wireless networks in areas with such characteristics. The use of a dedicated communication channel enables data routing to/from unlimited distances.

  16. A Survey on Threats and Security schemes in Wireless Sensor Networks



    Full Text Available It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.

  17. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Bloomquist, Jane; Musa, Atif


    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  18. Analysis of k-Coverage in Wireless Sensor Networks

    Rasmi Ranjan Patra


    Full Text Available Recently, a concept of wireless sensor networks has attracted much attention due to its wide-range of potential applications. Wireless sensor networks also pose a number of challenging optimization problems. One of the fundamental problems in sensor networks is the coverage problem, which reflects the quality of service that can be provided by a particular sensor network. The coverage concept is depending from several points of view due to a variety of sensors and a wide-range of their applications. One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this problem as a decision problem, whose goal is to determine the degree of coverage of a sensor network, which is covered by at least k sensors, where k is a predefined value. The sensing ranges of sensors can be same or different. Performance evaluation of our protocol indicates that degree of coverage of wireless sensor networks can be determined within small period of time. Therefore energy consumption of the sensor networks can be minimized.

  19. An Adaptive Lossless Data Compression Scheme for Wireless Sensor Networks

    Jonathan Gana Kolo


    Full Text Available Energy is an important consideration in the design and deployment of wireless sensor networks (WSNs since sensor nodes are typically powered by batteries with limited capacity. Since the communication unit on a wireless sensor node is the major power consumer, data compression is one of possible techniques that can help reduce the amount of data exchanged between wireless sensor nodes resulting in power saving. However, wireless sensor networks possess significant limitations in communication, processing, storage, bandwidth, and power. Thus, any data compression scheme proposed for WSNs must be lightweight. In this paper, we present an adaptive lossless data compression (ALDC algorithm for wireless sensor networks. Our proposed ALDC scheme performs compression losslessly using multiple code options. Adaptive compression schemes allow compression to dynamically adjust to a changing source. The data sequence to be compressed is partitioned into blocks, and the optimal compression scheme is applied for each block. Using various real-world sensor datasets we demonstrate the merits of our proposed compression algorithm in comparison with other recently proposed lossless compression algorithms for WSNs.

  20. Secure MAC for Wireless Sensor Networks through RBFNN

    P.Sankara Rao


    Full Text Available This paper discusses an application of a neural network in wireless sensor network security. It presents a Radial Basic Function Neural Network based media access control protocol (MAC to secure a CSMA-based wireless sensor network against the denial-of-service attacks launched by adversaries. The Radial Basic Function Neural Network enhances the security of a WSN by constantly monitoring the parameters that exhibit unusual variations in case of an attack. The RBFN shuts down the MAC layer and the physical layer of the sensor node when the suspicion factor, the output of the MLP, exceeds a preset threshold level. The MLP-guarded secure WSN is implemented using the Prowler simulator. Simulation results show that the MLP helps in extending the lifetime of the WSN.

  1. Burstiness-Aware Congestion Control Protocol for Wireless Sensor Networks

    Liang Lulu; Gao Deyun; Qin Yajuan; Zhang Hongke


    In monitoring Wireless Sensor Networks (WSNs),the traffic usually has bursty characteristics when an event occurs.Transient congestion would increase delay and packet loss rate severely,which greatly reduces network performance.To solve this problem,we propose a Burstiness-aware Congestion.Control Protocol (BCCP) for wireless sensor networks.In BCCP,the backoff delay is adopted as a congestion indication.Normally,sensor nodes work on contention-based MAC protocol (such as CSMA/CA).However,when congestion occurs,localized TDMA instead of CSMA/CA is embedded into the nodes around the congestion area.Thus,the congestion nodes only deliver their data during their assigned slots to alleviate the contention-caused congestion.Finally,we implement BCCP in our sensor network testbed.The experiment results show that BCCP could detect area congestion in time,and improve the network performance significantly in terms of delay and packet loss rate.

  2. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko


    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  3. MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

    Mohamed Labib Borham


    Full Text Available In this paper, we propose a Modified distributed storage algorithm for wireless sensor networks (MDSA. Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity,and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different reasons such as battery failure or physical damage. Since every node collects significant data about its region, it is important to find a methodology to recover these data in case of failure of the source node. Distributed storage algorithms provide reliable access to data through the redundancy spread over individual unreliable nodes. The proposed algorithm uses flooding to spread data over the network and unicasting to provide controlled data redundancy through the network. We evaluate the performance of the proposed algorithm through implementation and simulation. We show the results and the performance evaluation of the proposed algorithm

  4. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    Roy Sohini


    Full Text Available Wireless Sensor Network (WSN has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at the cost of energy. Hierarchical routing is more useful in this regard. The proposed algorithm Energy Aware Cluster Based Routing Scheme (EACBRS aims at conserving energy with the help of hierarchical routing by calculating the optimum number of cluster heads for the network, selecting energy-efficient route to the sink and by offering congestion control. Simulation results prove that EACBRS performs better than existing hierarchical routing algorithms like Distributed Energy-Efficient Clustering (DEEC algorithm for heterogeneous wireless sensor networks and Energy Efficient Heterogeneous Clustered scheme for Wireless Sensor Network (EEHC.

  5. Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization

    Daniel G. Costa


    Full Text Available The development of wireless sensor networks for control and monitoring functions has created a vibrant investigation scenario, where many critical topics, such as communication efficiency and energy consumption, have been investigated in the past few years. However, when sensors are endowed with low-power cameras for visual monitoring, a new scope of challenges is raised, demanding new research efforts. In this context, the resource-constrained nature of sensor nodes has demanded the use of prioritization approaches as a practical mechanism to lower the transmission burden of visual data over wireless sensor networks. Many works in recent years have considered local-level prioritization parameters to enhance the overall performance of those networks, but global-level policies can potentially achieve better results in terms of visual monitoring efficiency. In this paper, we make a broad review of some recent works on priority-based optimizations in wireless visual sensor networks. Moreover, we envisage some research trends when exploiting prioritization, potentially fostering the development of promising optimizations for wireless sensor networks composed of visual sensors.

  6. Media-specific rate allocation in heterogeneous wireless networks

    JURCA Dan; FROSSARD Pascal


    We address the problem of joint path selection and rate allocation in multipath wireless streaming, in order to optimize a media specific quality of service. We leverage on the existence of multiple parallel wireless services, in order to enhance the received video quality at a wireless client. An optimization problem is proposed, aimed at minimizing a video distortion metric based on sequence-dependent parameters, and transmission channel characteristics, for a given wireless network infrastructure.Even if joint optimal path selection and rate allocation is in general an NP complete problem, an in-depth analysis of the media distortion evolution allows defining a low complexity optimal streaming strategy, under reasonable network assumptions. In particular, we show that a greedy allocation of rates along paths with increasing error probability leads to an optimal solution. We argue that a network path should not be chosen for transmission, unless all other available paths with lower error probability have been chosen. Moreover, the chosen paths should be used at their maximum end-to-end bandwidth. These results are demonstrated for both independent network paths, and non-disjoint channel segments, in generic network topologies. Simulation results showed that the optimal rate allocation carefully trades off total encoding/transmission rate, with the end-to-end transmission error probability and the number of chosen paths. In many cases, the optimal rate allocation provides more than 20% improvement in received video quality, compared to heuristic-based algorithms.

  7. Analysis Of Packets Delay In Wireless Data Networks

    Krivchenkov Aleksandr


    Full Text Available The networks with wireless links for automation control applications traffic transmission when packets have small size and application payload is predictable are under consideration. Analytical model for packets delay on their propagation path through the network is proposed. Estimations for network architectures based on WiFi and Bluetooth wireless technologies are made. The specifications for physical layer 802.11 a/b/g/n and 802.15.1 are under consideration. Analytical and experimental results for delivered network bandwidth for different network architecture, traffic structure and wireless technologies were compared to validate that basic mechanisms are correctly taken into account in the model. It is shown that basic effects are taken into account and further accuracy “improvement” of the model will give not more than 5%. As a result that is important for automation control applications we have reliably received the lowest possible level for packets delay in one wireless link. For 802.11 it is of order of 0.2 ms, for 802.15.1 it is 1.25 ms and is true when application packet can be transferred by one data frame.

  8. Recent development in wireless sensor and ad-hoc networks

    Li, Xiaolong; Yang, Yeon-Mo


    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  9. Research trends in wireless visual sensor networks when exploiting prioritization.

    Costa, Daniel G; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo


    The development of wireless sensor networks for control and monitoring functions has created a vibrant investigation scenario, where many critical topics, such as communication efficiency and energy consumption, have been investigated in the past few years. However, when sensors are endowed with low-power cameras for visual monitoring, a new scope of challenges is raised, demanding new research efforts. In this context, the resource-constrained nature of sensor nodes has demanded the use of prioritization approaches as a practical mechanism to lower the transmission burden of visual data over wireless sensor networks. Many works in recent years have considered local-level prioritization parameters to enhance the overall performance of those networks, but global-level policies can potentially achieve better results in terms of visual monitoring efficiency. In this paper, we make a broad review of some recent works on priority-based optimizations in wireless visual sensor networks. Moreover, we envisage some research trends when exploiting prioritization, potentially fostering the development of promising optimizations for wireless sensor networks composed of visual sensors.


    Gerardine Immaculate Mary


    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  11. Challenges of CAC in Heterogeneous Wireless Cognitive Networks

    Wang, Jiazheng; Fu, Xiuhua

    Call admission control (CAC) is known as an effective functionality in ensuring the QoS of wireless networks. The vision of next generation wireless networks has led to the development of new call admission control (CAC) algorithms specifically designed for heterogeneous wireless Cognitive networks. However, there will be a number of challenges created by dynamic spectrum access and scheduling techniques associated with the cognitive systems. In this paper for the first time, we recommend that the CAC policies should be distinguished between primary users and secondary users. The classification of different methods of cac policies in cognitive networks contexts is proposed. Although there have been some researches within the umbrella of Joint CAC and cross-layer optimization for wireless networks, the advent of the cognitive networks adds some additional problems. We present the conceptual models for joint CAC and cross-layer optimization respectively. Also, the benefit of Cognition can only be realized fully if application requirements and traffic flow contexts are determined or inferred in order to know what modes of operation and spectrum bands to use at each point in time. The process model of Cognition involved per-flow-based CAC is presented. Because there may be a number of parameters on different levels affecting a CAC decision and the conditions for accepting or rejecting a call must be computed quickly and frequently, simplicity and practicability are particularly important for designing a feasible CAC algorithm. In a word, a more thorough understanding of CAC in heterogeneous wireless cognitive networks may help one to design better CAC algorithms.

  12. Routing Protocol for Mobile Ad-hoc Wireless Networks

    I. M. B. Nogales


    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  13. Efficient Real-time Video Transmission in Wireless Mesh Network

    Rajanikanth Aluvalu


    Full Text Available We are experiencing rapid improvement in video transmission and picture quality. The technologies are supporting us with real-time video transmissions such as video conferences and webinars. Soon reliable, simple, low cost real-time video will become essential, providing its extensive support to mobiles; PDA’s etc. These enhancements are going to affect the consumer behaviour, business culture. Video transmission includes transmitting packets through Wireless Mesh Network (WMN, which turned out to be a challenging scenario for real-time video services. Due to the existing nature of wireless networks include the presence of unpredictable delays and high packet error rates due to the error-prone nature of the wireless links. In this paper, we will propose a model which provides high capacity data transfer with reduced delay. We have simulated and achieved results with higher through put.

  14. Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses

    Sen, Jaydip


    Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

  15. A survey on routing in wireless sensor networks

    XIAO Renyi; WU Guozheng


    One of the most important issues in wireless sensor networks is data delivery service between sensors and the data collection unit (called sink ). Although sensor networks and mobile ad hoc networks are similar to some extent, they are radically distinct in many aspects. Sensor networks have many unique features, making them more challenging and need further research efforts. The existing routing protocols for sensor networks can be classified as indicator-based and indicator-free. In this survey, we make a comparative study of these protocols. Open issues and research directions are pointed out as guidelines for our future work.

  16. IPv6 for Future Wireless Networks

    Nielsen, Thomas Toftegaard


    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...

  17. Joint routing, scheduling, and power control for multichannel wireless sensor networks with physical interference


    Reliability and real-time requirements bring new challenges to the energy-constrained wireless sensor networks, especially to the industrial wireless sensor networks. Meanwhile, the capacity of wireless sensor networks can be substantially increased by operating on multiple nonoverlapping channels. In this context, new routing, scheduling, and power control algorithms are required to achieve reliable and real-time communications and to fully utilize the increased bandwidth in multichannel wireless sensor ne...

  18. Two-scale cost efficiency optimization of 5G wireless backhaul networks

    Ge, Xiaohu; Tu, Song; Mao, Guoqiang; Lau, Vincent K. N.; Pan, Linghui


    To cater for the demands of future fifth generation (5G) ultra-dense small cell networks, the wireless backhaul network is an attractive solution for the urban deployment of 5G wireless networks. Optimization of 5G wireless backhaul networks is a key issue. In this paper we propose a two-scale optimization solution to maximize the cost efficiency of 5G wireless backhaul networks. Specifically, the number and positions of gateways are optimized in the long time scale of 5G wireless backhaul ne...

  19. Medium access control and network layer design for 60 GHz wireless personal area networks

    An, X.


    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks (WPA

  20. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks

    Virendra Pal Singh


    Full Text Available Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. One of them is hello flood attack, in which an adversary, which is not a legal node in the network, can flood hello request to any legitimate node and break the security of WSN. The current solutions for these types of attacks are mainly cryptographic, which suffer from heavy computational complexity. Hence they are less suitable for wireless sensor networks. In this paper a method based on signal strength has been proposed to detect and prevent hello flood attack. Nodes have been classified as friend and stranger based on the signal strength. Short client puzzles that require less computational power and battery power have been used to check the validity of suspicious nodes.